EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. ================================================================== BUG: KCSAN: data-race in __mark_inode_dirty / __writeback_single_inode write to 0xffff88811a5e8ea8 of 4 bytes by task 15417 on cpu 0: __mark_inode_dirty+0x248/0x750 fs/fs-writeback.c:2558 ext4_mb_new_blocks+0x10b9/0x2080 fs/ext4/mballoc.c:-1 ext4_ext_map_blocks+0xff5/0x38a0 fs/ext4/extents.c:4383 ext4_map_create_blocks fs/ext4/inode.c:609 [inline] ext4_map_blocks+0x5ee/0xd00 fs/ext4/inode.c:811 ext4_alloc_file_blocks+0x2a9/0x800 fs/ext4/extents.c:4551 ext4_do_fallocate+0x13b/0x3f0 fs/ext4/extents.c:4742 ext4_fallocate+0x20d/0x2f0 fs/ext4/extents.c:4805 vfs_fallocate+0x3b6/0x400 fs/open.c:342 ksys_fallocate fs/open.c:366 [inline] __do_sys_fallocate fs/open.c:371 [inline] __se_sys_fallocate fs/open.c:369 [inline] __x64_sys_fallocate+0x7a/0xd0 fs/open.c:369 x64_sys_call+0x2514/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:286 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff88811a5e8ea8 of 4 bytes by task 15404 on cpu 1: __writeback_single_inode+0x109/0x7c0 fs/fs-writeback.c:1700 writeback_single_inode+0x167/0x3e0 fs/fs-writeback.c:1801 sync_inode_metadata+0x5b/0x90 fs/fs-writeback.c:2884 generic_buffers_fsync_noflush+0xd9/0x120 fs/buffer.c:619 ext4_fsync_nojournal fs/ext4/fsync.c:88 [inline] ext4_sync_file+0x1ab/0x690 fs/ext4/fsync.c:147 vfs_fsync_range+0x10d/0x130 fs/sync.c:187 generic_write_sync include/linux/fs.h:3042 [inline] ext4_buffered_write_iter+0x34f/0x3c0 fs/ext4/file.c:305 ext4_dio_write_iter fs/ext4/file.c:613 [inline] ext4_file_write_iter+0xdbf/0xf00 fs/ext4/file.c:721 iter_file_splice_write+0x663/0xa60 fs/splice.c:738 do_splice_from fs/splice.c:938 [inline] direct_splice_actor+0x153/0x2a0 fs/splice.c:1161 splice_direct_to_actor+0x30f/0x680 fs/splice.c:1105 do_splice_direct_actor fs/splice.c:1204 [inline] do_splice_direct+0xda/0x150 fs/splice.c:1230 do_sendfile+0x380/0x650 fs/read_write.c:1370 __do_sys_sendfile64 fs/read_write.c:1431 [inline] __se_sys_sendfile64 fs/read_write.c:1417 [inline] __x64_sys_sendfile64+0x105/0x150 fs/read_write.c:1417 x64_sys_call+0x2bb0/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:41 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000022 -> 0x0000003a Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 15404 Comm: syz.1.3836 Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 ==================================================================