EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. ================================================================== BUG: KCSAN: data-race in __lru_add_drain_all / folio_add_lru_vma read-write to 0xffff888237c2ac08 of 1 bytes by task 28695 on cpu 0: folio_batch_add include/linux/pagevec.h:77 [inline] folio_batch_add_and_move mm/swap.c:233 [inline] folio_add_lru mm/swap.c:522 [inline] folio_add_lru_vma+0x74/0x170 mm/swap.c:542 wp_page_copy mm/memory.c:3359 [inline] do_wp_page+0x1728/0x22b0 mm/memory.c:3683 handle_pte_fault mm/memory.c:5396 [inline] __handle_mm_fault mm/memory.c:5523 [inline] handle_mm_fault+0xb9b/0x2a80 mm/memory.c:5688 do_user_addr_fault arch/x86/mm/fault.c:1389 [inline] handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x296/0x650 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 __put_user_nocheck_4+0x7/0x20 arch/x86/lib/putuser.S:95 ____sys_recvmsg+0x1a3/0x280 net/socket.c:2817 ___sys_recvmsg net/socket.c:2846 [inline] do_recvmmsg+0x2eb/0x720 net/socket.c:2940 __sys_recvmmsg net/socket.c:3019 [inline] __do_sys_recvmmsg net/socket.c:3042 [inline] __se_sys_recvmmsg net/socket.c:3035 [inline] __x64_sys_recvmmsg+0xe2/0x170 net/socket.c:3035 x64_sys_call+0x271d/0x2d70 arch/x86/include/generated/asm/syscalls_64.h:300 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888237c2ac08 of 1 bytes by task 28367 on cpu 1: folio_batch_count include/linux/pagevec.h:56 [inline] cpu_needs_drain mm/swap.c:800 [inline] __lru_add_drain_all+0x12c/0x410 mm/swap.c:894 lru_add_drain_all+0x10/0x20 mm/swap.c:910 invalidate_bdev+0x47/0x70 block/bdev.c:100 ext4_put_super+0x51b/0x7e0 fs/ext4/super.c:1345 generic_shutdown_super+0xde/0x210 fs/super.c:642 kill_block_super+0x2a/0x70 fs/super.c:1676 ext4_kill_sb+0x44/0x80 fs/ext4/super.c:7301 deactivate_locked_super+0x7d/0x1c0 fs/super.c:473 deactivate_super+0x9f/0xb0 fs/super.c:506 cleanup_mnt+0x268/0x2e0 fs/namespace.c:1267 __cleanup_mnt+0x19/0x20 fs/namespace.c:1274 task_work_run+0x13a/0x1a0 kernel/task_work.c:180 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xbe/0x130 kernel/entry/common.c:218 do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0b -> 0x0c Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 28367 Comm: syz-executor.3 Tainted: G W 6.10.0-rc1-syzkaller-00013-g2bfcfd584ff5 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 ==================================================================