sctp: [Deprecated]: syz-executor.0 (pid 11840) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead WARNING: can't dereference registers at ffff8880b482a2a8 for ip common_interrupt+0x93/0x93 arch/x86/entry/entry_64.S:576 xt_TCPMSS: Only works on TCP SYN packets netlink: 84 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 84 bytes leftover after parsing attributes in process `syz-executor.0'. cannot load conntrack support for proto=3 cramfs: wrong magic cramfs: wrong magic TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. ********************************************************** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** IPVS: ftp: loaded support on port[0] = 21 ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging ** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ********************************************************** device batadv_slave_0 entered promiscuous mode device batadv_slave_0 left promiscuous mode __ntfs_error: 95 callbacks suppressed ntfs: (device nullb0): parse_options(): Unrecognized mount option tmpfs. overlayfs: fs on './file0' does not support file handles, falling back to index=off. audit: type=1804 audit(1616712661.984:113): pid=12145 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir154294769/syzkaller.euZBn0/38/bus/file0" dev="sda1" ino=14124 res=1 tmpfs: No value for mount option '00000000000000060928' audit: type=1800 audit(1616712661.984:114): pid=12145 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=14124 res=0 batman_adv: batadv0: Interface deactivated: batadv_slave_0 batman_adv: batadv0: Removing interface: batadv_slave_0 batman_adv: batadv0: Interface deactivated: batadv_slave_1 batman_adv: batadv0: Removing interface: batadv_slave_1 device bridge_slave_1 left promiscuous mode bridge0: port 2(bridge_slave_1) entered disabled state overlayfs: fs on '.' does not support file handles, falling back to index=off. overlayfs: 'file0' not a directory device bridge_slave_0 left promiscuous mode ntfs: (device nullb0): parse_options(): Unrecognized mount option tmpfs. bridge0: port 1(bridge_slave_0) entered disabled state overlayfs: filesystem on './bus' not supported as upperdir tmpfs: No value for mount option '00000000000000060928' audit: type=1804 audit(1616712662.324:115): pid=12142 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir154294769/syzkaller.euZBn0/38/bus/bus/file0" dev="sda1" ino=14135 res=1 device veth1_macvtap left promiscuous mode device veth0_macvtap left promiscuous mode audit: type=1800 audit(1616712662.324:116): pid=12142 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=14135 res=0 device veth1_vlan left promiscuous mode device veth0_vlan left promiscuous mode device hsr_slave_1 left promiscuous mode device hsr_slave_0 left promiscuous mode team0 (unregistering): Port device team_slave_1 removed team0 (unregistering): Port device team_slave_0 removed bond0 (unregistering): Releasing backup interface bond_slave_1 bond0 (unregistering): Releasing backup interface bond_slave_0 bond0 (unregistering): Released all slaves