[ 56.875953] audit: type=1400 audit(1661900310.472:115): avc: denied { create } for pid=1227 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 57.000811] audit: type=1400 audit(1661900310.597:116): avc: denied { create } for pid=1227 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 69.465953] sshd (1316) used greatest stack depth: 24808 bytes left [ 75.554183] kauditd_printk_skb: 16 callbacks suppressed [ 75.554201] audit: type=1400 audit(1661900329.150:133): avc: denied { mount } for pid=1336 comm="syz-executor3" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 75.639099] audit: type=1400 audit(1661900329.158:134): avc: denied { mounton } for pid=1340 comm="syz-executor5" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 435.606420] audit: type=1400 audit(1661900689.203:135): avc: denied { append } for pid=948 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 435.644987] audit: type=1400 audit(1661900689.203:136): avc: denied { open } for pid=948 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 435.666867] audit: type=1400 audit(1661900689.203:137): avc: denied { getattr } for pid=948 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 435.824010] sshd (19969) used greatest stack depth: 24696 bytes left Warning: Permanently added '10.128.10.25' (ECDSA) to the list of known hosts. [ 441.204234] audit: type=1400 audit(1661900694.801:138): avc: denied { read write } for pid=19991 comm="syz-executor336" name="mice" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 441.230982] audit: type=1400 audit(1661900694.801:139): avc: denied { open } for pid=19991 comm="syz-executor336" path="/dev/input/mice" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 441.255152] audit: type=1400 audit(1661900694.801:140): avc: denied { mounton } for pid=19991 comm="syz-executor336" path="/root/file0" dev="sda1" ino=1163 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 442.037421] [ 442.039095] ============================================ [ 442.044543] WARNING: possible recursive locking detected [ 442.049985] 6.0.0-rc3-syzkaller #0 Not tainted [ 442.054560] -------------------------------------------- [ 442.060409] kworker/0:18/4160 is trying to acquire lock: [ 442.065878] ffff88810efe8418 (&clnt->lock){+.+.}-{2:2}, at: p9_req_put+0xd2/0x260 [ 442.073562] [ 442.073562] but task is already holding lock: [ 442.079534] ffff88810efe8418 (&clnt->lock){+.+.}-{2:2}, at: p9_conn_cancel+0xb4/0xaa0 [ 442.087543] [ 442.087543] other info that might help us debug this: [ 442.094215] Possible unsafe locking scenario: [ 442.094215] [ 442.100359] CPU0 [ 442.102929] ---- [ 442.105504] lock(&clnt->lock); [ 442.108873] lock(&clnt->lock); [ 442.112243] [ 442.112243] *** DEADLOCK *** [ 442.112243] [ 442.118296] May be due to missing lock nesting notation [ 442.118296] [ 442.125226] 3 locks held by kworker/0:18/4160: [ 442.129805] #0: ffff888100067d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x8dd/0x1690 [ 442.139470] #1: ffff88812f6bfd98 (p9_poll_work){+.+.}-{0:0}, at: process_one_work+0x913/0x1690 [ 442.148353] #2: ffff88810efe8418 (&clnt->lock){+.+.}-{2:2}, at: p9_conn_cancel+0xb4/0xaa0 [ 442.157178] [ 442.157178] stack backtrace: [ 442.162040] CPU: 0 PID: 4160 Comm: kworker/0:18 Not tainted 6.0.0-rc3-syzkaller #0 [ 442.169962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 442.179337] Workqueue: events p9_poll_workfn [ 442.183878] Call Trace: [ 442.186455] [ 442.188704] dump_stack_lvl+0x156/0x1cb [ 442.192717] dump_stack+0x15/0x1b [ 442.196175] __lock_acquire.cold+0x130/0x39c [ 442.200723] ? lockdep_hardirqs_on_prepare+0x440/0x440 [ 442.206132] ? __this_cpu_preempt_check+0x1d/0x30 [ 442.211004] ? lock_is_held_type+0x102/0x180 [ 442.215781] lock_acquire+0x21d/0x630 [ 442.219596] ? p9_req_put+0xd2/0x260 [ 442.223314] ? lock_release+0x9a0/0x9a0 [ 442.227373] ? _raw_spin_unlock_irqrestore+0x31/0x90 [ 442.232474] ? __wake_up_common_lock+0xf8/0x150 [ 442.237141] ? _raw_spin_lock_irqsave+0xb9/0xf0 [ 442.241811] ? __this_cpu_preempt_check+0x1d/0x30 [ 442.246666] ? lockdep_hardirqs_off+0x71/0x120 [ 442.251262] _raw_spin_lock_irqsave+0x9b/0xf0 [ 442.255773] ? p9_req_put+0xd2/0x260 [ 442.260135] p9_req_put+0xd2/0x260 [ 442.263756] p9_client_cb+0x58/0x70 [ 442.267488] p9_conn_cancel+0x6b9/0xaa0 [ 442.271474] ? p9_pollwake+0x1d0/0x1d0 [ 442.275370] ? kmalloc_array.constprop.0+0x30/0x30 [ 442.280333] p9_poll_workfn+0x27c/0x570 [ 442.284335] ? p9_fd_create_tcp+0x530/0x530 [ 442.288665] ? __this_cpu_preempt_check+0x1d/0x30 [ 442.293524] ? lock_is_held_type+0x102/0x180 [ 442.297943] process_one_work+0x9e7/0x1690 [ 442.302190] ? pwq_dec_nr_in_flight+0x2c0/0x2c0 [ 442.306880] ? rwlock_bug.part.0+0x90/0x90 [ 442.311216] ? lockdep_hardirqs_off+0x71/0x120 [ 442.315906] worker_thread+0x670/0x10b0 [ 442.319880] ? lockdep_hardirqs_on+0x94/0x120 [ 442.324466] kthread+0x302/0x3d0 [ 442.327828] ? process_one_work+0x1690/0x1690 [ 442.332321] ? kthread_complete_and_exit+0x40/0x40 [ 442.337339] ret_from_fork+0x22/0x30 [ 442.346633]