================================================================== BUG: KCSAN: data-race in yama_ptracer_del / yama_ptracer_del write to 0xffff8880af47b850 of 1 bytes by interrupt on cpu 0: yama_ptracer_del+0x117/0x1a0 security/yama/yama_lsm.c:191 yama_task_free+0x1e/0x30 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1550 __put_task_struct+0xc3/0x350 kernel/fork.c:751 put_task_struct include/linux/sched/task.h:122 [inline] delayed_put_task_struct+0x19b/0x1c0 kernel/exit.c:182 rcu_do_batch kernel/rcu/tree.c:2218 [inline] rcu_core+0x533/0x9f0 kernel/rcu/tree.c:2445 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2454 __do_softirq+0x118/0x34a kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xb5/0xd0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:546 [inline] smp_apic_timer_interrupt+0xe2/0x270 arch/x86/kernel/apic/apic.c:1146 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 get_current arch/x86/include/asm/current.h:15 [inline] __sanitizer_cov_trace_pc+0x9/0x50 kernel/kcov.c:186 page_remove_file_rmap mm/rmap.c:1273 [inline] page_remove_rmap+0x362/0x790 mm/rmap.c:1330 zap_pte_range mm/memory.c:1080 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0xb99/0x1a60 mm/memory.c:1255 unmap_single_vma+0x13c/0x1f0 mm/memory.c:1300 unmap_vmas+0xe2/0x1b0 mm/memory.c:1332 exit_mmap+0x13e/0x2f0 mm/mmap.c:3130 __mmput kernel/fork.c:1088 [inline] mmput+0xe2/0x260 kernel/fork.c:1109 exit_mm kernel/exit.c:485 [inline] do_exit+0x640/0x1880 kernel/exit.c:788 do_group_exit+0xae/0x1a0 kernel/exit.c:899 get_signal+0x2a7/0x1290 kernel/signal.c:2734 do_signal+0x2b/0x670 arch/x86/kernel/signal.c:813 exit_to_usermode_loop+0x24a/0x2c0 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] syscall_return_slowpath arch/x86/entry/common.c:278 [inline] do_syscall_64+0x36e/0x390 arch/x86/entry/common.c:304 entry_SYSCALL_64_after_hwframe+0x44/0xa9 read to 0xffff8880af47b850 of 1 bytes by interrupt on cpu 1: yama_ptracer_del+0xd4/0x1a0 security/yama/yama_lsm.c:187 yama_task_free+0x1e/0x30 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1550 __put_task_struct+0xc3/0x350 kernel/fork.c:751 put_task_struct include/linux/sched/task.h:122 [inline] delayed_put_task_struct+0x19b/0x1c0 kernel/exit.c:182 rcu_do_batch kernel/rcu/tree.c:2218 [inline] rcu_core+0x533/0x9f0 kernel/rcu/tree.c:2445 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2454 __do_softirq+0x118/0x34a kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xb5/0xd0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:546 [inline] smp_apic_timer_interrupt+0xe2/0x270 arch/x86/kernel/apic/apic.c:1146 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 9505 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================