================================================================== BUG: KCSAN: data-race in find_get_block_common / has_bh_in_lru read-write to 0xffff888237d26f10 of 8 bytes by task 9894 on cpu 1: bh_lru_install fs/buffer.c:1351 [inline] find_get_block_common+0x4f0/0x960 fs/buffer.c:1416 __find_get_block_nonatomic+0x25/0x30 fs/buffer.c:1435 sb_find_get_block_nonatomic include/linux/buffer_head.h:406 [inline] ext4_free_blocks+0x442/0x1400 fs/ext4/mballoc.c:6645 ext4_remove_blocks fs/ext4/extents.c:2551 [inline] ext4_ext_rm_leaf fs/ext4/extents.c:2716 [inline] ext4_ext_remove_space+0x177b/0x2900 fs/ext4/extents.c:2965 ext4_ext_truncate+0xc7/0x170 fs/ext4/extents.c:4484 ext4_truncate+0x703/0xad0 fs/ext4/inode.c:4574 ext4_evict_inode+0x89c/0xd80 fs/ext4/inode.c:261 evict+0x2e3/0x550 fs/inode.c:810 iput_final fs/inode.c:1898 [inline] iput+0x447/0x5b0 fs/inode.c:1924 ext4_xattr_ibody_set+0x347/0x3c0 fs/ext4/xattr.c:2276 ext4_xattr_set_handle+0x923/0xe70 fs/ext4/xattr.c:2435 ext4_xattr_set+0x18e/0x240 fs/ext4/xattr.c:2549 ext4_xattr_trusted_set+0x3c/0x50 fs/ext4/xattr_trusted.c:38 __vfs_setxattr+0x2e6/0x310 fs/xattr.c:200 __vfs_setxattr_noperm+0xe8/0x410 fs/xattr.c:234 __vfs_setxattr_locked+0x1af/0x1d0 fs/xattr.c:295 vfs_setxattr+0x132/0x270 fs/xattr.c:321 do_setxattr fs/xattr.c:636 [inline] filename_setxattr+0x1ad/0x400 fs/xattr.c:665 path_setxattrat+0x2c9/0x310 fs/xattr.c:713 __do_sys_lsetxattr fs/xattr.c:754 [inline] __se_sys_lsetxattr fs/xattr.c:750 [inline] __x64_sys_lsetxattr+0x71/0x90 fs/xattr.c:750 x64_sys_call+0x1e36/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:190 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888237d26f10 of 8 bytes by task 3305 on cpu 0: has_bh_in_lru+0x35/0x1f0 fs/buffer.c:1557 smp_call_function_many_cond+0x389/0xbf0 kernel/smp.c:838 on_each_cpu_cond_mask+0x3c/0x80 kernel/smp.c:1052 on_each_cpu_cond include/linux/smp.h:105 [inline] invalidate_bh_lrus+0x2a/0x30 fs/buffer.c:1566 kill_bdev block/bdev.c:90 [inline] blkdev_flush_mapping+0x9a/0x1a0 block/bdev.c:712 blkdev_put_whole block/bdev.c:719 [inline] bdev_release+0x2bf/0x3d0 block/bdev.c:1144 blkdev_release+0x15/0x20 block/fops.c:684 __fput+0x298/0x650 fs/file_table.c:465 ____fput+0x1c/0x30 fs/file_table.c:493 task_work_run+0x131/0x1a0 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop+0xe4/0x100 kernel/entry/common.c:114 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline] do_syscall_64+0x1d6/0x200 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0xffff88811a41c680 -> 0xffff88811a41cf70 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3305 Comm: syz-executor Not tainted 6.16.0-rc6-syzkaller-00121-g6832a9317eee #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================