last executing test programs: 748.654706ms ago: executing program 3 (id=58): io_destroy(0x0) 747.909856ms ago: executing program 3 (id=65): rt_sigaction(0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000)) 738.888627ms ago: executing program 3 (id=70): tkill(0x0, 0x0) 716.885599ms ago: executing program 3 (id=76): modify_ldt$auto(0x0, &(0x7f0000000000), 0x0) 702.904151ms ago: executing program 3 (id=84): setgid(0x0) 702.326651ms ago: executing program 3 (id=87): pause() 152.536714ms ago: executing program 1 (id=313): memfd_secret(0x0) 137.076786ms ago: executing program 1 (id=318): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/irnet', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/irnet', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/irnet', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/irnet', 0x800, 0x0) 136.613256ms ago: executing program 1 (id=321): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/v4l/by-path/platform-soc@0:qcom_cam-req-mgr-video-index0', 0x2, 0x0) 120.082388ms ago: executing program 1 (id=326): setresuid(0x0, 0x0, 0x0) 119.835268ms ago: executing program 1 (id=329): socket$pppoe(0x18, 0x1, 0x0) 76.213162ms ago: executing program 1 (id=333): sync() 75.675322ms ago: executing program 0 (id=337): io_cancel(0x0, &(0x7f0000000000), &(0x7f0000000000)) 30.108327ms ago: executing program 0 (id=340): socket$inet_udplite(0x2, 0x2, 0x88) 29.934337ms ago: executing program 4 (id=342): socket$nl_generic(0x10, 0x3, 0x10) 29.819047ms ago: executing program 2 (id=343): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/seq', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/seq', 0x800, 0x0) 29.741067ms ago: executing program 2 (id=344): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp', 0x800, 0x0) 29.676977ms ago: executing program 4 (id=345): openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot', 0x800, 0x0) 27.985137ms ago: executing program 4 (id=346): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx', 0x800, 0x0) 25.234917ms ago: executing program 2 (id=347): readlinkat(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000000), 0x0) 23.044968ms ago: executing program 0 (id=348): getuid() 18.272158ms ago: executing program 0 (id=349): openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/sync/info', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/sync/info', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/sync/info', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/sync/info', 0x800, 0x0) 1.03823ms ago: executing program 2 (id=350): openat(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/ipv6host', 0x2, 0x0) 923.29µs ago: executing program 4 (id=351): getresgid(&(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000000)) 406.769µs ago: executing program 2 (id=352): openat(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user', 0x2, 0x0) 309.04µs ago: executing program 4 (id=353): socket$can_raw(0x1d, 0x3, 0x1) 245.719µs ago: executing program 2 (id=354): pwritev2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 170.61µs ago: executing program 0 (id=355): set_thread_area(&(0x7f0000000000)) 79.989µs ago: executing program 0 (id=356): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttynull', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttynull', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttynull', 0x800, 0x0) 0s ago: executing program 4 (id=357): syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000080), 0x0, 0x1) syz_open_dev$mouse(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$mouse(&(0x7f0000000140), 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000180), 0x1, 0x1) syz_open_dev$mouse(&(0x7f00000001c0), 0x1, 0x2) syz_open_dev$mouse(&(0x7f0000000200), 0x1, 0x800) syz_open_dev$mouse(&(0x7f0000000240), 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000280), 0x2, 0x1) syz_open_dev$mouse(&(0x7f00000002c0), 0x2, 0x2) syz_open_dev$mouse(&(0x7f0000000300), 0x2, 0x800) syz_open_dev$mouse(&(0x7f0000000340), 0x3, 0x0) syz_open_dev$mouse(&(0x7f0000000380), 0x3, 0x1) syz_open_dev$mouse(&(0x7f00000003c0), 0x3, 0x2) syz_open_dev$mouse(&(0x7f0000000400), 0x3, 0x800) syz_open_dev$mouse(&(0x7f0000000440), 0x4, 0x0) syz_open_dev$mouse(&(0x7f0000000480), 0x4, 0x1) syz_open_dev$mouse(&(0x7f00000004c0), 0x4, 0x2) syz_open_dev$mouse(&(0x7f0000000500), 0x4, 0x800) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.148' (ED25519) to the list of known hosts. [ 23.504075][ T29] audit: type=1400 audit(1760218278.668:62): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.527172][ T29] audit: type=1400 audit(1760218278.688:63): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.527906][ T3300] cgroup: Unknown subsys name 'net' [ 23.560807][ T29] audit: type=1400 audit(1760218278.728:64): avc: denied { unmount } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.752814][ T3300] cgroup: Unknown subsys name 'cpuset' [ 23.758903][ T3300] cgroup: Unknown subsys name 'rlimit' [ 23.930097][ T29] audit: type=1400 audit(1760218279.088:65): avc: denied { setattr } for pid=3300 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.954525][ T29] audit: type=1400 audit(1760218279.088:66): avc: denied { create } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.975159][ T29] audit: type=1400 audit(1760218279.088:67): avc: denied { write } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.995563][ T29] audit: type=1400 audit(1760218279.088:68): avc: denied { read } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.002484][ T3303] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.015837][ T29] audit: type=1400 audit(1760218279.098:69): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.049193][ T29] audit: type=1400 audit(1760218279.098:70): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 24.072464][ T29] audit: type=1400 audit(1760218279.198:71): avc: denied { relabelto } for pid=3303 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.111984][ T3300] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.554585][ T3574] mmap: syz.1.245 (3574) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 25.817025][ T3669] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 25.890447][ T3663] ================================================================== [ 25.898558][ T3663] BUG: KCSAN: data-race in __xa_clear_mark / xas_find_marked [ 25.905945][ T3663] [ 25.908259][ T3663] read-write to 0xffff888106e976b8 of 8 bytes by task 1476 on cpu 1: [ 25.916410][ T3663] __xa_clear_mark+0xf5/0x1e0 [ 25.921097][ T3663] __folio_end_writeback+0xf7/0x3b0 [ 25.926303][ T3663] folio_end_writeback_no_dropbehind+0x6d/0x1b0 [ 25.932649][ T3663] folio_end_writeback+0x1c/0x70 [ 25.937603][ T3663] ext4_finish_bio+0x459/0x8c0 [ 25.942402][ T3663] ext4_release_io_end+0x9f/0x1f0 [ 25.947430][ T3663] ext4_end_io_end+0x18d/0x240 [ 25.952192][ T3663] ext4_end_io_rsv_work+0x151/0x1e0 [ 25.957477][ T3663] process_scheduled_works+0x4ce/0x9d0 [ 25.962940][ T3663] worker_thread+0x582/0x770 [ 25.967537][ T3663] kthread+0x489/0x510 [ 25.971596][ T3663] ret_from_fork+0x122/0x1b0 [ 25.976176][ T3663] ret_from_fork_asm+0x1a/0x30 [ 25.980936][ T3663] [ 25.983247][ T3663] read to 0xffff888106e976b8 of 8 bytes by task 3663 on cpu 0: [ 25.990773][ T3663] xas_find_marked+0x218/0x620 [ 25.995535][ T3663] find_get_entry+0x5d/0x380 [ 26.000122][ T3663] filemap_get_folios_tag+0x13b/0x210 [ 26.005503][ T3663] filemap_fdatawait_keep_errors+0x6c/0x180 [ 26.011398][ T3663] sync_inodes_sb+0x39c/0x440 [ 26.016079][ T3663] sync_inodes_one_sb+0x3d/0x50 [ 26.020921][ T3663] __iterate_supers+0x110/0x220 [ 26.025760][ T3663] iterate_supers+0x1f/0x30 [ 26.030257][ T3663] ksys_sync+0x5c/0xe0 [ 26.034314][ T3663] __ia32_sys_sync+0xe/0x20 [ 26.038809][ T3663] x64_sys_call+0x2d1f/0x3000 [ 26.043477][ T3663] do_syscall_64+0xd2/0x200 [ 26.047985][ T3663] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 26.053869][ T3663] [ 26.056176][ T3663] value changed: 0xffffffffffffff80 -> 0xffffffffffc00000 [ 26.063265][ T3663] [ 26.065573][ T3663] Reported by Kernel Concurrency Sanitizer on: [ 26.071719][ T3663] CPU: 0 UID: 0 PID: 3663 Comm: syz.1.333 Not tainted syzkaller #0 PREEMPT(voluntary) [ 26.081344][ T3663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 26.091388][ T3663] ================================================================== SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)