loop3: detected capacity change from 0 to 2048 ================================================================== BUG: KCSAN: data-race in __filemap_add_folio / kiocb_invalidate_post_direct_write read-write to 0xffff88810adcd1b8 of 8 bytes by task 17344 on cpu 0: __filemap_add_folio+0x385/0x730 mm/filemap.c:907 filemap_add_folio+0x6f/0x150 mm/filemap.c:942 page_cache_ra_unbounded+0x15e/0x2e0 mm/readahead.c:250 do_page_cache_ra mm/readahead.c:299 [inline] page_cache_ra_order mm/readahead.c:546 [inline] ondemand_readahead+0x550/0x6c0 mm/readahead.c:668 page_cache_sync_ra+0x284/0x2a0 mm/readahead.c:695 page_cache_sync_readahead include/linux/pagemap.h:1273 [inline] filemap_get_pages+0x254/0xea0 mm/filemap.c:2568 filemap_read+0x1fb/0x670 mm/filemap.c:2663 generic_file_read_iter+0x78/0x340 mm/filemap.c:2842 call_read_iter include/linux/fs.h:1979 [inline] copy_splice_read+0x26b/0x4b0 fs/splice.c:365 vfs_splice_read fs/splice.c:993 [inline] splice_direct_to_actor+0x2aa/0x690 fs/splice.c:1070 do_splice_direct+0x10d/0x190 fs/splice.c:1195 do_sendfile+0x3b6/0x9a0 fs/read_write.c:1254 __do_sys_sendfile64 fs/read_write.c:1322 [inline] __se_sys_sendfile64 fs/read_write.c:1308 [inline] __x64_sys_sendfile64+0x110/0x150 fs/read_write.c:1308 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffff88810adcd1b8 of 8 bytes by task 17343 on cpu 1: kiocb_invalidate_post_direct_write+0x61/0x1b0 mm/filemap.c:3828 dio_complete+0x21b/0x480 fs/direct-io.c:301 __blockdev_direct_IO+0x1dee/0x1f80 fs/direct-io.c:1308 blockdev_direct_IO include/linux/fs.h:3009 [inline] fat_direct_IO+0x110/0x1d0 fs/fat/inode.c:283 generic_file_direct_write+0xb1/0x200 mm/filemap.c:3853 __generic_file_write_iter+0xae/0x120 mm/filemap.c:4009 generic_file_write_iter+0x7d/0x1c0 mm/filemap.c:4049 do_iter_write+0x4b4/0x7b0 fs/read_write.c:860 vfs_iter_write+0x56/0x70 fs/read_write.c:901 iter_file_splice_write+0x462/0x7e0 fs/splice.c:737 do_splice_from fs/splice.c:934 [inline] direct_splice_actor+0x8a/0xb0 fs/splice.c:1143 splice_direct_to_actor+0x31d/0x690 fs/splice.c:1089 do_splice_direct+0x10d/0x190 fs/splice.c:1195 do_sendfile+0x3b6/0x9a0 fs/read_write.c:1254 __do_sys_sendfile64 fs/read_write.c:1322 [inline] __se_sys_sendfile64 fs/read_write.c:1308 [inline] __x64_sys_sendfile64+0x110/0x150 fs/read_write.c:1308 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x000000000000001d -> 0x000000000000001e Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 17343 Comm: syz-executor.3 Tainted: G W 6.5.0-syzkaller-01207-g1c59d383390f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 ================================================================== syz-executor.3: attempt to access beyond end of device loop3: rw=2049, sector=2048, nr_sectors = 4 limit=2048