================================================================== BUG: KCSAN: data-race in inet_putpeer / inet_putpeer write to 0xffff8881243e9990 of 4 bytes by interrupt on cpu 0: inet_putpeer+0x37/0xa0 net/ipv4/inetpeer.c:240 ip4_frag_free+0x3d/0x50 net/ipv4/ip_fragment.c:102 inet_frag_destroy_rcu+0x58/0x80 net/ipv4/inet_fragment.c:228 __rcu_reclaim kernel/rcu/rcu.h:222 [inline] rcu_do_batch+0x256/0x5b0 kernel/rcu/tree.c:2157 rcu_core+0x369/0x4d0 kernel/rcu/tree.c:2377 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2386 __do_softirq+0x115/0x33f kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xbb/0xe0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0xe6/0x280 arch/x86/kernel/apic/apic.c:1137 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:830 __tsan_read8+0x18/0x1f0 kernel/kcsan/core.c:530 tomoyo_path_matches_pattern+0x2d/0x160 security/tomoyo/util.c:917 tomoyo_compare_name_union security/tomoyo/file.c:87 [inline] tomoyo_compare_name_union+0x71/0xa0 security/tomoyo/file.c:82 tomoyo_check_path_acl security/tomoyo/file.c:260 [inline] tomoyo_check_path_acl+0x85/0xa0 security/tomoyo/file.c:252 tomoyo_check_acl+0xf6/0x270 security/tomoyo/domain.c:172 tomoyo_path_permission security/tomoyo/file.c:586 [inline] tomoyo_path_permission+0xe3/0x160 security/tomoyo/file.c:573 tomoyo_check_open_permission+0x2fd/0x320 security/tomoyo/file.c:777 tomoyo_file_open security/tomoyo/tomoyo.c:319 [inline] tomoyo_file_open+0x75/0x90 security/tomoyo/tomoyo.c:314 security_file_open+0x69/0x210 security/security.c:1497 do_dentry_open+0x20a/0x8f0 fs/open.c:784 vfs_open+0x62/0x80 fs/open.c:914 do_last fs/namei.c:3408 [inline] path_openat+0xf73/0x36e0 fs/namei.c:3525 do_filp_open+0x11e/0x1b0 fs/namei.c:3555 do_sys_open+0x3b3/0x4f0 fs/open.c:1097 __do_sys_open fs/open.c:1115 [inline] __se_sys_open fs/open.c:1110 [inline] __x64_sys_open+0x55/0x70 fs/open.c:1110 do_syscall_64+0xcc/0x370 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x44/0xa9 write to 0xffff8881243e9990 of 4 bytes by interrupt on cpu 1: inet_putpeer+0x37/0xa0 net/ipv4/inetpeer.c:240 ip4_frag_free+0x3d/0x50 net/ipv4/ip_fragment.c:102 inet_frag_destroy_rcu+0x58/0x80 net/ipv4/inet_fragment.c:228 __rcu_reclaim kernel/rcu/rcu.h:222 [inline] rcu_do_batch+0x256/0x5b0 kernel/rcu/tree.c:2157 rcu_core+0x369/0x4d0 kernel/rcu/tree.c:2377 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2386 __do_softirq+0x115/0x33f kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xbb/0xe0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0xe6/0x280 arch/x86/kernel/apic/apic.c:1137 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:830 preempt_count arch/x86/include/asm/preempt.h:26 [inline] check_kcov_mode kernel/kcov.c:68 [inline] __sanitizer_cov_trace_pc+0x14/0x50 kernel/kcov.c:102 zap_pte_range mm/memory.c:1063 [inline] zap_pmd_range mm/memory.c:1166 [inline] zap_pud_range mm/memory.c:1195 [inline] zap_p4d_range mm/memory.c:1216 [inline] unmap_page_range+0xbe0/0x18d0 mm/memory.c:1237 unmap_single_vma+0x144/0x200 mm/memory.c:1282 unmap_vmas+0xda/0x1a0 mm/memory.c:1314 exit_mmap+0x13e/0x300 mm/mmap.c:3161 __mmput kernel/fork.c:1079 [inline] mmput+0xea/0x280 kernel/fork.c:1100 exit_mm kernel/exit.c:485 [inline] do_exit+0x4c9/0x18f0 kernel/exit.c:804 do_group_exit+0xb4/0x1c0 kernel/exit.c:921 __do_sys_exit_group kernel/exit.c:932 [inline] __se_sys_exit_group kernel/exit.c:930 [inline] __x64_sys_exit_group+0x2e/0x30 kernel/exit.c:930 do_syscall_64+0xcc/0x370 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 11014 Comm: net.agent Not tainted 5.4.0-rc6+ #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================