last executing test programs: kernel console output (not intermixed with test programs): [ 19.233447][ T28] audit: type=1400 audit(1773156641.085:62): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.255426][ T28] audit: type=1400 audit(1773156641.085:63): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.278407][ T28] audit: type=1400 audit(1773156641.085:64): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.301428][ T28] audit: type=1400 audit(1773156641.085:65): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.324668][ T28] audit: type=1400 audit(1773156641.085:66): avc: denied { read open } for pid=3194 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.164' (ED25519) to the list of known hosts. [ 25.118872][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 25.118886][ T28] audit: type=1400 audit(1773156646.975:70): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.147876][ T28] audit: type=1400 audit(1773156646.995:71): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.148606][ T3299] cgroup: Unknown subsys name 'net' [ 25.175466][ T28] audit: type=1400 audit(1773156647.025:72): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.299147][ T3299] cgroup: Unknown subsys name 'cpuset' [ 25.305176][ T3299] cgroup: Unknown subsys name 'rlimit' [ 25.414566][ T28] audit: type=1400 audit(1773156647.265:73): avc: denied { setattr } for pid=3299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.437873][ T28] audit: type=1400 audit(1773156647.265:74): avc: denied { create } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.466436][ T28] audit: type=1400 audit(1773156647.265:75): avc: denied { write } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.488841][ T28] audit: type=1400 audit(1773156647.265:76): avc: denied { read } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.492769][ T3302] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.509334][ T28] audit: type=1400 audit(1773156647.295:77): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.542423][ T28] audit: type=1400 audit(1773156647.295:78): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.565697][ T28] audit: type=1400 audit(1773156647.295:79): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 25.579324][ T3299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.654910][ C0] ================================================================== [ 25.662999][ C0] BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb [ 25.671230][ C0] [ 25.673535][ C0] write to 0xffff8881025a1b88 of 2 bytes by interrupt on cpu 1: [ 25.681135][ C0] virtqueue_disable_cb+0x75/0x2c0 [ 25.686237][ C0] skb_xmit_done+0x67/0x1a0 [ 25.690721][ C0] vring_interrupt+0x2d7/0x310 [ 25.695456][ C0] __handle_irq_event_percpu+0x9c/0x4d0 [ 25.700982][ C0] handle_irq_event+0x64/0xf0 [ 25.705649][ C0] handle_edge_irq+0x154/0x470 [ 25.710391][ C0] __common_interrupt+0x60/0xb0 [ 25.715222][ C0] common_interrupt+0x7e/0x90 [ 25.719881][ C0] asm_common_interrupt+0x26/0x40 [ 25.724890][ C0] pv_native_safe_halt+0xf/0x20 [ 25.729723][ C0] default_idle+0x9/0x20 [ 25.733969][ C0] default_idle_call+0x3b/0x60 [ 25.738705][ C0] do_idle+0xcd/0x230 [ 25.742678][ C0] cpu_startup_entry+0x24/0x30 [ 25.747419][ C0] start_secondary+0x95/0xa0 [ 25.751979][ C0] common_startup_64+0x13e/0x147 [ 25.756895][ C0] [ 25.759194][ C0] read to 0xffff8881025a1b88 of 2 bytes by interrupt on cpu 0: [ 25.766721][ C0] virtqueue_disable_cb+0x4c/0x2c0 [ 25.771900][ C0] start_xmit+0x102/0x17c0 [ 25.776293][ C0] dev_hard_start_xmit+0x136/0x3f0 [ 25.781380][ C0] sch_direct_xmit+0x192/0x550 [ 25.786118][ C0] __dev_queue_xmit+0xca9/0x1f20 [ 25.791031][ C0] ip_finish_output2+0x705/0x8c0 [ 25.795939][ C0] ip_finish_output+0x112/0x290 [ 25.800769][ C0] ip_output+0xbd/0x1c0 [ 25.804901][ C0] __ip_queue_xmit+0xb68/0xba0 [ 25.809644][ C0] ip_queue_xmit+0x39/0x50 [ 25.814051][ C0] __tcp_transmit_skb+0x1af2/0x1f10 [ 25.819237][ C0] tcp_write_xmit+0x1597/0x3640 [ 25.824081][ C0] __tcp_push_pending_frames+0x6d/0x1b0 [ 25.829608][ C0] tcp_rcv_established+0xc52/0x12f0 [ 25.834801][ C0] tcp_v4_do_rcv+0x91d/0xa30 [ 25.839366][ C0] tcp_v4_rcv+0x19f8/0x1db0 [ 25.844113][ C0] ip_protocol_deliver_rcu+0x395/0x790 [ 25.849550][ C0] ip_local_deliver_finish+0x1fc/0x2f0 [ 25.854997][ C0] ip_local_deliver+0xe8/0x1e0 [ 25.859750][ C0] ip_sublist_rcv+0x5a4/0x6a0 [ 25.864416][ C0] ip_list_rcv+0x261/0x290 [ 25.868809][ C0] __netif_receive_skb_list_core+0x4dc/0x500 [ 25.874782][ C0] netif_receive_skb_list_internal+0x47d/0x5f0 [ 25.880913][ C0] napi_complete_done+0x19c/0x3f0 [ 25.885914][ C0] virtnet_poll+0x1bb1/0x2040 [ 25.890570][ C0] __napi_poll+0x61/0x330 [ 25.894877][ C0] net_rx_action+0x452/0x930 [ 25.899451][ C0] handle_softirqs+0xb9/0x2a0 [ 25.904116][ C0] __irq_exit_rcu+0x39/0xc0 [ 25.908591][ C0] common_interrupt+0x83/0x90 [ 25.913243][ C0] asm_common_interrupt+0x26/0x40 [ 25.918239][ C0] pv_native_safe_halt+0xf/0x20 [ 25.923072][ C0] default_idle+0x9/0x20 [ 25.927294][ C0] default_idle_call+0x3b/0x60 [ 25.932035][ C0] do_idle+0xcd/0x230 [ 25.936002][ C0] cpu_startup_entry+0x24/0x30 [ 25.940746][ C0] rest_init+0xee/0xf0 [ 25.944791][ C0] start_kernel+0x49a/0x4c0 [ 25.949268][ C0] x86_64_start_reservations+0x24/0x30 [ 25.954715][ C0] x86_64_start_kernel+0xfc/0x100 [ 25.959715][ C0] common_startup_64+0x13e/0x147 [ 25.964639][ C0] [ 25.966935][ C0] value changed: 0x0000 -> 0x0001 [ 25.971930][ C0] [ 25.974229][ C0] Reported by Kernel Concurrency Sanitizer on: [ 25.980371][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT(full) [ 25.989280][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 25.999322][ C0] ==================================================================