------------[ cut here ]------------ Looking for class "&ei->i_data_sem" with key __key.0, but found a different class "&ei->i_data_sem" with the same key WARNING: CPU: 1 PID: 3842 at kernel/locking/lockdep.c:932 look_up_lock_class+0x16c/0x178 kernel/locking/lockdep.c:932 Modules linked in: CPU: 1 PID: 3842 Comm: syz-executor.0 Not tainted 6.8.0-rc6-syzkaller-00011-g45ec2f5f6ed3 #0 Hardware name: linux,dummy-virt (DT) pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : look_up_lock_class+0x16c/0x178 kernel/locking/lockdep.c:932 lr : look_up_lock_class+0x16c/0x178 kernel/locking/lockdep.c:932 sp : ffff80008d087590 x29: ffff80008d087590 x28: ffff00001328bb80 x27: 0000000000000001 x26: ffff8000891a0000 x25: 1ffff00011a10ed2 x24: ffff8000891a0140 x23: 0000000000000000 x22: 0000000000000000 x21: ffff0000181e4888 x20: ffff80008926c161 x19: ffff800088952e00 x18: ffff00001328c5d8 x17: 20646e756f662074 x16: 7562202c302e7965 x15: 6b5f5f2079656b20 x14: 6874697720226d65 x13: 205d323438335420 x12: ffff60000d5159bb x11: 1fffe0000d5159ba x10: ffff60000d5159ba x9 : dfff800000000000 x8 : 00009ffff2aea646 x7 : ffff00006a8acdd3 x6 : 0000000000000001 x5 : ffff00006a8acdd0 x4 : 1fffe00002651771 x3 : dfff800000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00001328bb80 Call trace: look_up_lock_class+0x16c/0x178 kernel/locking/lockdep.c:932 register_lock_class+0xc4/0xe24 kernel/locking/lockdep.c:1284 __lock_acquire+0x104/0x6b74 kernel/locking/lockdep.c:5014 lock_acquire kernel/locking/lockdep.c:5754 [inline] lock_acquire+0x480/0x7c8 kernel/locking/lockdep.c:5719 down_write_nested+0xb4/0x1a8 kernel/locking/rwsem.c:1695 ext4_double_down_write_data_sem+0x58/0x68 fs/ext4/move_extent.c:58 swap_inode_boot_loader fs/ext4/ioctl.c:432 [inline] __ext4_ioctl+0x16a0/0x3ecc fs/ext4/ioctl.c:1437 ext4_ioctl+0x10/0x1c fs/ext4/ioctl.c:1627 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:871 [inline] __se_sys_ioctl fs/ioctl.c:857 [inline] __arm64_sys_ioctl+0x124/0x190 fs/ioctl.c:857 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x6c/0x258 arch/arm64/kernel/syscall.c:51 el0_svc_common.constprop.0+0xac/0x230 arch/arm64/kernel/syscall.c:136 do_el0_svc+0x40/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x58/0x140 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x100/0x12c arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 irq event stamp: 5073 hardirqs last enabled at (5073): [] raw_spin_rq_unlock_irq kernel/sched/sched.h:1397 [inline] hardirqs last enabled at (5073): [] finish_lock_switch kernel/sched/core.c:5154 [inline] hardirqs last enabled at (5073): [] finish_task_switch.isra.0+0x1a8/0x8e8 kernel/sched/core.c:5272 hardirqs last disabled at (5072): [] __schedule+0xb9c/0x2ae8 kernel/sched/core.c:6625 softirqs last enabled at (5070): [] softirq_handle_end kernel/softirq.c:399 [inline] softirqs last enabled at (5070): [] __do_softirq+0x888/0xd9c kernel/softirq.c:582 softirqs last disabled at (5047): [] ____do_softirq+0x10/0x1c arch/arm64/kernel/irq.c:81 ---[ end trace 0000000000000000 ]--- EXT4-fs error (device loop0): ext4_do_update_inode:5082: inode #18: comm syz-executor.0: corrupted inode contents