EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. ================================================================== BUG: KCSAN: data-race in find_get_block_common / has_bh_in_lru read-write to 0xffff888237d277a0 of 8 bytes by task 3019 on cpu 1: bh_lru_install fs/buffer.c:1242 [inline] find_get_block_common+0x459/0x870 fs/buffer.c:1307 bdev_getblk+0x4d/0x3f0 include/linux/gfp.h:-1 getblk_unmovable include/linux/buffer_head.h:369 [inline] ext4_getblk+0x1ca/0x530 fs/ext4/inode.c:1007 ext4_bread_batch+0x5c/0x320 fs/ext4/inode.c:1076 __ext4_find_entry+0x852/0xdf0 fs/ext4/namei.c:1601 ext4_lookup_entry fs/ext4/namei.c:1703 [inline] ext4_lookup+0xcd/0x3a0 fs/ext4/namei.c:1769 lookup_open fs/namei.c:4484 [inline] open_last_lookups fs/namei.c:4611 [inline] path_openat+0xbf0/0x2050 fs/namei.c:4855 do_file_open+0x16c/0x290 fs/namei.c:4887 do_sys_openat2+0x94/0x130 fs/open.c:1364 do_sys_open fs/open.c:1370 [inline] __do_sys_openat fs/open.c:1386 [inline] __se_sys_openat fs/open.c:1381 [inline] __x64_sys_openat+0xf2/0x120 fs/open.c:1381 x64_sys_call+0x1e39/0x3020 arch/x86/include/generated/asm/syscalls_64.h:258 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888237d277a0 of 8 bytes by task 3293 on cpu 0: has_bh_in_lru+0x35/0x1f0 fs/buffer.c:1448 smp_call_function_many_cond+0x2a7/0xb70 kernel/smp.c:836 on_each_cpu_cond_mask+0x3c/0x80 kernel/smp.c:1057 on_each_cpu_cond include/linux/smp.h:106 [inline] invalidate_bh_lrus+0x2a/0x30 fs/buffer.c:1457 kill_bdev block/bdev.c:90 [inline] blkdev_flush_mapping+0x94/0x1a0 block/bdev.c:720 blkdev_put_whole block/bdev.c:727 [inline] bdev_release+0x2bf/0x3d0 block/bdev.c:1152 blkdev_release+0x15/0x20 block/fops.c:705 __fput+0x29b/0x630 fs/file_table.c:510 ____fput+0x1c/0x30 fs/file_table.c:538 task_work_run+0x130/0x1a0 kernel/task_work.c:233 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] __exit_to_user_mode_loop kernel/entry/common.c:67 [inline] exit_to_user_mode_loop+0x1f4/0x6f0 kernel/entry/common.c:98 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:207 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:238 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:318 [inline] do_syscall_64+0x232/0x3b0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000000000 -> 0xffff8881006df888 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3293 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 ==================================================================