last executing test programs: 1.813290426s ago: executing program 0 (id=1739): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, 0x0, 0x20, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x40000c0) 1.683797894s ago: executing program 0 (id=1741): r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)='2', 0x1}], 0x1) 1.075737123s ago: executing program 1 (id=1747): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x22241, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x5451) 812.12413ms ago: executing program 1 (id=1748): socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r0, 0x5451, 0x0) 725.121935ms ago: executing program 1 (id=1749): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/fs/cgroup', 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x5450, 0x0) 513.078189ms ago: executing program 1 (id=1750): r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$FS_IOC_GETFSLABEL(r0, 0x5450, 0x0) 302.770212ms ago: executing program 1 (id=1751): r0 = syz_open_dev$usbmon(&(0x7f0000000800), 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x9208, 0x0) 302.626402ms ago: executing program 0 (id=1752): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_READY(r0, 0x5450, 0x0) 184.236009ms ago: executing program 0 (id=1753): r0 = openat$smackfs_ambient(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$sysctl(r0, &(0x7f0000000400)='1\x00', 0x2) 80.682046ms ago: executing program 0 (id=1754): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r0, 0x5451, 0x0) 80.428946ms ago: executing program 1 (id=1755): r0 = memfd_create(&(0x7f0000000640)='\x00\xac=W[[\x87\x12\x04\xd5\xbc\x80K\x06\xcd]4(\xa2\xee2>\xa1\x9c\x86x\x1c\x9f\x97\x87\xd9c\xecR\xd6\xe8\xf3Y\x121p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00M\xc2N%\x93t[\xf3\xee\xa4\xb4\xfbf\x8dz7\\\x8e\xac\x18\x00\xfd\x89\xe1d\xfa\xcfb\xf3\xdc\xd4CY\x9a\xef\xa3\\\xa7\xa9^\xafL:[\x8e\x83U\xff\xfd\xb0\xfa\xdaL\xa99\x9b\xcfA\xe4n\xa0^\n\x1c\x84\x04\xc5a\xdf\xe5\xd4Hyn\xba:/\xa5\xf4\xaa\xfa\xcd\xc7T\x83\xf5N^\xf2n\xd0=\xb9\t\xdd-F\xacb\xac \xd3\xccj\x13\xa2\x9fLu\'\xed\x91\x867\xaa\xf5\xa0]\xb6\xaa\xea\xfd\xde\xa6\xec\b\x16\x86l:;\xf9\xdb\xcf\x88\"\xca\xe0E\xdb\xec\xf9\xb3\xed\a\x00\x00\x00\x00\x00\x00\x00\xd6.\xf7\x92\xc42\xdf\xefE\xce}\x1b\xda\xdd?\n6\xe1\xb1\xd8Y\x960\xd1\x00\x00\x00\x00\x00\x00MW\x8f\xc6\x82\xe4\x15\xf7\xe9\xd8\xc5b\x0e\x91\xc5\xc76$\x18\xa4\xbe\xe8V\x8d-\xe3\x8fC\xd5\xf5\xd6L\xe3\xce\xa1\x8dz\xce\xa7\xa5\xc8\xcbhM\x1b\xf8\x98\xc4\xfbD6\x88\xfd\xe5i\x8a\xd8\xcfm\x81Z\x19\xf0\xef\xc15\xe8\xcb\xf5\t\t\x00\x17\xfa\x1fqb\xe7\"\xcb4\xb8\xe5/\xd52\x17\x12\x1d\xd8\x87\xb9|\x8d\x83\xea\xcc\x94\xebZ\xae\xaf\x19\xa4\xb2\xc6\xe1\x926B\xb6\x89Z\xa9\xb5/\xbb\x9d&\xeeO\xb3\xb3\xd4\b`\xa9f\x84\xad\t\x1a\xc2\xd5\x88\xbfo\x80V\x93\x9fX\xd7\xff\x03\xb7J\xed\x183\xe3\x7f\xfaq,\xca\x06\xb0\xc9\x92\x93\xa5I\x89\xb7\x85\x90\xb7\x1b0\xce\xd7!\x8fD\x96\xe1 ^>\x9f\x04\x89<\xb7S\x7f\x1a\x88\xab$\xd3y\xc2\xe1\x99\xbch\xd3\x83\xcd\x7f\xc5n\xb1\xc1X \xe2\xbb\x1f\x01\x90\xb1O\x8d\x7f\xa8\xd4\xdbO\xef\x99\xf3\xd3M\x0f\t\x7f\n,\x84\x1f\xfa\xe2\xc8\x99\x97Oq\xae\x9b\x86h\xfa3\xb9\xfd\xbb\xd4^\xc0t\xa7]Y\xe9\x7f[\x11\xb1\xf3m\x17F\x9d\x18\xe2\xe1\x01\xb6f=-?\xbcI\xf2\xd9\xc4>-\xc0E\x9a\x82\xcc7S\xd4\xb6\'\xd2DY\xa5\x83,\xd1\xbc\xc7\xf6\xe0\x1f o\x06\xc2t\x14\xc2\xe0\x92\xc1\x8a\x85>@\xc9\xb0% \xc7\x13l\x8bJ\xe5\xec\x1dE\xf5\xc5\xe2\xe3\x10G7r#\xbc\x95&\x14\x1e\x97\xce\x83>Q@\xfb\xeb=\x1e\xb3\xd5H\x02\x86\xc6\xf3\xe1i\\\x1d\xf4\xc1\xacJC+\xc8}\x1b{\x86\x17\x00\n\"\xec\xa5x\xe6\xb1i\xeb\xb3\xb7I\x90\x9eai\xde\x01\xdc\xfeA\x05Sn\xe6\xe8^\xdf\x8c`\x17\xca\xbd\\QG\xb15\x82*=\xbd\xe9\xaf\x12<\xd7\xe1$\xa4\xdaU\xfb^\xd8!\xacxy\xd5X\xef\x03\xa7\x10\xa1C#S~\x0f\x17\t>X\\mv0\x9eZ\x89\xf4\xae\a\xc8\x16\xd2t\x16\xf3X%Q\xbd\xe9\x86V\xf2\x99^0\xe8xI(\xde-\x04s\x15\x06#2\xef\xef@\xa3t0d^^\xad\xf6\xad\xe0\x16\xf6\xa8\x99!\x0e\x9d+;D&\xebN\x94\x12\x04\x95o\xd6\x9fl\xcb\x16gc\xf5(\xaa_\xec\x9aiE\f\xd4\xc6\xf2\xae\x85n\x995\xcd\xa7\xbb\xf0pz\xaf\tC\x1cq\xaa\x92,Li\r\x95Z\x89\"\xaf]\x95\xb9b_\xe4\xba\xd4\x93\xab\xe1\xb9\xd8E[\xbb\xc9.M+\xbe\x81N\xd2\xae\xf4\x18\xd0\xe7\x98\x90,\xce\ft\xc4\xc7\x02\xaa\xc7\xeb1;\x86b\x8f\x12{k#c\x1d@\xc31\x00\xd2}f\x8cX\xce\xed\xa4\xe4\xca`<_}\'\xce\x81\xb3O\xae\xa1\xbfwcN,\xf2#\x16\xc4\xad\a&\xb1U\x83w\xd0K\xaa\xdf\x84\xe5\xe4\xdb\xa3G(\x7fv\x93\xb8m\x96\xd89Kb\xa9\x852\xb9\xcaG\x8b\x11\x16\x16\xeeI\x14\xcb\xe4\x9a\x1e\xb6^\xa3\xaa^\xdc\xcfo\xfb\xd6<\xa2\xc6\xbdj\xc4\xb1B\xf3S}\xfeI\xe2e\xec}o\xcfB\xa6\x877\'\x80\x82\t\xec\xc1&\xb8\xa9\x82&\xb8XQ8M@\xaa\x1f\vj\x9aW\xec\x92\x19\xdb^\x9d\x94\x87-&\x00/z\xa2\xd7\x01\\\t\xae~\xed\no\x1a\x9cKG^+\xc9\xe0v\xc0\x96\xc4\xcc\xb7\xdd\xdf\xf9\x01\x91\xe5\to[\x97\xbe\x110\x93\x14\xf8\x8a\x8d\xeb\t\xe7?/C\xaa\xd9\xc4\xc9\xbe\x12\xed\xb3*f\xd1J\x14\x80Iy4\xa9\xf88C\xe3', 0x0) ioctl$TUNSETOFFLOAD(r0, 0x5450, 0x0) 0s ago: executing program 0 (id=1756): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$smackfs_change_rule(r0, &(0x7f0000000bc0)={'\x00', 0x20, '', 0x20, 'rwxtl', 0x20, 'ratl'}, 0xe) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:53827' (ED25519) to the list of known hosts. syzkaller login: [ 81.984620][ T3324] cgroup: Unknown subsys name 'net' [ 82.140976][ T3324] cgroup: Unknown subsys name 'cpuset' [ 82.165314][ T3324] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 82.610347][ T3324] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 90.351010][ T3330] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.372461][ T3330] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.532276][ T3329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.552057][ T3329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.447675][ T3330] hsr_slave_0: entered promiscuous mode [ 91.454860][ T3330] hsr_slave_1: entered promiscuous mode [ 91.671868][ T3329] hsr_slave_0: entered promiscuous mode [ 91.676492][ T3329] hsr_slave_1: entered promiscuous mode [ 91.679343][ T3329] debugfs: 'hsr0' already exists in 'hsr' [ 91.679904][ T3329] Cannot create hsr debugfs directory [ 92.507178][ T3330] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 92.542362][ T3330] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 92.563060][ T3330] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 92.611353][ T3330] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 92.750530][ T3329] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 92.770782][ T3329] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 92.784413][ T3329] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 92.817478][ T3329] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 93.619725][ T3330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.778253][ T3329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.770766][ T3330] veth0_vlan: entered promiscuous mode [ 96.823421][ T3330] veth1_vlan: entered promiscuous mode [ 97.033869][ T3330] veth0_macvtap: entered promiscuous mode [ 97.098787][ T3329] veth0_vlan: entered promiscuous mode [ 97.123401][ T3330] veth1_macvtap: entered promiscuous mode [ 97.183557][ T3329] veth1_vlan: entered promiscuous mode [ 97.397018][ T14] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.399247][ T14] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.418014][ T14] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.419741][ T14] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.529640][ T3329] veth0_macvtap: entered promiscuous mode [ 97.587382][ T3329] veth1_macvtap: entered promiscuous mode [ 97.784873][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.786536][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.786702][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.786840][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.999591][ T3330] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 102.347300][ T3563] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 108.138462][ T3706] Zero length message leads to an empty skb [ 111.194640][ T3788] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 160.377946][ T5056] syz.0.779 uses obsolete (PF_INET,SOCK_PACKET) [ 205.554021][ T6268] kernel profiling enabled (shift: 9) [ 232.917791][ T6995] syz.0.1741 (6995): drop_caches: 2 [ 233.186986][ T30] audit: type=1400 audit(232.980:2): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3323 comm="sshd-session" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 233.234843][ T30] audit: type=1400 audit(233.030:3): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3323 comm="sshd-session" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 233.239052][ T30] audit: type=1400 audit(233.030:4): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3323 comm="sshd-session" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 233.243373][ T30] audit: type=1400 audit(233.030:5): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3323 comm="sshd-session" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 233.313105][ T30] audit: type=1400 audit(233.110:6): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3323 comm="sshd-session" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 233.327264][ T30] audit: type=1400 audit(233.110:7): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3323 comm="sshd-session" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 233.331925][ T30] audit: type=1400 audit(233.110:8): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3323 comm="sshd-session" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 233.403292][ T30] audit: type=1400 audit(233.200:9): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=15 comm="ksoftirqd/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 233.830932][ T30] audit: type=1400 audit(233.630:10): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=12 comm="kworker/u8:0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 234.577469][ T30] audit: type=1400 audit(234.380:11): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 239.881177][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 239.881602][ T30] audit: type=1400 audit(239.680:15): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 243.576907][ T30] audit: type=1400 audit(243.370:16): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 247.080470][ T30] audit: type=1400 audit(246.880:17): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 255.576320][ T30] audit: type=1400 audit(255.370:18): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 261.162788][ T30] audit: type=1400 audit(260.960:19): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 267.575020][ T30] audit: type=1400 audit(267.370:20): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 279.574729][ T30] audit: type=1400 audit(279.370:21): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 288.679895][ T30] audit: type=1400 audit(288.480:22): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 291.590693][ T30] audit: type=1400 audit(291.390:23): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 303.589478][ T30] audit: type=1400 audit(303.390:24): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 315.589337][ T30] audit: type=1400 audit(315.390:25): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 327.587687][ T30] audit: type=1400 audit(327.390:26): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 339.587880][ T30] audit: type=1400 audit(339.390:27): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 346.288114][ T30] audit: type=1400 audit(346.090:28): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=15 comm="ksoftirqd/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 351.586608][ T30] audit: type=1400 audit(351.380:29): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 363.586079][ T30] audit: type=1400 audit(363.380:30): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 375.586053][ T30] audit: type=1400 audit(375.380:31): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 387.584619][ T30] audit: type=1400 audit(387.380:32): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 399.586647][ T30] audit: type=1400 audit(399.380:33): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 411.582587][ T30] audit: type=1400 audit(411.380:34): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 423.582059][ T30] audit: type=1400 audit(423.380:35): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 435.581555][ T30] audit: type=1400 audit(435.380:36): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 447.580439][ T30] audit: type=1400 audit(447.380:37): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 458.920746][ T30] audit: type=1400 audit(458.720:38): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 459.579697][ T30] audit: type=1400 audit(459.380:39): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 471.579305][ T30] audit: type=1400 audit(471.380:40): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 483.577380][ T30] audit: type=1400 audit(483.380:41): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 495.577712][ T30] audit: type=1400 audit(495.380:42): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 507.577114][ T30] audit: type=1400 audit(507.380:43): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 519.576848][ T30] audit: type=1400 audit(519.380:44): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 531.574726][ T30] audit: type=1400 audit(531.370:45): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 543.574336][ T30] audit: type=1400 audit(543.370:46): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 555.574153][ T30] audit: type=1400 audit(555.370:47): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 567.573007][ T30] audit: type=1400 audit(567.370:48): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 579.573211][ T30] audit: type=1400 audit(579.370:49): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 581.801537][ T30] audit: type=1400 audit(581.600:50): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=15 comm="ksoftirqd/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 591.571027][ T30] audit: type=1400 audit(591.370:51): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 603.571505][ T30] audit: type=1400 audit(603.370:52): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 615.570404][ T30] audit: type=1400 audit(615.370:53): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 627.568381][ T30] audit: type=1400 audit(627.370:54): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 639.568827][ T30] audit: type=1400 audit(639.370:55): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 651.567486][ T30] audit: type=1400 audit(651.370:56): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 663.566806][ T30] audit: type=1400 audit(663.370:57): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 675.566376][ T30] audit: type=1400 audit(675.360:58): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 687.565171][ T30] audit: type=1400 audit(687.360:59): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 699.566293][ T30] audit: type=1400 audit(699.360:60): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 704.680419][ T30] audit: type=1400 audit(704.480:61): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 711.564085][ T30] audit: type=1400 audit(711.360:62): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 723.563635][ T30] audit: type=1400 audit(723.360:63): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 735.562687][ T30] audit: type=1400 audit(735.360:64): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 747.563325][ T30] audit: type=1400 audit(747.360:65): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 759.561996][ T30] audit: type=1400 audit(759.360:66): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 771.561036][ T30] audit: type=1400 audit(771.360:67): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=64 comm="kworker/u8:3" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 Connection to localhost closed by remote host. [ 783.559063][ T30] audit: type=1400 audit(783.360:68): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0 [ 827.559544][ T30] audit: type=1400 audit(827.360:69): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=37460 daddr=10.0.2.15 dest=22 netif=eth0