================================================================== BUG: KCSAN: data-race in yama_task_free / yama_task_free write to 0xffff88813a3fb610 of 1 bytes by interrupt on cpu 1: yama_ptracer_del security/yama/yama_lsm.c:191 [inline] yama_task_free+0xc3/0x160 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1610 __put_task_struct+0xc2/0x3a0 kernel/fork.c:736 put_task_struct include/linux/sched/task.h:113 [inline] delayed_put_task_struct+0x4e/0x130 kernel/exit.c:173 rcu_do_batch kernel/rcu/tree.c:2559 [inline] rcu_core+0x6e3/0xc70 kernel/rcu/tree.c:2794 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2807 __do_softirq+0x13c/0x2c3 kernel/softirq.c:345 run_ksoftirqd+0x13/0x20 kernel/softirq.c:652 smpboot_thread_fn+0x34f/0x520 kernel/smpboot.c:165 kthread+0x20b/0x230 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 read to 0xffff88813a3fb610 of 1 bytes by interrupt on cpu 0: yama_ptracer_del security/yama/yama_lsm.c:187 [inline] yama_task_free+0x5c/0x160 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1610 __put_task_struct+0xc2/0x3a0 kernel/fork.c:736 put_task_struct include/linux/sched/task.h:113 [inline] delayed_put_task_struct+0x4e/0x130 kernel/exit.c:173 rcu_do_batch kernel/rcu/tree.c:2559 [inline] rcu_core+0x6e3/0xc70 kernel/rcu/tree.c:2794 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2807 __do_softirq+0x13c/0x2c3 kernel/softirq.c:345 invoke_softirq kernel/softirq.c:221 [inline] __irq_exit_rcu+0xb4/0xc0 kernel/softirq.c:422 sysvec_apic_timer_interrupt+0x6e/0x80 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632 is_atomic kernel/kcsan/core.c:233 [inline] should_watch kernel/kcsan/core.c:261 [inline] check_access kernel/kcsan/core.c:627 [inline] __tsan_read2+0x11a/0x180 kernel/kcsan/core.c:838 tlb_flush_pte_range include/asm-generic/tlb.h:524 [inline] zap_pte_range+0x3c0/0x13f0 mm/memory.c:1256 zap_pmd_range mm/memory.c:1374 [inline] zap_pud_range mm/memory.c:1403 [inline] zap_p4d_range mm/memory.c:1424 [inline] unmap_page_range+0x540/0x650 mm/memory.c:1445 unmap_single_vma+0x157/0x210 mm/memory.c:1490 unmap_vmas+0xc0/0x170 mm/memory.c:1522 exit_mmap+0x1be/0x400 mm/mmap.c:3218 __mmput+0xa2/0x220 kernel/fork.c:1090 mmput+0x3d/0x50 kernel/fork.c:1111 exit_mm+0x344/0x430 kernel/exit.c:501 do_exit+0x3fc/0x15e0 kernel/exit.c:812 do_group_exit+0xce/0x180 kernel/exit.c:922 get_signal+0xf93/0x1510 kernel/signal.c:2781 arch_do_signal_or_restart+0x2a/0x270 arch/x86/kernel/signal.c:789 handle_signal_work kernel/entry/common.c:147 [inline] exit_to_user_mode_loop kernel/entry/common.c:171 [inline] exit_to_user_mode_prepare+0x11a/0x1b0 kernel/entry/common.c:208 __syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline] syscall_exit_to_user_mode+0x20/0x40 kernel/entry/common.c:301 do_syscall_64+0x45/0x80 arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x44/0xae Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 27126 Comm: syz-executor.5 Tainted: G W 5.12.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================