================================================================== BUG: KCSAN: data-race in yama_ptracer_del / yama_ptracer_del write to 0xffff88809facc5d0 of 1 bytes by interrupt on cpu 0: yama_ptracer_del+0x119/0x1a0 security/yama/yama_lsm.c:191 yama_task_free+0x22/0x30 security/yama/yama_lsm.c:207 security_task_free+0x43/0xa0 security/security.c:1518 __put_task_struct+0xcd/0x360 kernel/fork.c:745 put_task_struct include/linux/sched/task.h:122 [inline] delayed_put_task_struct+0x1a5/0x1d0 kernel/exit.c:182 rcu_do_batch kernel/rcu/tree.c:2186 [inline] rcu_core+0x531/0x9b0 kernel/rcu/tree.c:2410 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2419 __do_softirq+0x115/0x33f kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xbb/0xe0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0xe6/0x280 arch/x86/kernel/apic/apic.c:1137 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 get_current arch/x86/include/asm/current.h:15 [inline] get_ctx kernel/kcsan/core.c:185 [inline] is_atomic kernel/kcsan/core.c:209 [inline] should_watch kernel/kcsan/core.c:240 [inline] check_access kernel/kcsan/core.c:528 [inline] __tsan_read8+0xd1/0x100 kernel/kcsan/core.c:659 mnt_clone_write+0x88/0xe0 fs/namespace.c:380 __mnt_want_write_file+0x7b/0x80 fs/namespace.c:398 file_update_time+0x1dd/0x300 fs/inode.c:1895 __generic_file_write_iter+0x132/0x380 mm/filemap.c:3388 generic_file_write_iter+0x28c/0x38c mm/filemap.c:3470 call_write_iter include/linux/fs.h:1902 [inline] do_iter_readv_writev+0x487/0x5b0 fs/read_write.c:693 do_iter_write fs/read_write.c:970 [inline] do_iter_write+0x13b/0x3c0 fs/read_write.c:951 vfs_iter_write+0x5c/0x80 fs/read_write.c:983 iter_file_splice_write+0x530/0x840 fs/splice.c:760 do_splice_from fs/splice.c:863 [inline] direct_splice_actor+0xa0/0xc0 fs/splice.c:1037 splice_direct_to_actor+0x22b/0x540 fs/splice.c:992 do_splice_direct+0x161/0x1e0 fs/splice.c:1080 do_sendfile+0x384/0x7f0 fs/read_write.c:1464 __do_sys_sendfile64 fs/read_write.c:1525 [inline] __se_sys_sendfile64 fs/read_write.c:1511 [inline] __x64_sys_sendfile64+0x12a/0x140 fs/read_write.c:1511 do_syscall_64+0xcc/0x3a0 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x44/0xa9 read to 0xffff88809facc5d0 of 1 bytes by interrupt on cpu 1: yama_ptracer_del+0xd6/0x1a0 security/yama/yama_lsm.c:187 yama_task_free+0x22/0x30 security/yama/yama_lsm.c:207 security_task_free+0x43/0xa0 security/security.c:1518 __put_task_struct+0xcd/0x360 kernel/fork.c:745 put_task_struct include/linux/sched/task.h:122 [inline] delayed_put_task_struct+0x1a5/0x1d0 kernel/exit.c:182 rcu_do_batch kernel/rcu/tree.c:2186 [inline] rcu_core+0x531/0x9b0 kernel/rcu/tree.c:2410 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2419 __do_softirq+0x115/0x33f kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xbb/0xe0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0xe6/0x280 arch/x86/kernel/apic/apic.c:1137 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 __sanitizer_cov_trace_switch+0x0/0x80 kernel/kcov.c:283 arch_atomic_read arch/x86/include/asm/atomic.h:31 [inline] atomic_read include/asm-generic/atomic-instrumented.h:28 [inline] page_mapcount include/linux/mm.h:708 [inline] zap_pte_range mm/memory.c:1081 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x157f/0x1b20 mm/memory.c:1255 unmap_single_vma+0x144/0x200 mm/memory.c:1300 unmap_vmas+0xda/0x1a0 mm/memory.c:1332 exit_mmap+0x13e/0x300 mm/mmap.c:3140 __mmput kernel/fork.c:1082 [inline] mmput+0xea/0x280 kernel/fork.c:1103 exit_mm kernel/exit.c:485 [inline] do_exit+0x4ac/0x18c0 kernel/exit.c:784 do_group_exit+0xb4/0x1c0 kernel/exit.c:895 get_signal+0x2a2/0x1320 kernel/signal.c:2734 do_signal+0x2f/0x6c0 arch/x86/kernel/signal.c:815 exit_to_usermode_loop+0x250/0x2c0 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] syscall_return_slowpath+0x231/0x250 arch/x86/entry/common.c:278 ret_from_fork+0x15/0x30 arch/x86/entry/entry_64.S:344 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 11736 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================