====================================================== WARNING: possible circular locking dependency detected 5.7.0-syzkaller #0 Not tainted ------------------------------------------------------ kswapd0/1670 is trying to acquire lock: ffff88809340d970 (&sb->s_type->i_mutex_key#16){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:799 [inline] ffff88809340d970 (&sb->s_type->i_mutex_key#16){+.+.}-{3:3}, at: shmem_fallocate+0x153/0xd40 mm/shmem.c:2708 but task is already holding lock: ffffffff89a68aa0 (fs_reclaim){+.+.}-{0:0}, at: __fs_reclaim_acquire+0x0/0x30 mm/page_alloc.c:5009 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (fs_reclaim){+.+.}-{0:0}: __fs_reclaim_acquire mm/page_alloc.c:4183 [inline] fs_reclaim_acquire.part.0+0x20/0x30 mm/page_alloc.c:4194 fs_reclaim_acquire mm/page_alloc.c:4783 [inline] prepare_alloc_pages mm/page_alloc.c:4780 [inline] __alloc_pages_nodemask+0x4da/0x810 mm/page_alloc.c:4832 alloc_pages_vma+0xd9/0x600 mm/mempolicy.c:2255 shmem_alloc_page+0xb0/0x170 mm/shmem.c:1503 shmem_alloc_and_acct_page+0x160/0x980 mm/shmem.c:1528 shmem_getpage_gfp+0x514/0x24f0 mm/shmem.c:1824 shmem_getpage mm/shmem.c:154 [inline] shmem_write_begin+0x102/0x1e0 mm/shmem.c:2460 generic_perform_write+0x20a/0x4e0 mm/filemap.c:3299 __generic_file_write_iter+0x24c/0x610 mm/filemap.c:3428 generic_file_write_iter+0x3f3/0x630 mm/filemap.c:3460 call_write_iter include/linux/fs.h:1917 [inline] new_sync_write+0x426/0x650 fs/read_write.c:484 __vfs_write+0xc9/0x100 fs/read_write.c:497 vfs_write+0x268/0x5d0 fs/read_write.c:559 ksys_write+0x12d/0x250 fs/read_write.c:612 do_syscall_64+0xf6/0x7d0 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xb3 -> #0 (&sb->s_type->i_mutex_key#16){+.+.}-{3:3}: check_prev_add kernel/locking/lockdep.c:2496 [inline] check_prevs_add kernel/locking/lockdep.c:2601 [inline] validate_chain kernel/locking/lockdep.c:3218 [inline] __lock_acquire+0x2a9a/0x48a0 kernel/locking/lockdep.c:4380 lock_acquire+0x1f2/0x8f0 kernel/locking/lockdep.c:4959 down_write+0x8d/0x150 kernel/locking/rwsem.c:1531 inode_lock include/linux/fs.h:799 [inline] shmem_fallocate+0x153/0xd40 mm/shmem.c:2708 ashmem_shrink_scan drivers/staging/android/ashmem.c:490 [inline] ashmem_shrink_scan+0x34d/0x500 drivers/staging/android/ashmem.c:465 do_shrink_slab+0x3fa/0xa30 mm/vmscan.c:518 shrink_slab mm/vmscan.c:679 [inline] shrink_slab+0x16f/0x5f0 mm/vmscan.c:652 shrink_node_memcgs mm/vmscan.c:2655 [inline] shrink_node+0x53e/0x1c00 mm/vmscan.c:2767 kswapd_shrink_node mm/vmscan.c:3514 [inline] balance_pgdat+0x753/0x1110 mm/vmscan.c:3672 kswapd+0x5d0/0xe80 mm/vmscan.c:3929 kthread+0x388/0x470 kernel/kthread.c:268 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:351 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(fs_reclaim); lock(&sb->s_type->i_mutex_key#16); lock(fs_reclaim); lock(&sb->s_type->i_mutex_key#16); *** DEADLOCK *** 2 locks held by kswapd0/1670: #0: ffffffff89a68aa0 (fs_reclaim){+.+.}-{0:0}, at: __fs_reclaim_acquire+0x0/0x30 mm/page_alloc.c:5009 #1: ffffffff89a43450 (shrinker_rwsem){++++}-{3:3}, at: shrink_slab mm/vmscan.c:669 [inline] #1: ffffffff89a43450 (shrinker_rwsem){++++}-{3:3}, at: shrink_slab+0xc7/0x5f0 mm/vmscan.c:652 stack backtrace: CPU: 1 PID: 1670 Comm: kswapd0 Not tainted 5.7.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x188/0x20d lib/dump_stack.c:118 check_noncircular+0x32e/0x3e0 kernel/locking/lockdep.c:1827 check_prev_add kernel/locking/lockdep.c:2496 [inline] check_prevs_add kernel/locking/lockdep.c:2601 [inline] validate_chain kernel/locking/lockdep.c:3218 [inline] __lock_acquire+0x2a9a/0x48a0 kernel/locking/lockdep.c:4380 lock_acquire+0x1f2/0x8f0 kernel/locking/lockdep.c:4959 down_write+0x8d/0x150 kernel/locking/rwsem.c:1531 inode_lock include/linux/fs.h:799 [inline] shmem_fallocate+0x153/0xd40 mm/shmem.c:2708 ashmem_shrink_scan drivers/staging/android/ashmem.c:490 [inline] ashmem_shrink_scan+0x34d/0x500 drivers/staging/android/ashmem.c:465 do_shrink_slab+0x3fa/0xa30 mm/vmscan.c:518 shrink_slab mm/vmscan.c:679 [inline] shrink_slab+0x16f/0x5f0 mm/vmscan.c:652 shrink_node_memcgs mm/vmscan.c:2655 [inline] shrink_node+0x53e/0x1c00 mm/vmscan.c:2767 kswapd_shrink_node mm/vmscan.c:3514 [inline] balance_pgdat+0x753/0x1110 mm/vmscan.c:3672 kswapd+0x5d0/0xe80 mm/vmscan.c:3929 kthread+0x388/0x470 kernel/kthread.c:268 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:351