audit: type=1400 audit(1521111132.377:8): avc: denied { dyntransition } for pid=5566 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 ====================================================== [ INFO: possible circular locking dependency detected ] 4.4.120-gd63fdf6 #28 Not tainted ------------------------------------------------------- syz-executor1/5590 is trying to acquire lock: (&mm->mmap_sem){++++++}, at: [] __might_fault+0xe4/0x1d0 mm/memory.c:3809 but task is already holding lock: (ashmem_mutex){+.+.+.}, at: [] ashmem_pin_unpin drivers/staging/android/ashmem.c:701 [inline] (ashmem_mutex){+.+.+.}, at: [] ashmem_ioctl+0x367/0xfa0 drivers/staging/android/ashmem.c:778 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: [] lock_acquire+0x15e/0x460 kernel/locking/lockdep.c:3592 [] __mutex_lock_common kernel/locking/mutex.c:521 [inline] [] mutex_lock_nested+0xbb/0x850 kernel/locking/mutex.c:621 [] ashmem_mmap+0x53/0x400 drivers/staging/android/ashmem.c:366 [] mmap_region+0x94f/0x1250 mm/mmap.c:1664 [] do_mmap+0x4fd/0x9d0 mm/mmap.c:1441 [] do_mmap_pgoff include/linux/mm.h:1915 [inline] [] vm_mmap_pgoff+0x16e/0x1c0 mm/util.c:296 [] SYSC_mmap_pgoff mm/mmap.c:1491 [inline] [] SyS_mmap_pgoff+0x33f/0x560 mm/mmap.c:1449 [] SYSC_mmap arch/x86/kernel/sys_x86_64.c:95 [inline] [] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:86 [] entry_SYSCALL_64_fastpath+0x1c/0x98 [] check_prev_add kernel/locking/lockdep.c:1853 [inline] [] check_prevs_add kernel/locking/lockdep.c:1958 [inline] [] validate_chain kernel/locking/lockdep.c:2144 [inline] [] __lock_acquire+0x371f/0x4b50 kernel/locking/lockdep.c:3213 [] lock_acquire+0x15e/0x460 kernel/locking/lockdep.c:3592 [] __might_fault+0x14a/0x1d0 mm/memory.c:3810 [] copy_from_user arch/x86/include/asm/uaccess.h:724 [inline] [] ashmem_pin_unpin drivers/staging/android/ashmem.c:706 [inline] [] ashmem_ioctl+0x3b4/0xfa0 drivers/staging/android/ashmem.c:778 [] vfs_ioctl fs/ioctl.c:43 [inline] [] do_vfs_ioctl+0x7aa/0xee0 fs/ioctl.c:607 [] SYSC_ioctl fs/ioctl.c:622 [inline] [] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:613 [] entry_SYSCALL_64_fastpath+0x1c/0x98 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(ashmem_mutex); lock(&mm->mmap_sem); lock(ashmem_mutex); lock(&mm->mmap_sem); *** DEADLOCK *** 1 lock held by syz-executor1/5590: #0: (ashmem_mutex){+.+.+.}, at: [] ashmem_pin_unpin drivers/staging/android/ashmem.c:701 [inline] #0: (ashmem_mutex){+.+.+.}, at: [] ashmem_ioctl+0x367/0xfa0 drivers/staging/android/ashmem.c:778 stack backtrace: CPU: 0 PID: 5590 Comm: syz-executor1 Not tainted 4.4.120-gd63fdf6 #28 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 e52c769c3ed3c26f ffff8800b72579b8 ffffffff81d0408d ffffffff851a0010 ffffffff851a0010 ffffffff851be7c0 ffff8800b76288f8 ffff8800b7628000 ffff8800b7257a00 ffffffff81233ba1 ffff8800b76288f8 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_circular_bug+0x271/0x310 kernel/locking/lockdep.c:1226 [] check_prev_add kernel/locking/lockdep.c:1853 [inline] [] check_prevs_add kernel/locking/lockdep.c:1958 [inline] [] validate_chain kernel/locking/lockdep.c:2144 [inline] [] __lock_acquire+0x371f/0x4b50 kernel/locking/lockdep.c:3213 [] lock_acquire+0x15e/0x460 kernel/locking/lockdep.c:3592 [] __might_fault+0x14a/0x1d0 mm/memory.c:3810 [] copy_from_user arch/x86/include/asm/uaccess.h:724 [inline] [] ashmem_pin_unpin drivers/staging/android/ashmem.c:706 [inline] [] ashmem_ioctl+0x3b4/0xfa0 drivers/staging/android/ashmem.c:778 [] vfs_ioctl fs/ioctl.c:43 [inline] [] do_vfs_ioctl+0x7aa/0xee0 fs/ioctl.c:607 [] SYSC_ioctl fs/ioctl.c:622 [inline] [] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:613 [] entry_SYSCALL_64_fastpath+0x1c/0x98 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1808 sclass=netlink_route_socket binder: 5623:5627 transaction failed 29189/-22, size 40-8 line 3005 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1808 sclass=netlink_route_socket audit: type=1400 audit(1521111133.057:9): avc: denied { create } for pid=5631 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 binder: 5623:5627 transaction failed 29189/-22, size 40-8 line 3005 binder: 5623:5637 BC_INCREFS_DONE u0000000000000000 no match binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29189 audit: type=1400 audit(1521111133.117:10): avc: denied { setopt } for pid=5631 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1521111133.117:11): avc: denied { write } for pid=5631 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1400 audit(1521111133.457:12): avc: denied { create } for pid=5759 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 audit: type=1400 audit(1521111133.487:13): avc: denied { create } for pid=5759 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 binder: 5832:5834 ioctl c0306201 20008000 returned -14 binder_alloc: binder_alloc_mmap_handler: 5835 20000000-20002000 already mapped failed -16 binder: 5832:5834 ioctl c018620b 20000000 returned -14 capability: warning: `syz-executor1' uses deprecated v2 capabilities in a way that may be insecure binder_alloc: 6016: binder_alloc_buf, no vma binder: 6016:6045 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 6016:6027 transaction failed 29189/-3, size 40-8 line 3128 binder: 6016:6045 got reply transaction with no transaction stack capability: warning: `syz-executor0' uses 32-bit capabilities (legacy support in use) binder: 6016:6045 transaction failed 29201/-71, size 0-0 line 2921 binder: BINDER_SET_CONTEXT_MGR already set binder: 6016:6045 ioctl 40046207 0 returned -16 binder_alloc: 6016: binder_alloc_buf, no vma binder: 6016:6027 transaction failed 29189/-3, size 40-8 line 3128 binder: 6016:6065 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 6016:6065 got reply transaction with no transaction stack binder: 6016:6065 transaction failed 29201/-71, size 0-0 line 2921 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29201 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29201 device syz_tun entered promiscuous mode device syz_tun left promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. IPv6: NLM_F_REPLACE set, but no existing node found! IPv6: NLM_F_REPLACE set, but no existing node found! netlink: 64 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 64 bytes leftover after parsing attributes in process `syz-executor3'. binder: 6442:6449 unknown command 25426 binder: 6442:6449 ioctl c0306201 20004000 returned -22 binder: 6442:6469 BC_FREE_BUFFER u000000002000c000 no match binder: 6442:6469 unknown command 25426 binder: BINDER_SET_CONTEXT_MGR already set binder: 6442:6481 ioctl 40046207 0 returned -16 binder_alloc: binder_alloc_mmap_handler: 6442 2000c000-2000e000 already mapped failed -16 binder: 6442:6469 ioctl c0306201 20004000 returned -22 binder: 6493:6503 unknown command 536871040 binder: 6493:6503 ioctl c0306201 20008000 returned -22 binder: 6493:6503 unknown command 536871040 binder: 6493:6503 ioctl c0306201 20008000 returned -22 netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. audit_printk_skb: 24 callbacks suppressed audit: type=1400 audit(1521111136.867:22): avc: denied { setopt } for pid=6660 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. vmalloc: allocation failure: 0 bytes syz-executor5: page allocation failure: order:0, mode:0x24000c2 CPU: 1 PID: 6694 Comm: syz-executor5 Not tainted 4.4.120-gd63fdf6 #28 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 95153486ca22e8bc ffff8801d60a7938 ffffffff81d0408d 1ffff1003ac14f2a ffff8801c3251800 00000000024000c2 0000000000000000 0000000000000001 ffff8801d60a7a48 ffffffff81431059 ffffffff838ac620 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] warn_alloc_failed+0x1d9/0x240 mm/page_alloc.c:2757 [] __vmalloc_node_range+0x41d/0x630 mm/vmalloc.c:1692 [] __vmalloc_node mm/vmalloc.c:1715 [inline] [] __vmalloc_node_flags mm/vmalloc.c:1729 [inline] [] vmalloc+0x5b/0x70 mm/vmalloc.c:1744 [] sel_write_load+0x130/0xff0 security/selinux/selinuxfs.c:527 [] __vfs_write+0x103/0x450 fs/read_write.c:489 [] vfs_write+0x18a/0x530 fs/read_write.c:538 [] SYSC_write fs/read_write.c:585 [inline] [] SyS_write+0xd9/0x1b0 fs/read_write.c:577 [] entry_SYSCALL_64_fastpath+0x1c/0x98 Mem-Info: active_anon:54738 inactive_anon:45 isolated_anon:0 active_file:3570 inactive_file:8481 isolated_file:0 unevictable:0 dirty:48 writeback:0 unstable:0 slab_reclaimable:6307 slab_unreclaimable:60025 mapped:24277 shmem:51 pagetables:655 bounce:0 free:1471905 free_pcp:522 free_cma:0 DMA free:15904kB min:160kB low:200kB high:240kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:15992kB managed:15904kB mlocked:0kB dirty:0kB writeback:0kB mapped:0kB shmem:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB unstable:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? yes lowmem_reserve[]: 0 2911 6411 6411 DMA32 free:2662436kB min:30608kB low:38260kB high:45912kB active_anon:95740kB inactive_anon:84kB active_file:6120kB inactive_file:17368kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:3129292kB managed:2982732kB mlocked:0kB dirty:80kB writeback:0kB mapped:51136kB shmem:100kB slab_reclaimable:12504kB slab_unreclaimable:113152kB kernel_stack:1472kB pagetables:1208kB unstable:0kB bounce:0kB free_pcp:896kB local_pcp:252kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no lowmem_reserve[]: 0 0 3500 3500 Normal free:3206128kB min:36808kB low:46008kB high:55212kB active_anon:123304kB inactive_anon:96kB active_file:8180kB inactive_file:16552kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:4718592kB managed:3584660kB mlocked:0kB dirty:144kB writeback:0kB mapped:45868kB shmem:104kB slab_reclaimable:14048kB slab_unreclaimable:128936kB kernel_stack:4064kB pagetables:1332kB unstable:0kB bounce:0kB free_pcp:1468kB local_pcp:840kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no lowmem_reserve[]: 0 0 0 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB DMA32: 861*4kB (UME) 393*8kB (UM) 184*16kB (UM) 34*32kB (UM) 29*64kB (UME) 10*128kB (UM) 15*256kB (UME) 6*512kB (UM) 24*1024kB (ME) 4*2048kB (ME) 637*4096kB (M) = 2662588kB Normal: 691*4kB (UME) 277*8kB (UM) 172*16kB (UME) 55*32kB (UME) 20*64kB (ME) 19*128kB (ME) 14*256kB (UME) 7*512kB (UME) 27*1024kB (UME) 4*2048kB (UM) 769*4096kB (M) = 3206036kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 12106 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965969 pages RAM 0 pages HighMem/MovableOnly 320145 pages reserved vmalloc: allocation failure: 0 bytes syz-executor5: page allocation failure: order:0, mode:0x24000c2 CPU: 0 PID: 6699 Comm: syz-executor5 Not tainted 4.4.120-gd63fdf6 #28 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 3df0870d6ea9c615 ffff8801c32b7938 ffffffff81d0408d 1ffff10038656f2a ffff8801d61eb000 00000000024000c2 0000000000000000 0000000000000001 ffff8801c32b7a48 ffffffff81431059 ffffffff838ac620 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] warn_alloc_failed+0x1d9/0x240 mm/page_alloc.c:2757 [] __vmalloc_node_range+0x41d/0x630 mm/vmalloc.c:1692 [] __vmalloc_node mm/vmalloc.c:1715 [inline] [] __vmalloc_node_flags mm/vmalloc.c:1729 [inline] [] vmalloc+0x5b/0x70 mm/vmalloc.c:1744 [] sel_write_load+0x130/0xff0 security/selinux/selinuxfs.c:527 [] __vfs_write+0x103/0x450 fs/read_write.c:489 [] vfs_write+0x18a/0x530 fs/read_write.c:538 [] SYSC_write fs/read_write.c:585 [inline] [] SyS_write+0xd9/0x1b0 fs/read_write.c:577 [] entry_SYSCALL_64_fastpath+0x1c/0x98 Mem-Info: active_anon:54759 inactive_anon:45 isolated_anon:0 active_file:3576 inactive_file:8480 isolated_file:0 unevictable:0 dirty:61 writeback:0 unstable:0 slab_reclaimable:6675 slab_unreclaimable:60455 mapped:24251 shmem:51 pagetables:635 bounce:0 free:1471148 free_pcp:589 free_cma:0 DMA free:15904kB min:160kB low:200kB high:240kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:15992kB managed:15904kB mlocked:0kB dirty:0kB writeback:0kB mapped:0kB shmem:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB unstable:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? yes lowmem_reserve[]: 0 2911 6411 6411 DMA32 free:2662496kB min:30608kB low:38260kB high:45912kB active_anon:95748kB inactive_anon:84kB active_file:6120kB inactive_file:17372kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:3129292kB managed:2982732kB mlocked:0kB dirty:104kB writeback:0kB mapped:51136kB shmem:100kB slab_reclaimable:12652kB slab_unreclaimable:112884kB kernel_stack:1408kB pagetables:1208kB unstable:0kB bounce:0kB free_pcp:988kB local_pcp:632kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no lowmem_reserve[]: 0 0 3500 3500 Normal free:3206068kB min:36808kB low:46008kB high:55212kB active_anon:123288kB inactive_anon:96kB active_file:8184kB inactive_file:16548kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:4718592kB managed:3584660kB mlocked:0kB dirty:144kB writeback:0kB mapped:45868kB shmem:104kB slab_reclaimable:14052kB slab_unreclaimable:128936kB kernel_stack:4000kB pagetables:1332kB unstable:0kB bounce:0kB free_pcp:1484kB local_pcp:644kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no lowmem_reserve[]: 0 0 0 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB DMA32: 830*4kB (UME) 393*8kB (UM) 184*16kB (UM) 35*32kB (UM) 29*64kB (UME) 10*128kB (UM) 15*256kB (UME) 6*512kB (UM) 24*1024kB (ME) 4*2048kB (ME) 637*4096kB (M) = 2662496kB Normal: 691*4kB (UME) 277*8kB (UM) 172*16kB (UME) 56*32kB (UME) 20*64kB (ME) 19*128kB (ME) 14*256kB (UME) 7*512kB (UME) 27*1024kB (UME) 4*2048kB (UM) 769*4096kB (M) = 3206068kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 12111 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965969 pages RAM 0 pages HighMem/MovableOnly 320145 pages reserved binder: 6761:6764 unknown command 25388 binder: 6761:6764 ioctl c0306201 20000080 returned -22 binder: 6761:6776 unknown command 25388 binder: 6761:6776 ioctl c0306201 20000080 returned -22 netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. program syz-executor0 is using a deprecated SCSI ioctl, please convert it to SG_IO Option 'Ü¿Ò „ãÞ' to dns_resolver key: bad/missing value sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 Option 'Ü¿Ò „ãÞ' to dns_resolver key: bad/missing value TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. program syz-executor0 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=9127 sclass=netlink_tcpdiag_socket audit: type=1326 audit(1521111140.107:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7151 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x453e69 code=0x0 proc: unrecognized mount option "./bus" or missing value audit: type=1326 audit(1521111140.197:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7151 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x453e69 code=0x0 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable audit: type=1400 audit(1521111140.897:25): avc: denied { create } for pid=7361 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 audit: type=1400 audit(1521111140.937:26): avc: denied { write } for pid=7361 comm="syz-executor6" path="socket:[20797]" dev="sockfs" ino=20797 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 nla_parse: 9 callbacks suppressed netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 60 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 60 bytes leftover after parsing attributes in process `syz-executor7'. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.