audit: type=1400 audit(1735500833.526:12021): avc: denied { sendto } for pid=8463 comm="syz.8.16278" scontext=system_u:object_r:hugetlbfs_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_dgram_socket permissive=1 ================================================================== BUG: KCSAN: data-race in _prb_read_valid / prb_reserve write to 0xffffffff866e0a10 of 8 bytes by task 8470 on cpu 0: prb_reserve+0x740/0xb60 vprintk_store+0x558/0x870 kernel/printk/printk.c:2326 vprintk_emit+0x15e/0x680 kernel/printk/printk.c:2408 dev_vprintk_emit+0x1df/0x210 drivers/base/core.c:4935 dev_printk_emit+0x82/0xb0 drivers/base/core.c:4946 __dev_printk+0xf6/0x110 drivers/base/core.c:4958 _dev_warn+0x99/0xc0 drivers/base/core.c:5002 check_ctrlrecip+0x6db/0x7a0 proc_do_submiturb+0xece/0x1de0 drivers/usb/core/devio.c:1684 proc_submiturb drivers/usb/core/devio.c:2003 [inline] usbdev_do_ioctl drivers/usb/core/devio.c:2703 [inline] usbdev_ioctl+0x1d86/0x3e00 drivers/usb/core/devio.c:2827 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl+0xc9/0x140 fs/ioctl.c:892 __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:892 x64_sys_call+0x1690/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff866e0a10 of 8 bytes by task 29 on cpu 1: desc_read kernel/printk/printk_ringbuffer.c:486 [inline] desc_read_finalized_seq kernel/printk/printk_ringbuffer.c:1874 [inline] prb_read kernel/printk/printk_ringbuffer.c:1922 [inline] _prb_read_valid+0x1ec/0xba0 kernel/printk/printk_ringbuffer.c:2113 desc_update_last_finalized kernel/printk/printk_ringbuffer.c:1515 [inline] prb_final_commit+0x144/0x1f0 kernel/printk/printk_ringbuffer.c:1782 vprintk_store+0x75d/0x870 kernel/printk/printk.c:2352 vprintk_emit+0x15e/0x680 kernel/printk/printk.c:2408 vprintk_default+0x26/0x30 kernel/printk/printk.c:2447 vprintk+0x75/0x80 kernel/printk/printk_safe.c:86 _printk+0x7a/0xa0 kernel/printk/printk.c:2457 kauditd_printk_skb kernel/audit.c:546 [inline] kauditd_hold_skb+0x1a3/0x1b0 kernel/audit.c:581 kauditd_send_queue+0x288/0x2e0 kernel/audit.c:766 kauditd_thread+0x42a/0x650 kernel/audit.c:890 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000000dee -> 0x0000000000000000 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 29 Comm: kauditd Not tainted 6.13.0-rc4-syzkaller-00110-g4099a71718b0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== audit: type=1326 audit(1735500833.616:12022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8478 comm="syz.8.16284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc057655d29 code=0x7ffc0000 audit: type=1326 audit(1735500833.616:12023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8478 comm="syz.8.16284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc057655d29 code=0x7ffc0000 audit: type=1326 audit(1735500833.616:12024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8478 comm="syz.8.16284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=435 compat=0 ip=0x7fc057655d29 code=0x7ffc0000 audit: type=1326 audit(1735500833.616:12025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8478 comm="syz.8.16284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc057655d29 code=0x7ffc0000 audit: type=1326 audit(1735500833.616:12026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8480 comm="syz.8.16284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fc0576885e5 code=0x7ffc0000 audit: type=1326 audit(1735500833.616:12027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8478 comm="syz.8.16284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc057655d29 code=0x7ffc0000