================================================================== BUG: KCSAN: data-race in jbd2_journal_dirty_metadata / jbd2_journal_dirty_metadata write to 0xffff888106dbc3d4 of 4 bytes by task 3674 on cpu 0: jbd2_journal_dirty_metadata+0x33c/0x6c0 fs/jbd2/transaction.c:1556 __ext4_handle_dirty_metadata+0xe9/0x470 fs/ext4/ext4_jbd2.c:358 ext4_do_update_inode fs/ext4/inode.c:5220 [inline] ext4_mark_iloc_dirty+0xa37/0xda0 fs/ext4/inode.c:5869 __ext4_mark_inode_dirty+0x2e2/0x3f0 fs/ext4/inode.c:6074 ext4_dirty_inode+0x92/0xc0 fs/ext4/inode.c:6103 __mark_inode_dirty+0x15c/0x760 fs/fs-writeback.c:2527 generic_update_time fs/inode.c:2064 [inline] inode_update_time fs/inode.c:2077 [inline] touch_atime+0x229/0x330 fs/inode.c:2149 file_accessed include/linux/fs.h:2599 [inline] iterate_dir+0x28b/0x330 fs/readdir.c:111 __do_sys_getdents64 fs/readdir.c:403 [inline] __se_sys_getdents64+0x88/0x1b0 fs/readdir.c:389 __x64_sys_getdents64+0x43/0x50 fs/readdir.c:389 x64_sys_call+0x1302/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:218 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd0/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888106dbc3d4 of 4 bytes by task 12459 on cpu 1: jbd2_journal_dirty_metadata+0x105/0x6c0 fs/jbd2/transaction.c:1512 __ext4_handle_dirty_metadata+0xe9/0x470 fs/ext4/ext4_jbd2.c:358 ext4_do_update_inode fs/ext4/inode.c:5220 [inline] ext4_mark_iloc_dirty+0xa37/0xda0 fs/ext4/inode.c:5869 __ext4_mark_inode_dirty+0x2e2/0x3f0 fs/ext4/inode.c:6074 add_dirent_to_buf+0x2bb/0x350 fs/ext4/namei.c:2155 ext4_add_entry+0x34a/0x1c60 fs/ext4/namei.c:2430 ext4_add_nondir+0x4e/0x180 fs/ext4/namei.c:2786 ext4_symlink+0x59e/0x660 fs/ext4/namei.c:3426 vfs_symlink+0xd4/0x1e0 fs/namei.c:4723 do_symlinkat+0xc7/0x3c0 fs/namei.c:4749 __do_sys_symlinkat fs/namei.c:4765 [inline] __se_sys_symlinkat fs/namei.c:4762 [inline] __x64_sys_symlinkat+0x5a/0x70 fs/namei.c:4762 x64_sys_call+0x1558/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:267 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd0/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000 -> 0x00000001 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 12459 Comm: syz-executor.2 Not tainted 6.15.0-rc7-syzkaller-00142-g4856ebd99715 #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================