[ 79.853195] audit: type=1400 audit(1661903705.881:111): avc: denied { create } for pid=1233 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 79.901393] can: request_module (can-proto-0) failed. [ 79.907453] audit: type=1400 audit(1661903705.964:112): avc: denied { create } for pid=1233 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 80.010120] audit: type=1400 audit(1661903706.067:113): avc: denied { create } for pid=1233 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 80.048958] audit: type=1400 audit(1661903706.106:114): avc: denied { create } for pid=1233 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 80.118401] audit: type=1400 audit(1661903706.175:115): avc: denied { create } for pid=1233 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 80.342917] audit: type=1400 audit(1661903706.400:116): avc: denied { create } for pid=1233 comm="syz-fuzzer" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 100.871316] kauditd_printk_skb: 19 callbacks suppressed [ 100.871335] audit: type=1400 audit(1661903726.928:136): avc: denied { mounton } for pid=1518 comm="syz-executor0" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 424.538328] kworker/dying (29) used greatest stack depth: 23552 bytes left Warning: Permanently added '10.128.0.184' (ECDSA) to the list of known hosts. [ 465.999667] audit: type=1400 audit(1661904092.056:137): avc: denied { mounton } for pid=8653 comm="syz-executor390" path="/root/file0" dev="sda1" ino=1144 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 466.966347] [ 466.968025] ============================================ [ 466.973559] WARNING: possible recursive locking detected [ 466.979017] 6.0.0-rc3-next-20220830-syzkaller #0 Not tainted [ 466.984907] -------------------------------------------- [ 466.990608] kworker/1:5/1731 is trying to acquire lock: [ 466.997629] ffff88812131fc18 (&clnt->lock){+.+.}-{2:2}, at: p9_req_put+0xd2/0x260 [ 467.005693] [ 467.005693] but task is already holding lock: [ 467.012029] ffff88812131fc18 (&clnt->lock){+.+.}-{2:2}, at: p9_conn_cancel+0xb4/0xaa0 [ 467.020316] [ 467.020316] other info that might help us debug this: [ 467.027073] Possible unsafe locking scenario: [ 467.027073] [ 467.033433] CPU0 [ 467.036111] ---- [ 467.038828] lock(&clnt->lock); [ 467.042462] lock(&clnt->lock); [ 467.045941] [ 467.045941] *** DEADLOCK *** [ 467.045941] [ 467.052219] May be due to missing lock nesting notation [ 467.052219] [ 467.059497] 3 locks held by kworker/1:5/1731: [ 467.064044] #0: ffff888100061d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x8dd/0x1690 [ 467.074194] #1: ffff8881078e7d98 ((work_completion)(&m->rq)){+.+.}-{0:0}, at: process_one_work+0x913/0x1690 [ 467.084232] #2: ffff88812131fc18 (&clnt->lock){+.+.}-{2:2}, at: p9_conn_cancel+0xb4/0xaa0 [ 467.092795] [ 467.092795] stack backtrace: [ 467.097732] CPU: 1 PID: 1731 Comm: kworker/1:5 Not tainted 6.0.0-rc3-next-20220830-syzkaller #0 [ 467.107645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 467.117198] Workqueue: events p9_read_work [ 467.121929] Call Trace: [ 467.124908] [ 467.127149] dump_stack_lvl+0x156/0x1cb [ 467.131610] dump_stack+0x15/0x1b [ 467.135120] __lock_acquire.cold+0x130/0x39c [ 467.139563] ? lockdep_hardirqs_on_prepare+0x440/0x440 [ 467.145205] ? __this_cpu_preempt_check+0x1d/0x30 [ 467.150475] ? lock_is_held_type+0x102/0x180 [ 467.155249] lock_acquire+0x21d/0x630 [ 467.159295] ? p9_req_put+0xd2/0x260 [ 467.163099] ? lock_release+0x9a0/0x9a0 [ 467.167443] ? _raw_spin_unlock_irqrestore+0x31/0x90 [ 467.173121] ? __wake_up_common_lock+0xf8/0x150 [ 467.177913] ? _raw_spin_lock_irqsave+0xb9/0xf0 [ 467.182769] ? __this_cpu_preempt_check+0x1d/0x30 [ 467.187911] ? lockdep_hardirqs_off+0x71/0x120 [ 467.193385] _raw_spin_lock_irqsave+0x9b/0xf0 [ 467.197984] ? p9_req_put+0xd2/0x260 [ 467.202084] p9_req_put+0xd2/0x260 [ 467.205915] p9_client_cb+0x58/0x70 [ 467.209666] p9_conn_cancel+0x6b9/0xaa0 [ 467.213764] ? p9_pollwake+0x1d0/0x1d0 [ 467.217759] ? kernel_read+0xce/0x1e0 [ 467.221650] p9_read_work+0x54f/0x11e0 [ 467.225675] ? p9_conn_cancel+0xaa0/0xaa0 [ 467.230003] ? __this_cpu_preempt_check+0x1d/0x30 [ 467.234869] ? lock_is_held_type+0x102/0x180 [ 467.239342] process_one_work+0x9e4/0x1690 [ 467.243764] ? pwq_dec_nr_in_flight+0x2c0/0x2c0 [ 467.248466] ? rwlock_bug.part.0+0x90/0x90 [ 467.252887] ? lockdep_hardirqs_off+0x71/0x120 [ 467.257645] worker_thread+0x670/0x10b0 [ 467.261630] kthread+0x2ff/0x3d0 [ 467.264996] ? process_one_work+0x1690/0x1690 [ 467.269499] ? kthread_complete_and_exit+0x40/0x40 [ 467.274720] ret_from_fork+0x1f/0x30 [ 467.278566]