last executing test programs: 1.180118284s ago: executing program 4 (id=206): openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max', 0x2, 0x0) 1.161297824s ago: executing program 4 (id=212): ioperm(0x0, 0x0, 0x0) 1.160889804s ago: executing program 4 (id=214): socket$inet_sctp(0x2, 0x1, 0x84) 1.160364624s ago: executing program 4 (id=219): select(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000)) 1.119180534s ago: executing program 4 (id=223): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bifrost', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bifrost', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bifrost', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bifrost', 0x800, 0x0) 1.118667394s ago: executing program 4 (id=227): pause() 1.055281845s ago: executing program 2 (id=250): landlock_create_ruleset(&(0x7f0000000000), 0x0, 0x0) 1.055010544s ago: executing program 2 (id=254): socket$nl_route(0x10, 0x3, 0x0) 1.038010795s ago: executing program 2 (id=257): openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/access', 0x2, 0x0) 1.037734755s ago: executing program 2 (id=260): execveat(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000), 0x0) 1.019914845s ago: executing program 2 (id=266): getpid() 1.019559225s ago: executing program 2 (id=268): msgrcv(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0) 349.409238ms ago: executing program 3 (id=514): eventfd(0x0) 349.167748ms ago: executing program 3 (id=517): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer', 0x800, 0x0) 326.106198ms ago: executing program 3 (id=522): execve(&(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000)) 325.619848ms ago: executing program 3 (id=525): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full', 0x800, 0x0) 300.959918ms ago: executing program 3 (id=529): munmap(0x0, 0x0) 300.807428ms ago: executing program 3 (id=530): rt_sigreturn() 56.78806ms ago: executing program 1 (id=590): dup2(0xffffffffffffffff, 0xffffffffffffffff) 56.56568ms ago: executing program 0 (id=591): io_cancel(0x0, &(0x7f0000000000), &(0x7f0000000000)) 56.442789ms ago: executing program 0 (id=592): epoll_create1(0x0) 56.35057ms ago: executing program 0 (id=593): delete_module(&(0x7f0000000000), 0x0) 56.301ms ago: executing program 0 (id=594): gettid() 56.23774ms ago: executing program 1 (id=595): openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey', 0x800, 0x0) 56.184439ms ago: executing program 1 (id=596): nanosleep(&(0x7f0000000000), 0x0) 1.52178ms ago: executing program 0 (id=597): msgsnd(0x0, &(0x7f0000000000), 0x0, 0x0) 725.89µs ago: executing program 1 (id=598): openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/reclaim', 0x1, 0x0) 571.44µs ago: executing program 0 (id=599): openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load', 0x2, 0x0) 270.86µs ago: executing program 1 (id=600): openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot', 0x800, 0x0) 0s ago: executing program 1 (id=602): statx(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000)) kernel console output (not intermixed with test programs): [ 20.536420][ T29] audit: type=1400 audit(1732020217.441:81): avc: denied { read } for pid=2998 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.15.203' (ED25519) to the list of known hosts. [ 27.259139][ T29] audit: type=1400 audit(1732020224.171:82): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.260449][ T3304] cgroup: Unknown subsys name 'net' [ 27.281959][ T29] audit: type=1400 audit(1732020224.171:83): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.309693][ T29] audit: type=1400 audit(1732020224.201:84): avc: denied { unmount } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.468566][ T3304] cgroup: Unknown subsys name 'cpuset' [ 27.474722][ T3304] cgroup: Unknown subsys name 'rlimit' [ 27.623226][ T29] audit: type=1400 audit(1732020224.531:85): avc: denied { setattr } for pid=3304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.648637][ T29] audit: type=1400 audit(1732020224.531:86): avc: denied { create } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.669169][ T29] audit: type=1400 audit(1732020224.531:87): avc: denied { write } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.678048][ T3307] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.689511][ T29] audit: type=1400 audit(1732020224.531:88): avc: denied { read } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.718388][ T29] audit: type=1400 audit(1732020224.541:89): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.743393][ T29] audit: type=1400 audit(1732020224.541:90): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 27.766643][ T29] audit: type=1400 audit(1732020224.611:91): avc: denied { relabelto } for pid=3307 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.796989][ T3304] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.891116][ T3406] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 29.169249][ T3515] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 29.520100][ T3654] mmap: syz.1.322 (3654) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 30.450081][ T3944] ================================================================== [ 30.458231][ T3944] BUG: KCSAN: data-race in fill_mg_cmtime / shmem_symlink [ 30.465376][ T3944] [ 30.467727][ T3944] write to 0xffff888104124c94 of 4 bytes by task 3305 on cpu 0: [ 30.475382][ T3944] shmem_symlink+0x349/0x3a0 [ 30.480044][ T3944] vfs_symlink+0xca/0x1d0 [ 30.484408][ T3944] do_symlinkat+0xdf/0x350 [ 30.488856][ T3944] __x64_sys_symlink+0x50/0x60 [ 30.493686][ T3944] x64_sys_call+0x28b0/0x2dc0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 30.498413][ T3944] do_syscall_64+0xc9/0x1c0 [ 30.502941][ T3944] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 30.508872][ T3944] [ 30.511211][ T3944] read to 0xffff888104124c94 of 4 bytes by task 3944 on cpu 1: [ 30.518780][ T3944] fill_mg_cmtime+0x58/0x280 [ 30.523402][ T3944] generic_fillattr+0x241/0x330 [ 30.528287][ T3944] shmem_getattr+0x17b/0x200 [ 30.532917][ T3944] vfs_statx_path+0x171/0x2d0 [ 30.537632][ T3944] vfs_statx+0xe1/0x170 [ 30.541829][ T3944] __se_sys_newfstatat+0xdc/0x300 [ 30.546887][ T3944] __x64_sys_newfstatat+0x55/0x70 [ 30.551939][ T3944] x64_sys_call+0x236d/0x2dc0 [ 30.556647][ T3944] do_syscall_64+0xc9/0x1c0 [ 30.561174][ T3944] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 30.567106][ T3944] [ 30.569435][ T3944] value changed: 0x1617255e -> 0x162dbc4c [ 30.575170][ T3944] [ 30.577503][ T3944] Reported by Kernel Concurrency Sanitizer on: [ 30.583665][ T3944] CPU: 1 UID: 0 PID: 3944 Comm: udevd Not tainted 6.12.0-syzkaller-00971-g158f238aa69d #0 [ 30.593618][ T3944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 30.603695][ T3944] ================================================================== [ 30.767424][ T3317] syz-executor (3317) used greatest stack depth: 10656 bytes left