EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled ext4 filesystem being mounted at /31/file1 supports timestamps until 2038-01-19 (0x7fffffff) ================================================================== BUG: KCSAN: data-race in find_get_block_common / has_bh_in_lru read-write to 0xffff888237d26f10 of 8 bytes by task 8152 on cpu 1: bh_lru_install fs/buffer.c:1351 [inline] find_get_block_common+0x4f0/0x960 fs/buffer.c:1416 __find_get_block_nonatomic fs/buffer.c:1435 [inline] bdev_getblk+0x83/0x3d0 fs/buffer.c:1459 __getblk include/linux/buffer_head.h:382 [inline] sb_getblk include/linux/buffer_head.h:388 [inline] __ext4_get_inode_loc+0x303/0x930 fs/ext4/inode.c:4797 ext4_get_inode_loc+0x66/0xe0 fs/ext4/inode.c:4925 ext4_xattr_ibody_get+0x92/0x2c0 fs/ext4/xattr.c:644 ext4_xattr_get+0xdc/0x470 fs/ext4/xattr.c:705 ext4_xattr_security_get+0x32/0x40 fs/ext4/xattr_security.c:20 __vfs_getxattr+0x2aa/0x2c0 fs/xattr.c:423 get_vfs_caps_from_disk+0x9e/0x330 security/commoncap.c:684 get_file_caps security/commoncap.c:775 [inline] cap_bprm_creds_from_file+0x198/0xc30 security/commoncap.c:927 security_bprm_creds_from_file+0x40/0x80 security/security.c:1285 bprm_creds_from_file fs/exec.c:1595 [inline] begin_new_exec+0x1ea/0x1160 fs/exec.c:1105 load_elf_binary+0x5ff/0x19d0 fs/binfmt_elf.c:995 search_binary_handler fs/exec.c:1670 [inline] exec_binprm fs/exec.c:1702 [inline] bprm_execve+0x477/0x970 fs/exec.c:1754 kernel_execve+0x617/0x660 fs/exec.c:1920 call_usermodehelper_exec_async+0x197/0x250 kernel/umh.c:109 ret_from_fork+0xda/0x150 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffff888237d26f10 of 8 bytes by task 8146 on cpu 0: has_bh_in_lru+0x35/0x1f0 fs/buffer.c:1557 smp_call_function_many_cond+0x38c/0xbf0 kernel/smp.c:838 on_each_cpu_cond_mask+0x3c/0x80 kernel/smp.c:1052 on_each_cpu_cond include/linux/smp.h:105 [inline] invalidate_bh_lrus+0x2a/0x30 fs/buffer.c:1566 kill_bdev block/bdev.c:90 [inline] blkdev_flush_mapping+0x9a/0x1a0 block/bdev.c:712 blkdev_put_whole block/bdev.c:719 [inline] bdev_release+0x2bf/0x3d0 block/bdev.c:1144 blkdev_release+0x15/0x20 block/fops.c:684 __fput+0x29b/0x650 fs/file_table.c:465 ____fput+0x1c/0x30 fs/file_table.c:493 task_work_run+0x131/0x1a0 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop+0xe4/0x100 kernel/entry/common.c:114 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline] do_syscall_64+0x1d6/0x200 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000000000 -> 0xffff8881006aea28 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 8146 Comm: syz.3.1181 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================