audit: type=1400 audit(2000000441.594:58613): avc: denied { sendto } for pid=28 comm="kauditd" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 ================================================================== BUG: KCSAN: data-race in data_push_tail / vsnprintf write to 0xffffffff8938cd00 of 3 bytes by task 22275 on cpu 1: vsnprintf+0x2ce/0x860 lib/vsprintf.c:2899 vscnprintf+0x41/0x90 lib/vsprintf.c:3013 printk_sprint+0x30/0x2e0 kernel/printk/printk.c:2222 vprintk_store+0x57b/0x910 kernel/printk/printk.c:2364 vprintk_emit+0x1a4/0x600 kernel/printk/printk.c:2455 vprintk_default+0x26/0x30 kernel/printk/printk.c:2494 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2504 __ext4_msg+0x1aa/0x1c0 fs/ext4/super.c:995 ext4_orphan_cleanup+0x938/0xa00 fs/ext4/orphan.c:495 __ext4_fill_super fs/ext4/super.c:5670 [inline] ext4_fill_super+0x3408/0x37c0 fs/ext4/super.c:5793 get_tree_bdev_flags+0x291/0x300 fs/super.c:1694 get_tree_bdev+0x1f/0x30 fs/super.c:1717 ext4_get_tree+0x1c/0x30 fs/ext4/super.c:5825 vfs_get_tree+0x57/0x1d0 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3760 [inline] do_new_mount+0x288/0x8d0 fs/namespace.c:3836 path_mount+0x4d0/0xbc0 fs/namespace.c:4146 do_mount fs/namespace.c:4159 [inline] __do_sys_mount fs/namespace.c:4348 [inline] __se_sys_mount+0x28c/0x2e0 fs/namespace.c:4325 __x64_sys_mount+0x67/0x80 fs/namespace.c:4325 x64_sys_call+0x2d61/0x3020 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff8938cd00 of 8 bytes by task 28 on cpu 0: data_make_reusable kernel/printk/printk_ringbuffer.c:608 [inline] data_push_tail+0x100/0x470 kernel/printk/printk_ringbuffer.c:693 data_alloc+0x11b/0x390 kernel/printk/printk_ringbuffer.c:1089 prb_reserve+0x8d7/0xae0 kernel/printk/printk_ringbuffer.c:1724 vprintk_store+0x54a/0x910 kernel/printk/printk.c:2354 vprintk_emit+0x1a4/0x600 kernel/printk/printk.c:2455 vprintk_default+0x26/0x30 kernel/printk/printk.c:2494 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2504 kauditd_printk_skb kernel/audit.c:587 [inline] kauditd_hold_skb+0x1b1/0x1c0 kernel/audit.c:622 kauditd_send_queue+0x273/0x2c0 kernel/audit.c:807 kauditd_thread+0x444/0x670 kernel/audit.c:931 kthread+0x22a/0x280 kernel/kthread.c:467 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x00000000ffffed95 -> 0x636e757274203220 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 28 Comm: kauditd Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== audit: type=1400 audit(2000000441.594:58614): avc: denied { recv } for pid=28 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.126 dest=59664 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 audit: type=1400 audit(2000000441.594:58615): avc: denied { recv } for pid=28 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.126 dest=59664 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 kauditd_printk_skb: 1146 callbacks suppressed audit: type=1400 audit(2000000446.568:59762): avc: denied { search } for pid=22454 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 audit: type=1400 audit(2000000446.568:59763): avc: denied { search } for pid=22454 comm="rm" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 audit: type=1400 audit(2000000446.568:59764): avc: denied { search } for pid=22454 comm="rm" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 audit: type=1400 audit(2000000446.568:59765): avc: denied { getattr } for pid=22454 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth14.link" dev="tmpfs" ino=25868 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 audit: type=1400 audit(2000000446.568:59766): avc: denied { remove_name } for pid=22454 comm="rm" name="resolv.conf.eth14.link" dev="tmpfs" ino=25868 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 audit: type=1400 audit(2000000446.568:59767): avc: denied { unlink } for pid=22454 comm="rm" name="resolv.conf.eth14.link" dev="tmpfs" ino=25868 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 audit: type=1400 audit(2000000446.608:59768): avc: denied { search } for pid=22455 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 audit: type=1400 audit(2000000446.608:59769): avc: denied { search } for pid=22455 comm="rm" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1