Warning: Permanently added '10.128.1.67' (ED25519) to the list of known hosts. executing program [ 30.372227][ T29] audit: type=1400 audit(1728103383.624:80): avc: denied { execmem } for pid=2646 comm="syz-executor422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 30.398384][ T29] audit: type=1400 audit(1728103383.624:81): avc: denied { read write } for pid=2647 comm="syz-executor422" name="raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.422441][ T29] audit: type=1400 audit(1728103383.624:82): avc: denied { open } for pid=2647 comm="syz-executor422" path="/dev/raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.446287][ T29] audit: type=1400 audit(1728103383.634:83): avc: denied { ioctl } for pid=2647 comm="syz-executor422" path="/dev/raw-gadget" dev="devtmpfs" ino=140 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.615504][ T36] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 30.765335][ T36] usb 1-1: Using ep0 maxpacket: 32 [ 30.772451][ T36] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 30.784685][ T36] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 30.793817][ T36] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 30.802129][ T36] usb 1-1: Product: syz [ 30.806325][ T36] usb 1-1: Manufacturer: syz [ 30.810929][ T36] usb 1-1: SerialNumber: syz [ 30.818488][ T36] usb 1-1: config 0 descriptor?? [ 30.824649][ T2647] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 31.034011][ T2647] [ 31.036359][ T2647] ============================================ [ 31.042753][ T2647] WARNING: possible recursive locking detected [ 31.049004][ T2647] 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 Not tainted [ 31.056126][ T2647] -------------------------------------------- [ 31.062364][ T2647] syz-executor422/2647 is trying to acquire lock: [ 31.068785][ T2647] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x15d/0x2c0 [ 31.078544][ T2647] [ 31.078544][ T2647] but task is already holding lock: [ 31.085897][ T2647] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 31.095402][ T2647] [ 31.095402][ T2647] other info that might help us debug this: [ 31.103468][ T2647] Possible unsafe locking scenario: [ 31.103468][ T2647] [ 31.110901][ T2647] CPU0 [ 31.114164][ T2647] ---- [ 31.117426][ T2647] lock(chaoskey_list_lock); [ 31.122105][ T2647] lock(chaoskey_list_lock); [ 31.126851][ T2647] [ 31.126851][ T2647] *** DEADLOCK *** [ 31.126851][ T2647] [ 31.134976][ T2647] May be due to missing lock nesting notation [ 31.134976][ T2647] [ 31.143372][ T2647] 1 lock held by syz-executor422/2647: [ 31.148810][ T2647] #0: ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 31.158721][ T2647] [ 31.158721][ T2647] stack backtrace: [ 31.164604][ T2647] CPU: 0 UID: 0 PID: 2647 Comm: syz-executor422 Not tainted 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 [ 31.175696][ T2647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 31.185761][ T2647] Call Trace: [ 31.189029][ T2647] [ 31.191948][ T2647] dump_stack_lvl+0x116/0x1f0 [ 31.196646][ T2647] print_deadlock_bug+0x2e3/0x410 [ 31.201675][ T2647] __lock_acquire+0x2185/0x3ce0 [ 31.206543][ T2647] ? __pfx___lock_acquire+0x10/0x10 [ 31.211744][ T2647] ? __pfx_mark_lock+0x10/0x10 [ 31.216515][ T2647] lock_acquire.part.0+0x11b/0x380 [ 31.221625][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 31.226669][ T2647] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 31.232315][ T2647] ? rcu_is_watching+0x12/0xc0 [ 31.237094][ T2647] ? trace_lock_acquire+0x14a/0x1d0 [ 31.242284][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 31.247316][ T2647] ? lock_acquire+0x2f/0xb0 [ 31.251818][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 31.256832][ T2647] __mutex_lock+0x175/0x9c0 [ 31.261329][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 31.266369][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 31.271381][ T2647] ? __mutex_unlock_slowpath+0x164/0x650 [ 31.277007][ T2647] ? __pfx___mutex_lock+0x10/0x10 [ 31.282021][ T2647] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 31.287993][ T2647] ? locks_remove_file+0x393/0x5a0 [ 31.293119][ T2647] ? chaoskey_release+0x15d/0x2c0 [ 31.298151][ T2647] chaoskey_release+0x15d/0x2c0 [ 31.302991][ T2647] ? __pfx_chaoskey_release+0x10/0x10 [ 31.308354][ T2647] __fput+0x3f6/0xb60 [ 31.312327][ T2647] task_work_run+0x14e/0x250 [ 31.316917][ T2647] ? __pfx_task_work_run+0x10/0x10 [ 31.322046][ T2647] ? do_raw_spin_unlock+0x172/0x230 [ 31.327275][ T2647] do_exit+0xadd/0x2ce0 [ 31.331461][ T2647] ? do_group_exit+0x1c3/0x2a0 [ 31.336221][ T2647] ? __pfx_lock_release+0x10/0x10 [ 31.341242][ T2647] ? do_raw_spin_lock+0x12d/0x2c0 [ 31.346257][ T2647] ? __pfx_do_exit+0x10/0x10 [ 31.350857][ T2647] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 31.356218][ T2647] do_group_exit+0xd3/0x2a0 [ 31.360711][ T2647] __x64_sys_exit_group+0x3e/0x50 [ 31.365744][ T2647] x64_sys_call+0x14a9/0x16a0 [ 31.370411][ T2647] do_syscall_64+0xcd/0x250 [ 31.374995][ T2647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 31.380880][ T2647] RIP: 0033:0x7fbb318b0409 [ 31.385305][ T2647] Code: Unable to access opcode bytes at 0x7fbb318b03df. [ 31.392311][ T2647] RSP: 002b:00007fff4868af08 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 31.400709][ T2647] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbb318b0409 [ 31.408685][ T2647] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 31.416646][ T2647] RBP: 00007fbb3192b370 R08: ffffffffffffffb8 R09: 00007fff4868ac77 [ 31.424711][ T2647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbb3192b370 [ 31.432675][ T2647] R13: 0000000000000000 R14: 00007fbb3192f080 R15: 00007fbb3187e670 [ 31.440640][ T2647]