audit: type=1400 audit(1688866986.733:511): avc: denied { relabelfrom } for pid=7271 comm="syz-executor.4" name="NETLINK" dev="sockfs" ino=122395 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 ================================================================== BUG: KCSAN: data-race in data_push_tail / vsnprintf write to 0xffffffff86f41726 of 1 bytes by task 7272 on cpu 1: vsnprintf+0xdd0/0xe20 vscnprintf+0x42/0x80 lib/vsprintf.c:2923 printk_sprint+0x30/0x2d0 kernel/printk/printk.c:2128 vprintk_store+0x56f/0x800 kernel/printk/printk.c:2242 vprintk_emit+0xd0/0x430 kernel/printk/printk.c:2288 vprintk_default+0x26/0x30 kernel/printk/printk.c:2318 vprintk+0x83/0x90 kernel/printk/printk_safe.c:50 _printk+0x7a/0xa0 kernel/printk/printk.c:2328 sidtab_context_to_sid+0x5bf/0x5e0 security/selinux/ss/sidtab.c:346 security_context_to_sid_core+0x299/0x3a0 security/selinux/ss/services.c:1549 security_context_to_sid_force+0x30/0x40 security/selinux/ss/services.c:1622 selinux_inode_setxattr+0x579/0x770 security/selinux/hooks.c:3192 security_inode_setxattr+0xa0/0x130 security/security.c:2142 __vfs_setxattr_locked+0x88/0x1d0 fs/xattr.c:287 vfs_setxattr+0x140/0x280 fs/xattr.c:322 do_setxattr fs/xattr.c:630 [inline] setxattr+0x1bc/0x230 fs/xattr.c:653 __do_sys_fsetxattr fs/xattr.c:709 [inline] __se_sys_fsetxattr+0x117/0x170 fs/xattr.c:698 __x64_sys_fsetxattr+0x67/0x80 fs/xattr.c:698 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffffffff86f41720 of 8 bytes by task 26 on cpu 0: data_make_reusable kernel/printk/printk_ringbuffer.c:590 [inline] data_push_tail+0x102/0x430 kernel/printk/printk_ringbuffer.c:675 data_alloc+0xbe/0x2c0 kernel/printk/printk_ringbuffer.c:1046 prb_reserve+0x893/0xbc0 kernel/printk/printk_ringbuffer.c:1555 vprintk_store+0x53e/0x800 kernel/printk/printk.c:2232 vprintk_emit+0xd0/0x430 kernel/printk/printk.c:2288 vprintk_default+0x26/0x30 kernel/printk/printk.c:2318 vprintk+0x83/0x90 kernel/printk/printk_safe.c:50 _printk+0x7a/0xa0 kernel/printk/printk.c:2328 kauditd_printk_skb kernel/audit.c:536 [inline] kauditd_hold_skb+0x19d/0x1b0 kernel/audit.c:571 kauditd_send_queue+0x27a/0x2d0 kernel/audit.c:756 kauditd_thread+0x42a/0x640 kernel/audit.c:880 kthread+0x1d7/0x210 kernel/kthread.c:389 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 value changed: 0x00000000fffff0a9 -> 0x00000a2e292e2964 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 26 Comm: kauditd Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 ================================================================== audit: type=1400 audit(1688866986.733:512): avc: denied { relabelto } for pid=7271 comm="syz-executor.4" name="NETLINK" dev="sockfs" ino=122395 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_route_socket permissive=1 trawcon="system_u:object_r:sound_device_t:s0" audit: type=1400 audit(1688866994.163:513): avc: denied { setopt } for pid=7898 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 audit: type=1400 audit(1688866994.533:514): avc: denied { name_connect } for pid=7959 comm="syz-executor.4" dest=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1