last executing test programs: 530.073076ms ago: executing program 0 (id=4540): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0xb, 0x0, 0x0) 529.889207ms ago: executing program 1 (id=4541): r0 = syz_open_procfs$userns(0x0, &(0x7f000000bc80)) ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) 450.484196ms ago: executing program 0 (id=4542): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x5451, 0x0) 381.436024ms ago: executing program 1 (id=4543): r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000c40)={0x14, 0x0, 0x52d, 0x70bd29, 0x25dfdbfc}, 0x14}}, 0x200000d0) 360.254877ms ago: executing program 0 (id=4544): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000002dc0)={0x0, 0x0, &(0x7f0000002d80)={&(0x7f0000002d40)={0x14, 0xd, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 289.646375ms ago: executing program 1 (id=4545): r0 = openat$ttyprintk(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000100)) 221.786073ms ago: executing program 1 (id=4546): r0 = openat$smackfs_ambient(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000340)={0x28, 0x4, 0x0, {0x2, 0xfff}}, 0x28) 221.643324ms ago: executing program 0 (id=4547): r0 = socket$unix(0x1, 0x1, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5451, 0x0) 110.038677ms ago: executing program 1 (id=4548): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0x5451, 0x0) 109.880537ms ago: executing program 0 (id=4549): r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x8903, &(0x7f0000000000)) 47.616955ms ago: executing program 1 (id=4550): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000006fc0)={&(0x7f0000006f80)={0x20, 0x0, 0x4, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x5, 0x14}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004010) 0s ago: executing program 0 (id=4551): r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) pwritev2(r0, &(0x7f0000002440), 0x0, 0x3, 0x101, 0x4f5a66065047719d) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:2129' (ED25519) to the list of known hosts. syzkaller login: [ 75.868504][ T3329] cgroup: Unknown subsys name 'net' [ 76.034977][ T3329] cgroup: Unknown subsys name 'cpuset' [ 76.052308][ T3329] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 76.529882][ T3329] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 83.083025][ T3335] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.100358][ T3335] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.267591][ T3334] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.278627][ T3334] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.909573][ T3335] hsr_slave_0: entered promiscuous mode [ 83.916554][ T3335] hsr_slave_1: entered promiscuous mode [ 84.155070][ T3334] hsr_slave_0: entered promiscuous mode [ 84.161236][ T3334] hsr_slave_1: entered promiscuous mode [ 84.166464][ T3334] debugfs: 'hsr0' already exists in 'hsr' [ 84.167255][ T3334] Cannot create hsr debugfs directory [ 84.947979][ T3335] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 84.970681][ T3335] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 84.978431][ T3335] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 84.992965][ T3335] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 84.997836][ T3335] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 85.012024][ T3335] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 85.017253][ T3335] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 85.031741][ T3335] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 85.201481][ T3334] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 85.221905][ T3334] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 85.228597][ T3334] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 85.248234][ T3334] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 85.256028][ T3334] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 85.273870][ T3334] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 85.281022][ T3334] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 85.306853][ T3334] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 85.994853][ T3335] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.108823][ T3334] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.281033][ T3335] veth0_vlan: entered promiscuous mode [ 89.295026][ T3334] veth0_vlan: entered promiscuous mode [ 89.330669][ T3334] veth1_vlan: entered promiscuous mode [ 89.363488][ T3335] veth1_vlan: entered promiscuous mode [ 89.505666][ T3335] veth0_macvtap: entered promiscuous mode [ 89.557317][ T3335] veth1_macvtap: entered promiscuous mode [ 89.580322][ T3334] veth0_macvtap: entered promiscuous mode [ 89.614591][ T3334] veth1_macvtap: entered promiscuous mode [ 89.781829][ T102] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.804653][ T102] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.805070][ T102] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.805233][ T102] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.907829][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.908252][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.908407][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.908532][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.213352][ T3335] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 93.138369][ T3547] Zero length message leads to an empty skb [ 94.952217][ T3481] udevd[3481]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 95.047968][ T3481] udevd[3481]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 109.400473][ T4116] syz.0.316 uses obsolete (PF_INET,SOCK_PACKET) [ 112.806998][ T4248] [U] ^@ [ 136.181438][ T5032] syz.1.768 (5032): drop_caches: 0 [ 140.381310][ T5165] pimreg: entered allmulticast mode [ 179.143702][ T6458] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 179.156928][ T6458] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 224.489588][ T8539] pimreg: left allmulticast mode [ 235.996935][ T8946] random: crng reseeded on system resumption [ 236.490852][ T8968] syz.0.2714 (8968): drop_caches: 0 [ 284.869405][T10664] kernel profiling enabled (shift: 2) [ 295.096503][T10993] capability: warning: `syz.1.3712' uses 32-bit capabilities (legacy support in use) [ 321.218804][T11809] syz.1.4113: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 321.232749][T11809] CPU: 1 UID: 0 PID: 11809 Comm: syz.1.4113 Not tainted syzkaller #0 PREEMPT [ 321.233216][T11809] Hardware name: linux,dummy-virt (DT) [ 321.234764][T11809] Call trace: [ 321.235160][T11809] show_stack+0x18/0x24 (C) [ 321.236086][T11809] dump_stack_lvl+0x60/0x80 [ 321.236168][T11809] dump_stack+0x18/0x24 [ 321.236245][T11809] warn_alloc+0x130/0x1bc [ 321.236328][T11809] __vmalloc_node_range_noprof+0x97c/0x9a0 [ 321.236402][T11809] vmalloc_user_noprof+0x98/0xa8 [ 321.236472][T11809] xskq_create+0x64/0xa0 [ 321.236565][T11809] xsk_setsockopt+0x1fc/0x334 [ 321.236640][T11809] do_sock_setsockopt+0xa4/0x198 [ 321.236720][T11809] __sys_setsockopt+0x7c/0x100 [ 321.236798][T11809] __arm64_sys_setsockopt+0x28/0x40 [ 321.236874][T11809] invoke_syscall+0x54/0x10c [ 321.236951][T11809] el0_svc_common.constprop.0+0x40/0xe0 [ 321.237028][T11809] do_el0_svc+0x1c/0x34 [ 321.237129][T11809] el0_svc+0x38/0x15c [ 321.237210][T11809] el0t_64_sync_handler+0xa0/0xf0 [ 321.237287][T11809] el0t_64_sync+0x1a4/0x1a8 [ 321.244428][T11808] syz.0.4112 (11808): drop_caches: 0 [ 321.273730][T11809] Mem-Info: [ 321.274419][T11809] active_anon:13 inactive_anon:3407 isolated_anon:0 [ 321.274419][T11809] active_file:1699 inactive_file:12111 isolated_file:0 [ 321.274419][T11809] unevictable:768 dirty:9 writeback:0 [ 321.274419][T11809] slab_reclaimable:3266 slab_unreclaimable:9092 [ 321.274419][T11809] mapped:2744 shmem:825 pagetables:488 [ 321.274419][T11809] sec_pagetables:0 bounce:0 [ 321.274419][T11809] kernel_misc_reclaimable:0 [ 321.274419][T11809] free:446212 free_pcp:6877 free_cma:8128 [ 321.274911][T11809] Node 0 active_anon:52kB inactive_anon:13628kB active_file:6796kB inactive_file:48444kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:10976kB dirty:36kB writeback:0kB shmem:3300kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:3024kB pagetables:1952kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB gpu_active:0kB gpu_reclaim:0kB [ 321.275221][T11809] Node 0 DMA free:1784848kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB free_highatomic:0KB active_anon:52kB inactive_anon:13628kB active_file:6796kB inactive_file:48444kB unevictable:3072kB writepending:36kB zspages:0kB present:2097152kB managed:1988556kB mlocked:0kB bounce:0kB free_pcp:27508kB local_pcp:13880kB free_cma:32512kB [ 321.275721][T11809] lowmem_reserve[]: 0 0 0 0 0 [ 321.276378][T11809] Node 0 DMA: 506*4kB (UM) 319*8kB (UM) 57*16kB (UM) 63*32kB (UME) 67*64kB (UME) 44*128kB (UM) 44*256kB (UMEC) 42*512kB (UMC) 34*1024kB (UMC) 4*2048kB (UMEC) 413*4096kB (MC) = 1784848kB [ 321.279049][T11809] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 321.279258][T11809] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 321.279316][T11809] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 321.279364][T11809] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 321.279535][T11809] 14631 total pagecache pages [ 321.279617][T11809] 0 pages in swap cache [ 321.279664][T11809] Free swap = 124996kB [ 321.279707][T11809] Total swap = 124996kB [ 321.279898][T11809] 524288 pages RAM [ 321.279950][T11809] 0 pages HighMem/MovableOnly [ 321.279999][T11809] 27149 pages reserved [ 321.280044][T11809] 8192 pages cma reserved [ 321.280103][T11809] 0 pages hwpoisoned [ 323.686154][T11900] 8021q: VLANs not supported on wg2 [ 348.041365][ T28] audit: type=1400 audit(347.900:2): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3335 comm="syz-executor" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 348.078552][ T28] audit: type=1400 audit(347.950:3): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=12689 comm="syz-executor" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 348.081721][ T28] audit: type=1400 audit(347.950:4): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=12689 comm="syz-executor" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 348.133910][ T28] audit: type=1400 audit(348.010:5): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3335 comm="syz-executor" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 348.141094][ T28] audit: type=1400 audit(348.010:6): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3334 comm="syz-executor" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 348.144862][ T28] audit: type=1400 audit(348.010:7): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3334 comm="syz-executor" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 348.180843][ T28] audit: type=1400 audit(348.050:8): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3334 comm="syz-executor" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 348.188633][ T28] audit: type=1400 audit(348.060:9): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3335 comm="syz-executor" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 348.191097][ T28] audit: type=1400 audit(348.060:10): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3335 comm="syz-executor" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 348.248935][ T28] audit: type=1400 audit(348.120:11): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=3151 comm="udevd" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 354.755830][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 354.757343][ T28] audit: type=1400 audit(354.630:17): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 358.146590][ T28] audit: type=1400 audit(358.020:18): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 361.558171][ T28] audit: type=1400 audit(361.430:19): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 370.144103][ T28] audit: type=1400 audit(370.020:20): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 375.636458][ T28] audit: type=1400 audit(375.510:21): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 382.143994][ T28] audit: type=1400 audit(382.020:22): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 394.144358][ T28] audit: type=1400 audit(394.020:23): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 403.155721][ T28] audit: type=1400 audit(403.030:24): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=9 comm="kworker/0:0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 406.143315][ T28] audit: type=1400 audit(406.020:25): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 418.143043][ T28] audit: type=1400 audit(418.010:26): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 430.141917][ T28] audit: type=1400 audit(430.010:27): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 442.141067][ T28] audit: type=1400 audit(442.010:28): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 454.140182][ T28] audit: type=1400 audit(454.010:29): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 458.834846][ T28] audit: type=1400 audit(458.710:30): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 466.139155][ T28] audit: type=1400 audit(466.010:31): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 478.138605][ T28] audit: type=1400 audit(478.010:32): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 490.138028][ T28] audit: type=1400 audit(490.010:33): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 502.137670][ T28] audit: type=1400 audit(502.010:34): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 514.136512][ T28] audit: type=1400 audit(514.010:35): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 526.133676][ T28] audit: type=1400 audit(526.010:36): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 538.133881][ T28] audit: type=1400 audit(538.010:37): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 550.150691][ T28] audit: type=1400 audit(550.020:38): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 562.150162][ T28] audit: type=1400 audit(562.020:39): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 571.475882][ T28] audit: type=1400 audit(571.350:40): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 574.149419][ T28] audit: type=1400 audit(574.020:41): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 586.148503][ T28] audit: type=1400 audit(586.020:42): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 598.147787][ T28] audit: type=1400 audit(598.020:43): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 610.146960][ T28] audit: type=1400 audit(610.020:44): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 622.146057][ T28] audit: type=1400 audit(622.020:45): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 634.144374][ T28] audit: type=1400 audit(634.020:46): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 646.144660][ T28] audit: type=1400 audit(646.020:47): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 658.143966][ T28] audit: type=1400 audit(658.020:48): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 670.143755][ T28] audit: type=1400 audit(670.020:49): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 682.143059][ T28] audit: type=1400 audit(682.020:50): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 694.141403][ T28] audit: type=1400 audit(694.010:51): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 694.355670][ T28] audit: type=1400 audit(694.230:52): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 706.140812][ T28] audit: type=1400 audit(706.010:53): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 718.139721][ T28] audit: type=1400 audit(718.010:54): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 730.139566][ T28] audit: type=1400 audit(730.010:55): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 742.138184][ T28] audit: type=1400 audit(742.010:56): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 754.137510][ T28] audit: type=1400 audit(754.010:57): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 766.137090][ T28] audit: type=1400 audit(766.010:58): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 778.136094][ T28] audit: type=1400 audit(778.010:59): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 790.133805][ T28] audit: type=1400 audit(790.010:60): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 802.144719][ T28] audit: type=1400 audit(802.020:61): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 814.151566][ T28] audit: type=1400 audit(814.020:62): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 817.235602][ T28] audit: type=1400 audit(817.110:63): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=12698 comm="kworker/u8:0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 826.150681][ T28] audit: type=1400 audit(826.020:64): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 838.149756][ T28] audit: type=1400 audit(838.020:65): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 850.149222][ T28] audit: type=1400 audit(850.020:66): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 862.148363][ T28] audit: type=1400 audit(862.020:67): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 874.147827][ T28] audit: type=1400 audit(874.020:68): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 886.146467][ T28] audit: type=1400 audit(886.020:69): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 Connection to localhost closed by remote host. [ 898.144664][ T28] audit: type=1400 audit(898.020:70): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0 [ 940.115737][ T28] audit: type=1400 audit(939.990:71): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="(" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=33254 daddr=10.0.2.15 dest=22 netif=eth0