audit: type=1400 audit(1635372713.279:498): avc: denied { mount } for pid=30307 comm="syz-executor.0" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 ================================================================== BUG: KCSAN: data-race in data_push_tail / vsnprintf write to 0xffffffff8412f7ca of 1 bytes by task 30301 on cpu 0: vsnprintf+0xe8f/0xed0 va_format lib/vsprintf.c:1694 [inline] pointer+0x48c/0x830 lib/vsprintf.c:2427 vsnprintf+0x8a1/0xed0 lib/vsprintf.c:2801 vscnprintf+0x29/0x80 lib/vsprintf.c:2900 printk_sprint kernel/printk/printk.c:2075 [inline] vprintk_store+0x606/0xb80 kernel/printk/printk.c:2185 vprintk_emit+0xac/0x390 kernel/printk/printk.c:2228 vprintk_default+0x22/0x30 kernel/printk/printk.c:2255 vprintk+0x7f/0x90 kernel/printk/printk_safe.c:50 _printk+0x76/0x97 kernel/printk/printk.c:2265 fat_msg+0x91/0xb9 fs/fat/misc.c:56 fat_read_bpb fs/fat/inode.c:1484 [inline] fat_fill_super+0x13fb/0x2b10 fs/fat/inode.c:1656 vfat_fill_super+0x2c/0x40 fs/fat/namei_vfat.c:1051 mount_bdev+0x1e8/0x290 fs/super.c:1368 vfat_mount+0x2d/0x40 fs/fat/namei_vfat.c:1058 legacy_get_tree+0x70/0xc0 fs/fs_context.c:610 vfs_get_tree+0x4a/0x1a0 fs/super.c:1498 do_new_mount fs/namespace.c:2988 [inline] path_mount+0x11ec/0x1d20 fs/namespace.c:3318 do_mount fs/namespace.c:3331 [inline] __do_sys_mount fs/namespace.c:3539 [inline] __se_sys_mount+0x24b/0x2f0 fs/namespace.c:3516 __x64_sys_mount+0x63/0x70 fs/namespace.c:3516 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x44/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae read to 0xffffffff8412f7c8 of 8 bytes by task 22 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:587 [inline] data_push_tail+0x138/0x470 kernel/printk/printk_ringbuffer.c:672 data_alloc+0xbc/0x2b0 kernel/printk/printk_ringbuffer.c:1043 prb_reserve+0x920/0xbf0 kernel/printk/printk_ringbuffer.c:1549 vprintk_store+0x53a/0xb80 kernel/printk/printk.c:2175 vprintk_emit+0xac/0x390 kernel/printk/printk.c:2228 vprintk_default+0x22/0x30 kernel/printk/printk.c:2255 vprintk+0x7f/0x90 kernel/printk/printk_safe.c:50 _printk+0x76/0x97 kernel/printk/printk.c:2265 kauditd_printk_skb kernel/audit.c:538 [inline] kauditd_hold_skb+0x12d/0x140 kernel/audit.c:571 kauditd_send_queue+0x206/0x2e0 kernel/audit.c:734 kauditd_thread+0x415/0x6e0 kernel/audit.c:860 kthread+0x262/0x280 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 value changed: 0x0000000100000d1d -> 0x00000001000a7372 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 22 Comm: kauditd Not tainted 5.15.0-rc7-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ================================================================== audit: type=1400 audit(1635372713.349:499): avc: denied { read } for pid=30307 comm="syz-executor.0" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 audit: type=1400 audit(1635372713.349:500): avc: denied { open } for pid=30307 comm="syz-executor.0" path="/root/syzkaller-testdir375643668/syzkaller.1Otl8Y/1624/file0" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 audit: type=1400 audit(1635372713.349:501): avc: denied { unmount } for pid=30307 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1