last executing test programs: 18.960289855s ago: executing program 1 (id=2): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newlink={0x44, 0x10, 0xffffffffffffffff, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x1414, 0x2021}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MTU={0x8, 0x4, 0xbdb}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x8000002) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000380), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1234}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) 15.444683757s ago: executing program 1 (id=4): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xd1e2, 0x47fffffff}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x18) r1 = timerfd_create(0x7, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000001000)=@abs={0x0, 0x0, 0xce27}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001040)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x12, 0x600, 0x1c0, 0x202, 0x290, 0x2e8, 0x2e8, 0x290, 0x2c0, 0x4, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x190, 0x1c0, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "0000000000000019b5115c2aee68d23a465cd431e150c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baeb8989f1f34a214e6726401fe4b124e0f7323a587d2a1fcf07000000eca0a7b66c60c527bac2b500", 0x2}}, @common=@inet=@socket2={{0x28}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x20, r6, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x20}}, 0x0) 5.455128934s ago: executing program 0 (id=11): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008040000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000001500)='./bus\x00', 0x101) 4.919088011s ago: executing program 0 (id=12): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r3 = syz_io_uring_setup(0x499, &(0x7f0000000400)={0x0, 0xd144, 0x0, 0xffffffff, 0x289}, &(0x7f00000001c0)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r2, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}}) io_uring_enter(r3, 0x3516, 0xddd6, 0x4, 0x0, 0x0) 3.700277955s ago: executing program 0 (id=13): r0 = memfd_create(&(0x7f0000000480)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\x03\x00\x00\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10`\xee\xa9\x8b\x06%\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xa96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xd9Jx\xaa\x8f~\xb94a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xcaX\xe3\xd6m\xf7@]iNP\xf1\x1d\xab\x13\xce\x152s\xb8\x85\x98\x84\xbf\x8c\x80{\x16\t\xd6\x17P3\xe9\xebGKL\xd3\x88\xd2\xb1\rLG\x8e\xd6\xa72\xf4\x92\xeb&\xa5\xcc\x14FZN\x98%[p\x989\xf6\xf5\xb6\xedP\xff\xff\xff\xff\xff\xff\xff\xef)\x0f6\x88\x03P\x8ak\xf9\xc9\x82`\xb4Ku\x99\xab\xd4\xb2\xaa1\x99O\x8b\x9b-\xe3\xe6R\xa2T\x1e\n!\xad$\x93c\xd3\"\xd6\xa1\xd6\xfc\v\x81\x9e\xc1\xb3T\n\xd9\xff\x18 \xf8\xc4\xef\xd2\xb0\xf8\x80\xb8\x1e\xb7fo\x1c\a\xc9\x1a!D\xde\xc6\xf1\x13\xc2F\xc44A\x1d\xb7\xe6\xfbB\xee4\xa1\xdf+\xa5\xb1\xc2\xfb\xc0\t\x15\x7fA{\xe0\xc7\xe0\x96\xc9\xe6\x8fk\xe6\x87;\x03\xff\xb0\x10\x10\x1e\x14\x99\xc7\xd5)\x8d\xc7\xf0\xfd\xe9d\xc9\xce\x85\x88\x88\xcd\xf6\xb2\xbf\xf8E\xe4\xd8\xd0\xe00\xbd\xc2M\xe7\x1b\xac\xc0\v\xb0\xfc\"\x12\x8d\xa5\x96\x10\xf3\x82~2\xa3[\xa4w]\n\xb1+\xac\bR&B\xebW0\xe2\xffBO9y\x8e\xb6\x03\x99\r', 0x3) r1 = dup(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000c00)=ANY=[@ANYBLOB="7f454c4606ff78a3050000000000000002003e00cd220000c9030000000000004000000000000000ea02000000000000020001000500380001000600b10600040300000081000000ff000000000000000900000000000000070000000000000009"], 0x178) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 2.46735864s ago: executing program 0 (id=14): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8e}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) setresuid(0x0, 0xee00, 0xffffffffffffffff) r2 = io_uring_setup(0xaae, &(0x7f0000000080)={0x0, 0xffffeffa, 0x800, 0x7, 0x2}) setrlimit(0x40000000000008, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 604.395914ms ago: executing program 0 (id=15): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000008c0), 0xfffffffe, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r0, &(0x7f0000001ec0)="da28d10cc47a483f9e9aab8ae23799be13f7cb0f32ee2cc1481b68744192c3bf32279ef5b6c4fd78570114d7df32f97e1a304e22a25ea2a35992955dce4197a98cac4b5fd856bef714248cbb2b1437a365d163dcdea03157bd56376def0d6326bb587d", &(0x7f00000005c0)=""/31}, 0x20) 0s ago: executing program 0 (id=16): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) close(0xffffffffffffffff) syz_io_uring_setup(0x497, &(0x7f0000000300)={0x0, 0x4665, 0x800, 0x5, 0x20e}, &(0x7f0000000240)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000100)=0x1800, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r2) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r4, r5, 0x1f, 0x0, @val=@netfilter={0x2, 0x0, 0xe0}}, 0x20) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @loopback}, 0x1c) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:22855' (ED25519) to the list of known hosts. [ 239.001897][ T30] audit: type=1400 audit(238.550:46): avc: denied { name_bind } for pid=3320 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 239.382258][ T30] audit: type=1400 audit(238.930:47): avc: denied { execute } for pid=3321 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 239.388128][ T30] audit: type=1400 audit(238.940:48): avc: denied { execute_no_trans } for pid=3321 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 245.504278][ T30] audit: type=1400 audit(245.050:49): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 245.570801][ T30] audit: type=1400 audit(245.120:50): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 245.611033][ T3321] cgroup: Unknown subsys name 'net' [ 245.666891][ T30] audit: type=1400 audit(245.220:51): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 245.946596][ T3321] cgroup: Unknown subsys name 'cpuset' [ 246.011078][ T3321] cgroup: Unknown subsys name 'rlimit' [ 246.298234][ T30] audit: type=1400 audit(245.850:52): avc: denied { setattr } for pid=3321 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 246.303277][ T30] audit: type=1400 audit(245.850:53): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 246.310347][ T30] audit: type=1400 audit(245.860:54): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 246.734859][ T3323] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 246.742201][ T30] audit: type=1400 audit(246.290:55): avc: denied { relabelto } for pid=3323 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 246.750508][ T30] audit: type=1400 audit(246.300:56): avc: denied { write } for pid=3323 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 246.841859][ T30] audit: type=1400 audit(246.390:57): avc: denied { read } for pid=3321 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 246.850005][ T30] audit: type=1400 audit(246.400:58): avc: denied { open } for pid=3321 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 246.875803][ T3321] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 263.311960][ T30] audit: type=1400 audit(262.860:59): avc: denied { execmem } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 263.436153][ T30] audit: type=1400 audit(262.980:60): avc: denied { read } for pid=3326 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 263.440939][ T30] audit: type=1400 audit(262.990:61): avc: denied { open } for pid=3326 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 263.493163][ T30] audit: type=1400 audit(263.040:62): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 263.596439][ T30] audit: type=1400 audit(263.140:64): avc: denied { module_request } for pid=3326 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 263.601261][ T30] audit: type=1400 audit(263.140:63): avc: denied { module_request } for pid=3327 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 263.928749][ T30] audit: type=1400 audit(263.480:65): avc: denied { sys_module } for pid=3327 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 273.325040][ T3327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 273.376284][ T3327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 274.051952][ T3326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.092837][ T3326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 277.155742][ T3327] hsr_slave_0: entered promiscuous mode [ 277.171821][ T3327] hsr_slave_1: entered promiscuous mode [ 278.186822][ T3326] hsr_slave_0: entered promiscuous mode [ 278.198696][ T3326] hsr_slave_1: entered promiscuous mode [ 278.207977][ T3326] debugfs: 'hsr0' already exists in 'hsr' [ 278.211452][ T3326] Cannot create hsr debugfs directory [ 280.545128][ T30] audit: type=1400 audit(280.090:66): avc: denied { create } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 280.558585][ T30] audit: type=1400 audit(280.100:67): avc: denied { write } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 280.559183][ T30] audit: type=1400 audit(280.110:68): avc: denied { read } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 280.585899][ T3327] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 280.747687][ T3327] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 280.801531][ T3327] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 280.855589][ T3327] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 281.416921][ T3326] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 281.460928][ T3326] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 281.512609][ T3326] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 281.569419][ T3326] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 284.111574][ T3327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.650743][ T3326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 297.622907][ T3327] veth0_vlan: entered promiscuous mode [ 297.779623][ T3327] veth1_vlan: entered promiscuous mode [ 298.161594][ T3327] veth0_macvtap: entered promiscuous mode [ 298.240951][ T3327] veth1_macvtap: entered promiscuous mode [ 298.538656][ T3326] veth0_vlan: entered promiscuous mode [ 298.871052][ T3326] veth1_vlan: entered promiscuous mode [ 298.896511][ T1581] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.901441][ T1581] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.938704][ T1581] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.939920][ T1581] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.788912][ T30] audit: type=1400 audit(299.330:69): avc: denied { mount } for pid=3327 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 299.829710][ T30] audit: type=1400 audit(299.380:70): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/syzkaller.FbQpgw/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 299.852191][ T30] audit: type=1400 audit(299.400:71): avc: denied { mount } for pid=3327 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 299.910907][ T30] audit: type=1400 audit(299.460:72): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/syzkaller.FbQpgw/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 299.931804][ T30] audit: type=1400 audit(299.480:73): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/syzkaller.FbQpgw/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 300.005569][ T30] audit: type=1400 audit(299.550:74): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 300.052514][ T30] audit: type=1400 audit(299.600:75): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 300.068860][ T3326] veth0_macvtap: entered promiscuous mode [ 300.086618][ T30] audit: type=1400 audit(299.640:76): avc: denied { mount } for pid=3327 comm="syz-executor" name="/" dev="gadgetfs" ino=4154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 300.155204][ T30] audit: type=1400 audit(299.700:77): avc: denied { mount } for pid=3327 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 300.162221][ T30] audit: type=1400 audit(299.710:78): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 300.176929][ T3326] veth1_macvtap: entered promiscuous mode [ 300.449239][ T3327] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 300.480188][ T1581] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.480801][ T1581] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.480972][ T1581] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.481162][ T1581] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 308.708425][ T3488] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 310.551020][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 310.551621][ T30] audit: type=1400 audit(310.100:88): avc: denied { create } for pid=3491 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 310.594400][ T30] audit: type=1400 audit(310.140:89): avc: denied { setopt } for pid=3491 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 310.617245][ T30] audit: type=1400 audit(310.170:90): avc: denied { bind } for pid=3491 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 312.658899][ T30] audit: type=1400 audit(312.210:91): avc: denied { create } for pid=3498 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 312.688441][ T30] audit: type=1400 audit(312.240:92): avc: denied { ioctl } for pid=3498 comm="syz.0.8" path="socket:[3934]" dev="sockfs" ino=3934 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 313.178791][ T30] audit: type=1326 audit(312.730:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9b55b9e8 code=0x7ffc0000 [ 313.181683][ T30] audit: type=1326 audit(312.730:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9b55b9e8 code=0x7ffc0000 [ 313.188923][ T30] audit: type=1326 audit(312.730:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=25 compat=0 ip=0xffff9b55b9e8 code=0x7ffc0000 [ 313.202902][ T30] audit: type=1326 audit(312.750:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9b55b9e8 code=0x7ffc0000 [ 313.225181][ T30] audit: type=1326 audit(312.760:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9b55b9e8 code=0x7ffc0000 [ 316.875709][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 316.876724][ T30] audit: type=1400 audit(316.420:107): avc: denied { execute } for pid=3508 comm="syz.0.13" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 316.908148][ T3509] process 'syz.0.13' launched '/dev/fd/4' with NULL argv: empty string added [ 316.935770][ T30] audit: type=1400 audit(316.460:108): avc: denied { execute_no_trans } for pid=3508 comm="syz.0.13" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 320.236869][ T30] audit: type=1400 audit(319.790:109): avc: denied { bind } for pid=3514 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 320.269743][ T30] audit: type=1400 audit(319.820:110): avc: denied { setopt } for pid=3514 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 320.783004][ C1] ------------[ cut here ]------------ [ 320.783553][ C1] WARNING: CPU: 1 PID: 1581 at net/mptcp/subflow.c:1519 subflow_data_ready+0x368/0x614 [ 320.788493][ C1] Modules linked in: [ 320.790115][ C1] CPU: 1 UID: 0 PID: 1581 Comm: kworker/u8:7 Not tainted syzkaller #0 PREEMPT [ 320.790879][ C1] Hardware name: linux,dummy-virt (DT) [ 320.791557][ C1] Workqueue: krdsd rds_tcp_accept_worker [ 320.792320][ C1] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 320.792749][ C1] pc : subflow_data_ready+0x368/0x614 [ 320.793065][ C1] lr : subflow_data_ready+0x330/0x614 [ 320.793374][ C1] sp : ffff80008d6c7010 [ 320.793715][ C1] x29: ffff80008d6c7010 x28: ffff000014d0ec00 x27: ffff000019391010 [ 320.794471][ C1] x26: 1fffe0000327220b x25: 0000000000000000 x24: ffff00001efdec00 [ 320.795097][ C1] x23: ffff80008723df70 x22: 000000000000000b x21: 0000000000000001 [ 320.795696][ C1] x20: ffff000021300000 x19: ffff000014d0ec00 x18: 0000000000000004 [ 320.796328][ C1] x17: 1fffe000025836f2 x16: ffff00000e988000 x15: ffff000019390fe8 [ 320.796903][ C1] x14: 0000000000014523 x13: 0000000000000007 x12: ffff6000029a1d83 [ 320.797483][ C1] x11: 1fffe000029a1d82 x10: ffff6000029a1d82 x9 : dfff800000000000 [ 320.798146][ C1] x8 : ffff000014d0ec12 x7 : 0000000000000001 x6 : ffff6000029a1d82 [ 320.798723][ C1] x5 : ffff000014d0ec12 x4 : ffff6000029a1d83 x3 : 1fffe00004260074 [ 320.799348][ C1] x2 : 1fffe00003dfbd8c x1 : 0000000000000000 x0 : 0000000000000041 [ 320.800141][ C1] Call trace: [ 320.800691][ C1] subflow_data_ready+0x368/0x614 (P) [ 320.801250][ C1] tcp_data_ready+0xd4/0x3d0 [ 320.801637][ C1] tcp_data_queue+0x166c/0x4524 [ 320.801985][ C1] tcp_rcv_state_process+0xa5c/0x5274 [ 320.802347][ C1] tcp_v6_do_rcv+0x734/0x12b0 [ 320.802696][ C1] tcp_v6_rcv+0x1ccc/0x3388 [ 320.803067][ C1] ip6_protocol_deliver_rcu+0x158/0x1464 [ 320.803447][ C1] ip6_input_finish+0x164/0x3e0 [ 320.803914][ C1] ip6_input+0x11c/0x410 [ 320.804236][ C1] ipv6_rcv+0x3bc/0x49c [ 320.804574][ C1] __netif_receive_skb_one_core+0xf4/0x168 [ 320.805049][ C1] __netif_receive_skb+0x24/0x14c [ 320.805416][ C1] process_backlog+0x380/0x1584 [ 320.805754][ C1] __napi_poll.constprop.0+0x94/0x3d8 [ 320.806116][ C1] net_rx_action+0x770/0xac8 [ 320.806461][ C1] handle_softirqs+0x2d8/0xdb4 [ 320.806799][ C1] __do_softirq+0x14/0x20 [ 320.807214][ C1] ____do_softirq+0x10/0x1c [ 320.807553][ C1] call_on_irq_stack+0x30/0x48 [ 320.807904][ C1] do_softirq_own_stack+0x1c/0x2c [ 320.808250][ C1] do_softirq+0x12c/0x150 [ 320.808575][ C1] __local_bh_enable_ip+0x414/0x4a4 [ 320.808912][ C1] __dev_queue_xmit+0x858/0x3144 [ 320.809251][ C1] ip6_finish_output2+0xcb8/0x2584 [ 320.809593][ C1] ip6_finish_output+0x698/0xbb0 [ 320.809917][ C1] ip6_output+0x1ec/0x7fc [ 320.810219][ C1] ip6_xmit+0xb2c/0x1d3c [ 320.810541][ C1] inet6_csk_xmit+0x2d0/0x520 [ 320.810878][ C1] __tcp_transmit_skb+0x13d4/0x3cf8 [ 320.811270][ C1] tcp_write_xmit+0x131c/0x7f04 [ 320.811613][ C1] __tcp_push_pending_frames+0x88/0x2a4 [ 320.811961][ C1] tcp_send_fin+0x104/0xc3c [ 320.812287][ C1] __tcp_close+0x970/0xf40 [ 320.812610][ C1] tcp_close+0x2c/0x10c [ 320.812918][ C1] inet_release+0xd4/0x1d0 [ 320.813277][ C1] inet6_release+0x4c/0x6c [ 320.813674][ C1] sock_release+0x7c/0x170 [ 320.814024][ C1] rds_tcp_accept_one+0x24c/0x7f8 [ 320.814380][ C1] rds_tcp_accept_worker+0x50/0x74 [ 320.814809][ C1] process_one_work+0x7cc/0x18d4 [ 320.815200][ C1] worker_thread+0x734/0xb84 [ 320.815530][ C1] kthread+0x348/0x5fc [ 320.815878][ C1] ret_from_fork+0x10/0x20 [ 320.816531][ C1] irq event stamp: 182489 [ 320.816858][ C1] hardirqs last enabled at (182488): [] __local_bh_enable_ip+0x180/0x4a4 [ 320.817366][ C1] hardirqs last disabled at (182489): [] el1_brk64+0x20/0x54 [ 320.817842][ C1] softirqs last enabled at (182442): [] __dev_queue_xmit+0x838/0x3144 [ 320.818349][ C1] softirqs last disabled at (182443): [] __do_softirq+0x14/0x20 [ 320.818964][ C1] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 322.623333][ T1159] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.890149][ T1159] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.202804][ T1159] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.566351][ T1159] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 325.096734][ T30] audit: type=1400 audit(324.640:111): avc: denied { read } for pid=3171 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 327.519288][ T1159] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 327.598596][ T1159] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 327.669587][ T1159] bond0 (unregistering): Released all slaves [ 328.109518][ T1159] hsr_slave_0: left promiscuous mode [ 328.138990][ T1159] hsr_slave_1: left promiscuous mode [ 328.322353][ T1159] veth1_macvtap: left promiscuous mode [ 328.336503][ T1159] veth0_macvtap: left promiscuous mode [ 328.340203][ T1159] veth1_vlan: left promiscuous mode [ 328.344528][ T1159] veth0_vlan: left promiscuous mode