WARNING: can't dereference registers at 00000000000007c7 for ip retint_user+0x8/0x18 team0: Cannot enslave team device to itself batman_adv: batadv0: Adding interface: team0 batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Interface activated: team0 md: superblock version 1744830464 not known md: couldn't set array info. -22 batman_adv: batadv0: Interface deactivated: team0 md: superblock version 1744830464 not known batman_adv: batadv0: Removing interface: team0 md: couldn't set array info. -22 team0: Cannot enslave team device to itself md: superblock version 1744830464 not known batman_adv: batadv0: Adding interface: team0 batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. md: couldn't set array info. -22 md: superblock version 1744830464 not known md: couldn't set array info. -22 batman_adv: batadv0: Interface activated: team0 md: superblock version 1744830464 not known md: couldn't set array info. -22 batman_adv: batadv0: Interface deactivated: team0 batman_adv: batadv0: Removing interface: team0 team0: Cannot enslave team device to itself batman_adv: batadv0: Adding interface: team0 batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Interface activated: team0 team0: Cannot enslave team device to itself batman_adv: batadv0: Interface deactivated: team0 batman_adv: batadv0: Removing interface: team0 team0: Cannot enslave team device to itself batman_adv: batadv0: Adding interface: team0 batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Interface activated: team0 batman_adv: batadv0: Adding interface: team0 batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Interface activated: team0 batman_adv: batadv0: Interface deactivated: team0 batman_adv: batadv0: Removing interface: team0 team0: Cannot enslave team device to itself batman_adv: batadv0: Adding interface: team0 batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Interface activated: team0 batman_adv: batadv0: Interface deactivated: team0 overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. batman_adv: batadv0: Removing interface: team0 team0: Cannot enslave team device to itself batman_adv: batadv0: Adding interface: team0 batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Interface activated: team0 audit: type=1804 audit(1608072583.436:2): pid=9888 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir455326437/syzkaller.2ygIwE/17/bus" dev="sda1" ino=15792 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. tmpfs: No value for mount option 'measure' audit: type=1804 audit(1608072583.646:3): pid=9912 uid=0 auid=0 ses=4 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir455326437/syzkaller.2ygIwE/17/bus" dev="sda1" ino=15792 res=1 audit: type=1804 audit(1608072583.827:4): pid=9903 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir455326437/syzkaller.2ygIwE/17/bus" dev="sda1" ino=15792 res=1 audit: type=1804 audit(1608072584.277:5): pid=9941 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir096838022/syzkaller.9P1CzD/12/bus" dev="sda1" ino=15819 res=1 tmpfs: No value for mount option 'measure' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1608072584.307:6): pid=9943 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir455326437/syzkaller.2ygIwE/18/bus" dev="sda1" ino=15820 res=1 tmpfs: No value for mount option 'measure' TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. sch_tbf: burst 0 is lower than device lo mtu (65550) ! TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1608072584.437:7): pid=9962 uid=0 auid=0 ses=4 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir455326437/syzkaller.2ygIwE/18/bus" dev="sda1" ino=15820 res=1 tmpfs: No value for mount option 'measure' sch_tbf: burst 0 is lower than device lo mtu (65550) ! sch_tbf: burst 0 is lower than device lo mtu (65550) ! audit: type=1804 audit(1608072584.467:8): pid=9963 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir171837399/syzkaller.bwVFqM/15/bus" dev="sda1" ino=15818 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. audit: type=1804 audit(1608072584.507:9): pid=9968 uid=0 auid=0 ses=4 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir096838022/syzkaller.9P1CzD/12/bus" dev="sda1" ino=15819 res=1 sch_tbf: burst 0 is lower than device lo mtu (65550) ! audit: type=1804 audit(1608072584.567:10): pid=9975 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir455326437/syzkaller.2ygIwE/19/bus" dev="sda1" ino=15815 res=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. audit: type=1804 audit(1608072584.587:11): pid=9979 uid=0 auid=0 ses=4 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir171837399/syzkaller.bwVFqM/15/bus" dev="sda1" ino=15818 res=1 device veth0_to_batadv entered promiscuous mode PPPIOCDETACH file->f_count=2 device veth0_to_batadv left promiscuous mode device veth0_to_batadv entered promiscuous mode device veth0_to_batadv left promiscuous mode CIFS VFS: Device name not specified. CIFS VFS: Malformed UNC in devname. device veth0_to_batadv entered promiscuous mode CIFS VFS: Device name not specified. CIFS VFS: Malformed UNC in devname. PPPIOCDETACH file->f_count=2 CIFS VFS: Device name not specified. device veth0_to_batadv left promiscuous mode CIFS VFS: Malformed UNC in devname. CIFS VFS: Device name not specified. CIFS VFS: Malformed UNC in devname. device veth0_to_batadv entered promiscuous mode PPPIOCDETACH file->f_count=2 device veth0_to_batadv left promiscuous mode device veth0_to_batadv entered promiscuous mode PPPIOCDETACH file->f_count=2 device veth0_to_batadv left promiscuous mode