audit: type=1400 audit(1772778886.569:69361): avc: denied { recv } for pid=3303 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.148 dest=45190 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 ================================================================== BUG: KCSAN: data-race in data_alloc / prb_reserve write to 0xffffffff86c7e740 of 8 bytes by task 1913 on cpu 1: data_alloc+0x31c/0x390 kernel/printk/printk_ringbuffer.c:1130 prb_reserve+0x8d7/0xae0 kernel/printk/printk_ringbuffer.c:1724 vprintk_store+0x54a/0x910 kernel/printk/printk.c:2354 vprintk_emit+0x1a4/0x600 kernel/printk/printk.c:2455 dev_vprintk_emit+0x242/0x2a0 drivers/base/core.c:4913 dev_printk_emit+0x84/0xb0 drivers/base/core.c:4924 __netdev_printk+0x34b/0x370 net/core/dev.c:12934 netdev_info+0xa6/0xd0 net/core/dev.c:12989 nsim_udp_tunnel_unset_port+0x190/0x1b0 drivers/net/netdevsim/udp_tunnels.c:59 udp_tunnel_nic_device_sync_one net/ipv4/udp_tunnel_nic.c:-1 [inline] udp_tunnel_nic_device_sync_by_port net/ipv4/udp_tunnel_nic.c:249 [inline] __udp_tunnel_nic_device_sync+0x575/0x9b0 net/ipv4/udp_tunnel_nic.c:292 udp_tunnel_nic_device_sync_work+0x5d/0x580 net/ipv4/udp_tunnel_nic.c:740 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffffffff86c7e740 of 8 bytes by task 28 on cpu 0: desc_read kernel/printk/printk_ringbuffer.c:496 [inline] desc_push_tail kernel/printk/printk_ringbuffer.c:792 [inline] desc_reserve kernel/printk/printk_ringbuffer.c:938 [inline] prb_reserve+0x207/0xae0 kernel/printk/printk_ringbuffer.c:1674 vprintk_store+0x54a/0x910 kernel/printk/printk.c:2354 vprintk_emit+0x1a4/0x600 kernel/printk/printk.c:2455 vprintk_default+0x26/0x30 kernel/printk/printk.c:2494 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2504 kauditd_printk_skb kernel/audit.c:587 [inline] kauditd_hold_skb+0x1b1/0x1c0 kernel/audit.c:622 kauditd_send_queue+0x273/0x2c0 kernel/audit.c:807 kauditd_thread+0x444/0x670 kernel/audit.c:931 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x0000000000003ea8 -> 0x00000000000bfa70 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 28 Comm: kauditd Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== audit: type=1400 audit(1772778886.569:69362): avc: denied { recv } for pid=3303 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.148 dest=45190 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 audit: type=1400 audit(1772778886.569:69363): avc: denied { recv } for pid=3303 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.148 dest=45190 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 audit: type=1400 audit(1772778886.569:69364): avc: denied { read write } for pid=14399 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 audit: type=1400 audit(1772778886.569:69365): avc: denied { read write open } for pid=14399 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1