audit: audit_backlog=65 > audit_backlog_limit=64 ================================================================== BUG: KCSAN: data-race in _prb_read_valid / data_alloc write to 0xffffffff86c836d0 of 8 bytes by task 13507 on cpu 1: data_alloc+0x310/0x390 kernel/printk/printk_ringbuffer.c:1129 prb_reserve+0x8d7/0xae0 kernel/printk/printk_ringbuffer.c:1724 vprintk_store+0x54a/0x910 kernel/printk/printk.c:2354 vprintk_emit+0x1a4/0x600 kernel/printk/printk.c:2455 vprintk_default+0x26/0x30 kernel/printk/printk.c:2494 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2504 audit_log_lost+0x1cc/0x200 kernel/audit.c:416 audit_log_start+0x46f/0x730 kernel/audit.c:-1 common_lsm_audit+0x65/0x230 security/lsm_audit.c:442 slow_avc_audit+0x14c/0x190 security/selinux/avc.c:779 avc_audit security/selinux/include/avc.h:131 [inline] avc_has_perm+0x144/0x190 security/selinux/avc.c:1198 inode_has_perm security/selinux/hooks.c:1691 [inline] file_has_perm security/selinux/hooks.c:1787 [inline] selinux_revalidate_file_permission security/selinux/hooks.c:3793 [inline] selinux_file_permission+0x633/0x690 security/selinux/hooks.c:3814 security_file_permission+0x3a/0x70 security/security.c:2366 rw_verify_area+0x8d/0x160 fs/read_write.c:475 io_write+0x44a/0xd70 io_uring/rw.c:1165 __io_issue_sqe+0xfd/0x2d0 io_uring/io_uring.c:1384 io_issue_sqe+0x206/0xc00 io_uring/io_uring.c:1407 io_queue_sqe io_uring/io_uring.c:1634 [inline] io_req_task_submit+0x46/0xa0 io_uring/io_uring.c:1044 io_handle_tw_list+0x1f5/0x230 io_uring/tw.c:72 tctx_task_work_run+0x42/0x170 io_uring/tw.c:132 tctx_task_work+0x3f/0x80 io_uring/tw.c:150 task_work_run+0x130/0x1a0 kernel/task_work.c:233 get_signal+0xe0e/0xf60 kernel/signal.c:2807 arch_do_signal_or_restart+0x96/0x450 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x6a/0x6f0 kernel/entry/common.c:98 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:325 [inline] do_syscall_64+0x249/0x370 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff86c836d0 of 16 bytes by task 13808 on cpu 0: desc_read kernel/printk/printk_ringbuffer.c:496 [inline] desc_read_finalized_seq kernel/printk/printk_ringbuffer.c:1931 [inline] prb_read kernel/printk/printk_ringbuffer.c:1979 [inline] _prb_read_valid+0x1bc/0x950 kernel/printk/printk_ringbuffer.c:2170 desc_update_last_finalized+0x8f/0x170 kernel/printk/printk_ringbuffer.c:1570 prb_final_commit+0x10d/0x150 kernel/printk/printk_ringbuffer.c:1839 vprintk_store+0x88b/0x910 kernel/printk/printk.c:2381 vprintk_emit+0x1a4/0x600 kernel/printk/printk.c:2455 vprintk_default+0x26/0x30 kernel/printk/printk.c:2494 vprintk+0x1d/0x30 kernel/printk/printk_safe.c:82 _printk+0x79/0xa0 kernel/printk/printk.c:2504 audit_log_start+0x709/0x730 kernel/audit.c:1949 common_lsm_audit+0x65/0x230 security/lsm_audit.c:442 slow_avc_audit+0x14c/0x190 security/selinux/avc.c:779 avc_audit security/selinux/include/avc.h:131 [inline] avc_has_perm+0x144/0x190 security/selinux/avc.c:1198 selinux_kernel_module_request+0xb9/0xe0 security/selinux/hooks.c:4269 security_kernel_module_request+0x32/0x60 security/security.c:2858 __request_module+0x121/0x3f0 kernel/module/kmod.c:155 dev_load+0x61/0xc0 net/core/dev_ioctl.c:672 dev_ioctl+0x4fe/0x960 net/core/dev_ioctl.c:739 sock_do_ioctl+0x1aa/0x230 net/socket.c:1268 sock_ioctl+0x41b/0x610 net/socket.c:1375 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl+0xce/0x140 fs/ioctl.c:583 __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:583 x64_sys_call+0x1563/0x3020 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 13808 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ==================================================================