last executing test programs: 756.76338ms ago: executing program 1 (id=280): socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_MPATH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 656.899799ms ago: executing program 0 (id=281): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001ec0)={&(0x7f0000001e40)={0x14, 0x4, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x6}}, 0x14}, 0x1, 0x0, 0x0, 0x4000840}, 0x4000) 656.774279ms ago: executing program 1 (id=282): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5451, 0x0) 498.743774ms ago: executing program 0 (id=283): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000100)=""/196, &(0x7f0000000200)=0xc4) 498.638074ms ago: executing program 1 (id=284): r0 = socket(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 375.376136ms ago: executing program 0 (id=285): r0 = socket$rds(0x15, 0x5, 0x0) getsockname$l2tp(r0, 0x0, &(0x7f0000000180)) 287.866593ms ago: executing program 1 (id=286): r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$eventfd(r0, 0x0, 0x0) 286.552133ms ago: executing program 0 (id=287): r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001540), 0x80, 0x0) ioctl$BINDER_CTL_ADD(r0, 0xc1086201, 0x0) 206.538061ms ago: executing program 1 (id=288): r0 = openat$smackfs_ambient(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$sysctl(r0, &(0x7f0000000400)='1\x00', 0x2) 136.986507ms ago: executing program 0 (id=289): r0 = openat$smackfs_access(0xffffffffffffff9c, &(0x7f0000000200)='/sys/fs/smackfs/access2\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5450, 0x0) 28.078357ms ago: executing program 1 (id=290): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000840)={0x14}, 0x14}}, 0x0) 0s ago: executing program 0 (id=291): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='\x00', 0x1800) mmap$usbfs(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x32, r0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:27321' (ED25519) to the list of known hosts. syzkaller login: [ 74.413761][ T3328] cgroup: Unknown subsys name 'net' [ 74.539420][ T3328] cgroup: Unknown subsys name 'cpuset' [ 74.550713][ T3328] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 74.957934][ T3328] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 85.918394][ T3336] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.002163][ T3336] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.053477][ T3335] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.107461][ T3335] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.719657][ T3336] hsr_slave_0: entered promiscuous mode [ 86.724870][ T3336] hsr_slave_1: entered promiscuous mode [ 87.119651][ T3335] hsr_slave_0: entered promiscuous mode [ 87.123104][ T3335] hsr_slave_1: entered promiscuous mode [ 87.127818][ T3335] debugfs: 'hsr0' already exists in 'hsr' [ 87.128452][ T3335] Cannot create hsr debugfs directory [ 87.700528][ T3336] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 87.713041][ T3336] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 87.737426][ T3336] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 87.747514][ T3336] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 87.757015][ T3336] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 87.768276][ T3336] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 87.771191][ T3336] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 87.782911][ T3336] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 87.941021][ T3335] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 87.960194][ T3335] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 87.967898][ T3335] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 87.983589][ T3335] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 87.992621][ T3335] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 88.009861][ T3335] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 88.014438][ T3335] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 88.026321][ T3335] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 88.499655][ T3336] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.701507][ T3335] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.312426][ T3336] veth0_vlan: entered promiscuous mode [ 91.340632][ T3336] veth1_vlan: entered promiscuous mode [ 91.444550][ T3336] veth0_macvtap: entered promiscuous mode [ 91.469504][ T3336] veth1_macvtap: entered promiscuous mode [ 91.642263][ T1248] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.646633][ T1248] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.651712][ T1248] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.657746][ T1248] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.837724][ T3335] veth0_vlan: entered promiscuous mode [ 91.893253][ T3335] veth1_vlan: entered promiscuous mode [ 92.050447][ T3335] veth0_macvtap: entered promiscuous mode [ 92.084821][ T3335] veth1_macvtap: entered promiscuous mode [ 92.160204][ T3336] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 92.250685][ T980] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.251056][ T980] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.253083][ T980] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.253228][ T980] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.682027][ T3592] ptrace attach of "/syz-executor exec"[3593] was attempted by "/syz-executor exec"[3592] [ 102.029516][ T3754] Zero length message leads to an empty skb [ 112.006527][ T28] audit: type=1400 audit(111.850:2): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3482 comm="udevd" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 112.064007][ T28] audit: type=1400 audit(111.910:3): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3482 comm="udevd" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 112.064465][ T28] audit: type=1400 audit(111.910:4): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3482 comm="udevd" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 112.066529][ T28] audit: type=1400 audit(111.920:5): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=28 comm="kauditd" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 112.090660][ T28] audit: type=1400 audit(111.940:6): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3482 comm="udevd" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 112.093121][ T28] audit: type=1400 audit(111.940:7): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3482 comm="udevd" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 112.207616][ T28] audit: type=1400 audit(112.060:8): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=4067 comm="syz.0.291" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 112.226432][ T28] audit: type=1400 audit(112.070:9): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=4067 comm="syz.0.291" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 112.648739][ T28] audit: type=1400 audit(112.500:10): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=3482 comm="udevd" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 113.116505][ T28] audit: type=1400 audit(112.970:11): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 118.698090][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 118.698553][ T28] audit: type=1400 audit(118.550:15): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 122.156500][ T28] audit: type=1400 audit(122.010:16): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 126.059159][ T28] audit: type=1400 audit(125.910:17): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 134.226853][ T28] audit: type=1400 audit(134.080:18): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 140.137896][ T28] audit: type=1400 audit(139.990:19): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 146.266164][ T28] audit: type=1400 audit(146.120:20): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 158.286227][ T28] audit: type=1400 audit(158.140:21): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 167.659845][ T28] audit: type=1400 audit(167.510:22): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 170.376762][ T28] audit: type=1400 audit(170.230:23): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 182.436653][ T28] audit: type=1400 audit(182.290:24): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 194.666837][ T28] audit: type=1400 audit(194.520:25): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 206.866620][ T28] audit: type=1400 audit(206.720:26): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 219.006949][ T28] audit: type=1400 audit(218.860:27): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 223.348594][ T28] audit: type=1400 audit(223.200:28): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 231.136782][ T28] audit: type=1400 audit(230.990:29): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 243.266666][ T28] audit: type=1400 audit(243.120:30): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 255.336395][ T28] audit: type=1400 audit(255.190:31): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 267.446994][ T28] audit: type=1400 audit(267.300:32): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 279.566677][ T28] audit: type=1400 audit(279.420:33): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 291.706866][ T28] audit: type=1400 audit(291.560:34): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 303.796572][ T28] audit: type=1400 audit(303.650:35): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 315.956793][ T28] audit: type=1400 audit(315.810:36): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 328.126834][ T28] audit: type=1400 audit(327.980:37): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 335.981614][ T28] audit: type=1400 audit(335.830:38): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 340.266728][ T28] audit: type=1400 audit(340.120:39): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 352.307730][ T28] audit: type=1400 audit(352.160:40): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 364.446782][ T28] audit: type=1400 audit(364.300:41): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 376.557281][ T28] audit: type=1400 audit(376.410:42): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 388.626505][ T28] audit: type=1400 audit(388.480:43): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 400.667105][ T28] audit: type=1400 audit(400.520:44): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 412.766423][ T28] audit: type=1400 audit(412.620:45): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 424.906728][ T28] audit: type=1400 audit(424.760:46): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 437.026163][ T28] audit: type=1400 audit(436.880:47): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 449.176587][ T28] audit: type=1400 audit(449.030:48): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 458.858711][ T28] audit: type=1400 audit(458.710:49): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 461.296383][ T28] audit: type=1400 audit(461.150:50): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 473.406516][ T28] audit: type=1400 audit(473.260:51): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 485.526714][ T28] audit: type=1400 audit(485.380:52): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 497.626516][ T28] audit: type=1400 audit(497.480:53): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 509.786364][ T28] audit: type=1400 audit(509.640:54): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 521.866654][ T28] audit: type=1400 audit(521.720:55): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 533.977522][ T28] audit: type=1400 audit(533.830:56): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 546.127088][ T28] audit: type=1400 audit(545.980:57): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.226499][ T28] audit: type=1400 audit(558.080:58): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 570.377692][ T28] audit: type=1400 audit(570.230:59): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 581.738317][ T28] audit: type=1400 audit(581.590:60): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 582.476436][ T28] audit: type=1400 audit(582.330:61): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 594.537745][ T28] audit: type=1400 audit(594.390:62): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 606.717840][ T28] audit: type=1400 audit(606.570:63): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 618.957467][ T28] audit: type=1400 audit(618.810:64): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 631.137831][ T28] audit: type=1400 audit(630.990:65): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 643.477294][ T28] audit: type=1400 audit(643.330:66): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 655.607624][ T28] audit: type=1400 audit(655.460:67): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 Connection to localhost closed by remote host. [ 667.738435][ T28] audit: type=1400 audit(667.590:68): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0 [ 704.618766][ T28] audit: type=1400 audit(704.470:69): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="1" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40168 daddr=10.0.2.15 dest=22 netif=eth0