================================================================== BUG: KCSAN: data-race in yama_task_free / yama_task_free write to 0xffff8881214ff150 of 1 bytes by interrupt on cpu 0: yama_ptracer_del security/yama/yama_lsm.c:191 [inline] yama_task_free+0xc6/0x150 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1595 __put_task_struct+0x96/0x370 kernel/fork.c:750 put_task_struct include/linux/sched/task.h:126 [inline] delayed_put_task_struct+0x52/0x160 kernel/exit.c:172 rcu_do_batch kernel/rcu/tree.c:2414 [inline] rcu_core+0x576/0xac0 kernel/rcu/tree.c:2641 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2650 __do_softirq+0x198/0x360 kernel/softirq.c:292 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:711 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] do_softirq_own_stack+0x5d/0x80 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:387 [inline] __irq_exit_rcu+0x115/0x120 kernel/softirq.c:417 sysvec_apic_timer_interrupt+0xba/0xd0 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:587 is_atomic kernel/kcsan/core.c:229 [inline] should_watch kernel/kcsan/core.c:257 [inline] check_access kernel/kcsan/core.c:581 [inline] __tsan_read8+0x11a/0x180 kernel/kcsan/core.c:777 pte_val arch/x86/include/asm/paravirt.h:391 [inline] pte_pfn arch/x86/include/asm/pgtable.h:215 [inline] vm_normal_page+0x24/0x1d0 mm/memory.c:594 zap_pte_range+0x294/0x1610 mm/memory.c:1062 zap_pmd_range mm/memory.c:1193 [inline] zap_pud_range mm/memory.c:1222 [inline] zap_p4d_range mm/memory.c:1243 [inline] unmap_page_range+0x751/0x870 mm/memory.c:1264 unmap_single_vma+0x157/0x210 mm/memory.c:1309 unmap_vmas+0xc0/0x150 mm/memory.c:1341 exit_mmap+0x1c7/0x3b0 mm/mmap.c:3150 __mmput+0xa2/0x220 kernel/fork.c:1093 mmput+0x38/0x40 kernel/fork.c:1114 exit_mm+0x2c8/0x330 kernel/exit.c:482 do_exit+0x415/0x16e0 kernel/exit.c:792 do_group_exit+0xcb/0x180 kernel/exit.c:903 get_signal+0x106d/0x1650 kernel/signal.c:2743 do_signal+0x25/0x270 arch/x86/kernel/signal.c:810 exit_to_usermode_loop arch/x86/entry/common.c:235 [inline] __prepare_exit_to_usermode+0x127/0x230 arch/x86/entry/common.c:269 __syscall_return_slowpath+0x47/0x60 arch/x86/entry/common.c:352 do_syscall_64+0x5d/0xb0 arch/x86/entry/common.c:393 entry_SYSCALL_64_after_hwframe+0x44/0xa9 read to 0xffff8881214ff150 of 1 bytes by interrupt on cpu 1: yama_ptracer_del security/yama/yama_lsm.c:187 [inline] yama_task_free+0x61/0x150 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1595 __put_task_struct+0x96/0x370 kernel/fork.c:750 put_task_struct include/linux/sched/task.h:126 [inline] delayed_put_task_struct+0x52/0x160 kernel/exit.c:172 rcu_do_batch kernel/rcu/tree.c:2414 [inline] rcu_core+0x576/0xac0 kernel/rcu/tree.c:2641 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2650 __do_softirq+0x198/0x360 kernel/softirq.c:292 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:711 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] do_softirq_own_stack+0x5d/0x80 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:387 [inline] __irq_exit_rcu+0x115/0x120 kernel/softirq.c:417 sysvec_apic_timer_interrupt+0xba/0xd0 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:587 tomoyo_domain_quota_is_ok+0x7d/0x2d0 security/tomoyo/util.c:1037 tomoyo_supervisor+0x1f4/0xb30 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_perm+0x261/0x330 security/tomoyo/file.c:838 tomoyo_inode_getattr+0x18/0x20 security/tomoyo/tomoyo.c:123 security_inode_getattr+0x7f/0xd0 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx+0x118/0x2b0 fs/stat.c:206 vfs_lstat include/linux/fs.h:3302 [inline] __do_sys_newlstat fs/stat.c:374 [inline] __se_sys_newlstat+0x46/0x250 fs/stat.c:368 __x64_sys_newlstat+0x2d/0x40 fs/stat.c:368 do_syscall_64+0x51/0xb0 arch/x86/entry/common.c:384 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 5035 Comm: systemd-udevd Not tainted 5.8.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================