------------[ cut here ]------------
Looking for class "lock" with key init_kmem_cache_cpus.__key, but found a different class "&c->lock" with the same key
WARNING: CPU: 1 PID: 6798 at kernel/locking/lockdep.c:939 look_up_lock_class+0xec/0x160 kernel/locking/lockdep.c:936
Modules linked in:
CPU: 1 UID: 0 PID: 6798 Comm: syz.3.108 Not tainted 6.12.0-syzkaller-g7b1d1d4cfac0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : look_up_lock_class+0xec/0x160 kernel/locking/lockdep.c:936
lr : look_up_lock_class+0xec/0x160 kernel/locking/lockdep.c:936
sp : ffff80009cea6e80
x29: ffff80009cea6e80
 x28: dfff800000000000
 x27: 0000000000000000
x26: ffff8000973468c0 x25: ffff800097346000 x24: 0000000000000001
x23: 0000000000000000
 x22: 1ffff00011f040ba
 x21: ffff8000973a7690
x20: fffffdffbf706500 x19: ffff800092e195b0 x18: 0000000000000008
x17: 7562202c79656b5f x16: ffff80008b3ede1c x15: ffff700011f13534
x14: 1ffff00011f13534 x13: 0000000000000004 x12: ffffffffffffffff
x11: 0000000000040000 x10: 0000000000009bb1 x9 : 49cbc92a93a86900
x8 : 49cbc92a93a86900 x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff80009cea65b8 x4 : ffff80008f90d220 x3 : ffff8000803921b4
x2 : 0000000000000000 x1 : 0000000100000001 x0 : 0000000000000000
Call trace:
 look_up_lock_class+0xec/0x160 kernel/locking/lockdep.c:936 (P)
 look_up_lock_class+0xec/0x160 kernel/locking/lockdep.c:936 (L)
 register_lock_class+0x8c/0x6b4 kernel/locking/lockdep.c:1290
 __lock_acquire+0x18c/0x77c8 kernel/locking/lockdep.c:5077
 lock_acquire+0x240/0x728 kernel/locking/lockdep.c:5825
 local_lock_acquire+0x3c/0x98 include/linux/local_lock_internal.h:29
 ___slab_alloc+0xcd0/0xf4c mm/slub.c:3867
 __slab_alloc+0x74/0xd0 mm/slub.c:3908
 __slab_alloc_node mm/slub.c:3961 [inline]
 slab_alloc_node mm/slub.c:4122 [inline]
 kmem_cache_alloc_noprof+0x26c/0x354 mm/slub.c:4141
 ext4_mb_add_groupinfo+0x5b8/0xdc4 fs/ext4/mballoc.c:3356
 ext4_mb_init_backend fs/ext4/mballoc.c:3435 [inline]
 ext4_mb_init+0x107c/0x1ff4 fs/ext4/mballoc.c:3733
 __ext4_fill_super fs/ext4/super.c:5512 [inline]
 ext4_fill_super+0x4b48/0x57c8 fs/ext4/super.c:5686
 get_tree_bdev_flags+0x38c/0x494 fs/super.c:1636
 get_tree_bdev+0x2c/0x3c fs/super.c:1659
 ext4_get_tree+0x28/0x38 fs/ext4/super.c:5718
 vfs_get_tree+0x90/0x28c fs/super.c:1814
 do_new_mount+0x278/0x900 fs/namespace.c:3507
 path_mount+0x590/0xe04 fs/namespace.c:3834
 do_mount fs/namespace.c:3847 [inline]
 __do_sys_mount fs/namespace.c:4057 [inline]
 __se_sys_mount fs/namespace.c:4034 [inline]
 __arm64_sys_mount+0x4d4/0x5ac fs/namespace.c:4034
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744
 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600
irq event stamp: 3360
hardirqs last  enabled at (3359): [<ffff800080a114d8>] seqcount_lockdep_reader_access+0x6c/0xd4 include/linux/seqlock.h:74
hardirqs last disabled at (3360): [<ffff800080a2e208>] ___slab_alloc+0xca4/0xf4c mm/slub.c:3867
softirqs last  enabled at (3356): [<ffff80008020396c>] softirq_handle_end kernel/softirq.c:400 [inline]
softirqs last  enabled at (3356): [<ffff80008020396c>] handle_softirqs+0xa38/0xbf8 kernel/softirq.c:582
softirqs last disabled at (2105): [<ffff800080020db4>] __do_softirq+0x14/0x20 kernel/softirq.c:588
---[ end trace 0000000000000000 ]---
EXT4-fs error (device loop3): ext4_xattr_ibody_find:2240: inode #15: comm syz.3.108: corrupted in-inode xattr: invalid ea_ino
EXT4-fs error (device loop3): ext4_orphan_get:1393: comm syz.3.108: couldn't read orphan inode 15 (err -117)
EXT4-fs (loop3): mounted filesystem 00000007-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.