====================================================== WARNING: the mand mount option is being deprecated and will be removed in v5.15! ====================================================== Bluetooth: hci3 command 0x0419 tx timeout Bluetooth: hci2 command 0x0419 tx timeout batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! Bluetooth: hci1 command 0x0419 tx timeout Bluetooth: hci4 command 0x0419 tx timeout batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 Bluetooth: hci0 command 0x0419 tx timeout Bluetooth: hci5 command 0x0419 tx timeout batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 block nbd2: server does not support multiple connections per device. audit: type=1804 audit(1630050756.155:3): pid=9374 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir661806941/syzkaller.I8ZduR/0/bus" dev="sda1" ino=13898 res=1 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! block nbd2: shutting down sockets IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready batman_adv: batadv0: Interface activated: batadv_slave_0 EXT4-fs (sda1): re-mounted. Opts: (null) batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 EXT4-fs (sda1): re-mounted. Opts: (null) batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! audit: type=1804 audit(1630050756.405:4): pid=9441 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir549754775/syzkaller.jjAQzI/4/bus" dev="sda1" ino=13895 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 WARNING: can't dereference registers at 00000000000008cf for ip retint_user+0x8/0x18 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 audit: type=1804 audit(1630050756.525:5): pid=9445 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir661806941/syzkaller.I8ZduR/1/bus" dev="sda1" ino=13902 res=1 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready batman_adv: batadv0: Interface activated: batadv_slave_1 IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready audit: type=1804 audit(1630050757.545:6): pid=9480 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir437214387/syzkaller.eIdbbw/3/bus" dev="sda1" ino=13915 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1630050758.645:7): pid=9516 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir733992216/syzkaller.zF1LNU/1/bus" dev="sda1" ino=13928 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. ptrace attach of "/root/syz-executor.4"[7987] was attempted by "HH HtH % f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f% f4 t$\x0c+ T$\x22 H% \x0bH|$Y  SdH% H  dH%( H$ 1H9$\x0at>d% u \x0a1 \x0at\x0cH=\x0a H\x0aڌ\x0a=ߌ\x0a u2HT$ 1HH1\x0a  H$ { \x0a \x0a \x0aȉx\x0auDHo\x0a d% u\x0dU\x0a%M\x0a~\x1bE1Һ H=0\x0a  dH% H9\x0at>d% u \x0a1 \x0at\x0cH=\x0a{~ H܋\x0aҋ\x0au>H$ 1& \x0a H$ HH׹ 1ҿ  =\x0au\x0a   =u\x0au\x0bi\x0a =a\x0au audit: type=1804 audit(1630050760.216:8): pid=9567 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir549754775/syzkaller.jjAQzI/5/bus" dev="sda1" ino=13930 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1630050760.326:9): pid=9566 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir661806941/syzkaller.I8ZduR/2/bus" dev="sda1" ino=13929 res=1 audit: type=1804 audit(1630050761.486:10): pid=9592 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir437214387/syzkaller.eIdbbw/4/bus" dev="sda1" ino=13936 res=1 audit: type=1804 audit(1630050761.866:11): pid=9609 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir733992216/syzkaller.zF1LNU/2/bus" dev="sda1" ino=13938 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1630050762.096:12): pid=9618 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir437214387/syzkaller.eIdbbw/5/bus" dev="sda1" ino=13927 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1630050762.766:13): pid=9632 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir661806941/syzkaller.I8ZduR/3/bus" dev="sda1" ino=13932 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1630050764.276:14): pid=9664 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir549754775/syzkaller.jjAQzI/6/bus" dev="sda1" ino=13921 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. IPVS: ftp: loaded support on port[0] = 21