================================================================== BUG: KCSAN: data-race in audit_log_start / audit_receive write to 0xffffffff88edd4d0 of 8 bytes by task 10852 on cpu 1: audit_ctl_lock kernel/audit.c:245 [inline] audit_receive+0x78/0x2200 kernel/audit.c:1605 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x5c0/0x690 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x58b/0x6b0 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x145/0x180 net/socket.c:742 sock_sendmsg+0xc1/0x130 net/socket.c:765 splice_to_socket+0x5f3/0x990 fs/splice.c:886 do_splice_from fs/splice.c:938 [inline] direct_splice_actor+0x156/0x2a0 fs/splice.c:1161 splice_direct_to_actor+0x312/0x680 fs/splice.c:1105 do_splice_direct_actor fs/splice.c:1204 [inline] do_splice_direct+0xda/0x150 fs/splice.c:1230 do_sendfile+0x380/0x650 fs/read_write.c:1370 __do_sys_sendfile64 fs/read_write.c:1431 [inline] __se_sys_sendfile64 fs/read_write.c:1417 [inline] __x64_sys_sendfile64+0x105/0x150 fs/read_write.c:1417 x64_sys_call+0x2db1/0x3000 arch/x86/include/generated/asm/syscalls_64.h:41 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xca/0x2b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff88edd4d0 of 8 bytes by task 3047 on cpu 0: audit_ctl_owner_current kernel/audit.c:266 [inline] audit_log_start+0x106/0x720 kernel/audit.c:1923 common_lsm_audit+0x66/0x230 security/lsm_audit.c:442 slow_avc_audit+0x104/0x140 security/selinux/avc.c:779 avc_audit security/selinux/include/avc.h:131 [inline] avc_has_perm+0x13a/0x180 security/selinux/avc.c:1198 sock_has_perm security/selinux/hooks.c:4815 [inline] selinux_socket_recvmsg+0x175/0x1b0 security/selinux/hooks.c:5162 security_socket_recvmsg+0x50/0x90 security/security.c:4227 sock_recvmsg+0x38/0x170 net/socket.c:1098 ____sys_recvmsg+0xf5/0x280 net/socket.c:2812 ___sys_recvmsg+0x11f/0x370 net/socket.c:2854 __sys_recvmsg net/socket.c:2887 [inline] __do_sys_recvmsg net/socket.c:2893 [inline] __se_sys_recvmsg net/socket.c:2890 [inline] __x64_sys_recvmsg+0xd1/0x160 net/socket.c:2890 x64_sys_call+0x2cbf/0x3000 arch/x86/include/generated/asm/syscalls_64.h:48 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xca/0x2b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000000000 -> 0xffff88810387a100 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3047 Comm: dhcpcd Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 ================================================================== audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=21777 audit_rate_limit=0 audit_backlog_limit=64 audit: backlog limit exceeded audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=21778 audit_rate_limit=0 audit_backlog_limit=64 audit: backlog limit exceeded audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=22115 audit_rate_limit=0 audit_backlog_limit=64 audit: backlog limit exceeded audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=22116 audit_rate_limit=0 audit_backlog_limit=64