Warning: Permanently added '10.128.0.98' (ED25519) to the list of known hosts. executing program [ 41.245159][ T29] audit: type=1400 audit(1728105039.832:80): avc: denied { execmem } for pid=2651 comm="syz-executor413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 41.267283][ T29] audit: type=1400 audit(1728105039.842:81): avc: denied { read write } for pid=2652 comm="syz-executor413" name="raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.291103][ T29] audit: type=1400 audit(1728105039.842:82): avc: denied { open } for pid=2652 comm="syz-executor413" path="/dev/raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.315002][ T29] audit: type=1400 audit(1728105039.842:83): avc: denied { ioctl } for pid=2652 comm="syz-executor413" path="/dev/raw-gadget" dev="devtmpfs" ino=140 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.486205][ T9] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 41.636117][ T9] usb 1-1: Using ep0 maxpacket: 32 [ 41.643324][ T9] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 41.655288][ T9] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 41.664393][ T9] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 41.672612][ T9] usb 1-1: Product: syz [ 41.676811][ T9] usb 1-1: Manufacturer: syz [ 41.681403][ T9] usb 1-1: SerialNumber: syz [ 41.689395][ T9] usb 1-1: config 0 descriptor?? [ 41.695494][ T2652] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 41.904971][ T2652] [ 41.907310][ T2652] ============================================ [ 41.913449][ T2652] WARNING: possible recursive locking detected [ 41.919592][ T2652] 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 Not tainted [ 41.926685][ T2652] -------------------------------------------- [ 41.932813][ T2652] syz-executor413/2652 is trying to acquire lock: [ 41.939216][ T2652] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x15d/0x2c0 [ 41.948801][ T2652] [ 41.948801][ T2652] but task is already holding lock: [ 41.956149][ T2652] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 41.965615][ T2652] [ 41.965615][ T2652] other info that might help us debug this: [ 41.973668][ T2652] Possible unsafe locking scenario: [ 41.973668][ T2652] [ 41.981132][ T2652] CPU0 [ 41.984396][ T2652] ---- [ 41.987658][ T2652] lock(chaoskey_list_lock); [ 41.992318][ T2652] lock(chaoskey_list_lock); [ 41.996977][ T2652] [ 41.996977][ T2652] *** DEADLOCK *** [ 41.996977][ T2652] [ 42.005100][ T2652] May be due to missing lock nesting notation [ 42.005100][ T2652] [ 42.013407][ T2652] 1 lock held by syz-executor413/2652: [ 42.018846][ T2652] #0: ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 42.028760][ T2652] [ 42.028760][ T2652] stack backtrace: [ 42.034640][ T2652] CPU: 0 UID: 0 PID: 2652 Comm: syz-executor413 Not tainted 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 [ 42.045729][ T2652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 42.055774][ T2652] Call Trace: [ 42.059045][ T2652] [ 42.061959][ T2652] dump_stack_lvl+0x116/0x1f0 [ 42.066642][ T2652] print_deadlock_bug+0x2e3/0x410 [ 42.071653][ T2652] __lock_acquire+0x2185/0x3ce0 [ 42.076495][ T2652] ? __pfx___lock_acquire+0x10/0x10 [ 42.081725][ T2652] ? __pfx_mark_lock+0x10/0x10 [ 42.086476][ T2652] lock_acquire.part.0+0x11b/0x380 [ 42.091572][ T2652] ? chaoskey_release+0x15d/0x2c0 [ 42.096604][ T2652] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 42.102241][ T2652] ? rcu_is_watching+0x12/0xc0 [ 42.106988][ T2652] ? trace_lock_acquire+0x14a/0x1d0 [ 42.112187][ T2652] ? chaoskey_release+0x15d/0x2c0 [ 42.117199][ T2652] ? lock_acquire+0x2f/0xb0 [ 42.121706][ T2652] ? chaoskey_release+0x15d/0x2c0 [ 42.126715][ T2652] __mutex_lock+0x175/0x9c0 [ 42.131204][ T2652] ? chaoskey_release+0x15d/0x2c0 [ 42.136214][ T2652] ? chaoskey_release+0x15d/0x2c0 [ 42.141220][ T2652] ? __mutex_unlock_slowpath+0x164/0x650 [ 42.146840][ T2652] ? __pfx___mutex_lock+0x10/0x10 [ 42.152027][ T2652] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 42.157992][ T2652] ? locks_remove_file+0x393/0x5a0 [ 42.163112][ T2652] ? chaoskey_release+0x15d/0x2c0 [ 42.168121][ T2652] chaoskey_release+0x15d/0x2c0 [ 42.172959][ T2652] ? __pfx_chaoskey_release+0x10/0x10 [ 42.178335][ T2652] __fput+0x3f6/0xb60 [ 42.182393][ T2652] task_work_run+0x14e/0x250 [ 42.186973][ T2652] ? __pfx_task_work_run+0x10/0x10 [ 42.192090][ T2652] ? do_raw_spin_unlock+0x172/0x230 [ 42.197279][ T2652] do_exit+0xadd/0x2ce0 [ 42.201429][ T2652] ? do_group_exit+0x1c3/0x2a0 [ 42.206183][ T2652] ? __pfx_lock_release+0x10/0x10 [ 42.211201][ T2652] ? do_raw_spin_lock+0x12d/0x2c0 [ 42.216213][ T2652] ? __pfx_do_exit+0x10/0x10 [ 42.220798][ T2652] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 42.226157][ T2652] do_group_exit+0xd3/0x2a0 [ 42.230647][ T2652] __x64_sys_exit_group+0x3e/0x50 [ 42.235658][ T2652] x64_sys_call+0x14a9/0x16a0 [ 42.240320][ T2652] do_syscall_64+0xcd/0x250 [ 42.244817][ T2652] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.250720][ T2652] RIP: 0033:0x7f2d501a9409 [ 42.255126][ T2652] Code: Unable to access opcode bytes at 0x7f2d501a93df. [ 42.262123][ T2652] RSP: 002b:00007ffc91e1a798 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 42.270541][ T2652] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d501a9409 [ 42.278495][ T2652] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 42.286450][ T2652] RBP: 00007f2d50224370 R08: ffffffffffffffb8 R09: 00007ffc91e1a507 [ 42.294423][ T2652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d50224370 [ 42.302380][ T2652] R13: 0000000000000000 R14: 00007f2d50228080 R15: 00007f2d50177670 [ 42.310338][ T2652]