================================================================== BUG: KCSAN: data-race in yama_ptracer_del / yama_ptracer_del write to 0xffff8880a932d7d0 of 1 bytes by interrupt on cpu 1: yama_ptracer_del+0x119/0x1a0 security/yama/yama_lsm.c:191 yama_task_free+0x22/0x30 security/yama/yama_lsm.c:207 security_task_free+0x43/0xa0 security/security.c:1550 __put_task_struct+0xcd/0x360 kernel/fork.c:745 put_task_struct include/linux/sched/task.h:122 [inline] delayed_put_task_struct+0x1a5/0x1d0 kernel/exit.c:182 rcu_do_batch kernel/rcu/tree.c:2206 [inline] rcu_core+0x533/0x9f0 kernel/rcu/tree.c:2433 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2442 __do_softirq+0x115/0x33f kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xbb/0xe0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:546 [inline] smp_apic_timer_interrupt+0xe6/0x280 arch/x86/kernel/apic/apic.c:1146 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 __read_once_size include/linux/compiler.h:232 [inline] check_kcov_mode kernel/kcov.c:155 [inline] write_comp_data+0x1e/0x70 kernel/kcov.c:208 tomoyo_domain_quota_is_ok+0x234/0x2b0 security/tomoyo/util.c:1071 tomoyo_supervisor+0x1d9/0xc90 security/tomoyo/common.c:2089 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x121/0x160 security/tomoyo/file.c:573 tomoyo_path_perm+0x2c6/0x390 security/tomoyo/file.c:838 tomoyo_path_symlink+0x69/0xa0 security/tomoyo/tomoyo.c:206 security_path_symlink+0xab/0xe0 security/security.c:1085 do_symlinkat+0xcd/0x1e0 fs/namei.c:4226 __do_sys_symlink fs/namei.c:4247 [inline] __se_sys_symlink fs/namei.c:4245 [inline] __x64_sys_symlink+0x3f/0x50 fs/namei.c:4245 do_syscall_64+0xcc/0x3a0 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x44/0xa9 read to 0xffff8880a932d7d0 of 1 bytes by interrupt on cpu 0: yama_ptracer_del+0xd6/0x1a0 security/yama/yama_lsm.c:187 yama_task_free+0x22/0x30 security/yama/yama_lsm.c:207 security_task_free+0x43/0xa0 security/security.c:1550 __put_task_struct+0xcd/0x360 kernel/fork.c:745 put_task_struct include/linux/sched/task.h:122 [inline] delayed_put_task_struct+0x1a5/0x1d0 kernel/exit.c:182 rcu_do_batch kernel/rcu/tree.c:2206 [inline] rcu_core+0x533/0x9f0 kernel/rcu/tree.c:2433 rcu_core_si+0x12/0x20 kernel/rcu/tree.c:2442 __do_softirq+0x115/0x33f kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0xbb/0xe0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:546 [inline] smp_apic_timer_interrupt+0xe6/0x280 arch/x86/kernel/apic/apic.c:1146 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 __read_once_size+0x38/0xe0 include/linux/compiler.h:232 compound_head include/linux/page-flags.h:174 [inline] PageAnon include/linux/page-flags.h:463 [inline] zap_pte_range mm/memory.c:1070 [inline] zap_pmd_range mm/memory.c:1184 [inline] zap_pud_range mm/memory.c:1213 [inline] zap_p4d_range mm/memory.c:1234 [inline] unmap_page_range+0x990/0x1a40 mm/memory.c:1255 unmap_single_vma+0x144/0x200 mm/memory.c:1300 unmap_vmas+0xda/0x1a0 mm/memory.c:1332 exit_mmap+0x13e/0x300 mm/mmap.c:3130 __mmput kernel/fork.c:1082 [inline] mmput+0xea/0x280 kernel/fork.c:1103 exit_mm kernel/exit.c:485 [inline] do_exit+0x60d/0x18a0 kernel/exit.c:788 do_group_exit+0xb4/0x1c0 kernel/exit.c:899 get_signal+0x2a2/0x1320 kernel/signal.c:2734 do_signal+0x2f/0x6c0 arch/x86/kernel/signal.c:813 exit_to_usermode_loop+0x250/0x2c0 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] syscall_return_slowpath arch/x86/entry/common.c:278 [inline] do_syscall_64+0x384/0x3a0 arch/x86/entry/common.c:304 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 3051 Comm: syz-executor.0 Not tainted 5.6.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================