======================================================
WARNING: possible circular locking dependency detected
6.13.0-rc6-next-20250107-syzkaller #0 Not tainted
------------------------------------------------------
syz.0.473/7823 is trying to acquire lock:
ffff88807f6bb5c8 (vm_lock){++++}-{0:0}, at: binder_alloc_free_page+0x150/0xd50 drivers/android/binder_alloc.c:1156

but task is already holding lock:
ffff88802ef9be30 (&l->lock){+.+.}-{3:3}, at: spin_lock include/linux/spinlock.h:351 [inline]
ffff88802ef9be30 (&l->lock){+.+.}-{3:3}, at: lock_list_lru_of_memcg+0x24c/0x4d0 mm/list_lru.c:77

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #1 (&l->lock){+.+.}-{3:3}:
       lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5851
       __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
       _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
       spin_lock include/linux/spinlock.h:351 [inline]
       lock_list_lru_of_memcg+0x24c/0x4d0 mm/list_lru.c:77
       list_lru_del+0x58/0x1f0 mm/list_lru.c:202
       zswap_lru_del mm/zswap.c:736 [inline]
       zswap_entry_free+0x1ff/0x440 mm/zswap.c:802
       zswap_load+0x364/0x4a0 mm/zswap.c:1643
       swap_read_folio+0x9b4/0x2690 mm/page_io.c:641
       swap_cluster_readahead+0x3cf/0x710 mm/swap_state.c:689
       swapin_readahead+0x1ba/0xd30 mm/swap_state.c:881
       do_swap_page+0x5c4/0x5c40 mm/memory.c:4411
       handle_pte_fault mm/memory.c:5892 [inline]
       __handle_mm_fault+0x13d7/0x70f0 mm/memory.c:6032
       handle_mm_fault+0x3e2/0x8c0 mm/memory.c:6201
       do_user_addr_fault arch/x86/mm/fault.c:1337 [inline]
       handle_page_fault arch/x86/mm/fault.c:1480 [inline]
       exc_page_fault+0x459/0x8b0 arch/x86/mm/fault.c:1538
       asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623

-> #0 (vm_lock){++++}-{0:0}:
       check_prev_add kernel/locking/lockdep.c:3163 [inline]
       check_prevs_add kernel/locking/lockdep.c:3282 [inline]
       validate_chain+0x18ef/0x5920 kernel/locking/lockdep.c:3906
       __lock_acquire+0x1397/0x2100 kernel/locking/lockdep.c:5228
       lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5851
       vma_start_read include/linux/mm.h:749 [inline]
       lock_vma_under_rcu+0x35f/0x9a0 mm/memory.c:6436
       binder_alloc_free_page+0x150/0xd50 drivers/android/binder_alloc.c:1156
       __list_lru_walk_one+0x170/0x470 mm/list_lru.c:300
       list_lru_walk_one mm/list_lru.c:337 [inline]
       list_lru_walk_node+0xc4/0xa70 mm/list_lru.c:357
       list_lru_walk include/linux/list_lru.h:282 [inline]
       binder_shrink_scan+0x138/0x260 drivers/android/binder_alloc.c:1226
       do_shrink_slab+0x72d/0x1160 mm/shrinker.c:437
       shrink_slab+0x1093/0x14d0 mm/shrinker.c:664
       drop_slab_node mm/vmscan.c:421 [inline]
       drop_slab+0x142/0x280 mm/vmscan.c:439
       drop_caches_sysctl_handler+0xbc/0x160 fs/drop_caches.c:68
       proc_sys_call_handler+0x5ec/0x920 fs/proc/proc_sysctl.c:601
       do_iter_readv_writev+0x71a/0x9d0
       vfs_writev+0x38b/0xbc0 fs/read_write.c:1050
       do_writev+0x1b6/0x360 fs/read_write.c:1096
       do_syscall_x64 arch/x86/entry/common.c:52 [inline]
       do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&l->lock);
                               lock(vm_lock);
                               lock(&l->lock);
  rlock(vm_lock);

 *** DEADLOCK ***

4 locks held by syz.0.473/7823:
 #0: ffff88801ca8b978 (&f->f_pos_lock){+.+.}-{4:4}, at: fdget_pos+0x254/0x320 fs/file.c:1192
 #1: ffff888028802420 (sb_writers#3){.+.+}-{0:0}, at: file_start_write include/linux/fs.h:3016 [inline]
 #1: ffff888028802420 (sb_writers#3){.+.+}-{0:0}, at: vfs_writev+0x2d6/0xbc0 fs/read_write.c:1048
 #2: ffff88802ef9be30 (&l->lock){+.+.}-{3:3}, at: spin_lock include/linux/spinlock.h:351 [inline]
 #2: ffff88802ef9be30 (&l->lock){+.+.}-{3:3}, at: lock_list_lru_of_memcg+0x24c/0x4d0 mm/list_lru.c:77
 #3: ffffffff8e937ee0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
 #3: ffffffff8e937ee0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
 #3: ffffffff8e937ee0 (rcu_read_lock){....}-{1:3}, at: lock_vma_under_rcu+0x1dd/0x9a0 mm/memory.c:6431

stack backtrace:
CPU: 1 UID: 0 PID: 7823 Comm: syz.0.473 Not tainted 6.13.0-rc6-next-20250107-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_circular_bug+0x13a/0x1b0 kernel/locking/lockdep.c:2076
 check_noncircular+0x36a/0x4a0 kernel/locking/lockdep.c:2208
 check_prev_add kernel/locking/lockdep.c:3163 [inline]
 check_prevs_add kernel/locking/lockdep.c:3282 [inline]
 validate_chain+0x18ef/0x5920 kernel/locking/lockdep.c:3906
 __lock_acquire+0x1397/0x2100 kernel/locking/lockdep.c:5228
 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5851
 vma_start_read include/linux/mm.h:749 [inline]
 lock_vma_under_rcu+0x35f/0x9a0 mm/memory.c:6436
 binder_alloc_free_page+0x150/0xd50 drivers/android/binder_alloc.c:1156
 __list_lru_walk_one+0x170/0x470 mm/list_lru.c:300
 list_lru_walk_one mm/list_lru.c:337 [inline]
 list_lru_walk_node+0xc4/0xa70 mm/list_lru.c:357
 list_lru_walk include/linux/list_lru.h:282 [inline]
 binder_shrink_scan+0x138/0x260 drivers/android/binder_alloc.c:1226
 do_shrink_slab+0x72d/0x1160 mm/shrinker.c:437
 shrink_slab+0x1093/0x14d0 mm/shrinker.c:664
 drop_slab_node mm/vmscan.c:421 [inline]
 drop_slab+0x142/0x280 mm/vmscan.c:439
 drop_caches_sysctl_handler+0xbc/0x160 fs/drop_caches.c:68
 proc_sys_call_handler+0x5ec/0x920 fs/proc/proc_sysctl.c:601
 do_iter_readv_writev+0x71a/0x9d0
 vfs_writev+0x38b/0xbc0 fs/read_write.c:1050
 do_writev+0x1b6/0x360 fs/read_write.c:1096
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb99a185d29
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fb99b07b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014
RAX: ffffffffffffffda RBX: 00007fb99a375fa0 RCX: 00007fb99a185d29
RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003
RBP: 00007fb99a201b08 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007fb99a375fa0 R15: 00007ffe790a84e8
 </TASK>
syz.0.473 (7823): drop_caches: 2