Warning: Permanently added '10.128.1.226' (ED25519) to the list of known hosts. executing program [ 42.855128][ T29] audit: type=1400 audit(1728112337.894:80): avc: denied { execmem } for pid=2650 comm="syz-executor363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 42.874936][ T29] audit: type=1400 audit(1728112337.894:81): avc: denied { read write } for pid=2651 comm="syz-executor363" name="raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 42.899428][ T29] audit: type=1400 audit(1728112337.894:82): avc: denied { open } for pid=2651 comm="syz-executor363" path="/dev/raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 42.923104][ T29] audit: type=1400 audit(1728112337.894:83): avc: denied { ioctl } for pid=2651 comm="syz-executor363" path="/dev/raw-gadget" dev="devtmpfs" ino=140 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 43.094549][ T36] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 43.244434][ T36] usb 1-1: Using ep0 maxpacket: 32 [ 43.251755][ T36] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 43.263821][ T36] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 43.272910][ T36] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 43.281103][ T36] usb 1-1: Product: syz [ 43.285292][ T36] usb 1-1: Manufacturer: syz [ 43.289875][ T36] usb 1-1: SerialNumber: syz [ 43.296878][ T36] usb 1-1: config 0 descriptor?? [ 43.303086][ T2651] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 43.514216][ T2651] [ 43.516560][ T2651] ============================================ [ 43.522697][ T2651] WARNING: possible recursive locking detected [ 43.528844][ T2651] 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 Not tainted [ 43.535934][ T2651] -------------------------------------------- [ 43.542060][ T2651] syz-executor363/2651 is trying to acquire lock: [ 43.548452][ T2651] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x15d/0x2c0 [ 43.558028][ T2651] [ 43.558028][ T2651] but task is already holding lock: [ 43.565371][ T2651] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 43.574835][ T2651] [ 43.574835][ T2651] other info that might help us debug this: [ 43.582871][ T2651] Possible unsafe locking scenario: [ 43.582871][ T2651] [ 43.590297][ T2651] CPU0 [ 43.593552][ T2651] ---- [ 43.596813][ T2651] lock(chaoskey_list_lock); [ 43.601469][ T2651] lock(chaoskey_list_lock); [ 43.606125][ T2651] [ 43.606125][ T2651] *** DEADLOCK *** [ 43.606125][ T2651] [ 43.614243][ T2651] May be due to missing lock nesting notation [ 43.614243][ T2651] [ 43.622539][ T2651] 1 lock held by syz-executor363/2651: [ 43.627975][ T2651] #0: ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 43.637882][ T2651] [ 43.637882][ T2651] stack backtrace: [ 43.643774][ T2651] CPU: 0 UID: 0 PID: 2651 Comm: syz-executor363 Not tainted 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 [ 43.654865][ T2651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 43.664923][ T2651] Call Trace: [ 43.668187][ T2651] [ 43.671117][ T2651] dump_stack_lvl+0x116/0x1f0 [ 43.675789][ T2651] print_deadlock_bug+0x2e3/0x410 [ 43.680799][ T2651] __lock_acquire+0x2185/0x3ce0 [ 43.685640][ T2651] ? __pfx___lock_acquire+0x10/0x10 [ 43.690824][ T2651] ? __pfx_mark_lock+0x10/0x10 [ 43.695578][ T2651] lock_acquire.part.0+0x11b/0x380 [ 43.700674][ T2651] ? chaoskey_release+0x15d/0x2c0 [ 43.705685][ T2651] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 43.711304][ T2651] ? rcu_is_watching+0x12/0xc0 [ 43.716051][ T2651] ? trace_lock_acquire+0x14a/0x1d0 [ 43.721229][ T2651] ? chaoskey_release+0x15d/0x2c0 [ 43.726239][ T2651] ? lock_acquire+0x2f/0xb0 [ 43.730727][ T2651] ? chaoskey_release+0x15d/0x2c0 [ 43.735733][ T2651] __mutex_lock+0x175/0x9c0 [ 43.740228][ T2651] ? chaoskey_release+0x15d/0x2c0 [ 43.745235][ T2651] ? chaoskey_release+0x15d/0x2c0 [ 43.750257][ T2651] ? __mutex_unlock_slowpath+0x164/0x650 [ 43.755878][ T2651] ? __pfx___mutex_lock+0x10/0x10 [ 43.760888][ T2651] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 43.766855][ T2651] ? locks_remove_file+0x393/0x5a0 [ 43.771954][ T2651] ? chaoskey_release+0x15d/0x2c0 [ 43.776963][ T2651] chaoskey_release+0x15d/0x2c0 [ 43.781798][ T2651] ? __pfx_chaoskey_release+0x10/0x10 [ 43.787151][ T2651] __fput+0x3f6/0xb60 [ 43.791120][ T2651] task_work_run+0x14e/0x250 [ 43.795696][ T2651] ? __pfx_task_work_run+0x10/0x10 [ 43.800792][ T2651] ? do_raw_spin_unlock+0x172/0x230 [ 43.805971][ T2651] do_exit+0xadd/0x2ce0 [ 43.810110][ T2651] ? do_group_exit+0x1c3/0x2a0 [ 43.814857][ T2651] ? __pfx_lock_release+0x10/0x10 [ 43.819884][ T2651] ? do_raw_spin_lock+0x12d/0x2c0 [ 43.824885][ T2651] ? __pfx_do_exit+0x10/0x10 [ 43.829457][ T2651] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 43.834810][ T2651] do_group_exit+0xd3/0x2a0 [ 43.839300][ T2651] __x64_sys_exit_group+0x3e/0x50 [ 43.844307][ T2651] x64_sys_call+0x14a9/0x16a0 [ 43.848971][ T2651] do_syscall_64+0xcd/0x250 [ 43.853462][ T2651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.859363][ T2651] RIP: 0033:0x7fd87e4bb409 [ 43.863761][ T2651] Code: Unable to access opcode bytes at 0x7fd87e4bb3df. [ 43.870754][ T2651] RSP: 002b:00007ffcb70ccdd8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 43.879149][ T2651] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd87e4bb409 [ 43.887099][ T2651] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 43.895050][ T2651] RBP: 00007fd87e536370 R08: ffffffffffffffb8 R09: 00007ffcb70ccb47 [ 43.903002][ T2651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87e536370 [ 43.910957][ T2651] R13: 0000000000000000 R14: 00007fd87e53a080 R15: 00007fd87e489670 [ 43.918915][ T2651]