audit: type=1400 audit(1753069597.817:2490): avc: denied { read } for pid=9707 comm="syz.5.2629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 audit: type=1400 audit(1753069597.859:2491): avc: denied { sqpoll } for pid=9707 comm="syz.5.2629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 ================================================================== BUG: KCSAN: data-race in data_push_tail / string write to 0xffffffff88e315b0 of 1 bytes by task 9701 on cpu 0: string_nocheck lib/vsprintf.c:643 [inline] string+0x187/0x220 lib/vsprintf.c:721 vsnprintf+0x532/0x890 lib/vsprintf.c:2874 vscnprintf+0x41/0x90 lib/vsprintf.c:2939 printk_sprint+0x30/0x2d0 kernel/printk/printk.c:2216 vprintk_store+0x599/0x860 kernel/printk/printk.c:2336 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 __netdev_printk+0x321/0x3e0 net/core/dev.c:12517 netdev_info+0x9b/0xd0 net/core/dev.c:12564 bond_change_active_slave+0x6c7/0x1f20 drivers/net/bonding/bond_main.c:1303 bond_select_active_slave+0x47d/0x620 drivers/net/bonding/bond_main.c:1391 bond_enslave+0x18ce/0x2160 drivers/net/bonding/bond_main.c:2366 do_set_master+0x38d/0x460 net/core/rtnetlink.c:2946 rtnl_newlink_create+0x426/0x620 net/core/rtnetlink.c:3837 __rtnl_newlink net/core/rtnetlink.c:3940 [inline] rtnl_newlink+0xf29/0x12d0 net/core/rtnetlink.c:4055 rtnetlink_rcv_msg+0x5fe/0x6d0 net/core/rtnetlink.c:6944 netlink_rcv_skb+0x120/0x220 net/netlink/af_netlink.c:2552 rtnetlink_rcv+0x1c/0x30 net/core/rtnetlink.c:6971 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline] netlink_unicast+0x5a8/0x680 net/netlink/af_netlink.c:1346 netlink_sendmsg+0x58b/0x6b0 net/netlink/af_netlink.c:1896 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x145/0x180 net/socket.c:727 ____sys_sendmsg+0x31e/0x4e0 net/socket.c:2566 ___sys_sendmsg+0x17b/0x1d0 net/socket.c:2620 __sys_sendmsg net/socket.c:2652 [inline] __do_sys_sendmsg net/socket.c:2657 [inline] __se_sys_sendmsg net/socket.c:2655 [inline] __x64_sys_sendmsg+0xd4/0x160 net/socket.c:2655 x64_sys_call+0x2999/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff88e315b0 of 8 bytes by task 30 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:594 [inline] data_push_tail+0xfd/0x420 kernel/printk/printk_ringbuffer.c:679 data_alloc+0xbf/0x2b0 kernel/printk/printk_ringbuffer.c:1054 prb_reserve+0x808/0xaf0 kernel/printk/printk_ringbuffer.c:1669 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2326 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 kauditd_printk_skb kernel/audit.c:546 [inline] kauditd_hold_skb+0x1b1/0x1c0 kernel/audit.c:581 kauditd_send_queue+0x270/0x2c0 kernel/audit.c:766 kauditd_thread+0x421/0x630 kernel/audit.c:890 kthread+0x489/0x510 kernel/kthread.c:464 ret_from_fork+0xda/0x150 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x00000000ffffe05f -> 0x28203a31646e6f62 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 30 Comm: kauditd Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ================================================================== audit: type=1400 audit(1753069597.902:2492): avc: denied { write } for pid=9704 comm="syz.1.2631" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 audit: type=1400 audit(1753069597.913:2493): avc: denied { write } for pid=3295 comm="syz-executor" path="pipe:[2218]" dev="pipefs" ino=2218 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1