Warning: Permanently added '10.128.1.140' (ED25519) to the list of known hosts. executing program [ 31.444661][ T29] audit: type=1400 audit(1728103453.532:80): avc: denied { execmem } for pid=2646 comm="syz-executor196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 31.465347][ T29] audit: type=1400 audit(1728103453.542:81): avc: denied { read write } for pid=2647 comm="syz-executor196" name="raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.489689][ T29] audit: type=1400 audit(1728103453.542:82): avc: denied { open } for pid=2647 comm="syz-executor196" path="/dev/raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.513547][ T29] audit: type=1400 audit(1728103453.542:83): avc: denied { ioctl } for pid=2647 comm="syz-executor196" path="/dev/raw-gadget" dev="devtmpfs" ino=140 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.685492][ T36] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 31.835299][ T36] usb 1-1: Using ep0 maxpacket: 32 [ 31.842738][ T36] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 31.854805][ T36] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 31.863886][ T36] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 31.872079][ T36] usb 1-1: Product: syz [ 31.876277][ T36] usb 1-1: Manufacturer: syz [ 31.880858][ T36] usb 1-1: SerialNumber: syz [ 31.888170][ T36] usb 1-1: config 0 descriptor?? [ 31.894408][ T2647] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 32.103884][ T2647] [ 32.106225][ T2647] ============================================ [ 32.112442][ T2647] WARNING: possible recursive locking detected [ 32.118578][ T2647] 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 Not tainted [ 32.125660][ T2647] -------------------------------------------- [ 32.131782][ T2647] syz-executor196/2647 is trying to acquire lock: [ 32.138171][ T2647] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x15d/0x2c0 [ 32.147740][ T2647] [ 32.147740][ T2647] but task is already holding lock: [ 32.155080][ T2647] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 32.164538][ T2647] [ 32.164538][ T2647] other info that might help us debug this: [ 32.172572][ T2647] Possible unsafe locking scenario: [ 32.172572][ T2647] [ 32.179997][ T2647] CPU0 [ 32.183254][ T2647] ---- [ 32.186516][ T2647] lock(chaoskey_list_lock); [ 32.191171][ T2647] lock(chaoskey_list_lock); [ 32.195828][ T2647] [ 32.195828][ T2647] *** DEADLOCK *** [ 32.195828][ T2647] [ 32.203947][ T2647] May be due to missing lock nesting notation [ 32.203947][ T2647] [ 32.212241][ T2647] 1 lock held by syz-executor196/2647: [ 32.217677][ T2647] #0: ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 32.227577][ T2647] [ 32.227577][ T2647] stack backtrace: [ 32.233448][ T2647] CPU: 1 UID: 0 PID: 2647 Comm: syz-executor196 Not tainted 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 [ 32.244532][ T2647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 32.254575][ T2647] Call Trace: [ 32.257835][ T2647] [ 32.260747][ T2647] dump_stack_lvl+0x116/0x1f0 [ 32.265414][ T2647] print_deadlock_bug+0x2e3/0x410 [ 32.270424][ T2647] __lock_acquire+0x2185/0x3ce0 [ 32.275265][ T2647] ? __pfx___lock_acquire+0x10/0x10 [ 32.280451][ T2647] ? __pfx_mark_lock+0x10/0x10 [ 32.285200][ T2647] lock_acquire.part.0+0x11b/0x380 [ 32.290323][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.295332][ T2647] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 32.300953][ T2647] ? rcu_is_watching+0x12/0xc0 [ 32.305700][ T2647] ? trace_lock_acquire+0x14a/0x1d0 [ 32.310880][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.315888][ T2647] ? lock_acquire+0x2f/0xb0 [ 32.320377][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.325387][ T2647] __mutex_lock+0x175/0x9c0 [ 32.329878][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.334885][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.339890][ T2647] ? __mutex_unlock_slowpath+0x164/0x650 [ 32.345506][ T2647] ? __pfx___mutex_lock+0x10/0x10 [ 32.350514][ T2647] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 32.356481][ T2647] ? locks_remove_file+0x393/0x5a0 [ 32.361584][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 32.366596][ T2647] chaoskey_release+0x15d/0x2c0 [ 32.371435][ T2647] ? __pfx_chaoskey_release+0x10/0x10 [ 32.376795][ T2647] __fput+0x3f6/0xb60 [ 32.380784][ T2647] task_work_run+0x14e/0x250 [ 32.385361][ T2647] ? __pfx_task_work_run+0x10/0x10 [ 32.390459][ T2647] ? do_raw_spin_unlock+0x172/0x230 [ 32.395637][ T2647] do_exit+0xadd/0x2ce0 [ 32.399786][ T2647] ? do_group_exit+0x1c3/0x2a0 [ 32.404534][ T2647] ? __pfx_lock_release+0x10/0x10 [ 32.409544][ T2647] ? do_raw_spin_lock+0x12d/0x2c0 [ 32.414547][ T2647] ? __pfx_do_exit+0x10/0x10 [ 32.419119][ T2647] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 32.424472][ T2647] do_group_exit+0xd3/0x2a0 [ 32.428960][ T2647] __x64_sys_exit_group+0x3e/0x50 [ 32.433971][ T2647] x64_sys_call+0x14a9/0x16a0 [ 32.438633][ T2647] do_syscall_64+0xcd/0x250 [ 32.443132][ T2647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.449012][ T2647] RIP: 0033:0x7f5532890409 [ 32.453419][ T2647] Code: Unable to access opcode bytes at 0x7f55328903df. [ 32.460418][ T2647] RSP: 002b:00007ffd74c0dce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 32.468813][ T2647] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5532890409 [ 32.476795][ T2647] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 32.484767][ T2647] RBP: 00007f553290b370 R08: ffffffffffffffb8 R09: 00007ffd74c0da57 [ 32.492718][ T2647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f553290b370 [ 32.500670][ T2647] R13: 0000000000000000 R14: 00007f553290f080 R15: 00007f553285e670 [ 32.508627][ T2647]