audit: type=1326 audit(2000000000.840:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4142 comm="syz.4.233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa7f11feba9 code=0x7ffc0000 audit: type=1326 audit(2000000000.840:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4142 comm="syz.4.233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa7f11feba9 code=0x7ffc0000 audit: type=1326 audit(2000000000.840:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4142 comm="syz.4.233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa7f11feba9 code=0x7ffc0000 ================================================================== BUG: KCSAN: data-race in console_flush_all / console_flush_all write to 0xffffffff86a20c28 of 8 bytes by task 4141 on cpu 0: console_emit_next_record kernel/printk/printk.c:3099 [inline] console_flush_all+0x35a/0x730 kernel/printk/printk.c:3226 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline] console_unlock+0xa1/0x330 kernel/printk/printk.c:3325 vprintk_emit+0x388/0x650 kernel/printk/printk.c:2450 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 isofs_fill_super+0x1199/0x1270 fs/isofs/inode.c:908 get_tree_bdev_flags+0x291/0x300 fs/super.c:1692 get_tree_bdev+0x1f/0x30 fs/super.c:1715 isofs_get_tree+0x1c/0x30 fs/isofs/inode.c:1533 vfs_get_tree+0x54/0x1d0 fs/super.c:1815 do_new_mount+0x207/0x5e0 fs/namespace.c:3808 path_mount+0x4a4/0xb20 fs/namespace.c:4123 do_mount fs/namespace.c:4136 [inline] __do_sys_mount fs/namespace.c:4347 [inline] __se_sys_mount+0x28f/0x2e0 fs/namespace.c:4324 __x64_sys_mount+0x67/0x80 fs/namespace.c:4324 x64_sys_call+0x2b4d/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff86a20c28 of 8 bytes by task 29 on cpu 1: console_flush_all+0x563/0x730 kernel/printk/printk.c:3227 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline] console_unlock+0xa1/0x330 kernel/printk/printk.c:3325 vprintk_emit+0x388/0x650 kernel/printk/printk.c:2450 vprintk_default+0x26/0x30 kernel/printk/printk.c:2465 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2475 kauditd_printk_skb kernel/audit.c:546 [inline] kauditd_hold_skb+0x1b1/0x1c0 kernel/audit.c:581 kauditd_send_queue+0x273/0x2c0 kernel/audit.c:766 kauditd_thread+0x421/0x630 kernel/audit.c:890 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x11f/0x1b0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x000000000000086b -> 0x000000000000086c Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 29 Comm: kauditd Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 ================================================================== audit: type=1326 audit(2000000000.840:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4142 comm="syz.4.233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa7f11feba9 code=0x7ffc0000 audit: type=1326 audit(2000000000.840:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4142 comm="syz.4.233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa7f11feba9 code=0x7ffc0000 audit: type=1326 audit(2000000001.140:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4142 comm="syz.4.233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa7f11feba9 code=0x7ffc0000 audit: type=1326 audit(2000000001.140:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4142 comm="syz.4.233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa7f11feba9 code=0x7ffc0000 audit: type=1326 audit(2000000001.140:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4142 comm="syz.4.233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa7f11feba9 code=0x7ffc0000