================================================================== BUG: KCSAN: data-race in audit_log_start / audit_receive write to 0xffffffff893bf500 of 8 bytes by task 21677 on cpu 0: audit_ctl_lock kernel/audit.c:249 [inline] audit_receive+0x77/0x2270 kernel/audit.c:1609 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x5c0/0x690 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x5c8/0x6f0 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] sock_sendmsg+0x254/0x280 net/socket.c:765 splice_to_socket+0x6e2/0xa80 fs/splice.c:886 do_splice_from fs/splice.c:938 [inline] direct_splice_actor+0x156/0x2a0 fs/splice.c:1161 splice_direct_to_actor+0x311/0x670 fs/splice.c:1105 do_splice_direct_actor fs/splice.c:1204 [inline] do_splice_direct+0x119/0x1a0 fs/splice.c:1230 do_sendfile+0x382/0x650 fs/read_write.c:1372 __do_sys_sendfile64 fs/read_write.c:1433 [inline] __se_sys_sendfile64 fs/read_write.c:1419 [inline] __x64_sys_sendfile64+0x105/0x150 fs/read_write.c:1419 x64_sys_call+0x2dc4/0x3020 arch/x86/include/generated/asm/syscalls_64.h:41 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff893bf500 of 8 bytes by task 3040 on cpu 1: audit_ctl_owner_current kernel/audit.c:270 [inline] audit_log_start+0x103/0x730 kernel/audit.c:1927 common_lsm_audit+0x65/0x230 security/lsm_audit.c:442 slow_avc_audit+0x14c/0x190 security/selinux/avc.c:779 avc_audit security/selinux/include/avc.h:131 [inline] avc_has_perm+0x144/0x190 security/selinux/avc.c:1198 sock_has_perm security/selinux/hooks.c:4820 [inline] selinux_socket_recvmsg+0x192/0x1c0 security/selinux/hooks.c:5167 security_socket_recvmsg+0x4c/0x90 security/security.c:4227 sock_recvmsg+0x38/0x160 net/socket.c:1098 ____sys_recvmsg+0xf5/0x280 net/socket.c:2812 ___sys_recvmsg+0x11f/0x3b0 net/socket.c:2854 __sys_recvmsg net/socket.c:2887 [inline] __do_sys_recvmsg net/socket.c:2893 [inline] __se_sys_recvmsg net/socket.c:2890 [inline] __x64_sys_recvmsg+0xd1/0x160 net/socket.c:2890 x64_sys_call+0x2b1a/0x3020 arch/x86/include/generated/asm/syscalls_64.h:48 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000000000 -> 0xffff88811d7a5280 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 3040 Comm: dhcpcd Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=167 audit_rate_limit=0 audit_backlog_limit=64 audit: backlog limit exceeded audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=168 audit_rate_limit=0 audit_backlog_limit=64 audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=265 audit_rate_limit=0 audit_backlog_limit=64 audit: backlog limit exceeded audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=266 audit_rate_limit=0 audit_backlog_limit=64