================================================================== BUG: KCSAN: data-race in __find_get_block / has_bh_in_lru read-write to 0xffff888237c26b30 of 8 bytes by task 24925 on cpu 0: bh_lru_install fs/buffer.c:1337 [inline] __find_get_block+0x430/0x8a0 fs/buffer.c:1400 bdev_getblk+0x30/0x3b0 fs/buffer.c:1425 __getblk include/linux/buffer_head.h:379 [inline] sb_getblk include/linux/buffer_head.h:385 [inline] __ext4_get_inode_loc+0x328/0x9a0 fs/ext4/inode.c:4455 ext4_get_inode_loc+0x6a/0xe0 fs/ext4/inode.c:4583 ext4_xattr_ibody_get+0xa0/0x2e0 fs/ext4/xattr.c:644 ext4_xattr_get+0xf3/0x4d0 fs/ext4/xattr.c:705 ext4_xattr_security_get+0x32/0x40 fs/ext4/xattr_security.c:20 __vfs_getxattr+0x29f/0x2b0 fs/xattr.c:423 get_vfs_caps_from_disk+0xa2/0x320 security/commoncap.c:684 get_file_caps security/commoncap.c:775 [inline] cap_bprm_creds_from_file+0x1a6/0xc80 security/commoncap.c:927 security_bprm_creds_from_file+0x3d/0x80 security/security.c:1285 bprm_creds_from_file fs/exec.c:1703 [inline] begin_new_exec+0x1fd/0x1150 fs/exec.c:1213 load_elf_binary+0x65a/0x1a50 fs/binfmt_elf.c:1001 search_binary_handler fs/exec.c:1778 [inline] exec_binprm fs/exec.c:1810 [inline] bprm_execve+0x48b/0x9c0 fs/exec.c:1862 kernel_execve+0x694/0x6d0 fs/exec.c:2028 call_usermodehelper_exec_async+0x19d/0x250 kernel/umh.c:109 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffff888237c26b30 of 8 bytes by task 14537 on cpu 1: has_bh_in_lru+0x35/0x1f0 fs/buffer.c:1521 smp_call_function_many_cond+0x30a/0xbc0 kernel/smp.c:838 on_each_cpu_cond_mask+0x3c/0x90 kernel/smp.c:1052 on_each_cpu_cond include/linux/smp.h:105 [inline] invalidate_bh_lrus+0x2a/0x30 fs/buffer.c:1530 kill_bdev block/bdev.c:90 [inline] blkdev_flush_mapping+0x9b/0x1a0 block/bdev.c:674 blkdev_put_whole block/bdev.c:681 [inline] bdev_release+0x2f9/0x420 block/bdev.c:1106 blkdev_release+0x15/0x20 block/fops.c:660 __fput+0x2ac/0x640 fs/file_table.c:465 ____fput+0x1c/0x30 fs/file_table.c:493 task_work_run+0x13c/0x1b0 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xa8/0x120 kernel/entry/common.c:218 do_syscall_64+0xd6/0x1c0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000000000 -> 0xffff888100566c98 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 14537 Comm: syz-executor Not tainted 6.15.0-rc2-syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ==================================================================