EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. ================================================================== BUG: KCSAN: data-race in mlock_new_folio / need_mlock_drain read-write to 0xffff888237c2b4a0 of 1 bytes by task 14305 on cpu 0: folio_batch_add include/linux/pagevec.h:77 [inline] mlock_new_folio+0x114/0x200 mm/mlock.c:280 folio_add_lru_vma+0x5d/0x60 mm/swap.c:499 do_anonymous_page mm/memory.c:4856 [inline] do_pte_missing mm/memory.c:3977 [inline] handle_pte_fault mm/memory.c:5801 [inline] __handle_mm_fault mm/memory.c:5944 [inline] handle_mm_fault+0x24d8/0x2ac0 mm/memory.c:6112 faultin_page mm/gup.c:1196 [inline] __get_user_pages+0xf2c/0x2670 mm/gup.c:1494 populate_vma_page_range mm/gup.c:1932 [inline] __mm_populate+0x25b/0x3b0 mm/gup.c:2035 do_mlock+0x415/0x510 mm/mlock.c:653 __do_sys_mlock mm/mlock.c:661 [inline] __se_sys_mlock mm/mlock.c:659 [inline] __x64_sys_mlock+0x36/0x40 mm/mlock.c:659 x64_sys_call+0x26b2/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:150 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888237c2b4a0 of 1 bytes by task 14293 on cpu 1: folio_batch_count include/linux/pagevec.h:56 [inline] need_mlock_drain+0x30/0x50 mm/mlock.c:235 cpu_needs_drain mm/swap.c:747 [inline] __lru_add_drain_all+0x22a/0x3f0 mm/swap.c:835 lru_add_drain_all+0x10/0x20 mm/swap.c:851 invalidate_bdev+0x47/0x70 block/bdev.c:101 ext4_put_super+0x571/0x840 fs/ext4/super.c:1356 generic_shutdown_super+0xe5/0x220 fs/super.c:642 kill_block_super+0x2a/0x70 fs/super.c:1710 ext4_kill_sb+0x44/0x80 fs/ext4/super.c:7379 deactivate_locked_super+0x7d/0x1c0 fs/super.c:473 deactivate_super+0x9f/0xb0 fs/super.c:506 cleanup_mnt+0x268/0x2e0 fs/namespace.c:1373 __cleanup_mnt+0x19/0x20 fs/namespace.c:1380 task_work_run+0x13a/0x1a0 kernel/task_work.c:239 exit_task_work include/linux/task_work.h:43 [inline] do_exit+0x5d8/0x17f0 kernel/exit.c:938 do_group_exit+0x102/0x150 kernel/exit.c:1087 get_signal+0xeb9/0x1000 kernel/signal.c:3017 arch_do_signal_or_restart+0x95/0x4b0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x62/0x120 kernel/entry/common.c:218 do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0a -> 0x0d Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 14293 Comm: syz.0.3627 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ==================================================================