====================================================== WARNING: possible circular locking dependency detected 6.5.0-rc1-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.3/4931 is trying to acquire lock: ffff8881112672f0 (&sb->s_type->i_lock_key){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline] ffff8881112672f0 (&sb->s_type->i_lock_key){+.+.}-{2:2}, at: inode_add_bytes+0x1d/0x80 fs/stat.c:794 but task is already holding lock: ffff8881112674b0 (&xa->xa_lock#7){..-.}-{2:2}, at: spin_lock_irq include/linux/spinlock.h:376 [inline] ffff8881112674b0 (&xa->xa_lock#7){..-.}-{2:2}, at: collapse_file+0x225/0x1bd0 mm/khugepaged.c:1802 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&xa->xa_lock#7){..-.}-{2:2}: __raw_spin_lock_irq include/linux/spinlock_api_smp.h:119 [inline] _raw_spin_lock_irq+0x36/0x50 kernel/locking/spinlock.c:170 spin_lock_irq include/linux/spinlock.h:376 [inline] filemap_remove_folio+0x37/0xa0 mm/filemap.c:259 truncate_inode_folio+0x1e/0x30 mm/truncate.c:195 shmem_undo_range+0x168/0x6a0 mm/shmem.c:1003 shmem_truncate_range mm/shmem.c:1119 [inline] shmem_evict_inode+0xd8/0x280 mm/shmem.c:1249 evict+0xc8/0x1c0 fs/inode.c:665 __dentry_kill+0xda/0x1a0 fs/dcache.c:607 dentry_kill fs/dcache.c:745 [inline] dput+0x2c2/0x500 fs/dcache.c:913 do_renameat2+0x371/0x600 fs/namei.c:5011 __do_sys_rename fs/namei.c:5055 [inline] __se_sys_rename fs/namei.c:5053 [inline] __x64_sys_rename+0x3e/0x50 fs/namei.c:5053 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd -> #0 (&sb->s_type->i_lock_key){+.+.}-{2:2}: check_prev_add kernel/locking/lockdep.c:3142 [inline] check_prevs_add kernel/locking/lockdep.c:3261 [inline] validate_chain kernel/locking/lockdep.c:3876 [inline] __lock_acquire+0x12e6/0x1d00 kernel/locking/lockdep.c:5144 lock_acquire kernel/locking/lockdep.c:5761 [inline] lock_acquire+0xcd/0x2d0 kernel/locking/lockdep.c:5726 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] inode_add_bytes+0x1d/0x80 fs/stat.c:794 __dquot_alloc_space+0x275/0x350 fs/quota/dquot.c:1676 dquot_alloc_space_nodirty include/linux/quotaops.h:300 [inline] dquot_alloc_block_nodirty include/linux/quotaops.h:327 [inline] shmem_inode_acct_block mm/shmem.c:225 [inline] shmem_charge+0x4b/0x130 mm/shmem.c:428 collapse_file+0xbc5/0x1bd0 mm/khugepaged.c:1831 hpage_collapse_scan_file+0x45b/0x680 mm/khugepaged.c:2285 madvise_collapse+0x1d8/0x4a0 mm/khugepaged.c:2729 madvise_vma_behavior mm/madvise.c:1094 [inline] madvise_walk_vmas mm/madvise.c:1268 [inline] do_madvise+0x432/0x1150 mm/madvise.c:1448 __do_sys_madvise mm/madvise.c:1461 [inline] __se_sys_madvise mm/madvise.c:1459 [inline] __x64_sys_madvise+0x27/0x30 mm/madvise.c:1459 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&xa->xa_lock#7); lock(&sb->s_type->i_lock_key); lock(&xa->xa_lock#7); lock(&sb->s_type->i_lock_key); *** DEADLOCK *** 1 lock held by syz-executor.3/4931: #0: ffff8881112674b0 (&xa->xa_lock#7){..-.}-{2:2}, at: spin_lock_irq include/linux/spinlock.h:376 [inline] #0: ffff8881112674b0 (&xa->xa_lock#7){..-.}-{2:2}, at: collapse_file+0x225/0x1bd0 mm/khugepaged.c:1802 stack backtrace: CPU: 1 PID: 4931 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x5c/0xb0 lib/dump_stack.c:106 check_noncircular+0x116/0x130 kernel/locking/lockdep.c:2195 check_prev_add kernel/locking/lockdep.c:3142 [inline] check_prevs_add kernel/locking/lockdep.c:3261 [inline] validate_chain kernel/locking/lockdep.c:3876 [inline] __lock_acquire+0x12e6/0x1d00 kernel/locking/lockdep.c:5144 lock_acquire kernel/locking/lockdep.c:5761 [inline] lock_acquire+0xcd/0x2d0 kernel/locking/lockdep.c:5726 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] inode_add_bytes+0x1d/0x80 fs/stat.c:794 __dquot_alloc_space+0x275/0x350 fs/quota/dquot.c:1676 dquot_alloc_space_nodirty include/linux/quotaops.h:300 [inline] dquot_alloc_block_nodirty include/linux/quotaops.h:327 [inline] shmem_inode_acct_block mm/shmem.c:225 [inline] shmem_charge+0x4b/0x130 mm/shmem.c:428 collapse_file+0xbc5/0x1bd0 mm/khugepaged.c:1831 hpage_collapse_scan_file+0x45b/0x680 mm/khugepaged.c:2285 madvise_collapse+0x1d8/0x4a0 mm/khugepaged.c:2729 madvise_vma_behavior mm/madvise.c:1094 [inline] madvise_walk_vmas mm/madvise.c:1268 [inline] do_madvise+0x432/0x1150 mm/madvise.c:1448 __do_sys_madvise mm/madvise.c:1461 [inline] __se_sys_madvise mm/madvise.c:1459 [inline] __x64_sys_madvise+0x27/0x30 mm/madvise.c:1459 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0x80 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fef4407cb29 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fef44e1d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000001c RAX: ffffffffffffffda RBX: 00007fef4419c120 RCX: 00007fef4407cb29 RDX: 0000000000000019 RSI: 0000000000400000 RDI: 0000000020000000 RBP: 00007fef440c847a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007fef4419c120 R15: 00007ffd9906dfa8