last executing test programs: 688.314365ms ago: executing program 1 (id=347): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) preadv2(r0, &(0x7f00000023c0)=[{&(0x7f0000002180)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x0) 592.811049ms ago: executing program 0 (id=348): r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$TUNSETVNETLE(r0, 0x5450, 0x0) 592.443069ms ago: executing program 1 (id=349): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x10) 463.838196ms ago: executing program 0 (id=350): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x29, 0x15, &(0x7f0000000040)=0xa4ffffff, 0x49) 463.686956ms ago: executing program 1 (id=351): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x64040000) 382.62474ms ago: executing program 0 (id=352): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 285.508945ms ago: executing program 0 (id=353): r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap$dsp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x2011, r0, 0x0) 285.370775ms ago: executing program 1 (id=354): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x5450, 0x0) 163.031762ms ago: executing program 0 (id=355): r0 = openat$smackfs_ambient(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000004e00)={0x50, 0x0, 0x0, {0x7, 0x2b, 0x1000, 0x40272042, 0x0, 0x7ff, 0x1, 0xffffff00, 0x0, 0x0, 0x8, 0x1}}, 0x50) 162.930952ms ago: executing program 1 (id=356): r0 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$FITHAW(r0, 0x5450) 144.558472ms ago: executing program 0 (id=357): r0 = io_uring_setup(0x4328, &(0x7f0000000080)) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x5450, 0x0) 0s ago: executing program 1 (id=358): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={0x0}, 0x1, 0x0, 0xf0ff7f}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:12840' (ED25519) to the list of known hosts. syzkaller login: [ 75.014450][ T3314] cgroup: Unknown subsys name 'net' [ 75.276948][ T3314] cgroup: Unknown subsys name 'cpuset' [ 75.296975][ T3314] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 75.722772][ T3314] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 84.382058][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.394176][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.616156][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.634581][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.236724][ T3321] hsr_slave_0: entered promiscuous mode [ 85.242835][ T3321] hsr_slave_1: entered promiscuous mode [ 85.630539][ T3320] hsr_slave_0: entered promiscuous mode [ 85.635341][ T3320] hsr_slave_1: entered promiscuous mode [ 85.640708][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 85.641336][ T3320] Cannot create hsr debugfs directory [ 86.235862][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 86.267092][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 86.301496][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 86.317256][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 86.446578][ T3320] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 86.476652][ T3320] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 86.492708][ T3320] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 86.507402][ T3320] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 87.313786][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.431499][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.326614][ T3320] veth0_vlan: entered promiscuous mode [ 90.372334][ T3320] veth1_vlan: entered promiscuous mode [ 90.525795][ T3320] veth0_macvtap: entered promiscuous mode [ 90.559065][ T3320] veth1_macvtap: entered promiscuous mode [ 90.732802][ T3321] veth0_vlan: entered promiscuous mode [ 90.768737][ T1207] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.769524][ T1207] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.769682][ T1207] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.769816][ T1207] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.871998][ T3321] veth1_vlan: entered promiscuous mode [ 91.073476][ T3321] veth0_macvtap: entered promiscuous mode [ 91.105490][ T3321] veth1_macvtap: entered promiscuous mode [ 91.151003][ T3320] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 91.294700][ T1207] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.295076][ T1207] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.295450][ T1207] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.295576][ T1207] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.279915][ T3584] nvme_fabrics: missing parameter 'transport=%s' [ 97.280240][ T3584] nvme_fabrics: missing parameter 'nqn=%s' [ 99.220503][ T3649] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 107.513371][ T3904] syz.0.216 uses obsolete (PF_INET,SOCK_PACKET) [ 110.038602][ T3985] Zero length message leads to an empty skb [ 112.716447][ T4076] capability: warning: `syz.1.299' uses deprecated v2 capabilities in a way that may be insecure [ 116.249107][ T28] audit: type=1400 audit(116.090:2): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=3313 comm="sshd-session" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 116.259586][ T28] audit: type=1400 audit(116.100:3): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=3313 comm="sshd-session" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 116.263637][ T28] audit: type=1400 audit(116.110:4): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=3313 comm="sshd-session" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 116.264077][ T28] audit: type=1400 audit(116.110:5): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=3313 comm="sshd-session" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 116.394936][ T28] audit: type=1400 audit(116.240:6): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=3313 comm="sshd-session" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 116.408824][ T28] audit: type=1400 audit(116.250:7): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=3313 comm="sshd-session" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 116.418942][ T28] audit: type=1400 audit(116.260:8): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=3313 comm="sshd-session" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 116.443232][ T28] audit: type=1400 audit(116.290:9): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=3313 comm="sshd-session" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 116.467530][ T28] audit: type=1400 audit(116.310:10): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 116.891501][ T28] audit: type=1400 audit(116.740:11): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 122.941507][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 122.943721][ T28] audit: type=1400 audit(122.790:16): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 126.619644][ T28] audit: type=1400 audit(126.470:17): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 129.901255][ T28] audit: type=1400 audit(129.750:18): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 138.620297][ T28] audit: type=1400 audit(138.470:19): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 143.984101][ T28] audit: type=1400 audit(143.830:20): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 150.619217][ T28] audit: type=1400 audit(150.460:21): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 162.618168][ T28] audit: type=1400 audit(162.460:22): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 171.502313][ T28] audit: type=1400 audit(171.350:23): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 174.617351][ T28] audit: type=1400 audit(174.460:24): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 186.616821][ T28] audit: type=1400 audit(186.460:25): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 198.615732][ T28] audit: type=1400 audit(198.460:26): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 210.615089][ T28] audit: type=1400 audit(210.460:27): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 222.614131][ T28] audit: type=1400 audit(222.460:28): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 228.471359][ T28] audit: type=1400 audit(228.320:29): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 234.613304][ T28] audit: type=1400 audit(234.460:30): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 246.612668][ T28] audit: type=1400 audit(246.460:31): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 258.612355][ T28] audit: type=1400 audit(258.460:32): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 270.609631][ T28] audit: type=1400 audit(270.460:33): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 282.609628][ T28] audit: type=1400 audit(282.460:34): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 294.609774][ T28] audit: type=1400 audit(294.460:35): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 306.608722][ T28] audit: type=1400 audit(306.460:36): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 318.608527][ T28] audit: type=1400 audit(318.450:37): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 330.608236][ T28] audit: type=1400 audit(330.450:38): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 341.103276][ T28] audit: type=1400 audit(340.950:39): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 342.622675][ T28] audit: type=1400 audit(342.470:40): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 354.622555][ T28] audit: type=1400 audit(354.470:41): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 366.622050][ T28] audit: type=1400 audit(366.470:42): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 378.620487][ T28] audit: type=1400 audit(378.470:43): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 390.620291][ T28] audit: type=1400 audit(390.470:44): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 402.650160][ T28] audit: type=1400 audit(402.500:45): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 414.651781][ T28] audit: type=1400 audit(414.500:46): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 426.649544][ T28] audit: type=1400 audit(426.500:47): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 438.650614][ T28] audit: type=1400 audit(438.500:48): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 450.649604][ T28] audit: type=1400 audit(450.500:49): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 462.649093][ T28] audit: type=1400 audit(462.500:50): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 463.982239][ T28] audit: type=1400 audit(463.830:51): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 474.648230][ T28] audit: type=1400 audit(474.490:52): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 486.647685][ T28] audit: type=1400 audit(486.490:53): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 498.646792][ T28] audit: type=1400 audit(498.490:54): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 510.645691][ T28] audit: type=1400 audit(510.490:55): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 522.644900][ T28] audit: type=1400 audit(522.490:56): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 534.644263][ T28] audit: type=1400 audit(534.490:57): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 546.660791][ T28] audit: type=1400 audit(546.510:58): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 558.659552][ T28] audit: type=1400 audit(558.510:59): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 570.667476][ T28] audit: type=1400 audit(570.510:60): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 582.658846][ T28] audit: type=1400 audit(582.500:61): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 586.862758][ T28] audit: type=1400 audit(586.710:62): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 594.657768][ T28] audit: type=1400 audit(594.500:63): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 606.656834][ T28] audit: type=1400 audit(606.500:64): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 618.656363][ T28] audit: type=1400 audit(618.500:65): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 630.655688][ T28] audit: type=1400 audit(630.500:66): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 642.654205][ T28] audit: type=1400 audit(642.500:67): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 654.653680][ T28] audit: type=1400 audit(654.500:68): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 Connection to localhost closed by remote host. [ 666.653756][ T28] audit: type=1400 audit(666.500:69): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=739 comm="kworker/u8:5" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0 [ 709.742825][ T28] audit: type=1400 audit(709.590:70): lsm=SMACK fn=smack_socket_sock_rcv_skb action=denied subject="P" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=49474 daddr=10.0.2.15 dest=22 netif=eth0