audit: type=1400 audit(1682196207.768:174): avc: denied { read } for pid=14239 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 ================================================================== BUG: KCSAN: data-race in data_push_tail / number write to 0xffffffff86f0f639 of 1 bytes by task 14239 on cpu 0: number+0x85f/0xa90 lib/vsprintf.c:562 pointer_string+0x80/0x90 lib/vsprintf.c:740 default_pointer+0x4af/0x690 pointer+0x829/0xd10 vsnprintf+0x861/0xe20 lib/vsprintf.c:2800 vscnprintf+0x42/0x80 lib/vsprintf.c:2902 printk_sprint+0x30/0x2d0 kernel/printk/printk.c:2137 vprintk_store+0x56f/0x800 kernel/printk/printk.c:2251 vprintk_emit+0xd0/0x430 kernel/printk/printk.c:2297 vprintk_default+0x26/0x30 kernel/printk/printk.c:2327 vprintk+0x83/0x90 kernel/printk/printk_safe.c:50 _printk+0x7a/0xa0 kernel/printk/printk.c:2337 base_sock_release+0x38/0x200 drivers/isdn/mISDN/socket.c:622 __sock_release net/socket.c:653 [inline] sock_close+0x70/0x150 net/socket.c:1395 __fput+0x245/0x570 fs/file_table.c:321 ____fput+0x15/0x20 fs/file_table.c:349 task_work_run+0x123/0x160 kernel/task_work.c:179 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0xd1/0xe0 kernel/entry/common.c:171 exit_to_user_mode_prepare+0x6c/0xb0 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x26/0x140 kernel/entry/common.c:297 do_syscall_64+0x4d/0xc0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffffffff86f0f638 of 8 bytes by task 23 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:590 [inline] data_push_tail+0x102/0x430 kernel/printk/printk_ringbuffer.c:675 data_alloc+0xbe/0x2c0 kernel/printk/printk_ringbuffer.c:1046 prb_reserve+0x893/0xbc0 kernel/printk/printk_ringbuffer.c:1555 vprintk_store+0x53e/0x800 kernel/printk/printk.c:2241 vprintk_emit+0xd0/0x430 kernel/printk/printk.c:2297 vprintk_default+0x26/0x30 kernel/printk/printk.c:2327 vprintk+0x83/0x90 kernel/printk/printk_safe.c:50 _printk+0x7a/0xa0 kernel/printk/printk.c:2337 kauditd_printk_skb kernel/audit.c:536 [inline] kauditd_hold_skb+0x19d/0x1b0 kernel/audit.c:571 kauditd_send_queue+0x27a/0x2d0 kernel/audit.c:756 kauditd_thread+0x42a/0x640 kernel/audit.c:880 kthread+0x1a6/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 value changed: 0x00000000ffffe71a -> 0x3431383838666666 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 23 Comm: kauditd Not tainted 6.3.0-rc7-syzkaller-00189-g2caeeb9d4a1b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 ================================================================== audit: type=1400 audit(1682196208.058:175): avc: denied { create } for pid=14270 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 audit: type=1400 audit(1682196208.718:176): avc: denied { sqpoll } for pid=14381 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 audit: type=1400 audit(1682196209.568:177): avc: denied { append } for pid=2728 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 audit: type=1400 audit(1682196209.568:178): avc: denied { open } for pid=2728 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 audit: type=1400 audit(1682196209.568:179): avc: denied { getattr } for pid=2728 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 audit: type=1400 audit(1682196210.448:180): avc: denied { create } for pid=14585 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 audit: type=1400 audit(1682196210.468:181): avc: denied { ioctl } for pid=14585 comm="syz-executor.5" path="socket:[53824]" dev="sockfs" ino=53824 ioctlcmd=0xf504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 audit: type=1400 audit(1682196211.408:182): avc: denied { create } for pid=14710 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 audit: type=1400 audit(1682196212.918:183): avc: denied { create } for pid=14951 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 audit: type=1400 audit(1682196212.958:184): avc: denied { setopt } for pid=14921 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 audit: type=1400 audit(1682196213.048:185): avc: denied { read } for pid=14963 comm="syz-executor.4" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 audit: type=1400 audit(1682196213.048:186): avc: denied { open } for pid=14963 comm="syz-executor.4" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 kauditd_printk_skb: 1 callbacks suppressed audit: type=1400 audit(1682196217.648:188): avc: denied { ioctl } for pid=15522 comm="syz-executor.5" path="socket:[56213]" dev="sockfs" ino=56213 ioctlcmd=0x7201 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1