====================================================== WARNING: possible circular locking dependency detected 4.14.113+ #61 Not tainted ------------------------------------------------------ syz-executor.5/13574 is trying to acquire lock: (cpu_hotplug_lock.rw_sem){++++}, at: [<000000002a8c96d2>] get_online_cpus include/linux/cpu.h:138 [inline] (cpu_hotplug_lock.rw_sem){++++}, at: [<000000002a8c96d2>] lru_add_drain_all+0xa/0x20 mm/swap.c:729 but task is already holding lock: (&sb->s_type->i_mutex_key#10){+.+.}, at: [<00000000eadfed5f>] inode_lock include/linux/fs.h:715 [inline] (&sb->s_type->i_mutex_key#10){+.+.}, at: [<00000000eadfed5f>] shmem_add_seals+0x12b/0x1150 mm/shmem.c:2829 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #5 (&sb->s_type->i_mutex_key#10){+.+.}: -> #4 (ashmem_mutex){+.+.}: -> #3 (&mm->mmap_sem){++++}: -> #2 (&cpuctx_mutex){+.+.}: -> #1 (pmus_lock){+.+.}: -> #0 (cpu_hotplug_lock.rw_sem){++++}: other info that might help us debug this: Chain exists of: cpu_hotplug_lock.rw_sem --> ashmem_mutex --> &sb->s_type->i_mutex_key#10 Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&sb->s_type->i_mutex_key#10); lock(ashmem_mutex); lock(&sb->s_type->i_mutex_key#10); lock(cpu_hotplug_lock.rw_sem); *** DEADLOCK *** 1 lock held by syz-executor.5/13574: #0: (&sb->s_type->i_mutex_key#10){+.+.}, at: [<00000000eadfed5f>] inode_lock include/linux/fs.h:715 [inline] #0: (&sb->s_type->i_mutex_key#10){+.+.}, at: [<00000000eadfed5f>] shmem_add_seals+0x12b/0x1150 mm/shmem.c:2829 stack backtrace: CPU: 1 PID: 13574 Comm: syz-executor.5 Not tainted 4.14.113+ #61 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xb9/0x10e lib/dump_stack.c:53 print_circular_bug.isra.0.cold+0x2dc/0x425 kernel/locking/lockdep.c:1258 audit: type=1400 audit(373.637:127): avc: denied { module_load } for pid=14131 comm="syz-executor.2" path=2F6D656D66643A2163707573657473656C66256D696D655F747970657D73797374656D466B657972696E67707070316D696D655F74797065215B766D6E657431656D31656D305B63707573657426202864656C6574656429 dev="tmpfs" ino=37857 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=system permissive=1