EXT4-fs: inline encryption not supported EXT4-fs warning (device loop4): ext4_enable_quotas:7066: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. EXT4-fs (loop4): mount failed ================================================================== BUG: KCSAN: data-race in mlock_new_folio / need_mlock_drain read-write to 0xffff888237d2b370 of 1 bytes by task 18458 on cpu 1: folio_batch_add include/linux/pagevec.h:77 [inline] mlock_new_folio+0x114/0x200 mm/mlock.c:280 folio_add_lru_vma+0x5d/0x60 mm/swap.c:544 do_anonymous_page mm/memory.c:4604 [inline] do_pte_missing mm/memory.c:3945 [inline] handle_pte_fault mm/memory.c:5521 [inline] __handle_mm_fault mm/memory.c:5664 [inline] handle_mm_fault+0x246c/0x2a30 mm/memory.c:5832 faultin_page mm/gup.c:1194 [inline] __get_user_pages+0x499/0x10d0 mm/gup.c:1493 populate_vma_page_range mm/gup.c:1932 [inline] __mm_populate+0x25b/0x3b0 mm/gup.c:2035 mm_populate include/linux/mm.h:3430 [inline] __do_sys_mlockall mm/mlock.c:766 [inline] __se_sys_mlockall+0x2c5/0x370 mm/mlock.c:742 __x64_sys_mlockall+0x1f/0x30 mm/mlock.c:742 x64_sys_call+0x1e3a/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:152 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888237d2b370 of 1 bytes by task 18456 on cpu 0: folio_batch_count include/linux/pagevec.h:56 [inline] need_mlock_drain+0x30/0x50 mm/mlock.c:235 cpu_needs_drain mm/swap.c:824 [inline] __lru_add_drain_all+0x235/0x410 mm/swap.c:912 lru_add_drain_all+0x10/0x20 mm/swap.c:928 invalidate_bdev+0x47/0x70 block/bdev.c:100 __ext4_fill_super fs/ext4/super.c:5639 [inline] ext4_fill_super+0x6f3/0x39e0 fs/ext4/super.c:5664 get_tree_bdev+0x256/0x2e0 fs/super.c:1635 ext4_get_tree+0x1c/0x30 fs/ext4/super.c:5696 vfs_get_tree+0x56/0x1e0 fs/super.c:1800 do_new_mount+0x227/0x690 fs/namespace.c:3472 path_mount+0x49b/0xb30 fs/namespace.c:3799 do_mount fs/namespace.c:3812 [inline] __do_sys_mount fs/namespace.c:4020 [inline] __se_sys_mount+0x27c/0x2d0 fs/namespace.c:3997 __x64_sys_mount+0x67/0x80 fs/namespace.c:3997 x64_sys_call+0x203e/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x17 -> 0x1d Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 18456 Comm: syz.4.4197 Not tainted 6.11.0-rc6-syzkaller-00019-g67784a74e258 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 ==================================================================