[ 10.801929][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 10.945267][ T24] kauditd_printk_skb: 60 callbacks suppressed [ 10.945274][ T24] audit: type=1400 audit(1664174393.349:71): avc: denied { transition } for pid=290 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 10.951024][ T24] audit: type=1400 audit(1664174393.359:72): avc: denied { write } for pid=290 comm="sh" path="pipe:[297]" dev="pipefs" ino=297 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 11.759533][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 11.789798][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #02!!! [ 11.879622][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #88!!! [ 12.190233][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 12.200388][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 15.069610][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! Warning: Permanently added '10.128.1.32' (ECDSA) to the list of known hosts. [ 38.219573][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! 2022/09/26 06:40:20 ignoring optional flag "sandboxArg"="0" 2022/09/26 06:40:20 parsed 1 programs [ 38.501758][ T24] audit: type=1400 audit(1664174420.909:73): avc: denied { getattr } for pid=365 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 38.516935][ T371] cgroup: Unknown subsys name 'net' [ 38.525463][ T24] audit: type=1400 audit(1664174420.909:74): avc: denied { read } for pid=365 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 38.551516][ T24] audit: type=1400 audit(1664174420.909:75): avc: denied { open } for pid=365 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 38.551739][ T371] cgroup: Unknown subsys name 'devices' [ 38.574890][ T24] audit: type=1400 audit(1664174420.909:76): avc: denied { read } for pid=365 comm="syz-execprog" name="raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 38.603276][ T24] audit: type=1400 audit(1664174420.909:77): avc: denied { open } for pid=365 comm="syz-execprog" path="/dev/raw-gadget" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 38.626866][ T24] audit: type=1400 audit(1664174420.919:78): avc: denied { mounton } for pid=371 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.649651][ T24] audit: type=1400 audit(1664174420.919:79): avc: denied { mount } for pid=371 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.671892][ T24] audit: type=1400 audit(1664174420.939:80): avc: denied { unmount } for pid=371 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 2022/09/26 06:40:21 executed programs: 0 [ 38.761430][ T371] cgroup: Unknown subsys name 'hugetlb' [ 38.767085][ T371] cgroup: Unknown subsys name 'rlimit' [ 38.830930][ T24] audit: type=1400 audit(1664174421.239:81): avc: denied { mounton } for pid=371 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.855706][ T24] audit: type=1400 audit(1664174421.239:82): avc: denied { mount } for pid=371 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 38.881471][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.888485][ T375] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.895913][ T375] device bridge_slave_0 entered promiscuous mode [ 38.902870][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.910294][ T375] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.917535][ T375] device bridge_slave_1 entered promiscuous mode [ 38.944567][ T375] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.951612][ T375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.958917][ T375] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.966001][ T375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.981656][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.988995][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.996537][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.004276][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.020398][ T109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.028481][ T109] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.035525][ T109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.043335][ T109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.051762][ T109] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.058771][ T109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.066098][ T109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.073982][ T109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.083577][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.099894][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.108339][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.116854][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.125899][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.139701][ T375] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 39.165382][ T381] EXT4-fs (sda1): re-mounted. Opts: (null) [ 39.889945][ T10] device bridge_slave_1 left promiscuous mode [ 39.896062][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.903555][ T10] device bridge_slave_0 left promiscuous mode [ 39.909749][ T10] bridge0: port 1(bridge_slave_0) entered disabled state 2022/09/26 06:40:32 SYZFATAL: executor failed 11 times: failed to create temp dir: mkdir ./syzkaller-testdir929297247: read-only file system