last executing test programs: 308.91797ms ago: executing program 3 (id=4): setreuid(0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x2, 0x5, 0x9, r1, 0xa, 'syzkaller\x00'}}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd000000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) sendmmsg$inet6(r0, &(0x7f0000002940), 0x40000000000017d, 0x888) 124.287496ms ago: executing program 0 (id=1): setreuid(0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x2, 0x5, 0x9, r1, 0xa, 'syzkaller\x00'}}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd000000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) sendmmsg$inet6(r0, &(0x7f0000002940), 0x40000000000017d, 0x888) 0s ago: executing program 4 (id=5): r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000040)={'erspan0\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x8000, 0x1, 0x5, 0x1, {{0x1d, 0x4, 0x1, 0x8, 0x74, 0x66, 0x0, 0x0, 0x4, 0x0, @loopback, @rand_addr=0x64010100, {[@end, @noop, @noop, @timestamp_addr={0x44, 0x4c, 0xf4, 0x1, 0x1, [{@broadcast, 0x6}, {@multicast1, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0x6}, {@remote, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x401}, {@remote, 0x1}, {@broadcast, 0x6}, {@private=0xa010102, 0x7}, {@broadcast, 0x2}]}, @timestamp={0x44, 0x10, 0xd, 0x0, 0x2, [0x6, 0x35, 0x2]}]}}}}}) connect$x25(0xffffffffffffffff, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0xd, r1, 0x1, 0xe3, 0x6, @remote}, 0x14) r2 = socket(0x2, 0x80805, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r3, &(0x7f00000002c0)=[{&(0x7f0000000280)='2', 0x1}, {&(0x7f0000000080)='-6', 0x3f}], 0x2) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e23, @rand_addr=0x64010102}]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x7a, &(0x7f0000000340)={r5, @in6={{0xa, 0x3, 0x4, @rand_addr=' \x01\x00'}}}, &(0x7f0000000040)=0x84) sendmmsg$inet_sctp(r2, &(0x7f00000032c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="30000000000000008400000001000000000000017c"], 0x30}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={r6, 0x7, 0x5, 0x101, 0xff, 0x3}, 0x14) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r7 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r7, 0x1, 0x3c, &(0x7f0000000000)={0x1, 0x2000001}, 0x8) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="fc0000001000a54627bd7000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="150c000000000000d400128009000100766c616e00000000c400028006000100040000000c0002001c00000010000000320004800c00010007000000e16c00000c00010008000000f30000000c000100050000000b000000340003800c00010001800000ffff00000c0001000600000001f0ffff0c00010001000000040000000c0001000100010007000000040004804c0004800c000100ff010000060000000c000100000000000a0000000c00010002000000070000000c00010001000000ff0100000c00010004000000d30c00000c00010006000000ff00000008000500", @ANYRES32=r9, @ANYBLOB="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"], 0xfc}, 0x1, 0x0, 0x0, 0x28001}, 0x8000) sendmsg$nl_route_sched_retired(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=@delqdisc={0x58, 0x25, 0x4, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r9, {0xb, 0x6}, {0x6, 0x3}, {0xe, 0xb}}, [@q_dsmark={{0xfed9}, {0x4}}, @q_dsmark={{0xb}, {0x18, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x7ff}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x9}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x58004}, 0x800) socket$packet(0x11, 0x3, 0x300) r10 = semget(0x1, 0x4, 0x39c) semop(r10, &(0x7f0000000000)=[{0x3, 0xfe88}], 0x1) semctl$SETALL(r10, 0x0, 0x11, &(0x7f0000000240)) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f0000000240)=0x1) socket$packet(0x11, 0x2, 0x300) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000400)={r6, @in6={{0xa, 0x4e24, 0x1ff, @rand_addr=' \x01\x00', 0xfffffff7}}, 0x98c4, 0x1}, 0x90) sendmmsg$inet6(r7, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x4, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4000800) kernel console output (not intermixed with test programs): [ 19.535887][ T28] audit: type=1400 audit(1774968946.919:62): avc: denied { search } for pid=3197 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.558064][ T28] audit: type=1400 audit(1774968946.919:63): avc: denied { search } for pid=3197 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.580869][ T28] audit: type=1400 audit(1774968946.919:64): avc: denied { search } for pid=3197 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.603778][ T28] audit: type=1400 audit(1774968946.919:65): avc: denied { search } for pid=3197 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.627425][ T28] audit: type=1400 audit(1774968946.919:66): avc: denied { read open } for pid=3198 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.126' (ED25519) to the list of known hosts. [ 25.095752][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 25.095769][ T28] audit: type=1400 audit(1774968952.479:70): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.125072][ T28] audit: type=1400 audit(1774968952.509:71): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.125744][ T3301] cgroup: Unknown subsys name 'net' [ 25.152741][ T28] audit: type=1400 audit(1774968952.539:72): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.292222][ T3301] cgroup: Unknown subsys name 'cpuset' [ 25.298374][ T3301] cgroup: Unknown subsys name 'rlimit' [ 25.407986][ T28] audit: type=1400 audit(1774968952.789:73): avc: denied { setattr } for pid=3301 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.431761][ T28] audit: type=1400 audit(1774968952.789:74): avc: denied { create } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.464175][ T3306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.475164][ T28] audit: type=1400 audit(1774968952.789:75): avc: denied { write } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.495855][ T28] audit: type=1400 audit(1774968952.789:76): avc: denied { read } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.516999][ T28] audit: type=1400 audit(1774968952.799:77): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.542205][ T28] audit: type=1400 audit(1774968952.799:78): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.552166][ T3301] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.565542][ T28] audit: type=1400 audit(1774968952.839:79): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 27.603044][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 27.653288][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 27.662748][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 27.703744][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.710945][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.718230][ T3318] bridge_slave_0: entered allmulticast mode [ 27.725187][ T3318] bridge_slave_0: entered promiscuous mode [ 27.735932][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.743127][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.750347][ T3318] bridge_slave_1: entered allmulticast mode [ 27.757033][ T3318] bridge_slave_1: entered promiscuous mode [ 27.791530][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.807046][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 27.820964][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.830286][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 27.868018][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.875166][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.882422][ T3316] bridge_slave_0: entered allmulticast mode [ 27.888722][ T3316] bridge_slave_0: entered promiscuous mode [ 27.899479][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.906979][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.914310][ T3316] bridge_slave_1: entered allmulticast mode [ 27.920760][ T3316] bridge_slave_1: entered promiscuous mode [ 27.935597][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.942927][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.949995][ T3315] bridge_slave_0: entered allmulticast mode [ 27.956407][ T3315] bridge_slave_0: entered promiscuous mode [ 27.963631][ T3318] team0: Port device team_slave_0 added [ 27.969402][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.976518][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.983642][ T3315] bridge_slave_1: entered allmulticast mode [ 27.990210][ T3315] bridge_slave_1: entered promiscuous mode [ 28.007761][ T3318] team0: Port device team_slave_1 added [ 28.040143][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.050576][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.065880][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.075375][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.082366][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.108443][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.120275][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.145454][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.152508][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.178600][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.201953][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.209911][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.217395][ T3323] bridge_slave_0: entered allmulticast mode [ 28.223880][ T3323] bridge_slave_0: entered promiscuous mode [ 28.242605][ T3316] team0: Port device team_slave_0 added [ 28.248201][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.255508][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.263210][ T3321] bridge_slave_0: entered allmulticast mode [ 28.269563][ T3321] bridge_slave_0: entered promiscuous mode [ 28.276237][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.283413][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.290590][ T3323] bridge_slave_1: entered allmulticast mode [ 28.296961][ T3323] bridge_slave_1: entered promiscuous mode [ 28.303945][ T3315] team0: Port device team_slave_0 added [ 28.315556][ T3316] team0: Port device team_slave_1 added [ 28.321241][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.328405][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.335530][ T3321] bridge_slave_1: entered allmulticast mode [ 28.341986][ T3321] bridge_slave_1: entered promiscuous mode [ 28.353189][ T3315] team0: Port device team_slave_1 added [ 28.365007][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.387280][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.405394][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.426938][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.433982][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.460247][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.472096][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.481522][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.488627][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.514639][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.532093][ T3318] hsr_slave_0: entered promiscuous mode [ 28.538126][ T3318] hsr_slave_1: entered promiscuous mode [ 28.544719][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.551801][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.578072][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.599125][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.606405][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.632729][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.644236][ T3323] team0: Port device team_slave_0 added [ 28.670805][ T3323] team0: Port device team_slave_1 added [ 28.686122][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.693343][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.719760][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.735359][ T3321] team0: Port device team_slave_0 added [ 28.743003][ T3315] hsr_slave_0: entered promiscuous mode [ 28.748917][ T3315] hsr_slave_1: entered promiscuous mode [ 28.754852][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 28.760839][ T3315] Cannot create hsr debugfs directory [ 28.773347][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.780412][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.806544][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.818246][ T3321] team0: Port device team_slave_1 added [ 28.841722][ T3316] hsr_slave_0: entered promiscuous mode [ 28.847867][ T3316] hsr_slave_1: entered promiscuous mode [ 28.853881][ T3316] debugfs: 'hsr0' already exists in 'hsr' [ 28.859715][ T3316] Cannot create hsr debugfs directory [ 28.873280][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.880237][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.906188][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.941390][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.948458][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.974517][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.006008][ T3323] hsr_slave_0: entered promiscuous mode [ 29.012562][ T3323] hsr_slave_1: entered promiscuous mode [ 29.018555][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 29.024354][ T3323] Cannot create hsr debugfs directory [ 29.065360][ T3321] hsr_slave_0: entered promiscuous mode [ 29.071409][ T3321] hsr_slave_1: entered promiscuous mode [ 29.077274][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 29.083048][ T3321] Cannot create hsr debugfs directory [ 29.196541][ T3318] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.209279][ T3318] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.222686][ T3318] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.231392][ T3318] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.274694][ T3316] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.286634][ T3316] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.298131][ T3316] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.309556][ T3316] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.341963][ T3315] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.354360][ T3315] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.365255][ T3315] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.375092][ T3315] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.401628][ T3323] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.410636][ T3323] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.420254][ T3323] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.429597][ T3323] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.440991][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.477453][ T3321] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.486897][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.498047][ T3321] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.507545][ T3321] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.516507][ T3321] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.529010][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.536092][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.561006][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.571253][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.578341][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.602088][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.617409][ T1625] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.624499][ T1625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.642207][ T1625] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.649268][ T1625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.665235][ T3318] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.675745][ T3318] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.709550][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.730672][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.751235][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.762982][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.776745][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.798602][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.814936][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.827834][ T1625] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.835034][ T1625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.846494][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.853617][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.874506][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.881756][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.891186][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.898554][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.930924][ T3323] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.942005][ T3323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.964715][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.993418][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.022756][ T2063] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.029983][ T2063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.052237][ T2063] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.059346][ T2063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.086493][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.105776][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.157032][ T3321] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.192209][ T3316] veth0_vlan: entered promiscuous mode [ 30.213519][ T3316] veth1_vlan: entered promiscuous mode [ 30.228099][ T3318] veth0_vlan: entered promiscuous mode [ 30.253992][ T3318] veth1_vlan: entered promiscuous mode [ 30.280837][ T3323] veth0_vlan: entered promiscuous mode [ 30.302965][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.318183][ T3323] veth1_vlan: entered promiscuous mode [ 30.326507][ T3316] veth0_macvtap: entered promiscuous mode [ 30.334294][ T3316] veth1_macvtap: entered promiscuous mode [ 30.343053][ T3315] veth0_vlan: entered promiscuous mode [ 30.353408][ T3318] veth0_macvtap: entered promiscuous mode [ 30.367877][ T3315] veth1_vlan: entered promiscuous mode [ 30.374527][ T3318] veth1_macvtap: entered promiscuous mode [ 30.392311][ T3323] veth0_macvtap: entered promiscuous mode [ 30.400307][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.411837][ T3323] veth1_macvtap: entered promiscuous mode [ 30.424539][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.436501][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.448258][ T1925] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.463047][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.472327][ T3315] veth0_macvtap: entered promiscuous mode [ 30.484346][ T1925] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.493402][ T1925] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.503557][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.513824][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.522647][ T3315] veth1_macvtap: entered promiscuous mode [ 30.529426][ T1925] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.540958][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.562630][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 30.562645][ T28] audit: type=1400 audit(1774968957.949:90): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.Z6vBix/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 30.595161][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.595254][ T28] audit: type=1400 audit(1774968957.949:91): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 30.608856][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.635163][ T28] audit: type=1400 audit(1774968957.949:92): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.Z6vBix/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 30.653583][ T3321] veth0_vlan: entered promiscuous mode [ 30.660811][ T28] audit: type=1400 audit(1774968957.949:93): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 30.690430][ T28] audit: type=1400 audit(1774968957.949:94): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.Z6vBix/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 30.693039][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.726532][ T3316] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.731590][ T28] audit: type=1400 audit(1774968957.949:95): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/root/syzkaller.Z6vBix/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=5040 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 30.769157][ T28] audit: type=1400 audit(1774968957.949:96): avc: denied { unmount } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 30.770373][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.791863][ T28] audit: type=1400 audit(1774968958.019:97): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 30.802507][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.821282][ T28] audit: type=1400 audit(1774968958.019:98): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="gadgetfs" ino=5042 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 30.831861][ T3321] veth1_vlan: entered promiscuous mode [ 30.865057][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.879365][ T28] audit: type=1400 audit(1774968958.259:99): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 30.881189][ T12] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.918933][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.018953][ T3321] veth0_macvtap: entered promiscuous mode [ 31.026527][ T3321] veth1_macvtap: entered promiscuous mode [ 31.037814][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.046972][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.065273][ T12] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.079573][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.097566][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.197156][ T1925] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.207055][ T1925] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.233673][ T30] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.239787][ T3492] netlink: 120 bytes leftover after parsing attributes in process `syz.4.5'. [ 31.242896][ T30] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.252147][ T3492] netlink: 10 bytes leftover after parsing attributes in process `syz.4.5'. [ 31.275498][ T30] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.295625][ T30] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.355139][ T3419] ================================================================== [ 31.363630][ T3419] BUG: KCSAN: data-race in __mod_timer / __mod_timer [ 31.370362][ T3419] [ 31.372710][ T3419] write to 0xffff88811a935150 of 8 bytes by task 9 on cpu 0: [ 31.380279][ T3419] __mod_timer+0x670/0x9d0 [ 31.384736][ T3419] mod_timer+0x1f/0x30 [ 31.388843][ T3419] wg_timers_any_authenticated_packet_traversal+0xd0/0x100 [ 31.396067][ T3419] wg_packet_tx_worker+0xeb/0x330 [ 31.401167][ T3419] process_scheduled_works+0x513/0xa10 [ 31.406741][ T3419] worker_thread+0x58a/0x780 [ 31.411428][ T3419] kthread+0x22a/0x280 [ 31.415550][ T3419] ret_from_fork+0x150/0x360 [ 31.420152][ T3419] ret_from_fork_asm+0x1a/0x30 [ 31.425010][ T3419] [ 31.427430][ T3419] read to 0xffff88811a935150 of 8 bytes by task 3419 on cpu 1: [ 31.435169][ T3419] __mod_timer+0x69/0x9d0 [ 31.439595][ T3419] mod_timer+0x1f/0x30 [ 31.443670][ T3419] wg_timers_any_authenticated_packet_traversal+0xd0/0x100 [ 31.450961][ T3419] wg_packet_rx_poll+0x7f5/0x10f0 [ 31.456025][ T3419] __napi_poll+0x61/0x330 [ 31.460361][ T3419] napi_threaded_poll_loop+0x1db/0x660 [ 31.465908][ T3419] napi_threaded_poll+0x193/0x240 [ 31.470938][ T3419] kthread+0x22a/0x280 [ 31.475029][ T3419] ret_from_fork+0x150/0x360 [ 31.479718][ T3419] ret_from_fork_asm+0x1a/0x30 [ 31.484495][ T3419] [ 31.486827][ T3419] value changed: 0x00000000ffff97fd -> 0x00000000ffff9801 [ 31.493927][ T3419] [ 31.496247][ T3419] Reported by Kernel Concurrency Sanitizer on: [ 31.502394][ T3419] CPU: 1 UID: 0 PID: 3419 Comm: napi/wg0-0 Not tainted syzkaller #0 PREEMPT(full) [ 31.511684][ T3419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 31.521923][ T3419] ================================================================== [ 39.261831][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 39.261848][ T28] audit: type=1400 audit(1774968966.649:111): avc: denied { read } for pid=3499 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 3126) OK Stopping crond: stopped /usr/sbin/crond (pid 3105) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 3042) Stopping network: OK Stopping iptables: [ 39.701178][ T28] audit: type=1400 audit(1774968967.079:112): avc: denied { search } for pid=3530 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 39.732714][ T28] audit: type=1400 audit(1774968967.109:113): avc: denied { search } for pid=3530 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 39.754953][ T28] audit: type=1400 audit(1774968967.109:114): avc: denied { add_name } for pid=3530 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 39.776516][ T28] audit: type=1400 audit(1774968967.109:115): avc: denied { create } for pid=3530 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Stopping system [ 39.798667][ T28] audit: type=1400 audit(1774968967.109:116): avc: denied { read open } for pid=3530 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=575 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 message bus: [ 39.823630][ T28] audit: type=1400 audit(1774968967.109:117): avc: denied { lock } for pid=3530 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=575 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 39.848446][ T28] audit: type=1400 audit(1774968967.109:118): avc: denied { unlink } for pid=3043 comm="dhcpcd" name="sock" dev="tmpfs" ino=485 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 done Stopping klogd: OK Stopping acpid: [ 40.042996][ T28] audit: type=1400 audit(1774968967.429:119): avc: denied { remove_name } for pid=2989 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 40.068290][ T28] audit: type=1400 audit(1774968967.429:120): avc: denied { unlink } for pid=2989 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping syslogd: stopped /sbin/syslogd (pid 2986) OK umount: can't remount debugfs read-only Connection to 10.128.1.126 closed by remote host. umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Sent SIGTERM to all processes