------------[ cut here ]------------ WARNING: CPU: 1 PID: 64209 at kernel/locking/lockdep.c:894 look_up_lock_class+0x86/0x110 kernel/locking/lockdep.c:894 Modules linked in: CPU: 1 PID: 64209 Comm: syz-executor.3 Not tainted 5.10.223 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:look_up_lock_class+0x86/0x110 kernel/locking/lockdep.c:894 Code: 24 e8 ce 02 00 00 4d 85 e4 74 2c 49 39 5c 24 40 75 eb 48 8b 45 18 49 39 84 24 b0 00 00 00 74 1a 48 81 7d 00 00 22 15 86 74 10 <0f> 0b eb 0c e8 b1 4a 0a fe 85 c0 75 50 45 31 e4 48 83 c4 08 4c 89 RSP: 0018:ffff88805702f590 EFLAGS: 00010002 RAX: ffffffff84535860 RBX: ffffffff871b9521 RCX: 0000000000000000 RDX: 0000000000000046 RSI: 0000000000000001 RDI: ffff88801af97898 RBP: ffff88801af97898 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000246 R11: 0000000000000001 R12: ffffffff868ac600 R13: ffffffff86bf59e0 R14: 0000000000000001 R15: 0000000000000000 FS: 00007fa950510700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2d227000 CR3: 00000000559cc000 CR4: 0000000000350ee0 Call Trace: register_lock_class+0xbb/0x17b0 kernel/locking/lockdep.c:1244 __lock_acquire+0x102/0x5b00 kernel/locking/lockdep.c:4834 lock_acquire kernel/locking/lockdep.c:5566 [inline] lock_acquire+0x197/0x470 kernel/locking/lockdep.c:5531 down_write_nested+0x96/0x160 kernel/locking/rwsem.c:1667 ext4_double_down_write_data_sem fs/ext4/move_extent.c:58 [inline] ext4_move_extents+0x90d/0x3050 fs/ext4/move_extent.c:610 __ext4_ioctl+0x302e/0x4190 fs/ext4/ioctl.c:999 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x67/0xd1 RIP: 0033:0x7fa952f9ab19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=35144 sclass=netlink_audit_socket pid=64214 comm=syz-executor.2 RSP: 002b:00007fa950510188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fa9530adf60 RCX: 00007fa952f9ab19 RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000003 RBP: 00007fa952ff4f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fffe2f4b0ff R14: 00007fa950510300 R15: 0000000000022000 irq event stamp: 2725 hardirqs last enabled at (2725): [] syscall_enter_from_user_mode+0x1d/0x50 kernel/entry/common.c:98 hardirqs last disabled at (2724): [] do_syscall_64+0xf/0x40 arch/x86/entry/common.c:41 softirqs last enabled at (2076): [] asm_call_irq_on_stack+0x12/0x20 softirqs last disabled at (2067): [] asm_call_irq_on_stack+0x12/0x20 ---[ end trace 486241b00f0d47c9 ]--- SELinux: unrecognized netlink message: protocol=9 nlmsg_type=34247 sclass=netlink_audit_socket pid=64214 comm=syz-executor.2 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=53893 sclass=netlink_audit_socket pid=64214 comm=syz-executor.2 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=53481 sclass=netlink_audit_socket pid=64214 comm=syz-executor.2 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=35656 sclass=netlink_audit_socket pid=64214 comm=syz-executor.2 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=64214 comm=syz-executor.2 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=33608 sclass=netlink_audit_socket pid=64214 comm=syz-executor.2 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=35140 sclass=netlink_audit_socket pid=64214 comm=syz-executor.2 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=64214 comm=syz-executor.2 cgroup2: Unknown parameter '802.15.4 MAC' device veth0_vlan entered promiscuous mode device veth0_vlan entered promiscuous mode device veth0_vlan entered promiscuous mode device veth0_vlan entered promiscuous mode device veth0_vlan entered promiscuous mode device veth0_vlan entered promiscuous mode device veth0_vlan entered promiscuous mode netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. net_ratelimit: 1 callbacks suppressed TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. device veth0_vlan entered promiscuous mode Bluetooth: hci0: load_link_keys: too big key_count value 18432 Bluetooth: hci0: load_link_keys: too big key_count value 18432 kauditd_printk_skb: 621 callbacks suppressed audit: type=1326 audit(1722703213.887:2218): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=69868 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9e3f347b19 code=0x0 audit: type=1326 audit(1722703213.949:2219): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=69868 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7f9e3f2fa72b code=0x0 Bluetooth: hci0: load_link_keys: too big key_count value 18432 Bluetooth: hci0: load_link_keys: too big key_count value 18432 audit: type=1326 audit(1722703214.587:2220): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=70961 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9e3f347b19 code=0x0 audit: type=1326 audit(1722703214.632:2221): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=70961 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7f9e3f2fa72b code=0x0 Bluetooth: hci0: load_link_keys: too big key_count value 18432 audit: type=1326 audit(1722703214.714:2222): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=71044 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9e3f347b19 code=0x0 audit: type=1326 audit(1722703214.753:2223): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=71044 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7f9e3f2fa72b code=0x0 audit: type=1326 audit(1722703214.867:2224): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=71231 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9e3f347b19 code=0x0 audit: type=1326 audit(1722703214.917:2225): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=71231 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=3 compat=0 ip=0x7f9e3f2fa72b code=0x0 audit: type=1326 audit(1722703216.169:2226): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=73591 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe7e9298b19 code=0x7ffc0000 audit: type=1326 audit(1722703216.169:2227): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=73591 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7fe7e9298b19 code=0x7ffc0000 device veth0_vlan entered promiscuous mode