sd 0:0:1:0: [sg0] tag#301 CDB[00]: 02 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 [ INFO: possible circular locking dependency detected ] 4.9.86-gb324a70 #58 Not tainted ------------------------------------------------------- syz-executor4/5785 is trying to acquire lock: (&mm->mmap_sem){++++++}, at: [] __might_fault+0xe4/0x1d0 mm/memory.c:4013 but task is already holding lock: (ashmem_mutex){+.+.+.}, at: [] ashmem_pin_unpin drivers/staging/android/ashmem.c:714 [inline] (ashmem_mutex){+.+.+.}, at: [] ashmem_ioctl+0x371/0xfe0 drivers/staging/android/ashmem.c:791 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: lock_acquire+0x12e/0x410 kernel/locking/lockdep.c:3756 __mutex_lock_common kernel/locking/mutex.c:521 [inline] mutex_lock_nested+0xbb/0x870 kernel/locking/mutex.c:621 ashmem_mmap+0x53/0x400 drivers/staging/android/ashmem.c:379 mmap_region+0x7dd/0xfd0 mm/mmap.c:1694 do_mmap+0x57b/0xbe0 mm/mmap.c:1473 do_mmap_pgoff include/linux/mm.h:2032 [inline] vm_mmap_pgoff+0x16b/0x1b0 mm/util.c:329 SYSC_mmap_pgoff mm/mmap.c:1523 [inline] SyS_mmap_pgoff+0x33f/0x560 mm/mmap.c:1481 do_syscall_32_irqs_on arch/x86/entry/common.c:325 [inline] do_fast_syscall_32+0x2f5/0x870 arch/x86/entry/common.c:387 entry_SYSENTER_compat+0x90/0xa2 arch/x86/entry/entry_64_compat.S:137 check_prev_add kernel/locking/lockdep.c:1828 [inline] check_prevs_add kernel/locking/lockdep.c:1938 [inline] validate_chain kernel/locking/lockdep.c:2265 [inline] __lock_acquire+0x2bf9/0x3640 kernel/locking/lockdep.c:3345 lock_acquire+0x12e/0x410 kernel/locking/lockdep.c:3756 __might_fault+0x14a/0x1d0 mm/memory.c:4014 copy_from_user arch/x86/include/asm/uaccess.h:705 [inline] ashmem_pin_unpin drivers/staging/android/ashmem.c:719 [inline] ashmem_ioctl+0x3c0/0xfe0 drivers/staging/android/ashmem.c:791 compat_ashmem_ioctl+0x3e/0x50 drivers/staging/android/ashmem.c:822 C_SYSC_ioctl fs/compat_ioctl.c:1602 [inline] compat_SyS_ioctl+0x15f/0x2050 fs/compat_ioctl.c:1549 do_syscall_32_irqs_on arch/x86/entry/common.c:325 [inline] do_fast_syscall_32+0x2f5/0x870 arch/x86/entry/common.c:387 entry_SYSENTER_compat+0x90/0xa2 arch/x86/entry/entry_64_compat.S:137 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(ashmem_mutex); lock(&mm->mmap_sem); lock(ashmem_mutex); lock(&mm->mmap_sem); *** DEADLOCK *** 1 lock held by syz-executor4/5785: #0: (ashmem_mutex){+.+.+.}, at: [] ashmem_pin_unpin drivers/staging/android/ashmem.c:714 [inline] #0: (ashmem_mutex){+.+.+.}, at: [] ashmem_ioctl+0x371/0xfe0 drivers/staging/android/ashmem.c:791 stack backtrace: CPU: 0 PID: 5785 Comm: syz-executor4 Not tainted 4.9.86-gb324a70 #58 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801c65dfa38 ffffffff81d956f9 ffffffff853a4cd0 ffffffff853a4cd0 ffffffff853c4f80 ffff8801d7c688d8 ffff8801d7c68000 ffff8801c65dfa80 ffffffff812387f1 ffff8801d7c688d8 00000000d7c688b0 ffff8801d7c688d8 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_circular_bug+0x271/0x310 kernel/locking/lockdep.c:1202 [] check_prev_add kernel/locking/lockdep.c:1828 [inline] [] check_prevs_add kernel/locking/lockdep.c:1938 [inline] [] validate_chain kernel/locking/lockdep.c:2265 [inline] [] __lock_acquire+0x2bf9/0x3640 kernel/locking/lockdep.c:3345 [] lock_acquire+0x12e/0x410 kernel/locking/lockdep.c:3756 [] __might_fault+0x14a/0x1d0 mm/memory.c:4014 [] copy_from_user arch/x86/include/asm/uaccess.h:705 [inline] [] ashmem_pin_unpin drivers/staging/android/ashmem.c:719 [inline] [] ashmem_ioctl+0x3c0/0xfe0 drivers/staging/android/ashmem.c:791 [] compat_ashmem_ioctl+0x3e/0x50 drivers/staging/android/ashmem.c:822 [] C_SYSC_ioctl fs/compat_ioctl.c:1602 [inline] [] compat_SyS_ioctl+0x15f/0x2050 fs/compat_ioctl.c:1549 [] do_syscall_32_irqs_on arch/x86/entry/common.c:325 [inline] [] do_fast_syscall_32+0x2f5/0x870 arch/x86/entry/common.c:387 [] entry_SYSENTER_compat+0x90/0xa2 arch/x86/entry/entry_64_compat.S:137 binder: 5824:5825 unknown command -1513737013 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: opcode=0x2 sd 0:0:1:0: [sg0] tag#301 CDB[00]: 02 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 audit: type=1400 audit(1520309738.035:20): avc: denied { setgid } for pid=5827 comm="" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: opcode=0x2 sd 0:0:1:0: [sg0] tag#301 CDB[00]: 02 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 binder: 5824:5843 ioctl 4c01 0 returned -22 binder: BINDER_SET_CONTEXT_MGR already set binder: 5824:5843 ioctl 40046207 0 returned -16 binder: 5824:5852 unknown command -1513737013 binder: 5824:5852 ioctl c0306201 20007000 returned -22 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: opcode=0x2 sd 0:0:1:0: [sg0] tag#301 CDB[00]: 02 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 binder: 5824:5825 ioctl c0306201 20007000 returned -22 sd 0:0:1:0: [sg0] tag#770 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#770 CDB: opcode=0x2 sd 0:0:1:0: [sg0] tag#770 CDB[00]: 02 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#770 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#770 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: opcode=0x2 sd 0:0:1:0: [sg0] tag#301 CDB[00]: 02 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: opcode=0x2 sd 0:0:1:0: [sg0] tag#301 CDB[00]: 02 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#770 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#770 CDB: opcode=0x2 sd 0:0:1:0: [sg0] tag#770 CDB[00]: 02 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#770 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#770 CDB[20]: 00 00 00 keychord: invalid keycode count 0 keychord: invalid keycode count 0 IPVS: Creating netns size=2536 id=9 pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads random: crng init done IPVS: Creating netns size=2536 id=10 pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads mmap: syz-executor4 (6303) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. audit: type=1400 audit(1520309741.135:21): avc: denied { setuid } for pid=6550 comm="syz-executor6" capability=7 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 binder: 6663:6668 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 6663:6681 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1400 audit(1520309742.115:22): avc: denied { write } for pid=6948 comm="syz-executor2" name="net" dev="proc" ino=17206 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 audit: type=1400 audit(1520309742.165:23): avc: denied { add_name } for pid=6948 comm="syz-executor2" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 audit: type=1400 audit(1520309742.185:24): avc: denied { create } for pid=6948 comm="syz-executor2" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 scsi_io_completion: 114 callbacks suppressed sd 0:0:1:0: [sg0] tag#806 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#806 CDB: Test Unit Ready sd 0:0:1:0: [sg0] tag#806 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#806 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: Test Unit Ready sd 0:0:1:0: [sg0] tag#301 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: Verify(10) sd 0:0:1:0: [sg0] tag#301 CDB[00]: 2f 70 72 6f 63 2f 73 65 6c 66 2f 6e 65 74 2f 70 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 66 6b 65 79 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: Test Unit Ready sd 0:0:1:0: [sg0] tag#301 CDB[00]: 00 07 70 6f 72 74 30 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: Test Unit Ready sd 0:0:1:0: [sg0] tag#301 CDB[00]: 00 07 70 6f 72 74 30 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: Test Unit Ready sd 0:0:1:0: [sg0] tag#301 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: Read(6) sd 0:0:1:0: [sg0] tag#301 CDB[00]: 08 00 00 00 07 00 00 00 02 00 00 00 90 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 05 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor1/7134 caller is __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 CPU: 1 PID: 7134 Comm: syz-executor1 Not tainted 4.9.86-gb324a70 #58 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d06c7668 ffffffff81d956f9 0000000000000001 ffffffff83c19000 ffffffff83f45e20 ffff8801d0529800 0000000000000003 ffff8801d06c76a8 ffffffff81dfccf4 ffff8801d06c76c0 ffffffff83f45e20 dffffc0000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] check_preemption_disabled+0x1d4/0x200 lib/smp_processor_id.c:46 [] __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 [] ipcomp_alloc_tfms net/xfrm/xfrm_ipcomp.c:286 [inline] [] ipcomp_init_state+0x188/0x930 net/xfrm/xfrm_ipcomp.c:363 [] ipcomp4_init_state+0xb0/0x7d0 net/ipv4/ipcomp.c:137 [] __xfrm_init_state+0x3e7/0xb30 net/xfrm/xfrm_state.c:2096 [] xfrm_init_state+0x1a/0x20 net/xfrm/xfrm_state.c:2122 [] pfkey_msg2xfrm_state net/key/af_key.c:1289 [inline] [] pfkey_add+0x1fb9/0x3470 net/key/af_key.c:1506 [] pfkey_process+0x68b/0x750 net/key/af_key.c:2834 [] pfkey_sendmsg+0x3a9/0x760 net/key/af_key.c:3678 [] sock_sendmsg_nosec net/socket.c:635 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:645 [] ___sys_sendmsg+0x6d1/0x7e0 net/socket.c:1969 [] __sys_sendmsg+0xd6/0x190 net/socket.c:2003 [] C_SYSC_sendmsg net/compat.c:734 [inline] [] compat_SyS_sendmsg+0x2a/0x40 net/compat.c:732 [] do_syscall_32_irqs_on arch/x86/entry/common.c:325 [inline] [] do_fast_syscall_32+0x2f5/0x870 arch/x86/entry/common.c:387 [] entry_SYSENTER_compat+0x90/0xa2 arch/x86/entry/entry_64_compat.S:137 sd 0:0:1:0: [sg0] tag#806 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#301 CDB: Verify(10) sd 0:0:1:0: [sg0] tag#301 CDB[00]: 2f 73 65 6c 69 6e 75 78 2f 70 6f 6c 69 63 79 00 sd 0:0:1:0: [sg0] tag#301 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#301 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#806 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#806 CDB: Verify(10) sd 0:0:1:0: [sg0] tag#806 CDB[00]: 2f 73 65 6c 69 6e 75 78 2f 70 6f 6c 69 63 79 00 sd 0:0:1:0: [sg0] tag#806 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#806 CDB[20]: 00 00 00 sd 0:0:1:0: [sg0] tag#806 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#806 CDB: Test Unit Ready sd 0:0:1:0: [sg0] tag#806 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#806 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#806 CDB[20]: 00 00 00 audit: type=1400 audit(1520309743.435:25): avc: denied { bind } for pid=7289 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26224 sclass=netlink_route_socket pig=7317 comm=syz-executor2 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26224 sclass=netlink_route_socket pig=7320 comm=syz-executor2 audit: type=1400 audit(1520309743.885:26): avc: denied { validate_trans } for pid=7500 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 binder: 7686:7693 BC_FREE_BUFFER u000000002000c000 matched unreturned buffer binder_alloc: 7686:7693 FREE_BUFFER u000000002000c000 user freed buffer twice binder: 7686:7693 BC_FREE_BUFFER u000000002000c000 no match audit: type=1400 audit(1520309744.345:27): avc: denied { net_broadcast } for pid=7686 comm="syz-executor2" capability=11 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 binder: BINDER_SET_CONTEXT_MGR already set binder: 7686:7693 ioctl 40046207 0 returned -16 binder_alloc: 7686: binder_alloc_buf, no vma binder: 7686:7711 transaction failed 29189/-3, size 0-0 line 3127 binder: 7686:7716 BC_FREE_BUFFER u000000002000c000 no match binder: undelivered TRANSACTION_ERROR: 29189 binder: release 7686:7693 transaction 15 out, still active binder: undelivered TRANSACTION_COMPLETE binder: send failed reply for transaction 15, target dead audit: type=1400 audit(1520309744.925:28): avc: denied { getopt } for pid=7990 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59 sclass=netlink_route_socket pig=8361 comm=syz-executor2 audit: type=1400 audit(1520309745.725:29): avc: denied { create } for pid=8414 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 IPVS: Creating netns size=2536 id=11 IPVS: Creating netns size=2536 id=12 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11088 sclass=netlink_route_socket pig=8613 comm=syz-executor2 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11088 sclass=netlink_route_socket pig=8613 comm=syz-executor2 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58148 sclass=netlink_route_socket pig=8971 comm=syz-executor3 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.