EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. ================================================================== BUG: KCSAN: data-race in __find_get_block / has_bh_in_lru read-write to 0xffff888237d26b30 of 8 bytes by task 4072 on cpu 1: bh_lru_install fs/buffer.c:1337 [inline] __find_get_block+0x430/0x8a0 fs/buffer.c:1400 __getblk_slow fs/buffer.c:1127 [inline] bdev_getblk+0x139/0x3b0 fs/buffer.c:1431 __getblk include/linux/buffer_head.h:379 [inline] sb_getblk include/linux/buffer_head.h:385 [inline] __ext4_get_inode_loc+0x328/0x9a0 fs/ext4/inode.c:4455 __ext4_get_inode_loc_noinmem fs/ext4/inode.c:4568 [inline] __ext4_iget+0x312/0x1ee0 fs/ext4/inode.c:4815 __ext4_fill_super fs/ext4/super.c:5502 [inline] ext4_fill_super+0x2b5f/0x3580 fs/ext4/super.c:5726 get_tree_bdev_flags+0x2b4/0x330 fs/super.c:1636 get_tree_bdev+0x1f/0x30 fs/super.c:1659 ext4_get_tree+0x1c/0x30 fs/ext4/super.c:5758 vfs_get_tree+0x56/0x1e0 fs/super.c:1759 do_new_mount+0x246/0x6b0 fs/namespace.c:3881 path_mount+0x49b/0xb30 fs/namespace.c:4208 do_mount fs/namespace.c:4221 [inline] __do_sys_mount fs/namespace.c:4432 [inline] __se_sys_mount+0x28f/0x2e0 fs/namespace.c:4409 __x64_sys_mount+0x67/0x80 fs/namespace.c:4409 x64_sys_call+0xd11/0x2e10 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xc9/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888237d26b30 of 8 bytes by task 3302 on cpu 0: has_bh_in_lru+0x35/0x1f0 fs/buffer.c:1521 smp_call_function_many_cond+0x30a/0xbc0 kernel/smp.c:838 on_each_cpu_cond_mask+0x3c/0x90 kernel/smp.c:1052 on_each_cpu_cond include/linux/smp.h:105 [inline] invalidate_bh_lrus+0x2a/0x30 fs/buffer.c:1530 kill_bdev block/bdev.c:90 [inline] blkdev_flush_mapping+0x9b/0x1a0 block/bdev.c:674 blkdev_put_whole block/bdev.c:681 [inline] bdev_release+0x2f9/0x420 block/bdev.c:1106 blkdev_release+0x15/0x20 block/fops.c:660 __fput+0x2ac/0x640 fs/file_table.c:465 ____fput+0x1c/0x30 fs/file_table.c:493 task_work_run+0x13c/0x1b0 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xa8/0x120 kernel/entry/common.c:218 do_syscall_64+0xd6/0x1a0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000000000 -> 0xffff888106613410 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3302 Comm: syz-executor Not tainted 6.15.0-rc3-syzkaller-00019-gbc3372351d0c #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ==================================================================