====================================================== WARNING: the mand mount option is being deprecated and will be removed in v5.15! ====================================================== audit: type=1804 audit(1630066401.967:5): pid=14322 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir477144081/syzkaller.6Pb6Nv/212/bus" dev="sda1" ino=14385 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1630066402.167:6): pid=14333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir650571983/syzkaller.rToTCN/224/bus" dev="sda1" ino=14404 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1630066402.307:7): pid=14336 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir731738058/syzkaller.a3HJIc/111/bus" dev="sda1" ino=14019 res=1 NILFS (loop3): broken superblock, retrying with spare superblock (blocksize = 1024) NILFS (loop3): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds audit: type=1804 audit(1630066403.047:8): pid=14358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir650571983/syzkaller.rToTCN/225/bus" dev="sda1" ino=14404 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. Process accounting resumed Process accounting resumed netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. audit: type=1804 audit(1630066405.428:9): pid=14433 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir477144081/syzkaller.6Pb6Nv/213/bus" dev="sda1" ino=14377 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. sd 0:0:1:0: [sg0] tag#5935 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#5935 CDB: Verify(6) sd 0:0:1:0: [sg0] tag#5935 CDB[00]: 13 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 sd 0:0:1:0: [sg0] tag#5935 CDB[10]: 2a ef da 0b 61 a8 54 51 46 73 ab fe 44 d5 dd ee sd 0:0:1:0: [sg0] tag#5935 CDB[20]: b3 80 ce 94 f9 04 b6 80 fe 11 37 d7 4d f4 ae 77 sd 0:0:1:0: [sg0] tag#5935 CDB[30]: 88 fb 57 e3 fa 38 50 b1 0d 12 b5 13 ef 35 72 b0 sd 0:0:1:0: [sg0] tag#5935 CDB[40]: e0 91 51 f7 12 b6 5d 90 28 66 13 4a 28 ca f6 d1 sd 0:0:1:0: [sg0] tag#5935 CDB[50]: fb f9 0a 9d ea 3f 7e 6a 33 1c 4b 76 44 c0 0b bf sd 0:0:1:0: [sg0] tag#5935 CDB[60]: 1e 30 80 a2 36 c5 3a 53 60 14 2b 78 2a 33 66 5e sd 0:0:1:0: [sg0] tag#5935 CDB[70]: f7 0f 00 40 a7 ce bc 62 05 f0 89 b1 5a fb 9b 55 sd 0:0:1:0: [sg0] tag#5935 CDB[80]: f0 a0 c8 c0 5d 33 7d b9 f0 d7 8a 1f 2a 7e 7c 59 sd 0:0:1:0: [sg0] tag#5935 CDB[90]: fc 95 ee ea dd e9 f6 wlan1: Trigger new scan to find an IBSS to join sd 0:0:1:0: [sg0] tag#5935 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#5935 CDB: Verify(6) sd 0:0:1:0: [sg0] tag#5935 CDB[00]: 13 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 sd 0:0:1:0: [sg0] tag#5935 CDB[10]: 2a ef da 0b 61 a8 54 51 46 73 ab fe 44 d5 dd ee sd 0:0:1:0: [sg0] tag#5935 CDB[20]: b3 80 ce 94 f9 04 b6 80 fe 11 37 d7 4d f4 ae 77 sd 0:0:1:0: [sg0] tag#5935 CDB[30]: 88 fb 57 e3 fa 38 50 b1 0d 12 b5 13 ef 35 72 b0 sd 0:0:1:0: [sg0] tag#5935 CDB[40]: e0 91 51 f7 12 b6 5d 90 28 66 13 4a 28 ca f6 d1 sd 0:0:1:0: [sg0] tag#5935 CDB[50]: fb f9 0a 9d ea 3f 7e 6a 33 1c 4b 76 44 c0 0b bf sd 0:0:1:0: [sg0] tag#5935 CDB[60]: 1e 30 80 a2 36 c5 3a 53 60 14 2b 78 2a 33 66 5e sd 0:0:1:0: [sg0] tag#5935 CDB[70]: f7 0f 00 40 a7 ce bc 62 05 f0 89 b1 5a fb 9b 55 sd 0:0:1:0: [sg0] tag#5935 CDB[80]: f0 a0 c8 c0 5d 33 7d b9 f0 d7 8a 1f 2a 7e 7c 59 sd 0:0:1:0: [sg0] tag#5935 CDB[90]: fc 95 ee ea dd e9 f6 audit: type=1804 audit(1630066407.388:10): pid=14480 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir477144081/syzkaller.6Pb6Nv/214/bus" dev="sda1" ino=14421 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. sd 0:0:1:0: [sg0] tag#5965 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#5965 CDB: Verify(6) sd 0:0:1:0: [sg0] tag#5965 CDB[00]: 13 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 sd 0:0:1:0: [sg0] tag#5965 CDB[10]: 2a ef da 0b 61 a8 54 51 46 73 ab fe 44 d5 dd ee sd 0:0:1:0: [sg0] tag#5965 CDB[20]: b3 80 ce 94 f9 04 b6 80 fe 11 37 d7 4d f4 ae 77 sd 0:0:1:0: [sg0] tag#5965 CDB[30]: 88 fb 57 e3 fa 38 50 b1 0d 12 b5 13 ef 35 72 b0 sd 0:0:1:0: [sg0] tag#5965 CDB[40]: e0 91 51 f7 12 b6 5d 90 28 66 13 4a 28 ca f6 d1 sd 0:0:1:0: [sg0] tag#5965 CDB[50]: fb f9 0a 9d ea 3f 7e 6a 33 1c 4b 76 44 c0 0b bf sd 0:0:1:0: [sg0] tag#5965 CDB[60]: 1e 30 80 a2 36 c5 3a 53 60 14 2b 78 2a 33 66 5e sd 0:0:1:0: [sg0] tag#5965 CDB[70]: f7 0f 00 40 a7 ce bc 62 05 f0 89 b1 5a fb 9b 55 sd 0:0:1:0: [sg0] tag#5965 CDB[80]: f0 a0 c8 c0 5d 33 7d b9 f0 d7 8a 1f 2a 7e 7c 59 sd 0:0:1:0: [sg0] tag#5965 CDB[90]: fc 95 ee ea dd e9 f6 audit: type=1800 audit(1630066408.918:11): pid=14535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14424 res=0 audit: type=1800 audit(1630066408.918:12): pid=14535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14424 res=0 FAT-fs (loop0): Unrecognized mount option "1844674407370955161500000000000000000004ÿÿ" or missing value EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue