audit: type=1400 audit(2000000683.509:1261): avc: denied { accept } for pid=24944 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 ================================================================== BUG: KCSAN: data-race in data_push_tail / number write to 0xffffffff883ad550 of 1 bytes by task 24947 on cpu 0: number+0x7d0/0xa90 lib/vsprintf.c:564 pointer_string+0x80/0x90 lib/vsprintf.c:742 default_pointer+0x4b3/0x690 pointer+0x829/0xd20 vsnprintf+0x861/0xe30 lib/vsprintf.c:2828 vscnprintf+0x42/0x90 lib/vsprintf.c:2930 printk_sprint+0x30/0x2d0 kernel/printk/printk.c:2165 vprintk_store+0x570/0x810 kernel/printk/printk.c:2279 vprintk_emit+0x10c/0x5e0 kernel/printk/printk.c:2329 vprintk_default+0x26/0x30 kernel/printk/printk.c:2363 vprintk+0x75/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2373 base_sock_release+0x38/0x200 drivers/isdn/mISDN/socket.c:622 __sock_release net/socket.c:659 [inline] sock_close+0x68/0x150 net/socket.c:1421 __fput+0x2c1/0x660 fs/file_table.c:422 ____fput+0x15/0x20 fs/file_table.c:450 task_work_run+0x13a/0x1a0 kernel/task_work.c:180 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xbe/0x130 kernel/entry/common.c:218 do_syscall_64+0xe2/0x1d0 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x72/0x7a read to 0xffffffff883ad550 of 8 bytes by task 28 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:594 [inline] data_push_tail+0x102/0x430 kernel/printk/printk_ringbuffer.c:679 data_alloc+0xbe/0x2c0 kernel/printk/printk_ringbuffer.c:1054 prb_reserve+0x85e/0xb60 kernel/printk/printk_ringbuffer.c:1669 vprintk_store+0x53f/0x810 kernel/printk/printk.c:2269 vprintk_emit+0x10c/0x5e0 kernel/printk/printk.c:2329 vprintk_default+0x26/0x30 kernel/printk/printk.c:2363 vprintk+0x75/0x80 kernel/printk/printk_safe.c:45 _printk+0x7a/0xa0 kernel/printk/printk.c:2373 kauditd_printk_skb kernel/audit.c:546 [inline] kauditd_hold_skb+0x1a1/0x1b0 kernel/audit.c:581 kauditd_send_queue+0x288/0x2e0 kernel/audit.c:766 kauditd_thread+0x42a/0x650 kernel/audit.c:890 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x00000000fffff249 -> 0x00000000ff000a30 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 28 Comm: kauditd Tainted: G W 6.9.0-rc2-syzkaller-00435-g9fe30842a90b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ================================================================== audit: type=1400 audit(2000000692.459:1262): avc: denied { map } for pid=25160 comm="syz-executor.0" path="/dev/usbmon0" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1