EXT4-fs: Ignoring removed oldalloc option EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode EXT4-fs (loop1): corrupt root inode, run e2fsck EXT4-fs (loop1): mount failed ================================================================== BUG: KCSAN: data-race in __lru_add_drain_all / folios_put_refs write to 0xffff888237d25ea8 of 1 bytes by task 12549 on cpu 1: folio_batch_reinit include/linux/pagevec.h:50 [inline] folios_put_refs+0x285/0x2d0 mm/swap.c:991 folios_put include/linux/mm.h:1419 [inline] folio_batch_move_lru+0x1fd/0x230 mm/swap.c:175 __folio_batch_add_and_move mm/swap.c:196 [inline] folio_add_lru+0x14a/0x1f0 mm/swap.c:510 shmem_alloc_and_add_folio mm/shmem.c:2006 [inline] shmem_get_folio_gfp+0x7ab/0xd60 mm/shmem.c:2597 shmem_get_folio mm/shmem.c:2703 [inline] shmem_write_begin+0xa8/0x190 mm/shmem.c:3353 generic_perform_write+0x184/0x490 mm/filemap.c:4175 shmem_file_write_iter+0xc5/0xf0 mm/shmem.c:3528 new_sync_write fs/read_write.c:593 [inline] vfs_write+0x52a/0x960 fs/read_write.c:686 ksys_write+0xda/0x1a0 fs/read_write.c:738 __do_sys_write fs/read_write.c:749 [inline] __se_sys_write fs/read_write.c:746 [inline] __x64_sys_write+0x40/0x50 fs/read_write.c:746 x64_sys_call+0x27fe/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:2 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888237d25ea8 of 1 bytes by task 12544 on cpu 0: folio_batch_count include/linux/pagevec.h:56 [inline] cpu_needs_drain mm/swap.c:778 [inline] __lru_add_drain_all+0x12b/0x3f0 mm/swap.c:872 lru_add_drain_all+0x10/0x20 mm/swap.c:888 invalidate_bdev+0x47/0x70 block/bdev.c:101 __ext4_fill_super fs/ext4/super.c:5699 [inline] ext4_fill_super+0x2a6e/0x34e0 fs/ext4/super.c:5724 get_tree_bdev_flags+0x291/0x300 fs/super.c:1692 get_tree_bdev+0x1f/0x30 fs/super.c:1715 ext4_get_tree+0x1c/0x30 fs/ext4/super.c:5756 vfs_get_tree+0x54/0x1d0 fs/super.c:1815 do_new_mount+0x207/0x5e0 fs/namespace.c:3805 path_mount+0x4a4/0xb20 fs/namespace.c:4120 do_mount fs/namespace.c:4133 [inline] __do_sys_mount fs/namespace.c:4344 [inline] __se_sys_mount+0x28f/0x2e0 fs/namespace.c:4321 __x64_sys_mount+0x67/0x80 fs/namespace.c:4321 x64_sys_call+0x2b4d/0x2ff0 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x1f -> 0x02 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 12544 Comm: syz.1.4394 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 ==================================================================