last executing test programs: 497.061038ms ago: executing program 1 (id=7077): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x5421, &(0x7f0000000080)={'nicvf0\x00', {0x2, 0x0, @private}}) 496.892967ms ago: executing program 0 (id=7078): r0 = socket$netlink(0x10, 0x3, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 430.012752ms ago: executing program 0 (id=7079): pipe2(&(0x7f0000001240)={0xffffffffffffffff}, 0x0) ioctl$SOUND_OLD_MIXER_INFO(r0, 0x541b, &(0x7f0000000000)) 429.844822ms ago: executing program 1 (id=7080): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x109200, 0x0) ioctl$XFS_IOC_ATTRMULTI_BY_HANDLE(r0, 0x4048587b, &(0x7f0000000800)={{r0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0}) 338.968898ms ago: executing program 0 (id=7081): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x20000, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x8000007fff) 338.799748ms ago: executing program 1 (id=7082): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x5450, 0x0) 228.825635ms ago: executing program 1 (id=7083): r0 = openat$smackfs_ambient(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000340)={0x28, 0x4, 0x0, {0x2, 0xfff}}, 0x28) 228.655555ms ago: executing program 0 (id=7084): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8953, &(0x7f0000000040)={'xfrm0\x00'}) 139.801531ms ago: executing program 1 (id=7085): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x101840, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x5450, 0x0) 139.654831ms ago: executing program 0 (id=7086): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) setsockopt$MRT_TABLE(r0, 0x0, 0xcf, 0x0, 0x0) 87.362084ms ago: executing program 1 (id=7087): r0 = openat$smackfs_revoke_subject(0xffffffffffffff9c, &(0x7f0000000840), 0x2, 0x0) read$proc_mixer(r0, 0x0, 0x0) 0s ago: executing program 0 (id=7088): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x5451, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:34179' (ED25519) to the list of known hosts. syzkaller login: [ 83.894047][ T3317] cgroup: Unknown subsys name 'net' [ 84.116229][ T3317] cgroup: Unknown subsys name 'cpuset' [ 84.140694][ T3317] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 84.650094][ T3317] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 92.081328][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.139071][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 92.153771][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.206589][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 93.159449][ T3322] hsr_slave_0: entered promiscuous mode [ 93.164758][ T3322] hsr_slave_1: entered promiscuous mode [ 93.404479][ T3323] hsr_slave_0: entered promiscuous mode [ 93.406792][ T3323] hsr_slave_1: entered promiscuous mode [ 93.411403][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 93.414253][ T3323] Cannot create hsr debugfs directory [ 94.304036][ T3322] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 94.329075][ T3322] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 94.346103][ T3322] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 94.378382][ T3322] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 94.628626][ T3323] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 94.659976][ T3323] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 94.680761][ T3323] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 94.708443][ T3323] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 95.592924][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.758490][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.895321][ T3322] veth0_vlan: entered promiscuous mode [ 98.952013][ T3323] veth0_vlan: entered promiscuous mode [ 98.958884][ T3322] veth1_vlan: entered promiscuous mode [ 99.012663][ T3323] veth1_vlan: entered promiscuous mode [ 99.171393][ T3322] veth0_macvtap: entered promiscuous mode [ 99.228818][ T3322] veth1_macvtap: entered promiscuous mode [ 99.251499][ T3323] veth0_macvtap: entered promiscuous mode [ 99.290070][ T3323] veth1_macvtap: entered promiscuous mode [ 99.480431][ T116] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.481289][ T116] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.481578][ T116] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.481793][ T116] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.537366][ T101] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.537833][ T101] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.538142][ T101] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.538292][ T101] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.919977][ T3323] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 99.919994][ T3322] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 111.948586][ T3804] Zero length message leads to an empty skb [ 113.511527][ T3848] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 114.920543][ T3868] syz.1.195 (3868): drop_caches: 2 [ 115.165106][ T3878] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 141.837103][ T4642] binder: 4641:4642 ioctl c018620c 20000240 returned -1 [ 147.342168][ T4781] syz.0.647 uses obsolete (PF_INET,SOCK_PACKET) [ 208.837323][ T6680] capability: warning: `syz.1.1589' uses 32-bit capabilities (legacy support in use) [ 268.025793][ T8531] capability: warning: `syz.0.2505' uses deprecated v2 capabilities in a way that may be insecure [ 269.067894][ T8567] syz.1.2522(8567): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 307.095487][ T3400] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 307.254331][ T3400] usb 1-1: Using ep0 maxpacket: 16 [ 307.301389][ T3400] usb 1-1: config 0 interface 0 altsetting 9 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 307.305501][ T3400] usb 1-1: config 0 interface 0 has no altsetting 0 [ 307.307404][ T3400] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 307.311711][ T3400] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 307.326296][ T3400] usb 1-1: config 0 descriptor?? [ 307.784798][ T3400] usbhid 1-1:0.0: can't add hid device: -71 [ 307.787578][ T3400] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 307.801077][ T3400] usb 1-1: USB disconnect, device number 2 [ 374.249872][T11962] usb usb1: usbfs: process 11962 (syz.1.4177) did not claim interface 0 before use [ 379.939133][T12152] kernel profiling enabled (shift: 9) [ 388.196495][T12410] syz.1.4398 (12410): drop_caches: 2 [ 392.358084][T12550] RDS: rds_bind could not find a transport for ::ffff:10.1.1.1, load rds_tcp or rds_rdma? [ 503.489871][T16046] misc userio: The device must be registered before sending interrupts [ 520.932108][T16599] dlm: non-version read from control device 0 [ 522.704785][T16654] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6502'. [ 540.187013][T17224] ubi31: attaching mtd0 [ 540.277165][T17224] ubi31: scanning is finished [ 540.279649][T17224] ubi31 error: ubi_read_volume_table: the layout volume was not found [ 540.336705][T17224] ubi31 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 558.404298][ T28] audit: type=1400 audit(558.220:2): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3316 comm="sshd-session" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.441044][ T28] audit: type=1400 audit(558.270:3): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3316 comm="sshd-session" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.441534][ T28] audit: type=1400 audit(558.270:4): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3316 comm="sshd-session" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.481188][ T28] audit: type=1400 audit(558.310:5): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3316 comm="sshd-session" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.494389][ T28] audit: type=1400 audit(558.320:6): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3316 comm="sshd-session" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.494880][ T28] audit: type=1400 audit(558.320:7): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3316 comm="sshd-session" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.574461][ T28] audit: type=1400 audit(558.400:8): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3316 comm="sshd-session" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.590175][ T28] audit: type=1400 audit(558.420:9): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3316 comm="sshd-session" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.590678][ T28] audit: type=1400 audit(558.420:10): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3316 comm="sshd-session" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.618004][ T28] audit: type=1400 audit(558.450:11): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 565.127412][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 565.128880][ T28] audit: type=1400 audit(564.960:17): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 568.665080][ T28] audit: type=1400 audit(568.500:18): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 572.167940][ T28] audit: type=1400 audit(572.000:19): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 580.745334][ T28] audit: type=1400 audit(580.580:20): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 586.249795][ T28] audit: type=1400 audit(586.080:21): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 592.785647][ T28] audit: type=1400 audit(592.620:22): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 604.845285][ T28] audit: type=1400 audit(604.680:23): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 613.767784][ T28] audit: type=1400 audit(613.600:24): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 616.925374][ T28] audit: type=1400 audit(616.760:25): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 629.015785][ T28] audit: type=1400 audit(628.850:26): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 641.075350][ T28] audit: type=1400 audit(640.910:27): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 653.166258][ T28] audit: type=1400 audit(653.000:28): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 665.255805][ T28] audit: type=1400 audit(665.090:29): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 668.810941][ T28] audit: type=1400 audit(668.640:30): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 677.345474][ T28] audit: type=1400 audit(677.180:31): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 689.467708][ T28] audit: type=1400 audit(689.300:32): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 701.547706][ T28] audit: type=1400 audit(701.380:33): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 713.665281][ T28] audit: type=1400 audit(713.500:34): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 725.706361][ T28] audit: type=1400 audit(725.540:35): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 737.815210][ T28] audit: type=1400 audit(737.650:36): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 749.924691][ T28] audit: type=1400 audit(749.760:37): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 762.016031][ T28] audit: type=1400 audit(761.850:38): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 774.105469][ T28] audit: type=1400 audit(773.940:39): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 781.449402][ T28] audit: type=1400 audit(781.280:40): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 786.216634][ T28] audit: type=1400 audit(786.050:41): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 798.274918][ T28] audit: type=1400 audit(798.110:42): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 810.415864][ T28] audit: type=1400 audit(810.250:43): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 822.526581][ T28] audit: type=1400 audit(822.360:44): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 834.686229][ T28] audit: type=1400 audit(834.520:45): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 846.776996][ T28] audit: type=1400 audit(846.610:46): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 858.796308][ T28] audit: type=1400 audit(858.630:47): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 870.886850][ T28] audit: type=1400 audit(870.720:48): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 882.925233][ T28] audit: type=1400 audit(882.760:49): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 895.035136][ T28] audit: type=1400 audit(894.870:50): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 904.327668][ T28] audit: type=1400 audit(904.160:51): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 907.205618][ T28] audit: type=1400 audit(907.040:52): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 919.265870][ T28] audit: type=1400 audit(919.100:53): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 931.315718][ T28] audit: type=1400 audit(931.150:54): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 943.405960][ T28] audit: type=1400 audit(943.240:55): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 955.505609][ T28] audit: type=1400 audit(955.340:56): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 967.586201][ T28] audit: type=1400 audit(967.420:57): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 979.625797][ T28] audit: type=1400 audit(979.460:58): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 991.765108][ T28] audit: type=1400 audit(991.600:59): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1003.835683][ T28] audit: type=1400 audit(1003.670:60): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1015.965873][ T28] audit: type=1400 audit(1015.800:61): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1027.208401][ T28] audit: type=1400 audit(1027.040:62): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1028.095907][ T28] audit: type=1400 audit(1027.930:63): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1040.186120][ T28] audit: type=1400 audit(1040.020:64): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1052.286642][ T28] audit: type=1400 audit(1052.120:65): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1064.377631][ T28] audit: type=1400 audit(1064.210:66): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1076.466412][ T28] audit: type=1400 audit(1076.300:67): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1088.536085][ T28] audit: type=1400 audit(1088.370:68): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1100.676504][ T28] audit: type=1400 audit(1100.510:69): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 Connection to localhost closed by remote host. [ 1112.817472][ T28] audit: type=1400 audit(1112.650:70): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0 [ 1150.088465][ T28] audit: type=1400 audit(1149.920:71): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=41918 daddr=10.0.2.15 dest=22 netif=eth0