================================================================== BUG: KCSAN: data-race in yama_ptracer_del / yama_ptracer_del write to 0xffff8880a5971a50 of 1 bytes by interrupt on cpu 1: yama_ptracer_del+0x119/0x1a0 security/yama/yama_lsm.c:191 yama_task_free+0x22/0x30 security/yama/yama_lsm.c:207 security_task_free+0x43/0xa0 security/security.c:1518 __put_task_struct+0xcd/0x360 kernel/fork.c:745 put_task_struct include/linux/sched/task.h:122 [inline] delayed_put_task_struct+0x1a5/0x1d0 kernel/exit.c:182 rcu_do_batch kernel/rcu/tree.c:2186 [inline] rcu_core+0x531/0x9b0 kernel/rcu/tree.c:2410 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2419 __do_softirq+0x115/0x33f kernel/softirq.c:292 run_ksoftirqd+0x46/0x60 kernel/softirq.c:603 smpboot_thread_fn+0x37d/0x4a0 kernel/smpboot.c:165 kthread+0x1d4/0x200 drivers/block/aoe/aoecmd.c:1253 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352 read to 0xffff8880a5971a50 of 1 bytes by interrupt on cpu 0: yama_ptracer_del+0xd6/0x1a0 security/yama/yama_lsm.c:187 yama_task_free+0x22/0x30 security/yama/yama_lsm.c:207 security_task_free+0x43/0xa0 security/security.c:1518 __put_task_struct+0xcd/0x360 kernel/fork.c:745 put_task_struct include/linux/sched/task.h:122 [inline] delayed_put_task_struct+0x1a5/0x1d0 kernel/exit.c:182 rcu_do_batch kernel/rcu/tree.c:2186 [inline] rcu_core+0x531/0x9b0 kernel/rcu/tree.c:2410 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2419 __do_softirq+0x115/0x33f kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xbb/0xe0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0xe6/0x280 arch/x86/kernel/apic/apic.c:1137 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 arch_local_irq_restore arch/x86/include/asm/paravirt.h:752 [inline] kcsan_setup_watchpoint+0x211/0x380 kernel/kcsan/core.c:492 check_access kernel/kcsan/core.c:529 [inline] __tsan_read4+0xc6/0x100 kernel/kcsan/core.c:658 __rcu_read_unlock+0xcc/0x390 kernel/rcu/tree_plugin.h:397 rcu_read_unlock include/linux/rcupdate.h:654 [inline] __unlock_page_memcg+0x42/0xa0 mm/memcontrol.c:2019 unlock_page_memcg+0x23/0x30 mm/memcontrol.c:2028 page_remove_file_rmap mm/rmap.c:1273 [inline] page_remove_rmap+0x371/0x7a0 mm/rmap.c:1330 zap_pte_range mm/memory.c:1080 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0xc49/0x1b20 mm/memory.c:1255 unmap_single_vma+0x144/0x200 mm/memory.c:1300 unmap_vmas+0xda/0x1a0 mm/memory.c:1332 exit_mmap+0x13e/0x300 mm/mmap.c:3140 __mmput kernel/fork.c:1082 [inline] mmput+0xea/0x280 kernel/fork.c:1103 exit_mm kernel/exit.c:485 [inline] do_exit+0x4ac/0x18c0 kernel/exit.c:784 do_group_exit+0xb4/0x1c0 kernel/exit.c:895 __do_sys_exit_group kernel/exit.c:906 [inline] __se_sys_exit_group kernel/exit.c:904 [inline] __x64_sys_exit_group+0x2e/0x30 kernel/exit.c:904 do_syscall_64+0xcc/0x3a0 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 13837 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================