Warning: Permanently added '10.128.0.95' (ED25519) to the list of known hosts. executing program [ 31.064244][ T29] audit: type=1400 audit(1728106631.984:80): avc: denied { execmem } for pid=2645 comm="syz-executor320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 31.087594][ T29] audit: type=1400 audit(1728106631.984:81): avc: denied { read write } for pid=2646 comm="syz-executor320" name="raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.111539][ T29] audit: type=1400 audit(1728106631.984:82): avc: denied { open } for pid=2646 comm="syz-executor320" path="/dev/raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.135401][ T29] audit: type=1400 audit(1728106631.984:83): avc: denied { ioctl } for pid=2646 comm="syz-executor320" path="/dev/raw-gadget" dev="devtmpfs" ino=140 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.296079][ T36] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 31.445947][ T36] usb 1-1: Using ep0 maxpacket: 32 [ 31.452903][ T36] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 31.465080][ T36] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 31.474172][ T36] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 31.482356][ T36] usb 1-1: Product: syz [ 31.486546][ T36] usb 1-1: Manufacturer: syz [ 31.491158][ T36] usb 1-1: SerialNumber: syz [ 31.498716][ T36] usb 1-1: config 0 descriptor?? [ 31.504751][ T2646] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 31.714048][ T2646] [ 31.716416][ T2646] ============================================ [ 31.722542][ T2646] WARNING: possible recursive locking detected [ 31.728683][ T2646] 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 Not tainted [ 31.735771][ T2646] -------------------------------------------- [ 31.741910][ T2646] syz-executor320/2646 is trying to acquire lock: [ 31.748302][ T2646] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x15d/0x2c0 [ 31.757876][ T2646] [ 31.757876][ T2646] but task is already holding lock: [ 31.765222][ T2646] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 31.774685][ T2646] [ 31.774685][ T2646] other info that might help us debug this: [ 31.782725][ T2646] Possible unsafe locking scenario: [ 31.782725][ T2646] [ 31.790155][ T2646] CPU0 [ 31.793416][ T2646] ---- [ 31.796676][ T2646] lock(chaoskey_list_lock); [ 31.801335][ T2646] lock(chaoskey_list_lock); [ 31.806010][ T2646] [ 31.806010][ T2646] *** DEADLOCK *** [ 31.806010][ T2646] [ 31.814130][ T2646] May be due to missing lock nesting notation [ 31.814130][ T2646] [ 31.822429][ T2646] 1 lock held by syz-executor320/2646: [ 31.827866][ T2646] #0: ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 31.837774][ T2646] [ 31.837774][ T2646] stack backtrace: [ 31.843671][ T2646] CPU: 0 UID: 0 PID: 2646 Comm: syz-executor320 Not tainted 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 [ 31.854776][ T2646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 31.864825][ T2646] Call Trace: [ 31.868090][ T2646] [ 31.871006][ T2646] dump_stack_lvl+0x116/0x1f0 [ 31.875678][ T2646] print_deadlock_bug+0x2e3/0x410 [ 31.880694][ T2646] __lock_acquire+0x2185/0x3ce0 [ 31.885535][ T2646] ? __pfx___lock_acquire+0x10/0x10 [ 31.890720][ T2646] ? __pfx_mark_lock+0x10/0x10 [ 31.895471][ T2646] lock_acquire.part.0+0x11b/0x380 [ 31.900570][ T2646] ? chaoskey_release+0x15d/0x2c0 [ 31.905581][ T2646] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 31.911205][ T2646] ? rcu_is_watching+0x12/0xc0 [ 31.915953][ T2646] ? trace_lock_acquire+0x14a/0x1d0 [ 31.921140][ T2646] ? chaoskey_release+0x15d/0x2c0 [ 31.926150][ T2646] ? lock_acquire+0x2f/0xb0 [ 31.930643][ T2646] ? chaoskey_release+0x15d/0x2c0 [ 31.935667][ T2646] __mutex_lock+0x175/0x9c0 [ 31.940156][ T2646] ? chaoskey_release+0x15d/0x2c0 [ 31.945165][ T2646] ? chaoskey_release+0x15d/0x2c0 [ 31.950171][ T2646] ? __mutex_unlock_slowpath+0x164/0x650 [ 31.955792][ T2646] ? __pfx___mutex_lock+0x10/0x10 [ 31.960810][ T2646] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 31.966775][ T2646] ? locks_remove_file+0x393/0x5a0 [ 31.971877][ T2646] ? chaoskey_release+0x15d/0x2c0 [ 31.976886][ T2646] chaoskey_release+0x15d/0x2c0 [ 31.981723][ T2646] ? __pfx_chaoskey_release+0x10/0x10 [ 31.987077][ T2646] __fput+0x3f6/0xb60 [ 31.991067][ T2646] task_work_run+0x14e/0x250 [ 31.995656][ T2646] ? __pfx_task_work_run+0x10/0x10 [ 32.000756][ T2646] ? do_raw_spin_unlock+0x172/0x230 [ 32.005938][ T2646] do_exit+0xadd/0x2ce0 [ 32.010083][ T2646] ? do_group_exit+0x1c3/0x2a0 [ 32.014832][ T2646] ? __pfx_lock_release+0x10/0x10 [ 32.019847][ T2646] ? do_raw_spin_lock+0x12d/0x2c0 [ 32.024854][ T2646] ? __pfx_do_exit+0x10/0x10 [ 32.029431][ T2646] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 32.034788][ T2646] do_group_exit+0xd3/0x2a0 [ 32.039302][ T2646] __x64_sys_exit_group+0x3e/0x50 [ 32.044310][ T2646] x64_sys_call+0x14a9/0x16a0 [ 32.048977][ T2646] do_syscall_64+0xcd/0x250 [ 32.053477][ T2646] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.059364][ T2646] RIP: 0033:0x7fdecf39d409 [ 32.063769][ T2646] Code: Unable to access opcode bytes at 0x7fdecf39d3df. [ 32.070853][ T2646] RSP: 002b:00007ffd352f76b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 32.079334][ T2646] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdecf39d409 [ 32.087284][ T2646] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 32.095261][ T2646] RBP: 00007fdecf418370 R08: ffffffffffffffb8 R09: 00007ffd352f7427 [ 32.103234][ T2646] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdecf418370 [ 32.111199][ T2646] R13: 0000000000000000 R14: 00007fdecf41c080 R15: 00007fdecf36b670 [ 32.119173][ T2646]