audit: type=1400 audit(1762770351.022:25394): avc: denied { read write } for pid=7677 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ================================================================== BUG: KCSAN: data-race in _prb_read_valid / data_alloc write to 0xffffffff86873de0 of 8 bytes by task 6178 on cpu 0: data_alloc+0x274/0x2e0 kernel/printk/printk_ringbuffer.c:1101 prb_reserve+0x807/0xaf0 kernel/printk/printk_ringbuffer.c:1685 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2299 vprintk_emit+0x10d/0x580 kernel/printk/printk.c:2399 dev_vprintk_emit+0x242/0x2a0 drivers/base/core.c:4914 dev_printk_emit+0x84/0xb0 drivers/base/core.c:4925 __dev_printk+0xf3/0x110 drivers/base/core.c:4937 _dev_info+0x9b/0xd0 drivers/base/core.c:4983 vhci_urb_enqueue+0x52e/0x6c0 drivers/usb/usbip/vhci_hcd.c:764 usb_hcd_submit_urb+0x208/0x1200 drivers/usb/core/hcd.c:1546 usb_submit_urb+0xace/0xc20 drivers/usb/core/urb.c:587 usb_start_wait_urb+0x8c/0x190 drivers/usb/core/message.c:59 usb_internal_control_msg drivers/usb/core/message.c:103 [inline] usb_control_msg+0x18f/0x250 drivers/usb/core/message.c:154 hub_set_address drivers/usb/core/hub.c:4769 [inline] hub_port_init+0xbba/0x1680 drivers/usb/core/hub.c:5074 hub_port_connect drivers/usb/core/hub.c:5495 [inline] hub_port_connect_change drivers/usb/core/hub.c:5706 [inline] port_event drivers/usb/core/hub.c:5870 [inline] hub_event+0x19f3/0x29c0 drivers/usb/core/hub.c:5952 process_one_work kernel/workqueue.c:3263 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3346 worker_thread+0x582/0x770 kernel/workqueue.c:3427 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x122/0x1b0 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffffffff86873de0 of 16 bytes by task 29 on cpu 1: desc_read kernel/printk/printk_ringbuffer.c:479 [inline] desc_read_finalized_seq kernel/printk/printk_ringbuffer.c:1892 [inline] prb_read kernel/printk/printk_ringbuffer.c:1940 [inline] _prb_read_valid+0x1bc/0x920 kernel/printk/printk_ringbuffer.c:2131 prb_read_valid+0x3c/0x60 kernel/printk/printk_ringbuffer.c:2203 printk_get_next_message+0xc8/0x510 kernel/printk/printk.c:2978 console_emit_next_record kernel/printk/printk.c:3065 [inline] console_flush_all+0x290/0x6a0 kernel/printk/printk.c:3199 __console_flush_and_unlock kernel/printk/printk.c:3258 [inline] console_unlock+0xa1/0x2e0 kernel/printk/printk.c:3298 vprintk_emit+0x3b5/0x580 kernel/printk/printk.c:2423 vprintk_default+0x26/0x30 kernel/printk/printk.c:2438 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2448 kauditd_printk_skb kernel/audit.c:583 [inline] kauditd_hold_skb+0x1b1/0x1c0 kernel/audit.c:618 kauditd_send_queue+0x273/0x2c0 kernel/audit.c:803 kauditd_thread+0x421/0x630 kernel/audit.c:927 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x122/0x1b0 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 29 Comm: kauditd Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 ================================================================== audit: type=1400 audit(1762770351.022:25395): avc: denied { read write } for pid=7359 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 audit: type=1400 audit(1762770351.082:25396): avc: denied { map_create } for pid=13784 comm="syz.0.3542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 audit: type=1400 audit(1762770351.082:25397): avc: denied { prog_load } for pid=13784 comm="syz.0.3542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 audit: type=1400 audit(1762770351.082:25398): avc: denied { open } for pid=13784 comm="syz.0.3542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 audit: type=1400 audit(1762770351.092:25399): avc: denied { prog_load } for pid=13787 comm="syz.2.3544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0