================================================================== BUG: KCSAN: data-race in yama_task_free / yama_task_free write to 0xffff888035232f50 of 1 bytes by interrupt on cpu 0: yama_ptracer_del security/yama/yama_lsm.c:191 [inline] yama_task_free+0xc3/0x160 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1610 __put_task_struct+0xc2/0x3a0 kernel/fork.c:736 put_task_struct include/linux/sched/task.h:113 [inline] delayed_put_task_struct+0x4e/0x130 kernel/exit.c:173 rcu_do_batch kernel/rcu/tree.c:2559 [inline] rcu_core+0x6e3/0xc70 kernel/rcu/tree.c:2794 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2807 __do_softirq+0x13c/0x2c3 kernel/softirq.c:345 invoke_softirq kernel/softirq.c:221 [inline] __irq_exit_rcu+0xb4/0xc0 kernel/softirq.c:422 sysvec_apic_timer_interrupt+0x6e/0x80 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632 arch_atomic64_read arch/x86/include/asm/atomic64_64.h:22 [inline] atomic64_read include/asm-generic/atomic-instrumented.h:838 [inline] atomic_long_read include/asm-generic/atomic-long.h:29 [inline] find_watchpoint kernel/kcsan/core.c:122 [inline] check_access kernel/kcsan/core.c:612 [inline] __tsan_read2+0x37/0x180 kernel/kcsan/core.c:838 tomoyo_domain_quota_is_ok+0xdc/0x2f0 security/tomoyo/util.c:1068 tomoyo_supervisor+0x1f4/0xb40 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_perm+0x261/0x330 security/tomoyo/file.c:838 tomoyo_inode_getattr+0x18/0x20 security/tomoyo/tomoyo.c:123 security_inode_getattr+0x7f/0xd0 security/security.c:1288 vfs_getattr fs/stat.c:131 [inline] vfs_statx+0xf8/0x290 fs/stat.c:199 vfs_fstatat fs/stat.c:217 [inline] vfs_lstat include/linux/fs.h:3240 [inline] __do_sys_newlstat fs/stat.c:372 [inline] __se_sys_newlstat+0x46/0x250 fs/stat.c:366 __x64_sys_newlstat+0x2d/0x40 fs/stat.c:366 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xae read to 0xffff888035232f50 of 1 bytes by interrupt on cpu 1: yama_ptracer_del security/yama/yama_lsm.c:187 [inline] yama_task_free+0x5c/0x160 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1610 __put_task_struct+0xc2/0x3a0 kernel/fork.c:736 put_task_struct include/linux/sched/task.h:113 [inline] delayed_put_task_struct+0x4e/0x130 kernel/exit.c:173 rcu_do_batch kernel/rcu/tree.c:2559 [inline] rcu_core+0x6e3/0xc70 kernel/rcu/tree.c:2794 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2807 __do_softirq+0x13c/0x2c3 kernel/softirq.c:345 invoke_softirq kernel/softirq.c:221 [inline] __irq_exit_rcu+0xb4/0xc0 kernel/softirq.c:422 sysvec_apic_timer_interrupt+0x6e/0x80 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632 tomoyo_compare_number_union security/tomoyo/file.c:115 [inline] tomoyo_check_path_number_acl+0x60/0x160 security/tomoyo/file.c:282 tomoyo_check_acl+0xcc/0x220 security/tomoyo/domain.c:175 tomoyo_path_number_perm+0x1af/0x2d0 security/tomoyo/file.c:733 tomoyo_file_ioctl+0x1c/0x20 security/tomoyo/tomoyo.c:329 security_file_ioctl+0x45/0x90 security/security.c:1495 __do_sys_ioctl fs/ioctl.c:747 [inline] __se_sys_ioctl+0x48/0x140 fs/ioctl.c:739 __x64_sys_ioctl+0x3f/0x50 fs/ioctl.c:739 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xae Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 4006 Comm: syz-executor.5 Not tainted 5.12.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================