audit: type=1400 audit(2000000125.209:31114): avc: denied { mount } for pid=32422 comm="syz.1.5393" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 ================================================================== BUG: KCSAN: data-race in _prb_read_valid / data_alloc write to 0xffffffff86893518 of 8 bytes by task 32423 on cpu 0: data_alloc+0x271/0x2b0 kernel/printk/printk_ringbuffer.c:1095 prb_reserve+0x808/0xaf0 kernel/printk/printk_ringbuffer.c:1669 vprintk_store+0x56d/0x860 kernel/printk/printk.c:2326 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 mnt_warn_timestamp_expiry+0x1c3/0x200 fs/namespace.c:3300 do_new_mount_fc fs/namespace.c:3837 [inline] do_new_mount+0x2f6/0x680 fs/namespace.c:3904 path_mount+0x4a4/0xb20 fs/namespace.c:4226 do_mount fs/namespace.c:4239 [inline] __do_sys_mount fs/namespace.c:4450 [inline] __se_sys_mount+0x28f/0x2e0 fs/namespace.c:4427 __x64_sys_mount+0x67/0x80 fs/namespace.c:4427 x64_sys_call+0xd36/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff86893518 of 16 bytes by task 29 on cpu 1: desc_read kernel/printk/printk_ringbuffer.c:482 [inline] desc_read_finalized_seq kernel/printk/printk_ringbuffer.c:1874 [inline] prb_read kernel/printk/printk_ringbuffer.c:1922 [inline] _prb_read_valid+0x1bc/0x920 kernel/printk/printk_ringbuffer.c:2113 desc_update_last_finalized kernel/printk/printk_ringbuffer.c:1515 [inline] prb_final_commit+0x136/0x1e0 kernel/printk/printk_ringbuffer.c:1782 vprintk_store+0x741/0x860 kernel/printk/printk.c:2352 vprintk_emit+0x178/0x650 kernel/printk/printk.c:2426 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 kauditd_printk_skb kernel/audit.c:546 [inline] kauditd_hold_skb+0x1b1/0x1c0 kernel/audit.c:581 kauditd_send_queue+0x270/0x2c0 kernel/audit.c:766 kauditd_thread+0x421/0x630 kernel/audit.c:890 kthread+0x489/0x510 kernel/kthread.c:464 ret_from_fork+0xda/0x150 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 29 Comm: kauditd Not tainted 6.16.0-rc6-syzkaller-00205-gd786aba32000 #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ================================================================== audit: type=1400 audit(2000000125.249:31115): avc: denied { open } for pid=32422 comm="syz.1.5393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 audit: type=1400 audit(2000000125.249:31116): avc: denied { perfmon } for pid=32422 comm="syz.1.5393" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 audit: type=1400 audit(2000000125.249:31117): avc: denied { kernel } for pid=32422 comm="syz.1.5393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 audit: type=1400 audit(2000000125.509:31118): avc: denied { add_name } for pid=32422 comm="syz.1.5393" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 audit: type=1400 audit(2000000125.509:31119): avc: denied { create } for pid=32422 comm="syz.1.5393" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1