audit: type=1400 audit(2000009088.633:83444): avc: denied { write } for pid=24932 comm="syz.6.4927" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 ================================================================== BUG: KCSAN: data-race in data_push_tail / vsnprintf write to 0xffffffff893a43c0 of 45 bytes by task 24934 on cpu 0: vsnprintf+0x2ce/0x860 lib/vsprintf.c:2899 vscnprintf+0x41/0x90 lib/vsprintf.c:3013 printk_sprint+0x30/0x2e0 kernel/printk/printk.c:2222 vprintk_store+0x57b/0x910 kernel/printk/printk.c:2364 vprintk_emit+0x1a4/0x600 kernel/printk/printk.c:2455 vprintk_default+0x26/0x30 kernel/printk/printk.c:2494 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2504 random_pm_notification+0x177/0x1c0 drivers/char/random.c:846 notifier_call_chain kernel/notifier.c:85 [inline] notifier_call_chain_robust kernel/notifier.c:120 [inline] blocking_notifier_call_chain_robust+0xb2/0x3a0 kernel/notifier.c:345 pm_notifier_call_chain_robust+0x2c/0x60 kernel/power/main.c:172 snapshot_open+0x120/0x270 kernel/power/user.c:87 misc_open+0x1df/0x220 drivers/char/misc.c:163 chrdev_open+0x2eb/0x3a0 fs/char_dev.c:411 do_dentry_open+0x4ca/0xa90 fs/open.c:949 vfs_open+0x37/0x1e0 fs/open.c:1081 do_open fs/namei.c:4677 [inline] path_openat+0x1b70/0x2050 fs/namei.c:4836 do_file_open+0x16c/0x290 fs/namei.c:4865 do_sys_openat2+0x94/0x130 fs/open.c:1366 do_sys_open fs/open.c:1372 [inline] __do_sys_openat fs/open.c:1388 [inline] __se_sys_openat fs/open.c:1383 [inline] __x64_sys_openat+0xf2/0x120 fs/open.c:1383 x64_sys_call+0x1e39/0x3020 arch/x86/include/generated/asm/syscalls_64.h:258 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff893a43e8 of 8 bytes by task 28 on cpu 1: data_make_reusable kernel/printk/printk_ringbuffer.c:608 [inline] data_push_tail+0x100/0x470 kernel/printk/printk_ringbuffer.c:693 data_alloc+0x11b/0x390 kernel/printk/printk_ringbuffer.c:1089 prb_reserve+0x8d7/0xae0 kernel/printk/printk_ringbuffer.c:1724 vprintk_store+0x54a/0x910 kernel/printk/printk.c:2354 vprintk_emit+0x1a4/0x600 kernel/printk/printk.c:2455 vprintk_default+0x26/0x30 kernel/printk/printk.c:2494 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2504 kauditd_printk_skb kernel/audit.c:587 [inline] kauditd_hold_skb+0x1b1/0x1c0 kernel/audit.c:622 kauditd_send_queue+0x273/0x2c0 kernel/audit.c:807 kauditd_thread+0x444/0x670 kernel/audit.c:931 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x000000010000138b -> 0x0000000a6e6f6e6f Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 28 Comm: kauditd Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 ================================================================== audit: type=1400 audit(2000009088.633:83445): avc: denied { open } for pid=24932 comm="syz.6.4927" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 audit: type=1400 audit(2000009088.643:83446): avc: denied { ioctl } for pid=24932 comm="syz.6.4927" path="/dev/snapshot" dev="devtmpfs" ino=90 ioctlcmd=0x330f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 audit: type=1400 audit(2000009088.693:83447): avc: denied { read write } for pid=22514 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 audit: type=1400 audit(2000009088.693:83448): avc: denied { read write open } for pid=22514 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 audit: type=1400 audit(2000009088.693:83449): avc: denied { ioctl } for pid=22514 comm="syz-executor" path="/dev/loop6" dev="devtmpfs" ino=106 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 audit: type=1400 audit(2000009088.713:83450): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.105 dest=37374 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 audit: type=1400 audit(2000009088.723:83451): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.1.105 dest=37374 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 audit: type=1400 audit(2000009088.723:83452): avc: denied { recv } for pid=3037 comm="dhcpcd" saddr=10.128.0.163 src=30036 daddr=10.128.1.105 dest=37374 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 kauditd_printk_skb: 3248 callbacks suppressed audit: type=1400 audit(2000009093.613:86701): avc: denied { search } for pid=25245 comm="sed" name="resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 audit: type=1400 audit(2000009093.613:86702): avc: denied { read } for pid=25245 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=513 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 audit: type=1400 audit(2000009093.613:86703): avc: denied { read open } for pid=25245 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=513 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 audit: type=1400 audit(2000009093.613:86704): avc: denied { getattr } for pid=25245 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=513 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 audit: type=1400 audit(2000009093.623:86705): avc: denied { search } for pid=25246 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 audit: type=1400 audit(2000009093.623:86706): avc: denied { search } for pid=25246 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1