loop2: detected capacity change from 0 to 164 rock: corrupted directory entry. extent=28, offset=16056320, size=0 ================================================================== BUG: KCSAN: data-race in avc_policy_seqno / avc_ss_reset write to 0xffffffff88eb3c28 of 4 bytes by task 3605 on cpu 1: avc_latest_notif_update security/selinux/avc.c:581 [inline] avc_ss_reset+0x20c/0x240 security/selinux/avc.c:970 selinux_notify_policy_change security/selinux/ss/services.c:2231 [inline] security_set_bools+0x301/0x340 security/selinux/ss/services.c:3166 sel_commit_bools_write+0x1ea/0x270 security/selinux/selinuxfs.c:1325 do_loop_readv_writev fs/read_write.c:850 [inline] vfs_writev+0x406/0x8b0 fs/read_write.c:1059 do_writev+0xe7/0x210 fs/read_write.c:1103 __do_sys_writev fs/read_write.c:1171 [inline] __se_sys_writev fs/read_write.c:1168 [inline] __x64_sys_writev+0x45/0x50 fs/read_write.c:1168 x64_sys_call+0x1e9a/0x3000 arch/x86/include/generated/asm/syscalls_64.h:21 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff88eb3c28 of 4 bytes by task 3599 on cpu 0: avc_policy_seqno+0x15/0x30 security/selinux/avc.c:1206 selinux_file_permission+0x1cd/0x320 security/selinux/hooks.c:3787 security_file_permission+0x3e/0x80 security/security.c:2913 rw_verify_area+0x8d/0x160 fs/read_write.c:473 __io_read+0x3e1/0xc30 io_uring/rw.c:947 io_read+0x4a/0x190 io_uring/rw.c:1031 __io_issue_sqe+0xfe/0x2e0 io_uring/io_uring.c:1824 io_issue_sqe+0x56/0xa80 io_uring/io_uring.c:1847 io_queue_sqe io_uring/io_uring.c:2074 [inline] io_submit_sqe io_uring/io_uring.c:2334 [inline] io_submit_sqes+0x675/0x1060 io_uring/io_uring.c:2447 __do_sys_io_uring_enter io_uring/io_uring.c:3514 [inline] __se_sys_io_uring_enter+0x1c1/0x1b70 io_uring/io_uring.c:3453 __x64_sys_io_uring_enter+0x78/0x90 io_uring/io_uring.c:3453 x64_sys_call+0x2df0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:427 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000003 -> 0x00000004 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3599 Comm: syz.2.38 Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 ==================================================================