kauditd_printk_skb: 4 callbacks suppressed ================================================================== BUG: KCSAN: data-race in data_push_tail / string write to 0xffffffff86e54f28 of 1 bytes by task 11846 on cpu 0: string_nocheck lib/vsprintf.c:647 [inline] string+0x17b/0x220 lib/vsprintf.c:725 vsnprintf+0xb57/0xe80 lib/vsprintf.c:2782 vscnprintf+0x3e/0x80 lib/vsprintf.c:2888 printk_sprint kernel/printk/printk.c:2092 [inline] vprintk_store+0x5f2/0xb50 kernel/printk/printk.c:2206 vprintk_emit+0xcc/0x430 kernel/printk/printk.c:2252 vprintk_default+0x22/0x30 kernel/printk/printk.c:2282 vprintk+0x7f/0x90 kernel/printk/printk_safe.c:50 _printk+0x76/0x96 kernel/printk/printk.c:2292 caif_disconnect_client+0x140/0x150 net/caif/cfcnfg.c:194 caif_release+0xf8/0x240 net/caif/caif_socket.c:927 __sock_release net/socket.c:650 [inline] sock_close+0x6c/0x150 net/socket.c:1365 __fput+0x292/0x510 fs/file_table.c:317 ____fput+0x11/0x20 fs/file_table.c:350 task_work_run+0x8e/0x110 kernel/task_work.c:177 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0x124/0x130 kernel/entry/common.c:169 exit_to_user_mode_prepare kernel/entry/common.c:201 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline] syscall_exit_to_user_mode+0x6a/0x90 kernel/entry/common.c:294 do_syscall_64+0x37/0x70 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffffffff86e54f28 of 8 bytes by task 24 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:590 [inline] data_push_tail+0x10f/0x440 kernel/printk/printk_ringbuffer.c:675 data_alloc+0xbc/0x2b0 kernel/printk/printk_ringbuffer.c:1046 prb_reserve+0x897/0xbd0 kernel/printk/printk_ringbuffer.c:1555 vprintk_store+0x51c/0xb50 kernel/printk/printk.c:2196 vprintk_emit+0xcc/0x430 kernel/printk/printk.c:2252 vprintk_deferred+0x23/0xd0 kernel/printk/printk.c:3520 _printk_deferred+0x76/0x96 kernel/printk/printk.c:3532 ___ratelimit+0x291/0x2b0 lib/ratelimit.c:50 __printk_ratelimit+0x18/0x20 kernel/printk/printk.c:3548 kauditd_printk_skb kernel/audit.c:537 [inline] kauditd_hold_skb+0x5d/0x1a0 kernel/audit.c:573 kauditd_send_queue+0x297/0x300 kernel/audit.c:758 kauditd_thread+0x49b/0x740 kernel/audit.c:882 kthread+0x1a9/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 value changed: 0x00000000ffffe0fe -> 0x6e203a2928746e65 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 24 Comm: kauditd Not tainted 5.19.0-rc8-syzkaller-00003-g5de64d44968e-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 ================================================================== audit: type=1400 audit(1658876125.767:529): avc: denied { setopt } for pid=11846 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 audit: type=1400 audit(1658876132.107:530): avc: denied { nlmsg_write } for pid=11916 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1