loop3: detected capacity change from 0 to 2048 loop3: p1 < > p4 loop3: p4 size 8388608 extends beyond EOD, truncated ================================================================== BUG: KCSAN: data-race in __xa_clear_mark / xas_find_marked read-write to 0xffff888119c5d470 of 8 bytes by interrupt on cpu 0: instrument_read_write include/linux/instrumented.h:55 [inline] __instrument_read_write_bitop include/asm-generic/bitops/instrumented-non-atomic.h:84 [inline] ___test_and_clear_bit include/asm-generic/bitops/instrumented-non-atomic.h:114 [inline] node_clear_mark lib/xarray.c:102 [inline] xas_clear_mark lib/xarray.c:922 [inline] __xa_clear_mark+0xf5/0x1e0 lib/xarray.c:2097 __folio_end_writeback+0x177/0x470 mm/page-writeback.c:3024 folio_end_writeback+0x71/0x3d0 mm/filemap.c:1660 end_buffer_async_write+0x156/0x1f0 fs/buffer.c:419 end_bio_bh_io_sync+0x76/0xa0 fs/buffer.c:2783 bio_endio+0x377/0x410 block/bio.c:1645 blk_update_request+0x336/0x730 block/blk-mq.c:987 blk_mq_end_request+0x26/0x50 block/blk-mq.c:1149 lo_complete_rq+0x98/0x140 drivers/block/loop.c:304 blk_complete_reqs block/blk-mq.c:1224 [inline] blk_done_softirq+0x74/0xb0 block/blk-mq.c:1229 handle_softirqs+0xb7/0x290 kernel/softirq.c:579 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:968 smpboot_thread_fn+0x328/0x530 kernel/smpboot.c:164 kthread+0x489/0x510 kernel/kthread.c:464 ret_from_fork+0xda/0x150 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffff888119c5d470 of 8 bytes by task 7022 on cpu 1: xas_find_chunk include/linux/xarray.h:1752 [inline] xas_find_marked+0x218/0x620 lib/xarray.c:1510 find_get_entry+0x5d/0x380 mm/filemap.c:2038 filemap_get_folios_tag+0x13b/0x210 mm/filemap.c:2306 __filemap_fdatawait_range mm/filemap.c:530 [inline] filemap_write_and_wait_range+0x1d3/0x340 mm/filemap.c:700 direct_write_fallback+0x73/0x100 fs/libfs.c:2088 blkdev_write_iter+0x43d/0x4b0 block/fops.c:770 do_iter_readv_writev+0x421/0x4c0 fs/read_write.c:-1 vfs_writev+0x2df/0x8b0 fs/read_write.c:1057 do_pwritev fs/read_write.c:1153 [inline] __do_sys_pwritev2 fs/read_write.c:1211 [inline] __se_sys_pwritev2+0xfc/0x1c0 fs/read_write.c:1202 __x64_sys_pwritev2+0x67/0x80 fs/read_write.c:1202 x64_sys_call+0x1cea/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:329 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0xfffffe0000000000 -> 0xfffe000000000000 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 7022 Comm: syz.3.1514 Not tainted 6.16.0-rc6-syzkaller-00121-g6832a9317eee #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================