================================================================== BUG: KCSAN: data-race in yama_task_free / yama_task_free write to 0xffff88811ea08610 of 1 bytes by interrupt on cpu 1: yama_ptracer_del security/yama/yama_lsm.c:191 [inline] yama_task_free+0xc6/0x150 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1595 __put_task_struct+0x96/0x370 kernel/fork.c:750 put_task_struct include/linux/sched/task.h:126 [inline] delayed_put_task_struct+0x52/0x160 kernel/exit.c:172 rcu_do_batch kernel/rcu/tree.c:2414 [inline] rcu_core+0x576/0xac0 kernel/rcu/tree.c:2641 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2650 __do_softirq+0x198/0x360 kernel/softirq.c:292 run_ksoftirqd+0x2f/0x60 kernel/softirq.c:630 smpboot_thread_fn+0x347/0x530 kernel/smpboot.c:165 kthread+0x20d/0x230 kernel/kthread.c:291 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:293 read to 0xffff88811ea08610 of 1 bytes by interrupt on cpu 0: yama_ptracer_del security/yama/yama_lsm.c:187 [inline] yama_task_free+0x61/0x150 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1595 __put_task_struct+0x96/0x370 kernel/fork.c:750 put_task_struct include/linux/sched/task.h:126 [inline] delayed_put_task_struct+0x52/0x160 kernel/exit.c:172 rcu_do_batch kernel/rcu/tree.c:2414 [inline] rcu_core+0x576/0xac0 kernel/rcu/tree.c:2641 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2650 __do_softirq+0x198/0x360 kernel/softirq.c:292 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:711 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] do_softirq_own_stack+0x5d/0x80 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:387 [inline] __irq_exit_rcu+0x115/0x120 kernel/softirq.c:417 sysvec_apic_timer_interrupt+0xba/0xd0 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:585 tomoyo_domain_quota_is_ok+0xdd/0x2d0 security/tomoyo/util.c:1042 tomoyo_supervisor+0x1f4/0xb30 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_perm+0x261/0x330 security/tomoyo/file.c:838 tomoyo_inode_getattr+0x18/0x20 security/tomoyo/tomoyo.c:123 security_inode_getattr+0x7f/0xd0 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx+0x118/0x2b0 fs/stat.c:206 vfs_lstat include/linux/fs.h:3302 [inline] __do_sys_newlstat fs/stat.c:374 [inline] __se_sys_newlstat+0x46/0x250 fs/stat.c:368 __x64_sys_newlstat+0x2d/0x40 fs/stat.c:368 do_syscall_64+0x51/0xb0 arch/x86/entry/common.c:384 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 5042 Comm: systemd-udevd Not tainted 5.8.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================