------------[ cut here ]------------ Looking for class "lock" with key init_kmem_cache_cpus.__key, but found a different class "&c->lock" with the same key WARNING: CPU: 1 PID: 6798 at kernel/locking/lockdep.c:939 look_up_lock_class+0xec/0x160 kernel/locking/lockdep.c:936 Modules linked in: CPU: 1 UID: 0 PID: 6798 Comm: syz.3.108 Not tainted 6.12.0-syzkaller-g7b1d1d4cfac0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : look_up_lock_class+0xec/0x160 kernel/locking/lockdep.c:936 lr : look_up_lock_class+0xec/0x160 kernel/locking/lockdep.c:936 sp : ffff80009cea6e80 x29: ffff80009cea6e80 x28: dfff800000000000 x27: 0000000000000000 x26: ffff8000973468c0 x25: ffff800097346000 x24: 0000000000000001 x23: 0000000000000000 x22: 1ffff00011f040ba x21: ffff8000973a7690 x20: fffffdffbf706500 x19: ffff800092e195b0 x18: 0000000000000008 x17: 7562202c79656b5f x16: ffff80008b3ede1c x15: ffff700011f13534 x14: 1ffff00011f13534 x13: 0000000000000004 x12: ffffffffffffffff x11: 0000000000040000 x10: 0000000000009bb1 x9 : 49cbc92a93a86900 x8 : 49cbc92a93a86900 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff80009cea65b8 x4 : ffff80008f90d220 x3 : ffff8000803921b4 x2 : 0000000000000000 x1 : 0000000100000001 x0 : 0000000000000000 Call trace: look_up_lock_class+0xec/0x160 kernel/locking/lockdep.c:936 (P) look_up_lock_class+0xec/0x160 kernel/locking/lockdep.c:936 (L) register_lock_class+0x8c/0x6b4 kernel/locking/lockdep.c:1290 __lock_acquire+0x18c/0x77c8 kernel/locking/lockdep.c:5077 lock_acquire+0x240/0x728 kernel/locking/lockdep.c:5825 local_lock_acquire+0x3c/0x98 include/linux/local_lock_internal.h:29 ___slab_alloc+0xcd0/0xf4c mm/slub.c:3867 __slab_alloc+0x74/0xd0 mm/slub.c:3908 __slab_alloc_node mm/slub.c:3961 [inline] slab_alloc_node mm/slub.c:4122 [inline] kmem_cache_alloc_noprof+0x26c/0x354 mm/slub.c:4141 ext4_mb_add_groupinfo+0x5b8/0xdc4 fs/ext4/mballoc.c:3356 ext4_mb_init_backend fs/ext4/mballoc.c:3435 [inline] ext4_mb_init+0x107c/0x1ff4 fs/ext4/mballoc.c:3733 __ext4_fill_super fs/ext4/super.c:5512 [inline] ext4_fill_super+0x4b48/0x57c8 fs/ext4/super.c:5686 get_tree_bdev_flags+0x38c/0x494 fs/super.c:1636 get_tree_bdev+0x2c/0x3c fs/super.c:1659 ext4_get_tree+0x28/0x38 fs/ext4/super.c:5718 vfs_get_tree+0x90/0x28c fs/super.c:1814 do_new_mount+0x278/0x900 fs/namespace.c:3507 path_mount+0x590/0xe04 fs/namespace.c:3834 do_mount fs/namespace.c:3847 [inline] __do_sys_mount fs/namespace.c:4057 [inline] __se_sys_mount fs/namespace.c:4034 [inline] __arm64_sys_mount+0x4d4/0x5ac fs/namespace.c:4034 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 irq event stamp: 3360 hardirqs last enabled at (3359): [<ffff800080a114d8>] seqcount_lockdep_reader_access+0x6c/0xd4 include/linux/seqlock.h:74 hardirqs last disabled at (3360): [<ffff800080a2e208>] ___slab_alloc+0xca4/0xf4c mm/slub.c:3867 softirqs last enabled at (3356): [<ffff80008020396c>] softirq_handle_end kernel/softirq.c:400 [inline] softirqs last enabled at (3356): [<ffff80008020396c>] handle_softirqs+0xa38/0xbf8 kernel/softirq.c:582 softirqs last disabled at (2105): [<ffff800080020db4>] __do_softirq+0x14/0x20 kernel/softirq.c:588 ---[ end trace 0000000000000000 ]--- EXT4-fs error (device loop3): ext4_xattr_ibody_find:2240: inode #15: comm syz.3.108: corrupted in-inode xattr: invalid ea_ino EXT4-fs error (device loop3): ext4_orphan_get:1393: comm syz.3.108: couldn't read orphan inode 15 (err -117) EXT4-fs (loop3): mounted filesystem 00000007-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.