Warning: Permanently added '10.128.0.37' (ED25519) to the list of known hosts. executing program [ 66.135157][ T29] audit: type=1400 audit(1728108931.974:80): avc: denied { execmem } for pid=2647 comm="syz-executor490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 66.158037][ T29] audit: type=1400 audit(1728108931.974:81): avc: denied { read write } for pid=2648 comm="syz-executor490" name="raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.181989][ T29] audit: type=1400 audit(1728108931.974:82): avc: denied { open } for pid=2648 comm="syz-executor490" path="/dev/raw-gadget" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.205947][ T29] audit: type=1400 audit(1728108931.974:83): avc: denied { ioctl } for pid=2648 comm="syz-executor490" path="/dev/raw-gadget" dev="devtmpfs" ino=140 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.380270][ T9] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 66.540043][ T9] usb 1-1: Using ep0 maxpacket: 32 [ 66.547210][ T9] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 66.559247][ T9] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 66.568345][ T9] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 66.576549][ T9] usb 1-1: Product: syz [ 66.580761][ T9] usb 1-1: Manufacturer: syz [ 66.585360][ T9] usb 1-1: SerialNumber: syz [ 66.592714][ T9] usb 1-1: config 0 descriptor?? [ 66.598926][ T2648] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 66.808215][ T2648] [ 66.810649][ T2648] ============================================ [ 66.816780][ T2648] WARNING: possible recursive locking detected [ 66.822926][ T2648] 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 Not tainted [ 66.830454][ T2648] -------------------------------------------- [ 66.836597][ T2648] syz-executor490/2648 is trying to acquire lock: [ 66.843019][ T2648] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x15d/0x2c0 [ 66.852609][ T2648] [ 66.852609][ T2648] but task is already holding lock: [ 66.859964][ T2648] ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 66.869456][ T2648] [ 66.869456][ T2648] other info that might help us debug this: [ 66.877504][ T2648] Possible unsafe locking scenario: [ 66.877504][ T2648] [ 66.884938][ T2648] CPU0 [ 66.888200][ T2648] ---- [ 66.891458][ T2648] lock(chaoskey_list_lock); [ 66.896298][ T2648] lock(chaoskey_list_lock); [ 66.901061][ T2648] [ 66.901061][ T2648] *** DEADLOCK *** [ 66.901061][ T2648] [ 66.909187][ T2648] May be due to missing lock nesting notation [ 66.909187][ T2648] [ 66.917488][ T2648] 1 lock held by syz-executor490/2648: [ 66.922936][ T2648] #0: ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 [ 66.932847][ T2648] [ 66.932847][ T2648] stack backtrace: [ 66.938723][ T2648] CPU: 1 UID: 0 PID: 2648 Comm: syz-executor490 Not tainted 6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 [ 66.949814][ T2648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 66.959868][ T2648] Call Trace: [ 66.963226][ T2648] [ 66.966144][ T2648] dump_stack_lvl+0x116/0x1f0 [ 66.970818][ T2648] print_deadlock_bug+0x2e3/0x410 [ 66.975859][ T2648] __lock_acquire+0x2185/0x3ce0 [ 66.980705][ T2648] ? __pfx___lock_acquire+0x10/0x10 [ 66.985893][ T2648] ? __pfx_mark_lock+0x10/0x10 [ 66.990647][ T2648] lock_acquire.part.0+0x11b/0x380 [ 66.995751][ T2648] ? chaoskey_release+0x15d/0x2c0 [ 67.000763][ T2648] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 67.006386][ T2648] ? rcu_is_watching+0x12/0xc0 [ 67.011247][ T2648] ? trace_lock_acquire+0x14a/0x1d0 [ 67.016434][ T2648] ? chaoskey_release+0x15d/0x2c0 [ 67.021447][ T2648] ? lock_acquire+0x2f/0xb0 [ 67.025944][ T2648] ? chaoskey_release+0x15d/0x2c0 [ 67.030956][ T2648] __mutex_lock+0x175/0x9c0 [ 67.035447][ T2648] ? chaoskey_release+0x15d/0x2c0 [ 67.040458][ T2648] ? chaoskey_release+0x15d/0x2c0 [ 67.045558][ T2648] ? __mutex_unlock_slowpath+0x164/0x650 [ 67.051181][ T2648] ? __pfx___mutex_lock+0x10/0x10 [ 67.056197][ T2648] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 67.062167][ T2648] ? locks_remove_file+0x393/0x5a0 [ 67.067359][ T2648] ? chaoskey_release+0x15d/0x2c0 [ 67.072385][ T2648] chaoskey_release+0x15d/0x2c0 [ 67.077230][ T2648] ? __pfx_chaoskey_release+0x10/0x10 [ 67.082588][ T2648] __fput+0x3f6/0xb60 [ 67.086558][ T2648] task_work_run+0x14e/0x250 [ 67.091140][ T2648] ? __pfx_task_work_run+0x10/0x10 [ 67.096259][ T2648] ? do_raw_spin_unlock+0x172/0x230 [ 67.101442][ T2648] do_exit+0xadd/0x2ce0 [ 67.105588][ T2648] ? do_group_exit+0x1c3/0x2a0 [ 67.110350][ T2648] ? __pfx_lock_release+0x10/0x10 [ 67.115370][ T2648] ? do_raw_spin_lock+0x12d/0x2c0 [ 67.120396][ T2648] ? __pfx_do_exit+0x10/0x10 [ 67.125065][ T2648] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 67.130424][ T2648] do_group_exit+0xd3/0x2a0 [ 67.134917][ T2648] __x64_sys_exit_group+0x3e/0x50 [ 67.139928][ T2648] x64_sys_call+0x14a9/0x16a0 [ 67.144591][ T2648] do_syscall_64+0xcd/0x250 [ 67.149087][ T2648] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.154968][ T2648] RIP: 0033:0x7f4672d62409 [ 67.159371][ T2648] Code: Unable to access opcode bytes at 0x7f4672d623df. [ 67.166367][ T2648] RSP: 002b:00007ffedd85ede8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 67.174764][ T2648] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4672d62409 [ 67.182716][ T2648] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 67.190700][ T2648] RBP: 00007f4672ddd370 R08: ffffffffffffffb8 R09: 00007ffedd85eb57 [ 67.198660][ T2648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4672ddd370 [ 67.206613][ T2648] R13: 0000000000000000 R14: 00007f4672de1080 R15: 00007f4672d30670 [ 67.214662][ T2648]