Warning: Permanently added '10.128.0.40' (ED25519) to the list of known hosts. executing program [ 31.765123][ T29] audit: type=1400 audit(1728107101.367:80): avc: denied { execmem } for pid=2646 comm="syz-executor308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 31.793245][ T29] audit: type=1400 audit(1728107101.367:81): avc: denied { read write } for pid=2647 comm="syz-executor308" name="raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.817168][ T29] audit: type=1400 audit(1728107101.367:82): avc: denied { open } for pid=2647 comm="syz-executor308" path="/dev/raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.840949][ T29] audit: type=1400 audit(1728107101.367:83): avc: denied { ioctl } for pid=2647 comm="syz-executor308" path="/dev/raw-gadget" dev="devtmpfs" ino=140 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.998792][ T36] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 32.148644][ T36] usb 1-1: Using ep0 maxpacket: 32 [ 32.156059][ T36] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 32.168112][ T36] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 32.177207][ T36] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 32.185437][ T36] usb 1-1: Product: syz [ 32.189658][ T36] usb 1-1: Manufacturer: syz [ 32.194251][ T36] usb 1-1: SerialNumber: syz [ 32.201922][ T36] usb 1-1: config 0 descriptor?? [ 32.208063][ T2647] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 32.417901][ T2647] [ 32.420252][ T2647] ============================================ [ 32.426383][ T2647] WARNING: possible recursive locking detected [ 32.432539][ T2647] 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 Not tainted [ 32.439627][ T2647] -------------------------------------------- [ 32.445755][ T2647] syz-executor308/2647 is trying to acquire lock: [ 32.452164][ T2647] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x15d/0x2c0 [ 32.461781][ T2647] [ 32.461781][ T2647] but task is already holding lock: [ 32.469166][ T2647] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 32.478661][ T2647] [ 32.478661][ T2647] other info that might help us debug this: [ 32.486722][ T2647] Possible unsafe locking scenario: [ 32.486722][ T2647] [ 32.494174][ T2647] CPU0 [ 32.497450][ T2647] ---- [ 32.500738][ T2647] lock(chaoskey_list_lock); [ 32.505411][ T2647] lock(chaoskey_list_lock); [ 32.510077][ T2647] [ 32.510077][ T2647] *** DEADLOCK *** [ 32.510077][ T2647] [ 32.518314][ T2647] May be due to missing lock nesting notation [ 32.518314][ T2647] [ 32.526631][ T2647] 1 lock held by syz-executor308/2647: [ 32.532123][ T2647] #0: ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 32.542049][ T2647] [ 32.542049][ T2647] stack backtrace: [ 32.548028][ T2647] CPU: 0 UID: 0 PID: 2647 Comm: syz-executor308 Not tainted 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 [ 32.559126][ T2647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 32.569177][ T2647] Call Trace: [ 32.572532][ T2647] [ 32.575554][ T2647] dump_stack_lvl+0x116/0x1f0 [ 32.580236][ T2647] print_deadlock_bug+0x2e3/0x410 [ 32.585251][ T2647] __lock_acquire+0x2185/0x3ce0 [ 32.590094][ T2647] ? __pfx___lock_acquire+0x10/0x10 [ 32.595281][ T2647] ? __pfx_mark_lock+0x10/0x10 [ 32.600120][ T2647] lock_acquire.part.0+0x11b/0x380 [ 32.605225][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.610238][ T2647] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 32.615860][ T2647] ? rcu_is_watching+0x12/0xc0 [ 32.620614][ T2647] ? trace_lock_acquire+0x14a/0x1d0 [ 32.625794][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.630805][ T2647] ? lock_acquire+0x2f/0xb0 [ 32.635313][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.640323][ T2647] __mutex_lock+0x175/0x9c0 [ 32.644814][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.649825][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.654854][ T2647] ? __mutex_unlock_slowpath+0x164/0x650 [ 32.660483][ T2647] ? __pfx___mutex_lock+0x10/0x10 [ 32.665507][ T2647] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 32.671487][ T2647] ? locks_remove_file+0x393/0x5a0 [ 32.676602][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.681616][ T2647] chaoskey_release+0x15d/0x2c0 [ 32.686465][ T2647] ? __pfx_chaoskey_release+0x10/0x10 [ 32.691824][ T2647] __fput+0x3f6/0xb60 [ 32.695796][ T2647] task_work_run+0x14e/0x250 [ 32.700384][ T2647] ? __pfx_task_work_run+0x10/0x10 [ 32.705485][ T2647] ? do_raw_spin_unlock+0x172/0x230 [ 32.710667][ T2647] do_exit+0xadd/0x2ce0 [ 32.714812][ T2647] ? do_group_exit+0x1c3/0x2a0 [ 32.719558][ T2647] ? __pfx_lock_release+0x10/0x10 [ 32.724568][ T2647] ? do_raw_spin_lock+0x12d/0x2c0 [ 32.729574][ T2647] ? __pfx_do_exit+0x10/0x10 [ 32.734148][ T2647] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 32.739502][ T2647] do_group_exit+0xd3/0x2a0 [ 32.744008][ T2647] __x64_sys_exit_group+0x3e/0x50 [ 32.749015][ T2647] x64_sys_call+0x14a9/0x16a0 [ 32.753680][ T2647] do_syscall_64+0xcd/0x250 [ 32.758173][ T2647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.764056][ T2647] RIP: 0033:0x7f3ae7b79409 [ 32.768473][ T2647] Code: Unable to access opcode bytes at 0x7f3ae7b793df. [ 32.775468][ T2647] RSP: 002b:00007ffc8bd4c938 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 32.783880][ T2647] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3ae7b79409 [ 32.791831][ T2647] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 32.799785][ T2647] RBP: 00007f3ae7bf4370 R08: ffffffffffffffb8 R09: 00007ffc8bd4c6a7 [ 32.807738][ T2647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ae7bf4370 [ 32.815688][ T2647] R13: 0000000000000000 R14: 00007f3ae7bf8080 R15: 00007f3ae7b47670 [ 32.823647][ T2647]