================================================================== BUG: KCSAN: data-race in yama_task_free / yama_task_free write to 0xffff88810a5ce950 of 1 bytes by interrupt on cpu 0: yama_ptracer_del security/yama/yama_lsm.c:191 [inline] yama_task_free+0xc3/0x160 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1596 __put_task_struct+0xc2/0x3a0 kernel/fork.c:735 put_task_struct include/linux/sched/task.h:113 [inline] delayed_put_task_struct+0x4e/0x130 kernel/exit.c:172 rcu_do_batch kernel/rcu/tree.c:2476 [inline] rcu_core+0x6bb/0xbc0 kernel/rcu/tree.c:2711 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2724 __do_softirq+0x12c/0x2b1 kernel/softirq.c:298 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x32/0x40 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu+0xb2/0xc0 kernel/softirq.c:423 sysvec_apic_timer_interrupt+0x74/0x90 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:631 is_atomic kernel/kcsan/core.c:234 [inline] should_watch kernel/kcsan/core.c:262 [inline] check_access kernel/kcsan/core.c:631 [inline] __tsan_read1+0x116/0x180 kernel/kcsan/core.c:839 tomoyo_check_acl+0x6a/0x200 security/tomoyo/domain.c:173 tomoyo_path_permission security/tomoyo/file.c:586 [inline] tomoyo_path_perm+0x22f/0x330 security/tomoyo/file.c:838 tomoyo_path_unlink+0x43/0x60 security/tomoyo/tomoyo.c:150 security_path_unlink+0x82/0xd0 security/security.c:1101 do_unlinkat+0x231/0x4d0 fs/namei.c:3894 __do_sys_unlink fs/namei.c:3943 [inline] __se_sys_unlink fs/namei.c:3941 [inline] __x64_sys_unlink+0x2c/0x30 fs/namei.c:3941 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 read to 0xffff88810a5ce950 of 1 bytes by interrupt on cpu 1: yama_ptracer_del security/yama/yama_lsm.c:187 [inline] yama_task_free+0x5c/0x160 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1596 __put_task_struct+0xc2/0x3a0 kernel/fork.c:735 put_task_struct include/linux/sched/task.h:113 [inline] delayed_put_task_struct+0x4e/0x130 kernel/exit.c:172 rcu_do_batch kernel/rcu/tree.c:2476 [inline] rcu_core+0x6bb/0xbc0 kernel/rcu/tree.c:2711 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2724 __do_softirq+0x12c/0x2b1 kernel/softirq.c:298 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x32/0x40 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu+0xb2/0xc0 kernel/softirq.c:423 sysvec_apic_timer_interrupt+0x74/0x90 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:631 is_atomic kernel/kcsan/core.c:234 [inline] should_watch kernel/kcsan/core.c:262 [inline] check_access kernel/kcsan/core.c:631 [inline] __tsan_read2+0x11a/0x180 kernel/kcsan/core.c:840 vmx_read_guest_seg_selector+0xfb/0x150 arch/x86/kvm/vmx/vmx.c:780 vmx_get_segment+0xcb/0x230 arch/x86/kvm/vmx/vmx.c:3190 kvm_get_segment arch/x86/kvm/x86.c:5846 [inline] emulator_get_segment+0x59/0x230 arch/x86/kvm/x86.c:6649 x86_decode_insn+0x1f5/0x2b70 arch/x86/kvm/emulate.c:5216 x86_emulate_instruction+0x215/0x2ac0 arch/x86/kvm/x86.c:7317 kvm_mmu_page_fault+0x315/0x3c0 arch/x86/kvm/mmu/mmu.c:5097 handle_ept_violation+0x277/0x350 arch/x86/kvm/vmx/vmx.c:5357 vmx_handle_exit+0x2fd/0x7e0 arch/x86/kvm/vmx/vmx.c:6068 vcpu_enter_guest+0x1978/0x2390 arch/x86/kvm/x86.c:9025 vcpu_run+0x26e/0x730 arch/x86/kvm/x86.c:9090 kvm_arch_vcpu_ioctl_run+0x362/0x660 arch/x86/kvm/x86.c:9307 kvm_vcpu_ioctl+0x562/0x8f0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3234 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl+0xcb/0x140 fs/ioctl.c:739 __x64_sys_ioctl+0x3f/0x50 fs/ioctl.c:739 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 13032 Comm: syz-executor.5 Not tainted 5.10.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================