================================================================== BUG: KCSAN: data-race in yama_task_free / yama_task_free write to 0xffff8880166b0190 of 1 bytes by interrupt on cpu 1: yama_ptracer_del security/yama/yama_lsm.c:191 [inline] yama_task_free+0xc3/0x160 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1596 __put_task_struct+0xc2/0x3a0 kernel/fork.c:735 put_task_struct include/linux/sched/task.h:113 [inline] delayed_put_task_struct+0x4e/0x130 kernel/exit.c:172 rcu_do_batch kernel/rcu/tree.c:2476 [inline] rcu_core+0x6bb/0xbc0 kernel/rcu/tree.c:2711 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2724 __do_softirq+0x12c/0x2b1 kernel/softirq.c:298 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x32/0x40 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu+0xb2/0xc0 kernel/softirq.c:423 sysvec_apic_timer_interrupt+0x74/0x90 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:631 is_atomic kernel/kcsan/core.c:234 [inline] should_watch kernel/kcsan/core.c:262 [inline] check_access kernel/kcsan/core.c:631 [inline] __tsan_read4+0x11a/0x180 kernel/kcsan/core.c:841 kthread_blkcg+0x1b/0x80 kernel/kthread.c:1331 blk_cgroup_congested include/linux/blk-cgroup.h:274 [inline] cgroup_throttle_swaprate+0x46/0x200 mm/swapfile.c:3806 wp_page_copy+0x2e8/0x1490 mm/memory.c:2857 do_wp_page+0x482/0x6c0 arch/x86/include/asm/atomic.h:95 handle_pte_fault mm/memory.c:4392 [inline] __handle_mm_fault mm/memory.c:4509 [inline] handle_mm_fault+0x13d1/0x1770 mm/memory.c:4607 do_user_addr_fault+0x33e/0x730 arch/x86/mm/fault.c:1372 handle_page_fault arch/x86/mm/fault.c:1429 [inline] exc_page_fault+0x91/0x290 arch/x86/mm/fault.c:1485 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:583 read to 0xffff8880166b0190 of 1 bytes by interrupt on cpu 0: yama_ptracer_del security/yama/yama_lsm.c:187 [inline] yama_task_free+0x5c/0x160 security/yama/yama_lsm.c:207 security_task_free+0x3f/0xa0 security/security.c:1596 __put_task_struct+0xc2/0x3a0 kernel/fork.c:735 put_task_struct include/linux/sched/task.h:113 [inline] delayed_put_task_struct+0x4e/0x130 kernel/exit.c:172 rcu_do_batch kernel/rcu/tree.c:2476 [inline] rcu_core+0x6bb/0xbc0 kernel/rcu/tree.c:2711 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2724 __do_softirq+0x12c/0x2b1 kernel/softirq.c:298 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x32/0x40 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu+0xb2/0xc0 kernel/softirq.c:423 sysvec_apic_timer_interrupt+0x74/0x90 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:631 tomoyo_check_acl+0xc2/0x200 security/tomoyo/domain.c:173 tomoyo_path_permission security/tomoyo/file.c:586 [inline] tomoyo_check_open_permission+0x17f/0x370 security/tomoyo/file.c:777 tomoyo_file_open+0xd3/0xf0 security/tomoyo/tomoyo.c:313 security_file_open+0x3f/0x90 security/security.c:1575 do_dentry_open+0x22d/0x870 fs/open.c:804 vfs_open+0x43/0x50 fs/open.c:931 do_open fs/namei.c:3252 [inline] path_openat+0x1844/0x20a0 fs/namei.c:3369 do_filp_open+0xbd/0x1d0 fs/namei.c:3396 do_sys_openat2+0xa3/0x240 fs/open.c:1168 do_sys_open fs/open.c:1184 [inline] __do_sys_open fs/open.c:1192 [inline] __se_sys_open fs/open.c:1188 [inline] __x64_sys_open+0xe2/0x110 fs/open.c:1188 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 4893 Comm: systemd-udevd Not tainted 5.10.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================