audit: type=1400 audit(1730253824.436:31061): avc: denied { mount } for pid=21112 comm="syz.8.6465" name="/" dev="ramfs" ino=67928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 audit: type=1400 audit(1730253824.466:31062): avc: denied { create } for pid=21112 comm="syz.8.6465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 ================================================================== BUG: KCSAN: data-race in console_flush_all / console_flush_all write to 0xffffffff86816a28 of 8 bytes by task 21112 on cpu 1: console_emit_next_record kernel/printk/printk.c:3053 [inline] console_flush_all+0x395/0x770 kernel/printk/printk.c:3180 __console_flush_and_unlock kernel/printk/printk.c:3239 [inline] console_unlock+0xab/0x330 kernel/printk/printk.c:3279 vprintk_emit+0x3f4/0x680 kernel/printk/printk.c:2407 vprintk_default+0x26/0x30 kernel/printk/printk.c:2422 vprintk+0x75/0x80 kernel/printk/printk_safe.c:68 _printk+0x7a/0xa0 kernel/printk/printk.c:2432 base_sock_release+0x38/0x200 drivers/isdn/mISDN/socket.c:622 __sock_release net/socket.c:658 [inline] sock_close+0x68/0x150 net/socket.c:1426 __fput+0x17a/0x6d0 fs/file_table.c:431 ____fput+0x1c/0x30 fs/file_table.c:459 task_work_run+0x13a/0x1a0 kernel/task_work.c:239 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xbe/0x130 kernel/entry/common.c:218 do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff86816a28 of 8 bytes by task 29 on cpu 0: console_flush_all+0x57e/0x770 kernel/printk/printk.c:3181 __console_flush_and_unlock kernel/printk/printk.c:3239 [inline] console_unlock+0xab/0x330 kernel/printk/printk.c:3279 vprintk_emit+0x3f4/0x680 kernel/printk/printk.c:2407 vprintk_default+0x26/0x30 kernel/printk/printk.c:2422 vprintk+0x75/0x80 kernel/printk/printk_safe.c:68 _printk+0x7a/0xa0 kernel/printk/printk.c:2432 kauditd_printk_skb kernel/audit.c:546 [inline] kauditd_hold_skb+0x1a3/0x1b0 kernel/audit.c:581 kauditd_send_queue+0x288/0x2e0 kernel/audit.c:766 kauditd_thread+0x42a/0x650 kernel/audit.c:890 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000002fb3 -> 0x0000000000002fb4 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 29 Comm: kauditd Not tainted 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== audit: type=1400 audit(1730253824.496:31063): avc: denied { remove_name } for pid=20903 comm="syz-executor" name="lost+found" dev="loop8" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 audit: type=1400 audit(1730253824.496:31064): avc: denied { rmdir } for pid=20903 comm="syz-executor" name="lost+found" dev="loop8" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 audit: type=1400 audit(1730253824.496:31065): avc: denied { unlink } for pid=20903 comm="syz-executor" name="file0" dev="loop8" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 audit: type=1400 audit(1730253824.496:31066): avc: denied { unlink } for pid=20903 comm="syz-executor" name="file1" dev="loop8" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=lnk_file permissive=1