====================================================== WARNING: possible circular locking dependency detected 5.3.0-rc4+ #0 Not tainted ------------------------------------------------------ syz-executor.0/7555 is trying to acquire lock: 000000000787fc76 (cpu_hotplug_lock.rw_sem){++++}, at: __static_key_slow_dec kernel/jump_label.c:254 [inline] 000000000787fc76 (cpu_hotplug_lock.rw_sem){++++}, at: static_key_slow_dec+0x40/0x80 kernel/jump_label.c:270 but task is already holding lock: 00000000c0397515 (&mm->mmap_sem#2){++++}, at: vm_mmap_pgoff+0x15a/0x210 mm/util.c:389 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (&mm->mmap_sem#2){++++}: down_write+0x92/0x150 kernel/locking/rwsem.c:1534 mpol_rebind_mm+0x20/0xc0 mm/mempolicy.c:382 cpuset_attach+0x1e1/0x3b0 kernel/cgroup/cpuset.c:2204 cgroup_migrate_execute+0xafa/0x11e0 kernel/cgroup/cgroup.c:2524 cgroup_migrate+0xec/0x160 kernel/cgroup/cgroup.c:2780 cgroup_attach_task+0x3e6/0x610 kernel/cgroup/cgroup.c:2817 __cgroup1_procs_write.constprop.13+0x254/0x330 kernel/cgroup/cgroup-v1.c:541 cgroup1_procs_write+0xe/0x10 kernel/cgroup/cgroup-v1.c:554 cgroup_file_write+0x26b/0x7b0 kernel/cgroup/cgroup.c:3754 kernfs_fop_write+0x255/0x410 fs/kernfs/file.c:315 __vfs_write+0x5e/0x110 fs/read_write.c:494 vfs_write+0x18a/0x520 fs/read_write.c:558 ksys_write+0x105/0x220 fs/read_write.c:611 __do_sys_write fs/read_write.c:623 [inline] __se_sys_write fs/read_write.c:620 [inline] __x64_sys_write+0x6e/0xb0 fs/read_write.c:620 do_syscall_64+0xca/0x5d0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #1 (&cpuset_rwsem){++++}: percpu_down_read include/linux/percpu-rwsem.h:40 [inline] cpuset_read_lock+0x38/0xe0 kernel/cgroup/cpuset.c:340 __sched_setscheduler+0xcf2/0x2260 kernel/sched/core.c:4718 _sched_setscheduler+0x102/0x1b0 kernel/sched/core.c:4890 sched_setscheduler_nocheck+0xb/0x10 kernel/sched/core.c:4936 __kthread_create_on_node+0x31c/0x3d0 kernel/kthread.c:349 kthread_create_on_node+0x8c/0xc0 kernel/kthread.c:388 create_worker+0x204/0x540 kernel/workqueue.c:1929 workqueue_prepare_cpu+0x9e/0x120 kernel/workqueue.c:4982 cpuhp_invoke_callback+0x1a3/0x14f0 kernel/cpu.c:172 cpuhp_up_callbacks kernel/cpu.c:593 [inline] _cpu_up+0x23a/0x4d0 kernel/cpu.c:1153 do_cpu_up+0xd2/0xf0 kernel/cpu.c:1188 cpu_up+0xe/0x10 kernel/cpu.c:1196 smp_init+0x199/0x1af kernel/smp.c:593 kernel_init_freeable+0x2ef/0x4fb init/main.c:1186 kernel_init+0xc/0x107 init/main.c:1111 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 -> #0 (cpu_hotplug_lock.rw_sem){++++}: check_prev_add kernel/locking/lockdep.c:2476 [inline] check_prevs_add kernel/locking/lockdep.c:2581 [inline] validate_chain kernel/locking/lockdep.c:2971 [inline] __lock_acquire+0x2899/0x4ee0 kernel/locking/lockdep.c:3955 lock_acquire+0x194/0x410 kernel/locking/lockdep.c:4487 percpu_down_read include/linux/percpu-rwsem.h:40 [inline] cpus_read_lock+0x38/0xe0 kernel/cpu.c:292 __static_key_slow_dec kernel/jump_label.c:254 [inline] static_key_slow_dec+0x40/0x80 kernel/jump_label.c:270 sw_perf_event_destroy+0x7e/0x100 kernel/events/core.c:8482 _free_event+0x2f0/0x10d0 kernel/events/core.c:4470 put_event+0x2b/0x30 kernel/events/core.c:4564 perf_mmap_close+0x489/0xbe0 kernel/events/core.c:5567 remove_vma+0x9f/0x140 mm/mmap.c:183 remove_vma_list mm/mmap.c:2593 [inline] __do_munmap+0x739/0xca0 mm/mmap.c:2837 do_munmap mm/mmap.c:2845 [inline] mmap_region+0x198/0x1480 mm/mmap.c:1735 do_mmap+0x612/0xfa0 mm/mmap.c:1565 do_mmap_pgoff include/linux/mm.h:2374 [inline] vm_mmap_pgoff+0x195/0x210 mm/util.c:391 ksys_mmap_pgoff+0x3c7/0x650 mm/mmap.c:1615 __do_sys_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] __se_sys_mmap arch/x86/kernel/sys_x86_64.c:91 [inline] __x64_sys_mmap+0xe9/0x1b0 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0xca/0x5d0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Chain exists of: cpu_hotplug_lock.rw_sem --> &cpuset_rwsem --> &mm->mmap_sem#2 Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&mm->mmap_sem#2); lock(&cpuset_rwsem); lock(&mm->mmap_sem#2); lock(cpu_hotplug_lock.rw_sem); *** DEADLOCK *** 1 lock held by syz-executor.0/7555: #0: 00000000c0397515 (&mm->mmap_sem#2){++++}, at: vm_mmap_pgoff+0x15a/0x210 mm/util.c:389 stack backtrace: CPU: 1 PID: 7555 Comm: syz-executor.0 Not tainted 5.3.0-rc4+ #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x113/0x167 lib/dump_stack.c:113 print_circular_bug.isra.39.cold.59+0x15a/0x169 kernel/locking/lockdep.c:1685 check_noncircular+0x349/0x400 kernel/locking/lockdep.c:1809 check_prev_add kernel/locking/lockdep.c:2476 [inline] check_prevs_add kernel/locking/lockdep.c:2581 [inline] validate_chain kernel/locking/lockdep.c:2971 [inline] __lock_acquire+0x2899/0x4ee0 kernel/locking/lockdep.c:3955 lock_acquire+0x194/0x410 kernel/locking/lockdep.c:4487 percpu_down_read include/linux/percpu-rwsem.h:40 [inline] cpus_read_lock+0x38/0xe0 kernel/cpu.c:292 __static_key_slow_dec kernel/jump_label.c:254 [inline] static_key_slow_dec+0x40/0x80 kernel/jump_label.c:270 sw_perf_event_destroy+0x7e/0x100 kernel/events/core.c:8482 _free_event+0x2f0/0x10d0 kernel/events/core.c:4470 put_event+0x2b/0x30 kernel/events/core.c:4564 perf_mmap_close+0x489/0xbe0 kernel/events/core.c:5567 remove_vma+0x9f/0x140 mm/mmap.c:183 remove_vma_list mm/mmap.c:2593 [inline] __do_munmap+0x739/0xca0 mm/mmap.c:2837 do_munmap mm/mmap.c:2845 [inline] mmap_region+0x198/0x1480 mm/mmap.c:1735 do_mmap+0x612/0xfa0 mm/mmap.c:1565 do_mmap_pgoff include/linux/mm.h:2374 [inline] vm_mmap_pgoff+0x195/0x210 mm/util.c:391 ksys_mmap_pgoff+0x3c7/0x650 mm/mmap.c:1615 __do_sys_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] __se_sys_mmap arch/x86/kernel/sys_x86_64.c:91 [inline] __x64_sys_mmap+0xe9/0x1b0 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0xca/0x5d0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459829 Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fc4a1ec0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459829 RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffd000 RBP: 000000000075c070 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000000000011 R11: 0000000000000246 R12: 00007fc4a1ec16d4 R13: 00000000004c5d1b R14: 00000000004da770 R15: 00000000ffffffff