================================================================== BUG: KCSAN: data-race in yama_ptracer_del / yama_ptracer_del write to 0xffff88809c505510 of 1 bytes by interrupt on cpu 0: yama_ptracer_del+0x117/0x1a0 security/yama/yama_lsm.c:191 yama_task_free+0x1e/0x30 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1569 __put_task_struct+0xc3/0x350 kernel/fork.c:748 put_task_struct include/linux/sched/task.h:126 [inline] delayed_put_task_struct+0x19b/0x1c0 kernel/exit.c:173 rcu_do_batch kernel/rcu/tree.c:2206 [inline] rcu_core+0x533/0x9f0 kernel/rcu/tree.c:2433 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2442 __do_softirq+0x118/0x34a kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xb5/0xd0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:546 [inline] smp_apic_timer_interrupt+0xe2/0x270 arch/x86/kernel/apic/apic.c:1140 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 read to 0xffff88809c505510 of 1 bytes by interrupt on cpu 1: yama_ptracer_del+0xd4/0x1a0 security/yama/yama_lsm.c:187 yama_task_free+0x1e/0x30 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1569 __put_task_struct+0xc3/0x350 kernel/fork.c:748 put_task_struct include/linux/sched/task.h:126 [inline] delayed_put_task_struct+0x19b/0x1c0 kernel/exit.c:173 rcu_do_batch kernel/rcu/tree.c:2206 [inline] rcu_core+0x533/0x9f0 kernel/rcu/tree.c:2433 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2442 __do_softirq+0x118/0x34a kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xb5/0xd0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:546 [inline] smp_apic_timer_interrupt+0xe2/0x270 arch/x86/kernel/apic/apic.c:1140 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 __read_once_size include/linux/compiler.h:232 [inline] check_kcov_mode kernel/kcov.c:155 [inline] write_comp_data+0x1e/0x70 kernel/kcov.c:208 do_strncpy_from_user lib/strncpy_from_user.c:40 [inline] strncpy_from_user+0x17f/0x2b0 lib/strncpy_from_user.c:120 getname_flags fs/namei.c:149 [inline] getname_flags+0xc0/0x380 fs/namei.c:128 getname fs/namei.c:209 [inline] do_symlinkat+0x45/0x1e0 fs/namei.c:3953 __do_sys_symlink fs/namei.c:3983 [inline] __se_sys_symlink fs/namei.c:3981 [inline] __x64_sys_symlink+0x3c/0x50 fs/namei.c:3981 do_syscall_64+0xc7/0x3b0 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 16436 Comm: syz-executor.4 Not tainted 5.7.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================