[ 78.470037] audit: type=1400 audit(1661910979.033:122): avc: denied { create } for pid=1232 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 78.503620] can: request_module (can-proto-0) failed. [ 78.509616] audit: type=1400 audit(1661910979.125:123): avc: denied { create } for pid=1232 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 78.576797] audit: type=1400 audit(1661910979.192:124): avc: denied { create } for pid=1232 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 78.604581] audit: type=1400 audit(1661910979.220:125): avc: denied { create } for pid=1232 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 78.651297] audit: type=1400 audit(1661910979.267:126): avc: denied { create } for pid=1232 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 78.802285] audit: type=1400 audit(1661910979.417:127): avc: denied { create } for pid=1232 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 98.984267] kauditd_printk_skb: 16 callbacks suppressed [ 98.984288] audit: type=1400 audit(1661910999.600:144): avc: denied { mounton } for pid=1459 comm="syz-executor3" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 458.910329] audit: type=1400 audit(1661911359.526:145): avc: denied { transition } for pid=16535 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.62' (ECDSA) to the list of known hosts. [ 464.946060] [ 464.947761] ============================================ [ 464.953219] WARNING: possible recursive locking detected [ 464.958675] 6.0.0-rc3-syzkaller #0 Not tainted [ 464.963447] -------------------------------------------- [ 464.968905] kworker/0:21/6939 is trying to acquire lock: [ 464.974388] ffff888108acc018 (&clnt->lock){+.+.}-{2:2}, at: p9_req_put+0xd2/0x260 [ 464.982227] [ 464.982227] but task is already holding lock: [ 464.988209] ffff888108acc018 (&clnt->lock){+.+.}-{2:2}, at: p9_conn_cancel+0xb4/0xaa0 [ 464.996271] [ 464.996271] other info that might help us debug this: [ 465.002958] Possible unsafe locking scenario: [ 465.002958] [ 465.009026] CPU0 [ 465.011670] ---- [ 465.014257] lock(&clnt->lock); [ 465.017745] lock(&clnt->lock); [ 465.021321] [ 465.021321] *** DEADLOCK *** [ 465.021321] [ 465.027483] May be due to missing lock nesting notation [ 465.027483] [ 465.034422] 3 locks held by kworker/0:21/6939: [ 465.039114] #0: ffff888100067d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x8dd/0x1690 [ 465.048884] #1: ffff888131697d98 ((work_completion)(&m->rq)){+.+.}-{0:0}, at: process_one_work+0x913/0x1690 [ 465.058967] #2: ffff888108acc018 (&clnt->lock){+.+.}-{2:2}, at: p9_conn_cancel+0xb4/0xaa0 [ 465.067560] [ 465.067560] stack backtrace: [ 465.072073] CPU: 0 PID: 6939 Comm: kworker/0:21 Not tainted 6.0.0-rc3-syzkaller #0 [ 465.080020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 465.089496] Workqueue: events p9_read_work [ 465.093760] Call Trace: [ 465.096347] [ 465.098686] dump_stack_lvl+0x156/0x1cb [ 465.102730] dump_stack+0x15/0x1b [ 465.106396] __lock_acquire.cold+0x130/0x39c [ 465.111040] ? lockdep_hardirqs_on_prepare+0x440/0x440 [ 465.116398] ? __this_cpu_preempt_check+0x1d/0x30 [ 465.121296] ? lock_is_held_type+0x102/0x180 [ 465.125749] lock_acquire+0x21d/0x630 [ 465.129610] ? p9_req_put+0xd2/0x260 [ 465.133348] ? lock_release+0x9a0/0x9a0 [ 465.137519] ? _raw_spin_unlock_irqrestore+0x31/0x90 [ 465.142682] ? __wake_up_common_lock+0xf8/0x150 [ 465.147427] ? _raw_spin_lock_irqsave+0xb9/0xf0 [ 465.152649] ? __this_cpu_preempt_check+0x1d/0x30 [ 465.157624] ? lockdep_hardirqs_off+0x71/0x120 [ 465.162255] _raw_spin_lock_irqsave+0x9b/0xf0 [ 465.166783] ? p9_req_put+0xd2/0x260 [ 465.170521] p9_req_put+0xd2/0x260 [ 465.174164] p9_client_cb+0x58/0x70 [ 465.177893] p9_conn_cancel+0x6b9/0xaa0 [ 465.182183] ? p9_pollwake+0x1d0/0x1d0 [ 465.186189] ? kernel_read+0xce/0x1e0 [ 465.190181] p9_read_work+0x54f/0x11e0 [ 465.194099] ? p9_conn_cancel+0xaa0/0xaa0 [ 465.198268] ? __this_cpu_preempt_check+0x1d/0x30 [ 465.203394] ? lock_is_held_type+0x102/0x180 [ 465.207860] process_one_work+0x9e4/0x1690 [ 465.212233] ? pwq_dec_nr_in_flight+0x2c0/0x2c0 [ 465.217030] ? rwlock_bug.part.0+0x90/0x90 [ 465.221493] ? lockdep_hardirqs_off+0x71/0x120 [ 465.226323] worker_thread+0x670/0x10b0 [ 465.230335] ? lockdep_hardirqs_on+0x94/0x120 [ 465.234882] kthread+0x2ff/0x3d0 [ 465.238329] ? process_one_work+0x1690/0x1690 [ 465.243017] ? kthread_complete_and_exit+0x40/0x40 [ 465.248144] ret_from_fork+0x1f/0x30 [ 465.251905]