Warning: Permanently added '10.128.0.131' (ED25519) to the list of known hosts. executing program [ 40.452711][ T29] audit: type=1400 audit(1728102114.417:80): avc: denied { execmem } for pid=2649 comm="syz-executor358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 40.472593][ T29] audit: type=1400 audit(1728102114.417:81): avc: denied { read write } for pid=2650 comm="syz-executor358" name="raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.496604][ T29] audit: type=1400 audit(1728102114.417:82): avc: denied { open } for pid=2650 comm="syz-executor358" path="/dev/raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.520278][ T29] audit: type=1400 audit(1728102114.417:83): avc: denied { ioctl } for pid=2650 comm="syz-executor358" path="/dev/raw-gadget" dev="devtmpfs" ino=140 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.698620][ T9] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 40.848436][ T9] usb 1-1: Using ep0 maxpacket: 32 [ 40.855755][ T9] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 40.867861][ T9] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 40.877116][ T9] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 40.885322][ T9] usb 1-1: Product: syz [ 40.889516][ T9] usb 1-1: Manufacturer: syz [ 40.894096][ T9] usb 1-1: SerialNumber: syz [ 40.901236][ T9] usb 1-1: config 0 descriptor?? [ 40.907596][ T2651] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 41.117918][ T2650] [ 41.120277][ T2650] ============================================ [ 41.126407][ T2650] WARNING: possible recursive locking detected [ 41.132553][ T2650] 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 Not tainted [ 41.139647][ T2650] -------------------------------------------- [ 41.145776][ T2650] syz-executor358/2650 is trying to acquire lock: [ 41.152171][ T2650] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x15d/0x2c0 [ 41.161923][ T2650] [ 41.161923][ T2650] but task is already holding lock: [ 41.169355][ T2650] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 41.178825][ T2650] [ 41.178825][ T2650] other info that might help us debug this: [ 41.186873][ T2650] Possible unsafe locking scenario: [ 41.186873][ T2650] [ 41.194831][ T2650] CPU0 [ 41.198106][ T2650] ---- [ 41.201366][ T2650] lock(chaoskey_list_lock); [ 41.206060][ T2650] lock(chaoskey_list_lock); [ 41.210717][ T2650] [ 41.210717][ T2650] *** DEADLOCK *** [ 41.210717][ T2650] [ 41.218845][ T2650] May be due to missing lock nesting notation [ 41.218845][ T2650] [ 41.227191][ T2650] 1 lock held by syz-executor358/2650: [ 41.232630][ T2650] #0: ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 41.242716][ T2650] [ 41.242716][ T2650] stack backtrace: [ 41.248594][ T2650] CPU: 1 UID: 0 PID: 2650 Comm: syz-executor358 Not tainted 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 [ 41.259770][ T2650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 41.269822][ T2650] Call Trace: [ 41.273090][ T2650] [ 41.276003][ T2650] dump_stack_lvl+0x116/0x1f0 [ 41.280675][ T2650] print_deadlock_bug+0x2e3/0x410 [ 41.285702][ T2650] __lock_acquire+0x2185/0x3ce0 [ 41.290543][ T2650] ? __pfx___lock_acquire+0x10/0x10 [ 41.295725][ T2650] ? __pfx_mark_lock+0x10/0x10 [ 41.300475][ T2650] lock_acquire.part.0+0x11b/0x380 [ 41.305572][ T2650] ? chaoskey_release+0x15d/0x2c0 [ 41.310582][ T2650] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 41.316229][ T2650] ? rcu_is_watching+0x12/0xc0 [ 41.320978][ T2650] ? trace_lock_acquire+0x14a/0x1d0 [ 41.326173][ T2650] ? chaoskey_release+0x15d/0x2c0 [ 41.331186][ T2650] ? lock_acquire+0x2f/0xb0 [ 41.335696][ T2650] ? chaoskey_release+0x15d/0x2c0 [ 41.340715][ T2650] __mutex_lock+0x175/0x9c0 [ 41.345223][ T2650] ? chaoskey_release+0x15d/0x2c0 [ 41.350247][ T2650] ? chaoskey_release+0x15d/0x2c0 [ 41.355263][ T2650] ? __mutex_unlock_slowpath+0x164/0x650 [ 41.360907][ T2650] ? __pfx___mutex_lock+0x10/0x10 [ 41.365933][ T2650] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 41.372426][ T2650] ? locks_remove_file+0x393/0x5a0 [ 41.377529][ T2650] ? chaoskey_release+0x15d/0x2c0 [ 41.382542][ T2650] chaoskey_release+0x15d/0x2c0 [ 41.387392][ T2650] ? __pfx_chaoskey_release+0x10/0x10 [ 41.392754][ T2650] __fput+0x3f6/0xb60 [ 41.396723][ T2650] task_work_run+0x14e/0x250 [ 41.401302][ T2650] ? __pfx_task_work_run+0x10/0x10 [ 41.406408][ T2650] ? do_raw_spin_unlock+0x172/0x230 [ 41.411601][ T2650] do_exit+0xadd/0x2ce0 [ 41.415750][ T2650] ? do_group_exit+0x1c3/0x2a0 [ 41.420503][ T2650] ? __pfx_lock_release+0x10/0x10 [ 41.425515][ T2650] ? __pfx_do_exit+0x10/0x10 [ 41.430185][ T2650] do_group_exit+0xd3/0x2a0 [ 41.434680][ T2650] __x64_sys_exit_group+0x3e/0x50 [ 41.439692][ T2650] x64_sys_call+0x14a9/0x16a0 [ 41.444356][ T2650] do_syscall_64+0xcd/0x250 [ 41.448857][ T2650] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.455182][ T2650] RIP: 0033:0x7fdb322ddc49 [ 41.459605][ T2650] Code: Unable to access opcode bytes at 0x7fdb322ddc1f. [ 41.466601][ T2650] RSP: 002b:00007ffcbddfc138 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 41.475342][ T2650] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdb322ddc49 [ 41.483303][ T2650] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 41.491256][ T2650] RBP: 00007fdb32367370 R08: ffffffffffffffb0 R09: 0000000000000000 [ 41.499213][ T2650] R10: 00007ffcbddfc1d0 R11: 0000000000000246 R12: 00007fdb32367370 [ 41.507166][ T2650] R13: 0000000000000000 R14: 00007fdb3236b1a0 R15: 00007fdb322a8a90 [ 41.515141][ T2650]