WARNING: can't dereference registers at 0000000000000314 for ip entry_SYSCALL_64_after_hwframe+0x46/0xbb device team1 entered promiscuous mode ISOFS: Unable to identify CD-ROM format. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. EXT4-fs warning (device loop2): ext4_multi_mount_protect:287: Invalid MMP block in superblock EXT4-fs warning (device loop2): ext4_multi_mount_protect:287: Invalid MMP block in superblock netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. ====================================================== WARNING: the mand mount option is being deprecated and will be removed in v5.15! ====================================================== netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. batman_adv: batadv0: Interface deactivated: batadv_slave_0 batman_adv: batadv0: Removing interface: batadv_slave_0 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. Invalid argument reading file caps for ./file0 ptrace attach of "/root/syz-executor.3 exec"[13088] was attempted by "/root/syz-executor.3 exec"[13092] Invalid argument reading file caps for ./file0 ptrace attach of "/root/syz-executor.3 exec"[13112] was attempted by "/root/syz-executor.3 exec"[13116] Invalid argument reading file caps for ./file0 ptrace attach of ""[13125] was attempted by "/root/syz-executor.3 exec"[13130] Invalid argument reading file caps for ./file0 ptrace attach of "/root/syz-executor.3 exec"[13152] was attempted by "/root/syz-executor.3 exec"[13156] audit: type=1804 audit(1639125081.926:23): pid=13229 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir045502781/syzkaller.cxetMu/107/bus" dev="sda1" ino=14297 res=1 audit: type=1800 audit(1639125081.926:24): pid=13229 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=14297 res=0 netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. bridge0: port 2(bridge_slave_1) entered disabled state bridge0: port 1(bridge_slave_0) entered disabled state device bridge0 entered promiscuous mode audit: type=1800 audit(1639125082.686:25): pid=13269 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=14297 res=0 netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. xt_CONNSECMARK: cannot load conntrack support for proto=10 bridge0: port 2(bridge_slave_1) entered blocking state bridge0: port 2(bridge_slave_1) entered forwarding state bridge0: port 1(bridge_slave_0) entered blocking state bridge0: port 1(bridge_slave_0) entered forwarding state audit: type=1804 audit(1639125083.456:26): pid=13315 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir045502781/syzkaller.cxetMu/108/bus" dev="sda1" ino=14313 res=1 device bridge0 left promiscuous mode IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready bridge0: port 2(bridge_slave_1) entered disabled state bridge0: port 1(bridge_slave_0) entered disabled state audit: type=1800 audit(1639125083.466:27): pid=13315 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=14313 res=0 xt_CONNSECMARK: cannot load conntrack support for proto=10 device bridge0 entered promiscuous mode netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. audit: type=1804 audit(1639125084.286:28): pid=13351 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir825218424/syzkaller.t7tFaj/128/bus" dev="sda1" ino=14328 res=1