loop4: detected capacity change from 0 to 736 ================================================================== BUG: KCSAN: data-race in find_get_block_common / has_bh_in_lru read-write to 0xffff888237c26f10 of 8 bytes by task 15034 on cpu 0: bh_lru_install fs/buffer.c:1351 [inline] find_get_block_common+0x4f0/0x960 fs/buffer.c:1416 __find_get_block_nonatomic fs/buffer.c:1435 [inline] bdev_getblk+0x83/0x3d0 fs/buffer.c:1459 __bread_gfp+0x51/0x250 fs/buffer.c:1521 sb_bread include/linux/buffer_head.h:348 [inline] isofs_fill_super+0x3dc/0x1280 fs/isofs/inode.c:627 get_tree_bdev_flags+0x28e/0x300 fs/super.c:1679 get_tree_bdev+0x1f/0x30 fs/super.c:1702 isofs_get_tree+0x1c/0x30 fs/isofs/inode.c:1526 vfs_get_tree+0x57/0x1d0 fs/super.c:1802 do_new_mount+0x207/0x680 fs/namespace.c:3885 path_mount+0x4a4/0xb20 fs/namespace.c:4209 do_mount fs/namespace.c:4222 [inline] __do_sys_mount fs/namespace.c:4433 [inline] __se_sys_mount+0x28f/0x2e0 fs/namespace.c:4410 __x64_sys_mount+0x67/0x80 fs/namespace.c:4410 x64_sys_call+0xd36/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888237c26f10 of 8 bytes by task 15033 on cpu 1: has_bh_in_lru+0x35/0x1f0 fs/buffer.c:1557 smp_call_function_many_cond+0x389/0xbf0 kernel/smp.c:838 on_each_cpu_cond_mask+0x3c/0x80 kernel/smp.c:1052 on_each_cpu_cond include/linux/smp.h:105 [inline] invalidate_bh_lrus+0x2a/0x30 fs/buffer.c:1566 kill_bdev block/bdev.c:90 [inline] set_blocksize+0x24f/0x310 block/bdev.c:207 sb_set_blocksize+0x7a/0x100 block/bdev.c:224 isofs_fill_super+0xa73/0x1280 fs/isofs/inode.c:816 get_tree_bdev_flags+0x28e/0x300 fs/super.c:1679 get_tree_bdev+0x1f/0x30 fs/super.c:1702 isofs_get_tree+0x1c/0x30 fs/isofs/inode.c:1526 vfs_get_tree+0x57/0x1d0 fs/super.c:1802 do_new_mount+0x207/0x680 fs/namespace.c:3885 path_mount+0x4a4/0xb20 fs/namespace.c:4209 do_mount fs/namespace.c:4222 [inline] __do_sys_mount fs/namespace.c:4433 [inline] __se_sys_mount+0x28f/0x2e0 fs/namespace.c:4410 __x64_sys_mount+0x67/0x80 fs/namespace.c:4410 x64_sys_call+0xd36/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0xffff88811a5cd138 -> 0xffff88811a5cd068 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 15033 Comm: syz.4.3978 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ================================================================== rock: directory entry would overflow storage rock: sig=0x3b10, size=4, remaining=3 SELinux: policydb magic number 0x625 does not match expected magic number 0xf97cff8c SELinux: failed to load policy