last executing test programs: 106.655668ms ago: executing program 4 (id=157): truncate(&(0x7f0000000000), 0x0) 106.588198ms ago: executing program 3 (id=158): socket$isdn(0x22, 0x3, 0x0) 105.149178ms ago: executing program 3 (id=160): timer_gettime(0x0, &(0x7f0000000000)) 93.008179ms ago: executing program 0 (id=162): socket$tipc(0x1e, 0x2, 0x0) 92.733019ms ago: executing program 3 (id=164): clock_gettime(0x0, &(0x7f0000000000)) 92.340349ms ago: executing program 0 (id=166): openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/damon/target_ids', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/damon/target_ids', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/damon/target_ids', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/damon/target_ids', 0x800, 0x0) 91.882769ms ago: executing program 4 (id=169): move_pages(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000000), 0x0) 81.6741ms ago: executing program 4 (id=170): openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans', 0x1, 0x0) 81.10457ms ago: executing program 2 (id=171): getitimer(0x0, &(0x7f0000000000)) 80.878291ms ago: executing program 0 (id=172): cachestat(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000000), 0x0) 80.419491ms ago: executing program 3 (id=174): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net', 0x2, 0x0) 80.224971ms ago: executing program 3 (id=175): openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/load', 0x2, 0x0) 80.051081ms ago: executing program 2 (id=176): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor', 0x800, 0x0) 79.963121ms ago: executing program 4 (id=177): timer_getoverrun(0x0) 64.689343ms ago: executing program 0 (id=178): membarrier(0x0, 0x0) 64.423163ms ago: executing program 1 (id=179): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptp0', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptp0', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptp0', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptp0', 0x800, 0x0) 64.202673ms ago: executing program 2 (id=180): faccessat2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 64.098342ms ago: executing program 3 (id=181): socket$inet6_udp(0xa, 0x2, 0x0) 63.916683ms ago: executing program 4 (id=182): syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) 63.480123ms ago: executing program 2 (id=183): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa', 0x800, 0x0) 63.235002ms ago: executing program 1 (id=184): syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 63.122362ms ago: executing program 2 (id=185): syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000080), 0x0, 0x1) syz_open_dev$usbfs(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$usbfs(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$usbfs(&(0x7f0000000140), 0xa, 0x0) syz_open_dev$usbfs(&(0x7f0000000180), 0xa, 0x1) syz_open_dev$usbfs(&(0x7f00000001c0), 0xa, 0x2) syz_open_dev$usbfs(&(0x7f0000000200), 0xa, 0x800) syz_open_dev$usbfs(&(0x7f0000000240), 0x14, 0x0) syz_open_dev$usbfs(&(0x7f0000000280), 0x14, 0x1) syz_open_dev$usbfs(&(0x7f00000002c0), 0x14, 0x2) syz_open_dev$usbfs(&(0x7f0000000300), 0x14, 0x800) syz_open_dev$usbfs(&(0x7f0000000340), 0x1e, 0x0) syz_open_dev$usbfs(&(0x7f0000000380), 0x1e, 0x1) syz_open_dev$usbfs(&(0x7f00000003c0), 0x1e, 0x2) syz_open_dev$usbfs(&(0x7f0000000400), 0x1e, 0x800) syz_open_dev$usbfs(&(0x7f0000000440), 0x28, 0x0) syz_open_dev$usbfs(&(0x7f0000000480), 0x28, 0x1) syz_open_dev$usbfs(&(0x7f00000004c0), 0x28, 0x2) syz_open_dev$usbfs(&(0x7f0000000500), 0x28, 0x800) 47.485355ms ago: executing program 0 (id=186): socket$can_j1939(0x1d, 0x2, 0x7) 47.175165ms ago: executing program 1 (id=187): socket$packet(0x11, 0x2, 0x300) 47.015905ms ago: executing program 0 (id=189): sched_getattr(0x0, &(0x7f0000000000), 0x0, 0x0) 46.874035ms ago: executing program 1 (id=190): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom', 0x800, 0x0) 46.793204ms ago: executing program 4 (id=191): socket$inet_smc(0x2b, 0x1, 0x0) 46.492025ms ago: executing program 2 (id=192): syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$MSR(&(0x7f0000000080), 0x0, 0x1) syz_open_dev$MSR(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$MSR(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$MSR(&(0x7f0000000140), 0x1, 0x0) syz_open_dev$MSR(&(0x7f0000000180), 0x1, 0x1) syz_open_dev$MSR(&(0x7f00000001c0), 0x1, 0x2) syz_open_dev$MSR(&(0x7f0000000200), 0x1, 0x800) syz_open_dev$MSR(&(0x7f0000000240), 0x2, 0x0) syz_open_dev$MSR(&(0x7f0000000280), 0x2, 0x1) syz_open_dev$MSR(&(0x7f00000002c0), 0x2, 0x2) syz_open_dev$MSR(&(0x7f0000000300), 0x2, 0x800) syz_open_dev$MSR(&(0x7f0000000340), 0x3, 0x0) syz_open_dev$MSR(&(0x7f0000000380), 0x3, 0x1) syz_open_dev$MSR(&(0x7f00000003c0), 0x3, 0x2) syz_open_dev$MSR(&(0x7f0000000400), 0x3, 0x800) syz_open_dev$MSR(&(0x7f0000000440), 0x4, 0x0) syz_open_dev$MSR(&(0x7f0000000480), 0x4, 0x1) syz_open_dev$MSR(&(0x7f00000004c0), 0x4, 0x2) syz_open_dev$MSR(&(0x7f0000000500), 0x4, 0x800) 333.22µs ago: executing program 1 (id=193): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sr0', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sr0', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sr0', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sr0', 0x800, 0x0) 0s ago: executing program 1 (id=196): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/acpi_thermal_rel', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/acpi_thermal_rel', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/acpi_thermal_rel', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/acpi_thermal_rel', 0x800, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.186' (ED25519) to the list of known hosts. [ 31.723483][ T29] audit: type=1400 audit(1730334503.086:81): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 31.724440][ T3307] cgroup: Unknown subsys name 'net' [ 31.746198][ T29] audit: type=1400 audit(1730334503.086:82): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 31.773519][ T29] audit: type=1400 audit(1730334503.116:83): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 31.793337][ T29] audit: type=1400 audit(1730334503.126:84): avc: denied { read } for pid=2998 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 31.914660][ T3307] cgroup: Unknown subsys name 'cpuset' [ 31.920633][ T3307] cgroup: Unknown subsys name 'rlimit' [ 32.087322][ T29] audit: type=1400 audit(1730334503.456:85): avc: denied { setattr } for pid=3307 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 32.110691][ T29] audit: type=1400 audit(1730334503.456:86): avc: denied { create } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 32.127059][ T3309] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 32.131114][ T29] audit: type=1400 audit(1730334503.456:87): avc: denied { write } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.159978][ T29] audit: type=1400 audit(1730334503.456:88): avc: denied { read } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 32.163450][ T3307] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 32.180261][ T29] audit: type=1400 audit(1730334503.456:89): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 32.213747][ T29] audit: type=1400 audit(1730334503.456:90): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 33.023940][ T3326] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 33.521641][ T3530] ================================================================== [ 33.529834][ T3530] BUG: KCSAN: data-race in pcpu_alloc_noprof / pcpu_block_update_hint_alloc [ 33.538529][ T3530] [ 33.540853][ T3530] read-write to 0xffffffff88be03ac of 4 bytes by task 3531 on cpu 0: [ 33.548914][ T3530] pcpu_block_update_hint_alloc+0x5db/0x6a0 [ 33.554823][ T3530] pcpu_alloc_area+0x488/0x4b0 [ 33.559610][ T3530] pcpu_alloc_noprof+0x4bb/0x10a0 [ 33.564635][ T3530] sock_inuse_init_net+0x28/0x60 [ 33.569574][ T3530] ops_init+0x1c9/0x260 [ 33.573735][ T3530] setup_net+0x14d/0x600 [ 33.577984][ T3530] copy_net_ns+0x290/0x430 [ 33.582403][ T3530] create_new_namespaces+0x228/0x430 [ 33.587695][ T3530] unshare_nsproxy_namespaces+0xe6/0x120 [ 33.593340][ T3530] ksys_unshare+0x3c9/0x6e0 [ 33.597845][ T3530] __x64_sys_unshare+0x1f/0x30 [ 33.602618][ T3530] x64_sys_call+0x2c8d/0x2d60 [ 33.607299][ T3530] do_syscall_64+0xc9/0x1c0 [ 33.611803][ T3530] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.617708][ T3530] [ 33.620031][ T3530] read to 0xffffffff88be03ac of 4 bytes by task 3530 on cpu 1: [ 33.627570][ T3530] pcpu_alloc_noprof+0x9b6/0x10a0 [ 33.632607][ T3530] sock_inuse_init_net+0x28/0x60 [ 33.637549][ T3530] ops_init+0x1c9/0x260 [ 33.641714][ T3530] setup_net+0x14d/0x600 [ 33.645963][ T3530] copy_net_ns+0x290/0x430 [ 33.650383][ T3530] create_new_namespaces+0x228/0x430 [ 33.655680][ T3530] unshare_nsproxy_namespaces+0xe6/0x120 [ 33.661327][ T3530] ksys_unshare+0x3c9/0x6e0 [ 33.665840][ T3530] __x64_sys_unshare+0x1f/0x30 [ 33.670619][ T3530] x64_sys_call+0x2c8d/0x2d60 [ 33.675306][ T3530] do_syscall_64+0xc9/0x1c0 [ 33.679815][ T3530] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.685721][ T3530] [ 33.688041][ T3530] value changed: 0x00000002 -> 0x00000001 [ 33.693756][ T3530] [ 33.696076][ T3530] Reported by Kernel Concurrency Sanitizer on: [ 33.702228][ T3530] CPU: 1 UID: 0 PID: 3530 Comm: syz-executor Not tainted 6.12.0-rc5-syzkaller-00047-g4236f913808c #0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 33.713084][ T3530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 33.723141][ T3530] ================================================================== [ 33.876498][ T3542] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.