================================================================== BUG: KCSAN: data-race in has_bh_in_lru / invalidate_bh_lru write to 0xffff888237d2a388 of 8 bytes by task 3100 on cpu 1: __invalidate_bh_lrus fs/buffer.c:1493 [inline] invalidate_bh_lru+0x88/0xf0 fs/buffer.c:1505 csd_do_func kernel/smp.c:131 [inline] smp_call_function_many_cond+0x697/0xc20 kernel/smp.c:826 on_each_cpu_cond_mask+0x3c/0x80 kernel/smp.c:1003 on_each_cpu_cond include/linux/smp.h:105 [inline] invalidate_bh_lrus+0x2a/0x30 fs/buffer.c:1524 invalidate_bdev+0x55/0x80 block/bdev.c:85 ext4_put_super+0x502/0x7f0 fs/ext4/super.c:1340 generic_shutdown_super+0xd9/0x260 fs/super.c:499 kill_block_super+0x3b/0x60 fs/super.c:1417 deactivate_locked_super+0x6b/0xd0 fs/super.c:330 deactivate_super+0x9b/0xb0 fs/super.c:361 cleanup_mnt+0x272/0x2e0 fs/namespace.c:1254 __cleanup_mnt+0x19/0x20 fs/namespace.c:1261 task_work_run+0x135/0x1a0 kernel/task_work.c:179 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0xd1/0xe0 kernel/entry/common.c:171 exit_to_user_mode_prepare+0x6c/0xb0 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x26/0x140 kernel/entry/common.c:297 do_syscall_64+0x4d/0xc0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffff888237d2a388 of 8 bytes by task 12149 on cpu 0: has_bh_in_lru+0x35/0x1e0 fs/buffer.c:1515 smp_call_function_many_cond+0x2e4/0xc20 kernel/smp.c:788 on_each_cpu_cond_mask+0x3c/0x80 kernel/smp.c:1003 on_each_cpu_cond include/linux/smp.h:105 [inline] invalidate_bh_lrus+0x2a/0x30 fs/buffer.c:1524 kill_bdev block/bdev.c:75 [inline] set_blocksize+0x260/0x290 block/bdev.c:152 sb_set_blocksize+0x2d/0xb0 block/bdev.c:161 ext4_load_super fs/ext4/super.c:5093 [inline] __ext4_fill_super fs/ext4/super.c:5221 [inline] ext4_fill_super+0xa6c/0x38b0 fs/ext4/super.c:5696 get_tree_bdev+0x2b4/0x3b0 fs/super.c:1318 ext4_get_tree+0x1c/0x20 fs/ext4/super.c:5728 vfs_get_tree+0x51/0x190 fs/super.c:1519 do_new_mount+0x203/0x660 fs/namespace.c:3335 path_mount+0x496/0xb30 fs/namespace.c:3662 do_mount fs/namespace.c:3675 [inline] __do_sys_mount fs/namespace.c:3884 [inline] __se_sys_mount+0x27f/0x2d0 fs/namespace.c:3861 __x64_sys_mount+0x67/0x80 fs/namespace.c:3861 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0xffff88810a05b7b8 -> 0x0000000000000000 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 12149 Comm: syz-executor.5 Not tainted 6.5.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 ================================================================== EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended EXT4-fs (loop5): warning: checktime reached, running e2fsck is recommended [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a842c01c, mo2=0002] System zones: 0-2, 18-18, 34-34 EXT4-fs warning (device loop5): ext4_update_dynamic_rev:1084: updating to rev 1 because of new feature flag, running e2fsck is recommended EXT4-fs (loop5): 1 truncate cleaned up