TCP: request_sock_TCP: Possible SYN flooding on port 20013. Sending cookies. Check SNMP counters. ============================= WARNING: suspicious RCU usage 4.15.0-rc7+ #184 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1705 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 4 locks held by syz-executor4/12667: #0: (rtnl_mutex){+.+.}, at: [<00000000ed7b8b1a>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+...}, at: [<0000000084135099>] spin_trylock_bh include/linux/spinlock.h:370 [inline] #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+...}, at: [<0000000084135099>] fib6_run_gc+0x2b7/0x3c0 net/ipv6/ip6_fib.c:2018 #2: (rcu_read_lock){....}, at: [<0000000065e7be48>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1562 #3: (&(&tb->tb6_lock)->rlock){+...}, at: [<0000000043cb2c06>] spin_lock_bh include/linux/spinlock.h:315 [inline] #3: (&(&tb->tb6_lock)->rlock){+...}, at: [<0000000043cb2c06>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1958 stack backtrace: CPU: 1 PID: 12667 Comm: syz-executor4 Not tainted 4.15.0-rc7+ #184 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del+0xcd3/0x1240 net/ipv6/ip6_fib.c:1704 sctp: [Deprecated]: syz-executor2 (pid 12663) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead fib6_clean_node+0x42e/0x580 net/ipv6/ip6_fib.c:1895 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1818 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1866 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1943 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1959 sctp: [Deprecated]: syz-executor2 (pid 12691) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead fib6_clean_all net/ipv6/ip6_fib.c:1970 [inline] fib6_run_gc+0x16b/0x3c0 net/ipv6/ip6_fib.c:2026 ndisc_netdev_event+0x3c2/0x4a0 net/ipv6/ndisc.c:1776 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1708 call_netdevice_notifiers net/core/dev.c:1726 [inline] dev_close_many+0x3fb/0x850 net/core/dev.c:1504 rollback_registered_many+0x4d5/0xe20 net/core/dev.c:7324 unregister_netdevice_many.part.118+0x87/0x420 net/core/dev.c:8422 unregister_netdevice_many+0xbb/0x100 net/core/dev.c:8421 mroute_clean_tables+0x1fc/0x850 net/ipv6/ip6mr.c:1562 ip6mr_sk_done+0x3a8/0x450 net/ipv6/ip6mr.c:1638 ip6_mroute_setsockopt+0x1009/0x35b0 net/ipv6/ip6mr.c:1700 do_ipv6_setsockopt.isra.9+0x2f0/0x39a0 net/ipv6/ipv6_sockglue.c:163 ipv6_setsockopt+0xd7/0x150 net/ipv6/ipv6_sockglue.c:922 rawv6_setsockopt+0x4a/0xf0 net/ipv6/raw.c:1060 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2978 SYSC_setsockopt net/socket.c:1821 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1800 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f9583500c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 RDX: 00000000000000c9 RSI: 0000000000000029 RDI: 0000000000000013 RBP: 00000000000004ba R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020c3a000 R11: 0000000000000212 R12: 00000000006f5210 R13: 00000000ffffffff R14: 00007f95835016d4 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.15.0-rc7+ #184 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1732 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 4 locks held by syz-executor4/12667: #0: (rtnl_mutex){+.+.}, at: [<00000000ed7b8b1a>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+...}, at: [<0000000084135099>] spin_trylock_bh include/linux/spinlock.h:370 [inline] #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+...}, at: [<0000000084135099>] fib6_run_gc+0x2b7/0x3c0 net/ipv6/ip6_fib.c:2018 #2: (rcu_read_lock){....}, at: [<0000000065e7be48>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1562 #3: (&(&tb->tb6_lock)->rlock){+...}, at: [<0000000043cb2c06>] spin_lock_bh include/linux/spinlock.h:315 [inline] #3: (&(&tb->tb6_lock)->rlock){+...}, at: [<0000000043cb2c06>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1958 stack backtrace: CPU: 1 PID: 12667 Comm: syz-executor4 Not tainted 4.15.0-rc7+ #184 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del+0x425/0x1240 net/ipv6/ip6_fib.c:1731 fib6_clean_node+0x42e/0x580 net/ipv6/ip6_fib.c:1895 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1818 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1866 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1943 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1959 fib6_clean_all net/ipv6/ip6_fib.c:1970 [inline] fib6_run_gc+0x16b/0x3c0 net/ipv6/ip6_fib.c:2026 ndisc_netdev_event+0x3c2/0x4a0 net/ipv6/ndisc.c:1776 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1708 call_netdevice_notifiers net/core/dev.c:1726 [inline] dev_close_many+0x3fb/0x850 net/core/dev.c:1504 rollback_registered_many+0x4d5/0xe20 net/core/dev.c:7324 unregister_netdevice_many.part.118+0x87/0x420 net/core/dev.c:8422 unregister_netdevice_many+0xbb/0x100 net/core/dev.c:8421 mroute_clean_tables+0x1fc/0x850 net/ipv6/ip6mr.c:1562 ip6mr_sk_done+0x3a8/0x450 net/ipv6/ip6mr.c:1638 ip6_mroute_setsockopt+0x1009/0x35b0 net/ipv6/ip6mr.c:1700 do_ipv6_setsockopt.isra.9+0x2f0/0x39a0 net/ipv6/ipv6_sockglue.c:163 ipv6_setsockopt+0xd7/0x150 net/ipv6/ipv6_sockglue.c:922 rawv6_setsockopt+0x4a/0xf0 net/ipv6/raw.c:1060 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2978 SYSC_setsockopt net/socket.c:1821 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1800 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f9583500c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 RDX: 00000000000000c9 RSI: 0000000000000029 RDI: 0000000000000013 RBP: 00000000000004ba R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020c3a000 R11: 0000000000000212 R12: 00000000006f5210 R13: 00000000ffffffff R14: 00007f95835016d4 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.15.0-rc7+ #184 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1641 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 4 locks held by syz-executor4/12667: #0: (rtnl_mutex){+.+.}, at: [<00000000ed7b8b1a>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+...}, at: [<0000000084135099>] spin_trylock_bh include/linux/spinlock.h:370 [inline] #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+...}, at: [<0000000084135099>] fib6_run_gc+0x2b7/0x3c0 net/ipv6/ip6_fib.c:2018 #2: (rcu_read_lock){....}, at: [<0000000065e7be48>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1562 #3: (&(&tb->tb6_lock)->rlock){+...}, at: [<0000000043cb2c06>] spin_lock_bh include/linux/spinlock.h:315 [inline] #3: (&(&tb->tb6_lock)->rlock){+...}, at: [<0000000043cb2c06>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1958 stack backtrace: CPU: 1 PID: 12667 Comm: syz-executor4 Not tainted 4.15.0-rc7+ #184 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del_route net/ipv6/ip6_fib.c:1640 [inline] fib6_del+0xd41/0x1240 net/ipv6/ip6_fib.c:1734 fib6_clean_node+0x42e/0x580 net/ipv6/ip6_fib.c:1895 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1818 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1866 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1943 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1959 fib6_clean_all net/ipv6/ip6_fib.c:1970 [inline] fib6_run_gc+0x16b/0x3c0 net/ipv6/ip6_fib.c:2026 ndisc_netdev_event+0x3c2/0x4a0 net/ipv6/ndisc.c:1776 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1708 call_netdevice_notifiers net/core/dev.c:1726 [inline] dev_close_many+0x3fb/0x850 net/core/dev.c:1504 rollback_registered_many+0x4d5/0xe20 net/core/dev.c:7324 unregister_netdevice_many.part.118+0x87/0x420 net/core/dev.c:8422 unregister_netdevice_many+0xbb/0x100 net/core/dev.c:8421 mroute_clean_tables+0x1fc/0x850 net/ipv6/ip6mr.c:1562 ip6mr_sk_done+0x3a8/0x450 net/ipv6/ip6mr.c:1638 ip6_mroute_setsockopt+0x1009/0x35b0 net/ipv6/ip6mr.c:1700 do_ipv6_setsockopt.isra.9+0x2f0/0x39a0 net/ipv6/ipv6_sockglue.c:163 ipv6_setsockopt+0xd7/0x150 net/ipv6/ipv6_sockglue.c:922 rawv6_setsockopt+0x4a/0xf0 net/ipv6/raw.c:1060 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2978 SYSC_setsockopt net/socket.c:1821 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1800 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f9583500c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 RDX: 00000000000000c9 RSI: 0000000000000029 RDI: 0000000000000013 RBP: 00000000000004ba R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020c3a000 R11: 0000000000000212 R12: 00000000006f5210 R13: 00000000ffffffff R14: 00007f95835016d4 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.15.0-rc7+ #184 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1679 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 5 locks held by syz-executor4/12667: #0: (rtnl_mutex){+.+.}, at: [<00000000ed7b8b1a>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+...}, at: [<0000000084135099>] spin_trylock_bh include/linux/spinlock.h:370 [inline] #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+...}, at: [<0000000084135099>] fib6_run_gc+0x2b7/0x3c0 net/ipv6/ip6_fib.c:2018 #2: (rcu_read_lock){....}, at: [<0000000065e7be48>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1562 #3: (&(&tb->tb6_lock)->rlock){+...}, at: [<0000000043cb2c06>] spin_lock_bh include/linux/spinlock.h:315 [inline] #3: (&(&tb->tb6_lock)->rlock){+...}, at: [<0000000043cb2c06>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1958 #4: (&net->ipv6.fib6_walker_lock){++..}, at: [<000000007ba2fd0d>] fib6_del_route net/ipv6/ip6_fib.c:1674 [inline] #4: (&net->ipv6.fib6_walker_lock){++..}, at: [<000000007ba2fd0d>] fib6_del+0x95e/0x1240 net/ipv6/ip6_fib.c:1734 stack backtrace: CPU: 1 PID: 12667 Comm: syz-executor4 Not tainted 4.15.0-rc7+ #184 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del_route net/ipv6/ip6_fib.c:1678 [inline] fib6_del+0xee4/0x1240 net/ipv6/ip6_fib.c:1734 fib6_clean_node+0x42e/0x580 net/ipv6/ip6_fib.c:1895 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1818 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1866 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1943 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1959 fib6_clean_all net/ipv6/ip6_fib.c:1970 [inline] fib6_run_gc+0x16b/0x3c0 net/ipv6/ip6_fib.c:2026 ndisc_netdev_event+0x3c2/0x4a0 net/ipv6/ndisc.c:1776 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1708 call_netdevice_notifiers net/core/dev.c:1726 [inline] dev_close_many+0x3fb/0x850 net/core/dev.c:1504 rollback_registered_many+0x4d5/0xe20 net/core/dev.c:7324 unregister_netdevice_many.part.118+0x87/0x420 net/core/dev.c:8422 unregister_netdevice_many+0xbb/0x100 net/core/dev.c:8421 mroute_clean_tables+0x1fc/0x850 net/ipv6/ip6mr.c:1562 ip6mr_sk_done+0x3a8/0x450 net/ipv6/ip6mr.c:1638 ip6_mroute_setsockopt+0x1009/0x35b0 net/ipv6/ip6mr.c:1700 do_ipv6_setsockopt.isra.9+0x2f0/0x39a0 net/ipv6/ipv6_sockglue.c:163 ipv6_setsockopt+0xd7/0x150 net/ipv6/ipv6_sockglue.c:922 rawv6_setsockopt+0x4a/0xf0 net/ipv6/raw.c:1060 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2978 SYSC_setsockopt net/socket.c:1821 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1800 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f9583500c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 RDX: 00000000000000c9 RSI: 0000000000000029 RDI: 0000000000000013 RBP: 00000000000004ba R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020c3a000 R11: 0000000000000212 R12: 00000000006f5210 R13: 00000000ffffffff R14: 00007f95835016d4 R15: 0000000000000000 netlink: 'syz-executor7': attribute type 1 has an invalid length. netlink: 'syz-executor7': attribute type 1 has an invalid length. nla_parse: 9 callbacks suppressed netlink: 21 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 21 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 17 bytes leftover after parsing attributes in process `syz-executor5'. device lo entered promiscuous mode netlink: 17 bytes leftover after parsing attributes in process `syz-executor5'. do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app netlink: 12 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. tc_dump_action: action bad kind netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. sctp: [Deprecated]: syz-executor7 (pid 13501) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 13501) Use of int in maxseg socket option. Use struct sctp_assoc_value instead do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app sctp: [Deprecated]: syz-executor5 (pid 13650) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app sctp: [Deprecated]: syz-executor5 (pid 13650) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead openvswitch: netlink: ufid size 20 bytes exceeds the range (1, 16) sctp: [Deprecated]: syz-executor5 (pid 13748) Use of int in maxseg socket option. Use struct sctp_assoc_value instead openvswitch: netlink: ufid size 20 bytes exceeds the range (1, 16) sctp: [Deprecated]: syz-executor5 (pid 13764) Use of int in maxseg socket option. Use struct sctp_assoc_value instead audit: type=1400 audit(1515721450.628:69): avc: denied { map } for pid=13803 comm="syz-executor0" path="socket:[24932]" dev="sockfs" ino=24932 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 sctp: [Deprecated]: syz-executor2 (pid 13880) Use of int in max_burst socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor2 (pid 13880) Use of int in max_burst socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor5 (pid 13982) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead netlink: 'syz-executor3': attribute type 19 has an invalid length. netlink: 'syz-executor3': attribute type 19 has an invalid length. sctp: [Deprecated]: syz-executor5 (pid 14006) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead dccp_close: ABORT with 582 bytes unread netlink: 'syz-executor2': attribute type 1 has an invalid length. sctp: [Deprecated]: syz-executor3 (pid 14080) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor3 (pid 14080) Use of int in maxseg socket option. Use struct sctp_assoc_value instead audit: type=1400 audit(1515721451.781:70): avc: denied { shutdown } for pid=14119 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 netlink: 'syz-executor3': attribute type 16 has an invalid length. device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device lo left promiscuous mode device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device lo left promiscuous mode device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device lo left promiscuous mode device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device lo left promiscuous mode device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device lo left promiscuous mode nla_parse: 24 callbacks suppressed netlink: 14 bytes leftover after parsing attributes in process `syz-executor5'. device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device lo left promiscuous mode netlink: 13 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 13 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 14 bytes leftover after parsing attributes in process `syz-executor5'. device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device lo left promiscuous mode netlink: 'syz-executor6': attribute type 1 has an invalid length. netlink: 11 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor3'. device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready