================================================================== BUG: KCSAN: data-race in yama_task_free / yama_task_free write to 0xffff8881017b4790 of 1 bytes by interrupt on cpu 0: yama_ptracer_del security/yama/yama_lsm.c:191 [inline] yama_task_free+0xc3/0x160 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1610 __put_task_struct+0xc2/0x3a0 kernel/fork.c:736 put_task_struct include/linux/sched/task.h:113 [inline] delayed_put_task_struct+0x4e/0x130 kernel/exit.c:173 rcu_do_batch kernel/rcu/tree.c:2559 [inline] rcu_core+0x6e3/0xc70 kernel/rcu/tree.c:2794 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2807 __do_softirq+0x13c/0x2c3 kernel/softirq.c:345 invoke_softirq kernel/softirq.c:221 [inline] __irq_exit_rcu+0xb4/0xc0 kernel/softirq.c:422 sysvec_apic_timer_interrupt+0x37/0x80 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632 read to 0xffff8881017b4790 of 1 bytes by interrupt on cpu 1: yama_ptracer_del security/yama/yama_lsm.c:187 [inline] yama_task_free+0x5c/0x160 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1610 __put_task_struct+0xc2/0x3a0 kernel/fork.c:736 put_task_struct include/linux/sched/task.h:113 [inline] delayed_put_task_struct+0x4e/0x130 kernel/exit.c:173 rcu_do_batch kernel/rcu/tree.c:2559 [inline] rcu_core+0x6e3/0xc70 kernel/rcu/tree.c:2794 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2807 __do_softirq+0x13c/0x2c3 kernel/softirq.c:345 invoke_softirq kernel/softirq.c:221 [inline] __irq_exit_rcu+0xb4/0xc0 kernel/softirq.c:422 sysvec_apic_timer_interrupt+0x6e/0x80 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632 smap_restore arch/x86/include/asm/smap.h:70 [inline] kcsan_setup_watchpoint+0x436/0x470 kernel/kcsan/core.c:590 rcu_preempt_read_enter kernel/rcu/tree_plugin.h:356 [inline] __rcu_read_lock+0x21/0x40 kernel/rcu/tree_plugin.h:376 rcu_read_lock include/linux/rcupdate.h:654 [inline] lock_page_memcg+0x2d/0xf0 mm/memcontrol.c:2142 page_remove_rmap+0x1e/0x640 mm/rmap.c:1348 zap_pte_range+0x5b9/0x13f0 mm/memory.c:1270 zap_pmd_range mm/memory.c:1374 [inline] zap_pud_range mm/memory.c:1403 [inline] zap_p4d_range mm/memory.c:1424 [inline] unmap_page_range+0x540/0x650 mm/memory.c:1445 unmap_single_vma+0x157/0x210 mm/memory.c:1490 unmap_vmas+0xc0/0x170 mm/memory.c:1522 exit_mmap+0x1be/0x400 mm/mmap.c:3218 __mmput+0xa2/0x220 kernel/fork.c:1090 mmput+0x3d/0x50 kernel/fork.c:1111 exit_mm+0x344/0x430 kernel/exit.c:501 do_exit+0x3fc/0x15e0 kernel/exit.c:812 do_group_exit+0xce/0x180 kernel/exit.c:922 get_signal+0xf93/0x1510 kernel/signal.c:2781 arch_do_signal_or_restart+0x2a/0x270 arch/x86/kernel/signal.c:789 handle_signal_work kernel/entry/common.c:147 [inline] exit_to_user_mode_loop kernel/entry/common.c:171 [inline] exit_to_user_mode_prepare+0x11a/0x1b0 kernel/entry/common.c:208 __syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline] syscall_exit_to_user_mode+0x20/0x40 kernel/entry/common.c:301 do_syscall_64+0x45/0x80 arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x44/0xae Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 13237 Comm: syz-executor.3 Not tainted 5.12.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================