================================================================== BUG: KCSAN: data-race in find_get_block_common / has_bh_in_lru read-write to 0xffff888237c26f10 of 8 bytes by task 9687 on cpu 0: bh_lru_install fs/buffer.c:1351 [inline] find_get_block_common+0x4f0/0x960 fs/buffer.c:1416 __find_get_block_nonatomic fs/buffer.c:1435 [inline] bdev_getblk+0x83/0x3d0 fs/buffer.c:1459 getblk_unmovable include/linux/buffer_head.h:371 [inline] ext4_getblk+0x1b6/0x510 fs/ext4/inode.c:975 ext4_xattr_inode_write fs/ext4/xattr.c:1413 [inline] ext4_xattr_inode_lookup_create+0x971/0xed0 fs/ext4/xattr.c:1594 ext4_xattr_ibody_set+0x136/0x3c0 fs/ext4/xattr.c:2258 ext4_xattr_set_handle+0x923/0xe70 fs/ext4/xattr.c:2435 ext4_xattr_set+0x18e/0x240 fs/ext4/xattr.c:2549 ext4_xattr_trusted_set+0x3c/0x50 fs/ext4/xattr_trusted.c:38 __vfs_setxattr+0x2e6/0x310 fs/xattr.c:200 __vfs_setxattr_noperm+0xe8/0x410 fs/xattr.c:234 __vfs_setxattr_locked+0x1af/0x1d0 fs/xattr.c:295 vfs_setxattr+0x132/0x270 fs/xattr.c:321 do_setxattr fs/xattr.c:636 [inline] filename_setxattr+0x1ad/0x400 fs/xattr.c:665 path_setxattrat+0x2c9/0x310 fs/xattr.c:713 __do_sys_lsetxattr fs/xattr.c:754 [inline] __se_sys_lsetxattr fs/xattr.c:750 [inline] __x64_sys_lsetxattr+0x71/0x90 fs/xattr.c:750 x64_sys_call+0x1e36/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:190 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888237c26f10 of 8 bytes by task 6604 on cpu 1: has_bh_in_lru+0x35/0x1f0 fs/buffer.c:1557 smp_call_function_many_cond+0x389/0xbf0 kernel/smp.c:838 on_each_cpu_cond_mask+0x3c/0x80 kernel/smp.c:1052 on_each_cpu_cond include/linux/smp.h:105 [inline] invalidate_bh_lrus+0x2a/0x30 fs/buffer.c:1566 kill_bdev block/bdev.c:90 [inline] blkdev_flush_mapping+0x9a/0x1a0 block/bdev.c:712 blkdev_put_whole block/bdev.c:719 [inline] bdev_release+0x2bf/0x3d0 block/bdev.c:1144 blkdev_release+0x15/0x20 block/fops.c:684 __fput+0x29b/0x650 fs/file_table.c:465 ____fput+0x1c/0x30 fs/file_table.c:493 task_work_run+0x12e/0x1a0 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop+0xe4/0x100 kernel/entry/common.c:114 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline] do_syscall_64+0x1d6/0x200 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0xffff8881199e50d0 -> 0xffff8881199e5068 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 6604 Comm: syz-executor Not tainted 6.15.0-syzkaller-13473-gc0c9379f235d #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================