128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) r6 = open(&(0x7f0000000240)='./bus\x00', 0x10d100, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x40, 0x40, 0x80, 0x80, 0x0, 0x8, 0x501, 0xf, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x800, 0x2}, 0x800, 0x2, 0x2, 0x2, 0x0, 0x6, 0x1000, 0x0, 0x6, 0x0, 0x4}, r1, 0x6, r6, 0x3) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) process_vm_writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/1, 0x1}, {&(0x7f0000000140)=""/85, 0x55}], 0x2, &(0x7f0000000540)=[{&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f0000000440)=""/237, 0xed}], 0x5, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) open(&(0x7f0000000240)='./bus\x00', 0x10d100, 0x0) (async) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x40, 0x40, 0x80, 0x80, 0x0, 0x8, 0x501, 0xf, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x800, 0x2}, 0x800, 0x2, 0x2, 0x2, 0x0, 0x6, 0x1000, 0x0, 0x6, 0x0, 0x4}, r1, 0x6, r6, 0x3) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) 16:41:00 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200060000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:00 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fc070000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000fffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 901.670056] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:00 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000090000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020206020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000001fffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:00 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200068000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 901.750216] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 901.852544] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 901.885559] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000f0ffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:00 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000000a0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 902.240981] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 902.342988] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYRES32=r2]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:01 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r5}, 0x10) io_submit(0x0, 0xa, &(0x7f0000001a40)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x7, r2, &(0x7f0000000340)="99e26105dd17ad53aded146b79994eedf12716d8377c1f4a522a62cda4cccef225f8eb91ef0ff755265acd6c8f5a21f653447d924f67e5c9afbed56cbf989319f7d3a5140419a849d88cebc48252d0a15fdceec4286519bfbf7934433ddf7f650d07edfd8802942b4a208716ff94306c02273301bee7c9b9b644b0b5fe6df48325be2bc98327738f0bbd949b1b5d92825f5b3bd5b601728be3129d2e7e0fb76941246790ecce2cd58d99ca95713a3e2f94f1199278c0f82a6a6864176995639b8ac0091bf2b05cbb75c0173fd21e048705860d6e7ea2d5578964a1", 0xdb, 0x2, 0x0, 0x3, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x8625, 0xffffffffffffffff, &(0x7f0000000140)="99643ff2f3f8a1fafc509364261e5a2640dd213e1a4acb2f77deaf104d75d3be8885", 0x22, 0x400, 0x0, 0x3, r3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x0, r4, &(0x7f0000000440)="4259e5fcb608b0588d4706f4b8ce073153c01db7007d563c58fda114657134a158532301c37e82459dc3eaaab72a2563af63dcd2e4f65ccf28ab635aff90c87846dbd30d588c58333e76d32623a3568ffb2bfbec7c25c5a23a1e39193a69691c480728a9a5dfd261b264e06732beb8faaed6a1ba40e38ca9d1652bb403415de2875d02054756559fa490a33b596a243bed9f2c29eb6d6fad7731458c7323ffe4115bcb14a09d0aa06084eef1cc3bcfc6392452d80e01c5ae", 0xb8, 0x100, 0x0, 0x3, r4}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x3, r0, &(0x7f0000000240)="387eceb48295ba0c6fa9d50a9cc639a08275a396f6f4c6536ae198564e87386bcc870bd0618c77e22293045f", 0x2c, 0x7, 0x0, 0x0, r0}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x0, r4, &(0x7f0000000500)="9c4c193a99afa8107061ec8d507bdb071d2de0a258c76fe3d64d56a41477c4e4b131", 0x22, 0x8001}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x2, 0x577, r0, &(0x7f00000005c0)="d5b7dcdcbe650cf477daa94d680e7bdc3dafeb8d77ce97cbcc356fe1281f42c14182370863745d9c1753b8ea4cceaa906e7cc15f002ad64f7227eee08e87ac9b", 0x40, 0x5, 0x0, 0x2, r4}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0xbd2d, r4, &(0x7f0000000640)="3634858d2982fce1bd09192ed32572921d460245d7d0ee358b687b7c04084fe47ff78c6ef5ce86dd1cb1dbd4d82b37b0c9df6f0658b213bcbfa4d0aa60d8bd26dd382fa0ce639ca55488f7d5947ce52f876932c1b14306d00c068c4167bd5ab2e97f18b1aaef9e6ae7d142d3d7f3477b29ad3ab61ce4cdfda0e3182584c18c1cf8452a3c", 0x84, 0xffffffff}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f0000000880)="c959bdf2a2839b0d2a18f73f2b2589179621dc9807afb6073b8ea58a79f896fedd2a389146b74a73710c003c5a9c4d3883993fa2f10f97c9b0527417ff7bbc9271d3c55128414f8e460a44ac61f9dd98b8fcb0c4cc2961329cc90ad0590de9f676fa9954f13d2b780df587e7e256ba2d9e8cf0d74f739727d60ddd1f13fbfc1537ead824c44455be48e938e6a439b8ae93ec73746527b301980d6c0a596d30429c1debdede279bd207ab20305f61f2bb199e3e1fd74b2b115646c18edf644c", 0xbf, 0x0, 0x0, 0x7}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x5, 0x4, r5, &(0x7f0000000980)="e1baadd274960074a632bbf3c702fc39", 0x10, 0x4, 0x0, 0x1, r3}, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x5, 0x48f, r2, &(0x7f0000000a00)="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", 0x1000, 0x2, 0x0, 0x2, r4}]) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r7, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020206320202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:01 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020006c000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000fcfdffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:01 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000000c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 903.044895] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:01 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200074000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 903.112383] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020206420202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:01 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000000e0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 903.185308] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000fdfdffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:02 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000200000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 903.376501] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:02 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020007a000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 903.437857] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 903.662325] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 903.756719] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000007fffffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:02 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000230000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:02 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r5}, 0x10) (async) io_submit(0x0, 0xa, &(0x7f0000001a40)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x7, r2, &(0x7f0000000340)="99e26105dd17ad53aded146b79994eedf12716d8377c1f4a522a62cda4cccef225f8eb91ef0ff755265acd6c8f5a21f653447d924f67e5c9afbed56cbf989319f7d3a5140419a849d88cebc48252d0a15fdceec4286519bfbf7934433ddf7f650d07edfd8802942b4a208716ff94306c02273301bee7c9b9b644b0b5fe6df48325be2bc98327738f0bbd949b1b5d92825f5b3bd5b601728be3129d2e7e0fb76941246790ecce2cd58d99ca95713a3e2f94f1199278c0f82a6a6864176995639b8ac0091bf2b05cbb75c0173fd21e048705860d6e7ea2d5578964a1", 0xdb, 0x2, 0x0, 0x3, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x8625, 0xffffffffffffffff, &(0x7f0000000140)="99643ff2f3f8a1fafc509364261e5a2640dd213e1a4acb2f77deaf104d75d3be8885", 0x22, 0x400, 0x0, 0x3, r3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x0, r4, &(0x7f0000000440)="4259e5fcb608b0588d4706f4b8ce073153c01db7007d563c58fda114657134a158532301c37e82459dc3eaaab72a2563af63dcd2e4f65ccf28ab635aff90c87846dbd30d588c58333e76d32623a3568ffb2bfbec7c25c5a23a1e39193a69691c480728a9a5dfd261b264e06732beb8faaed6a1ba40e38ca9d1652bb403415de2875d02054756559fa490a33b596a243bed9f2c29eb6d6fad7731458c7323ffe4115bcb14a09d0aa06084eef1cc3bcfc6392452d80e01c5ae", 0xb8, 0x100, 0x0, 0x3, r4}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x3, r0, &(0x7f0000000240)="387eceb48295ba0c6fa9d50a9cc639a08275a396f6f4c6536ae198564e87386bcc870bd0618c77e22293045f", 0x2c, 0x7, 0x0, 0x0, r0}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x0, r4, &(0x7f0000000500)="9c4c193a99afa8107061ec8d507bdb071d2de0a258c76fe3d64d56a41477c4e4b131", 0x22, 0x8001}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x2, 0x577, r0, &(0x7f00000005c0)="d5b7dcdcbe650cf477daa94d680e7bdc3dafeb8d77ce97cbcc356fe1281f42c14182370863745d9c1753b8ea4cceaa906e7cc15f002ad64f7227eee08e87ac9b", 0x40, 0x5, 0x0, 0x2, r4}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0xbd2d, r4, &(0x7f0000000640)="3634858d2982fce1bd09192ed32572921d460245d7d0ee358b687b7c04084fe47ff78c6ef5ce86dd1cb1dbd4d82b37b0c9df6f0658b213bcbfa4d0aa60d8bd26dd382fa0ce639ca55488f7d5947ce52f876932c1b14306d00c068c4167bd5ab2e97f18b1aaef9e6ae7d142d3d7f3477b29ad3ab61ce4cdfda0e3182584c18c1cf8452a3c", 0x84, 0xffffffff}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f0000000880)="c959bdf2a2839b0d2a18f73f2b2589179621dc9807afb6073b8ea58a79f896fedd2a389146b74a73710c003c5a9c4d3883993fa2f10f97c9b0527417ff7bbc9271d3c55128414f8e460a44ac61f9dd98b8fcb0c4cc2961329cc90ad0590de9f676fa9954f13d2b780df587e7e256ba2d9e8cf0d74f739727d60ddd1f13fbfc1537ead824c44455be48e938e6a439b8ae93ec73746527b301980d6c0a596d30429c1debdede279bd207ab20305f61f2bb199e3e1fd74b2b115646c18edf644c", 0xbf, 0x0, 0x0, 0x7}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x5, 0x4, r5, &(0x7f0000000980)="e1baadd274960074a632bbf3c702fc39", 0x10, 0x4, 0x0, 0x1, r3}, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x5, 0x48f, r2, &(0x7f0000000a00)="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", 0x1000, 0x2, 0x0, 0x2, r4}]) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r7, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f0000000340)={0x2020}, 0x2020) ioctl$sock_inet6_tcp_SIOCATMARK(r5, 0x8905, &(0x7f0000000000)) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020207020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:02 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000f0000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 904.377401] kauditd_printk_skb: 27 callbacks suppressed [ 904.377415] audit: type=1804 audit(1642437662.947:4862): pid=2663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1548/bus" dev="sda1" ino=14130 res=1 [ 904.392437] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000008cffffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:03 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000003f0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020f720202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 904.422447] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 904.446184] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 904.505401] audit: type=1804 audit(1642437663.067:4863): pid=2665 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1548/bus" dev="sda1" ino=14130 res=1 16:41:03 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r5}, 0x10) (async) io_submit(0x0, 0xa, &(0x7f0000001a40)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x7, r2, &(0x7f0000000340)="99e26105dd17ad53aded146b79994eedf12716d8377c1f4a522a62cda4cccef225f8eb91ef0ff755265acd6c8f5a21f653447d924f67e5c9afbed56cbf989319f7d3a5140419a849d88cebc48252d0a15fdceec4286519bfbf7934433ddf7f650d07edfd8802942b4a208716ff94306c02273301bee7c9b9b644b0b5fe6df48325be2bc98327738f0bbd949b1b5d92825f5b3bd5b601728be3129d2e7e0fb76941246790ecce2cd58d99ca95713a3e2f94f1199278c0f82a6a6864176995639b8ac0091bf2b05cbb75c0173fd21e048705860d6e7ea2d5578964a1", 0xdb, 0x2, 0x0, 0x3, r4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x8625, 0xffffffffffffffff, &(0x7f0000000140)="99643ff2f3f8a1fafc509364261e5a2640dd213e1a4acb2f77deaf104d75d3be8885", 0x22, 0x400, 0x0, 0x3, r3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x0, r4, &(0x7f0000000440)="4259e5fcb608b0588d4706f4b8ce073153c01db7007d563c58fda114657134a158532301c37e82459dc3eaaab72a2563af63dcd2e4f65ccf28ab635aff90c87846dbd30d588c58333e76d32623a3568ffb2bfbec7c25c5a23a1e39193a69691c480728a9a5dfd261b264e06732beb8faaed6a1ba40e38ca9d1652bb403415de2875d02054756559fa490a33b596a243bed9f2c29eb6d6fad7731458c7323ffe4115bcb14a09d0aa06084eef1cc3bcfc6392452d80e01c5ae", 0xb8, 0x100, 0x0, 0x3, r4}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x3, r0, &(0x7f0000000240)="387eceb48295ba0c6fa9d50a9cc639a08275a396f6f4c6536ae198564e87386bcc870bd0618c77e22293045f", 0x2c, 0x7, 0x0, 0x0, r0}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x0, r4, &(0x7f0000000500)="9c4c193a99afa8107061ec8d507bdb071d2de0a258c76fe3d64d56a41477c4e4b131", 0x22, 0x8001}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x2, 0x577, r0, &(0x7f00000005c0)="d5b7dcdcbe650cf477daa94d680e7bdc3dafeb8d77ce97cbcc356fe1281f42c14182370863745d9c1753b8ea4cceaa906e7cc15f002ad64f7227eee08e87ac9b", 0x40, 0x5, 0x0, 0x2, r4}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0xbd2d, r4, &(0x7f0000000640)="3634858d2982fce1bd09192ed32572921d460245d7d0ee358b687b7c04084fe47ff78c6ef5ce86dd1cb1dbd4d82b37b0c9df6f0658b213bcbfa4d0aa60d8bd26dd382fa0ce639ca55488f7d5947ce52f876932c1b14306d00c068c4167bd5ab2e97f18b1aaef9e6ae7d142d3d7f3477b29ad3ab61ce4cdfda0e3182584c18c1cf8452a3c", 0x84, 0xffffffff}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f0000000880)="c959bdf2a2839b0d2a18f73f2b2589179621dc9807afb6073b8ea58a79f896fedd2a389146b74a73710c003c5a9c4d3883993fa2f10f97c9b0527417ff7bbc9271d3c55128414f8e460a44ac61f9dd98b8fcb0c4cc2961329cc90ad0590de9f676fa9954f13d2b780df587e7e256ba2d9e8cf0d74f739727d60ddd1f13fbfc1537ead824c44455be48e938e6a439b8ae93ec73746527b301980d6c0a596d30429c1debdede279bd207ab20305f61f2bb199e3e1fd74b2b115646c18edf644c", 0xbf, 0x0, 0x0, 0x7}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x5, 0x4, r5, &(0x7f0000000980)="e1baadd274960074a632bbf3c702fc39", 0x10, 0x4, 0x0, 0x1, r3}, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x5, 0x48f, r2, &(0x7f0000000a00)="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", 0x1000, 0x2, 0x0, 0x2, r4}]) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) (async) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r7, r4, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:03 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000030000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 904.546671] audit: type=1804 audit(1642437663.097:4864): pid=2678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1303/bus" dev="sda1" ino=14133 res=1 [ 904.582523] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000beffffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 904.643497] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:03 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x80002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x300, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x47e3, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, r1, 0xfffeffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x7c1043, 0x9) ftruncate(r2, 0x2007ffb) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x3, 0xac, 0x81, 0x80, 0x0, 0xd26, 0x407, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000140), 0x1}, 0x40040, 0x1fffe00000000, 0x3, 0x9, 0x6b, 0x8, 0x16, 0x0, 0x100, 0x0, 0x6}, r1, 0x0, 0xffffffffffffffff, 0x1) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) open(&(0x7f0000000000)='./bus\x00', 0x626000, 0xd2) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 904.678741] audit: type=1804 audit(1642437663.177:4865): pid=2685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1549/bus" dev="sda1" ino=14018 res=1 [ 904.731749] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:03 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000400000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:03 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000050000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 904.762843] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 904.822923] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 904.870868] audit: type=1804 audit(1642437663.227:4866): pid=2685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1549/bus" dev="sda1" ino=14018 res=1 [ 904.914440] audit: type=1804 audit(1642437663.307:4867): pid=2699 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1303/bus" dev="sda1" ino=14133 res=1 [ 904.940442] audit: type=1804 audit(1642437663.337:4868): pid=2701 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1550/bus" dev="sda1" ino=14035 res=1 [ 905.033940] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYRES32=r2]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000f0ffffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:04 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x80002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x300, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x47e3, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, r1, 0xfffeffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x7c1043, 0x9) ftruncate(r2, 0x2007ffb) (async) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x3, 0xac, 0x81, 0x80, 0x0, 0xd26, 0x407, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000140), 0x1}, 0x40040, 0x1fffe00000000, 0x3, 0x9, 0x6b, 0x8, 0x16, 0x0, 0x100, 0x0, 0x6}, r1, 0x0, 0xffffffffffffffff, 0x1) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) open(&(0x7f0000000000)='./bus\x00', 0x626000, 0xd2) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 16:41:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202002202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000430000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000060000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000450000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000f5ffffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:04 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x80002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x300, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x47e3, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, r1, 0xfffeffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x7c1043, 0x9) ftruncate(r2, 0x2007ffb) (async) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x3, 0xac, 0x81, 0x80, 0x0, 0xd26, 0x407, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000140), 0x1}, 0x40040, 0x1fffe00000000, 0x3, 0x9, 0x6b, 0x8, 0x16, 0x0, 0x100, 0x0, 0x6}, r1, 0x0, 0xffffffffffffffff, 0x1) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) open(&(0x7f0000000000)='./bus\x00', 0x626000, 0xd2) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 905.605884] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 905.611948] audit: type=1804 audit(1642437664.187:4869): pid=2756 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1551/bus" dev="sda1" ino=14058 res=1 [ 905.645597] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 905.702153] audit: type=1804 audit(1642437664.277:4870): pid=2761 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1304/bus" dev="sda1" ino=14562 res=1 16:41:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202009202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000070000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 905.744105] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:04 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r3, &(0x7f0000000340)={0x2020}, 0x2020) setsockopt$inet_udp_int(r3, 0x11, 0x67, &(0x7f0000000000)=0x7, 0x4) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 905.797901] audit: type=1804 audit(1642437664.367:4871): pid=2769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1552/bus" dev="sda1" ino=14466 res=1 [ 905.830508] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 906.054097] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 906.166025] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYRES32=r2]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000f6ffffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:05 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000480000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020200a202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:05 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r3, &(0x7f0000000340)={0x2020}, 0x2020) (async) setsockopt$inet_udp_int(r3, 0x11, 0x67, &(0x7f0000000000)=0x7, 0x4) (async) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r0, 0x0) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r6, r4, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000090000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000fbffffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 906.816748] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 906.841000] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000a0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202022202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:05 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000004c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 906.970441] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:05 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r3, &(0x7f0000000340)={0x2020}, 0x2020) (async) setsockopt$inet_udp_int(r3, 0x11, 0x67, &(0x7f0000000000)=0x7, 0x4) (async, rerun: 64) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (rerun: 64) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async, rerun: 64) open(0x0, 0x0, 0x4) (async, rerun: 64) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000feffffffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 907.106016] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 907.132876] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff]) mkdirat(r6, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:06 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000b0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202025202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:06 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000680000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000020000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:06 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x7f47b02d59d09b46, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4000}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000030000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 907.977460] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202055202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:06 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) (async) r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x7f47b02d59d09b46, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4000}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 908.071955] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:06 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000c0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:06 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000006c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000040000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 908.177629] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 908.334223] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 908.474568] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:07 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140), 0x4000, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x4f2180, 0x0) ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f00000000c0)='veth1_to_hsr\x00') sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202060202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:07 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000740000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:07 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) (async) r7 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x7f47b02d59d09b46, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4000}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000050000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000d0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202063202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 909.017152] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:07 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000007a0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000060000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:07 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2282, 0x0) ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, &(0x7f00000000c0)={0x80000001, 0x10, [0x5, 0x3, 0x80000000, 0x8], &(0x7f0000000000)=[0x0, 0x0]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 909.166818] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000e0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 909.249883] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 909.289940] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:07 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000027e0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 909.448905] kauditd_printk_skb: 23 callbacks suppressed [ 909.448918] audit: type=1804 audit(1642437668.027:4895): pid=3012 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1559/bus" dev="sda1" ino=13902 res=1 [ 909.488155] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 909.522874] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 909.649472] audit: type=1804 audit(1642437668.197:4896): pid=3017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1559/bus" dev="sda1" ino=13902 res=1 16:41:08 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000"]) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202064202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000200000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000070000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:08 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000c0ed0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:08 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2282, 0x0) (async) ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, &(0x7f00000000c0)={0x80000001, 0x10, [0x5, 0x3, 0x80000000, 0x8], &(0x7f0000000000)=[0x0, 0x0]}) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:08 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000f00000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 910.243896] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 910.252504] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 910.279770] audit: type=1804 audit(1642437668.857:4897): pid=3050 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1560/bus" dev="sda1" ino=15169 res=1 [ 910.308700] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:08 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000003f40000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202070202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000230000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000080000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:09 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async, rerun: 32) r1 = getpgid(0x0) (rerun: 32) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async, rerun: 64) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async, rerun: 64) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) (async) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2282, 0x0) (async, rerun: 32) ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, &(0x7f00000000c0)={0x80000001, 0x10, [0x5, 0x3, 0x80000000, 0x8], &(0x7f0000000000)=[0x0, 0x0]}) (async, rerun: 32) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async, rerun: 64) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 910.419391] audit: type=1804 audit(1642437668.967:4898): pid=3063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1308/bus" dev="sda1" ino=14977 res=1 [ 910.477056] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 910.566624] audit: type=1804 audit(1642437669.137:4899): pid=3074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1561/bus" dev="sda1" ino=14817 res=1 [ 910.599315] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 910.758363] audit: type=1804 audit(1642437669.187:4900): pid=3084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1308/bus" dev="sda1" ino=14977 res=1 [ 910.782426] audit: type=1804 audit(1642437669.247:4901): pid=3070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1561/bus" dev="sda1" ino=14817 res=1 [ 910.833856] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:09 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020f7202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000090000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:09 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000007fc0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000"]) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:09 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000003f0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 911.383637] audit: type=1804 audit(1642437669.957:4902): pid=3109 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1562/bus" dev="sda1" ino=14817 res=1 [ 911.422498] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000a0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:10 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000fff0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 911.462999] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 911.478711] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020022020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000400000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 911.530886] audit: type=1804 audit(1642437670.107:4903): pid=3130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1562/bus" dev="sda1" ino=14817 res=1 [ 911.657201] audit: type=1804 audit(1642437670.177:4904): pid=3131 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1309/bus" dev="sda1" ino=15281 res=1 16:41:10 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000"]) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', 0x2a) [ 911.788537] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 911.824448] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000c0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000430000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 911.839020] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020092020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:10 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000400bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 911.996175] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000e0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 912.120278] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:10 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000800bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000450000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 912.233914] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020200a2020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000230000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 912.344743] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000480000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 912.456969] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:11 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) (async) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 912.630910] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 912.803012] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000"]) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:11 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000c00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020222020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000430000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000004c0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:11 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000002040)={{r2}, "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"}) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x5, 0x11de, [0x0, 0x20000780, 0x20000c3c, 0x20001778], 0x0, &(0x7f00000000c0), &(0x7f0000000780)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x11, 0xa, 0x8100, 'caif0\x00', 'bridge0\x00', 'veth0_to_bridge\x00', 'macvtap0\x00', @random="df5388bc3dbd", [0xff, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x21}, [0x0, 0x0, 0xff], 0x2a6, 0x2a6, 0x2ee, [@bpf0={{'bpf\x00', 0x0, 0x210}, {{0x6, [{0xfff, 0x1f, 0x1f, 0x1}, {0x8, 0x20, 0x3f, 0x200}, {0x2, 0x7f, 0x3, 0xf4}, {0x9, 0xe9, 0x20, 0x401}, {0x3f, 0x1f, 0x3f, 0x3ff}, {0x8, 0x2, 0x8, 0x9ee}, {0x8, 0x4, 0x1, 0x10001}, {0x200, 0xfa, 0x81, 0x80}, {0x200, 0x3f, 0x8, 0x6}, {0x9, 0x6, 0x2, 0x40}, {0x4, 0x49, 0x9, 0x6}, {0x1000, 0xff, 0x2, 0x4c}, {0xfff, 0x9, 0x7, 0x990}, {0x20, 0x20, 0x40, 0x200}, {0x8, 0x20, 0xa, 0xcb}, {0x7, 0x3f, 0xbf, 0x7}, {0x3, 0x9, 0x9, 0x6}, {0x7ff, 0x20, 0x2, 0x5}, {0x9, 0x5, 0x0, 0xbd30}, {0x1, 0x8, 0x0, 0x5}, {0x5, 0xff, 0x8, 0x8f6f}, {0x76a7, 0x4, 0x2, 0x7f}, {0x3f, 0x81, 0x1, 0x8001}, {0x401, 0x1f, 0x0, 0x7}, {0x6, 0x0, 0x80, 0x80000000}, {0x3f, 0xe4, 0x8, 0xfffffffa}, {0x5, 0x6, 0x1}, {0x9, 0x5, 0x1, 0x100000}, {0x0, 0x0, 0x40, 0x8}, {0x9, 0x7f, 0x1f, 0x4}, {0x6, 0x3, 0xdf, 0x6}, {0x0, 0x4, 0x3a, 0x4}, {0x2, 0x3f, 0x3, 0x6}, {0x1, 0x9, 0x8, 0x1}, {0x1, 0x8, 0x5, 0x6}, {0x7, 0xea, 0x6}, {0x7, 0x1, 0x6, 0xfffffffe}, {0x7ff, 0x1f, 0x5b, 0x3}, {0xc74, 0x1, 0x1, 0xbd}, {0x1, 0x7f, 0x0, 0x2}, {0xbee, 0x7, 0x8, 0x9}, {0xfffe, 0xf8, 0x2, 0xfff}, {0x9, 0x2, 0x7, 0x4}, {0x20, 0x0, 0x4, 0x10000}, {0x448, 0x7, 0x5, 0x8}, {0x1ff, 0x1, 0xba, 0xfc6}, {0x800, 0x6, 0x8, 0x8}, {0x0, 0xd0, 0x20, 0x9}, {0x76, 0x7f, 0x6, 0x3}, {0x0, 0x7, 0x46, 0x80000001}, {0x3, 0xb6, 0x8, 0xc26}, {0x2, 0xfa, 0x5, 0x29}, {0xfff, 0x20, 0x2, 0xa354ce26}, {0x1000, 0x4, 0x4, 0x3c}, {0x800, 0x80, 0x9, 0x3b3}, {0xf627, 0x2, 0x4, 0x4}, {0x9a, 0x8, 0x2, 0x80000000}, {0x3, 0x0, 0x3, 0xd9f}, {0x2, 0x7, 0xc0, 0x3}, {0x81, 0x0, 0x8, 0x57e76b16}, {0xfffe, 0x2, 0x9, 0x3}, {0x1000, 0x1f, 0x0, 0x1}, {0xfc98, 0x1, 0x4, 0x5}, {0x5, 0x8, 0x6d, 0x8}], {0x7}}}}], [], @common=@ERROR={'ERROR\x00', 0x20, {"d027f85535761233f8b35609db2f94f41841cb4ee6253b0e20385aeef264"}}}, {0x5, 0x23, 0x6006, 'bridge_slave_1\x00', 'ip6erspan0\x00', 'bridge_slave_0\x00', 'ip6tnl0\x00', @local, [0xff, 0xff, 0xff, 0x0, 0xff], @broadcast, [0xff, 0xff, 0x0, 0x0, 0xff], 0xae, 0x126, 0x19e, [@statistic={{'statistic\x00', 0x0, 0x18}, {{0x0, 0x0, 0x7, 0x1, 0x80, {0x81}}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}, @common=@ERROR={'ERROR\x00', 0x20, {"b26bbff255a4d1d535aa075495ea26d000b56a7b15ddf55b0aab3cfbfcf1"}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xe5, 0x0, 0x3, 0x1, 0x0, "6197598d6d59f9d6e07b44b8063e5e9197f9096df1ebfe9189a504f4af15b58368c5b9f972dfbd9fe8a3cc656479b047c75df050523592cd412d0b60be557393"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{0x11, 0x31, 0x88f7, 'bond_slave_0\x00', 'sit0\x00', 'veth1_to_bridge\x00', 'team0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0x0, 0x0, 0xff, 0x0, 0x101], @random="b6a3f26edda8", [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xde, 0x10e, 0x23e, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'veth1_vlan\x00', {}, 'veth1\x00', {0xff}, 0x3, 0x12}}}], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x9}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}}}}, {0x11, 0x1, 0xf5, 'bridge0\x00', 'ip6erspan0\x00', 'netdevsim0\x00', 'gre0\x00', @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x856, 0x856, 0x8ce, [@u32={{'u32\x00', 0x0, 0x7c0}, {{[{[{0x8, 0x3}, {0xfffffff9}, {0x9, 0x2}, {0x81, 0x3}, {0xffffff81}, {0x9, 0x3}, {0x6080, 0x1}, {0x0, 0x3}, {0x1602d7fd, 0x3}, {0xfffffff7, 0x2}, {0x9, 0x2}], [{0x4}, {0x7, 0x3}, {0x5, 0x80000000}, {0x0, 0xd2b}, {0xffffffff, 0x1}, {0xfffffffb, 0x5}, {0xfffffffe, 0x8}, {0x3, 0x10001}, {0x5, 0x8001}, {0x51, 0x5d}, {0xda45}], 0xb, 0x8}, {[{0xfffffff7, 0x1}, {0x7}, {0x810000}, {0x5, 0x3}, {0x4, 0x3}, {0x101, 0x3}, {0x7, 0x3}, {0x0, 0x3}, {0x1ff, 0x1}, {0x2f2}, {0xff}], [{0x1800, 0x5}, {0x6, 0x9}, {0x3, 0x101}, {0x81, 0x51a89459}, {0x9, 0x400}, {0x80000000, 0x2}, {0x8, 0xff}, {0x7fffffff, 0x5db9}, {0x101, 0x5}, {0x117, 0xffff1b9b}, {0x9, 0x7fffffff}], 0x2, 0x3}, {[{0x5}, {0x4dc4, 0x3}, {0x0, 0x1}, {0x8, 0x2}, {0x7fffffff}, {0x7e9, 0x1}, {0x6, 0x1}, {0x0, 0x3}, {}, {0x3}, {0x9, 0x3}], [{0x5, 0x101}, {0x1, 0x8001}, {0x6, 0x6}, {0x2}, {0x566a, 0x3}, {0x7, 0x1}, {0x7, 0x800}, {0x2, 0x40}, {0xfff, 0x10001}, {0x0, 0x14ef}, {0x1, 0x80000000}], 0x7, 0x8}, {[{0x20, 0x1}, {0x0, 0x2}, {0x80, 0x3}, {0x80, 0x3}, {0xffff8001}, {0x2, 0x1}, {0x3}, {0x5, 0x3}, {0x2, 0x3}, {0x2, 0x2}, {0x7, 0x3}], [{0xee, 0x6}, {0x100, 0x81}, {0x0, 0xfff}, {0xffffb067, 0x80}, {0x3, 0xbe6b}, {0x9a1e, 0x10001}, {0x2, 0x7}, {0x16d, 0xeee}, {0x0, 0x90}, {0x853c, 0x7fff}, {0xffff, 0x93de}], 0x6, 0x1}, {[{0x3}, {0x1, 0x1}, {0x1000}, {0x0, 0x2}, {0x5}, {0xfffffffd, 0x1}, {}, {0x4, 0x1}, {0x30, 0x3}, {0xfff, 0x1}, {0x8, 0x1}], [{0x4, 0x8}, {0x1, 0x100}, {0x1ff, 0x800}, {0x1, 0x3}, {0x6, 0x9e4}, {}, {0xffffffff, 0x1}, {0x0, 0x3}, {0x8, 0x80000001}, {0x1, 0x7fffffff}, {0x9, 0x7}], 0x7, 0x5}, {[{0x0, 0x1}, {0x7}, {0x6}, {0x5}, {0x7fffffff, 0x2}, {0x9, 0x1}, {0xf}, {0x7, 0x2}, {0x6, 0x1}, {0x3ff, 0x1}, {0x401, 0x3}], [{0x0, 0x2}, {0xfffffff8, 0x9}, {0x0, 0x405}, {0x9}, {0x6, 0x80000000}, {0xbd846dc, 0xb6a0000}, {0x2, 0xb2}, {0x7ff, 0x4}, {0xffffffae, 0x2}, {0x6, 0x4}, {0x800, 0x8000}], 0x8, 0x7}, {[{0x5, 0x2}, {0x401, 0x1}, {0x1f, 0x3}, {0x6, 0x3}, {0x7ff, 0x1}, {0x8, 0x2}, {0x5, 0x1}, {0x9, 0x3}, {0x6, 0x3}, {0x2}, {0x6, 0x3}], [{0x1, 0x5}, {0x8091, 0x5}, {0x3, 0x5}, {0x100, 0x6}, {0x2, 0x4}, {0x7, 0xffff8000}, {0xe1, 0x40}, {0x2, 0x20}, {0x5, 0x9}, {0x8, 0x9}, {0xf635, 0x7}], 0x9, 0x7}, {[{0x400, 0x1}, {0x5}, {0x9}, {0x10000}, {0x8, 0x2}, {}, {0x8, 0x3}, {0x5}, {0x0, 0x3}, {0x7, 0x2}, {0x1, 0x3}], [{0x80000000, 0x401}, {0x7e6ad648, 0xfc62}, {0x101}, {0x10, 0x7}, {0x0, 0x7}, {0x21e, 0x7fff}, {0x5, 0x6}, {0x6, 0x32}, {0x12000000, 0xfffffffd}, {0x40, 0x4}, {0x1, 0x9}], 0xb, 0x4}, {[{0x8001, 0x2}, {0x3}, {0xff, 0x2}, {0xff, 0x3}, {0x1f, 0x2}, {0x80}, {0x1, 0x2}, {0x800, 0x1}, {0xb185}, {0x1ff}, {0x0, 0x1}], [{0x1ff, 0x7e}, {0xfffff063, 0x1}, {0x7fffffff, 0x10001}, {0x4, 0x4986ff1f}, {0x5, 0x9}, {0x2, 0x9}, {0x401, 0x4}, {0x6, 0x75}, {}, {0x8, 0x9}, {0xbf8, 0xfffffffb}], 0x0, 0x9}, {[{0x0, 0x3}, {0x200, 0x2}, {0x95d, 0x3}, {0x3, 0x3}, {0x5}, {0x0, 0x3}, {0x88, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x8000, 0x1}, {0x3ff, 0x2}], [{0x3, 0x9}, {0x40ae, 0x6}, {0x9, 0x5}, {0xfff, 0x1}, {0x2, 0x4}, {0x26, 0x6}, {0x44c, 0x8}, {0x7a1, 0x9}, {0xa, 0x3}, {0x4, 0xdc}, {0x6, 0x9}], 0x8, 0x9}, {[{0xb48, 0x3}, {0x7fffffff, 0x2}, {0x8, 0x1}, {0x8001}, {0x8000}, {0x42de, 0x1}, {0x5}, {0x1000, 0x2}, {0x2, 0x2}, {0x6db, 0x2}, {0x2}], [{0xfed, 0x7b8}, {0x6, 0x2}, {0x80, 0x1}, {0x4, 0x4}, {0x0, 0x9}, {0x4514, 0x5}, {0xffffffff, 0x4}, {0x9}, {0x7, 0x8}, {0x7a8, 0xfffff3b5}, {0x3, 0x560}], 0x3, 0x6}]}}}], [], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0xaff, 0x0, 0x0, 0x0, "89faa70fa6fb11f9a0ce3b2a86613858409c86694409ba12e454377d88cd2f9fc3b59e441120ff21b722b0036e16a8cead1c36775e06543827c94472d1b9495a"}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{0x11, 0x8, 0x88e7, 'sit0\x00', 'veth0_to_batadv\x00', 'veth1_to_hsr\x00', 'bond0\x00', @multicast, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @multicast, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xd6, 0x13e, 0x1b6, [@mac={{'mac\x00', 0x0, 0x10}, {{@random="67067b710c4d", 0x1}}}, @pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x5, 0x1}}}], [@common=@dnat={'dnat\x00', 0x10, {{@random="165a3f703cf4", 0xfffffffffffffffc}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x5}}}], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x8000, 0x7ff, 0x0, 0x0, "e3e81a3e012570eceaf871d87c97724bdac801b68d11a2933fb0ec99bf8fab2ca566fde419319d4a826970609dccaa5aa4b7ab6c98c1970adf6a77287bceb1cc"}}}}]}]}, 0x1256) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r7, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:11 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000ffff1f00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 913.109850] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000450000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 913.153590] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000600000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 913.197565] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020252020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000480000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:11 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fffff000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 913.360079] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 913.557305] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 913.622032] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:12 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000680000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000004c0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020552020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:12 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000001bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:12 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000002040)={{r2}, "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"}) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x5, 0x11de, [0x0, 0x20000780, 0x20000c3c, 0x20001778], 0x0, &(0x7f00000000c0), &(0x7f0000000780)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x11, 0xa, 0x8100, 'caif0\x00', 'bridge0\x00', 'veth0_to_bridge\x00', 'macvtap0\x00', @random="df5388bc3dbd", [0xff, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x21}, [0x0, 0x0, 0xff], 0x2a6, 0x2a6, 0x2ee, [@bpf0={{'bpf\x00', 0x0, 0x210}, {{0x6, [{0xfff, 0x1f, 0x1f, 0x1}, {0x8, 0x20, 0x3f, 0x200}, {0x2, 0x7f, 0x3, 0xf4}, {0x9, 0xe9, 0x20, 0x401}, {0x3f, 0x1f, 0x3f, 0x3ff}, {0x8, 0x2, 0x8, 0x9ee}, {0x8, 0x4, 0x1, 0x10001}, {0x200, 0xfa, 0x81, 0x80}, {0x200, 0x3f, 0x8, 0x6}, {0x9, 0x6, 0x2, 0x40}, {0x4, 0x49, 0x9, 0x6}, {0x1000, 0xff, 0x2, 0x4c}, {0xfff, 0x9, 0x7, 0x990}, {0x20, 0x20, 0x40, 0x200}, {0x8, 0x20, 0xa, 0xcb}, {0x7, 0x3f, 0xbf, 0x7}, {0x3, 0x9, 0x9, 0x6}, {0x7ff, 0x20, 0x2, 0x5}, {0x9, 0x5, 0x0, 0xbd30}, {0x1, 0x8, 0x0, 0x5}, {0x5, 0xff, 0x8, 0x8f6f}, {0x76a7, 0x4, 0x2, 0x7f}, {0x3f, 0x81, 0x1, 0x8001}, {0x401, 0x1f, 0x0, 0x7}, {0x6, 0x0, 0x80, 0x80000000}, {0x3f, 0xe4, 0x8, 0xfffffffa}, {0x5, 0x6, 0x1}, {0x9, 0x5, 0x1, 0x100000}, {0x0, 0x0, 0x40, 0x8}, {0x9, 0x7f, 0x1f, 0x4}, {0x6, 0x3, 0xdf, 0x6}, {0x0, 0x4, 0x3a, 0x4}, {0x2, 0x3f, 0x3, 0x6}, {0x1, 0x9, 0x8, 0x1}, {0x1, 0x8, 0x5, 0x6}, {0x7, 0xea, 0x6}, {0x7, 0x1, 0x6, 0xfffffffe}, {0x7ff, 0x1f, 0x5b, 0x3}, {0xc74, 0x1, 0x1, 0xbd}, {0x1, 0x7f, 0x0, 0x2}, {0xbee, 0x7, 0x8, 0x9}, {0xfffe, 0xf8, 0x2, 0xfff}, {0x9, 0x2, 0x7, 0x4}, {0x20, 0x0, 0x4, 0x10000}, {0x448, 0x7, 0x5, 0x8}, {0x1ff, 0x1, 0xba, 0xfc6}, {0x800, 0x6, 0x8, 0x8}, {0x0, 0xd0, 0x20, 0x9}, {0x76, 0x7f, 0x6, 0x3}, {0x0, 0x7, 0x46, 0x80000001}, {0x3, 0xb6, 0x8, 0xc26}, {0x2, 0xfa, 0x5, 0x29}, {0xfff, 0x20, 0x2, 0xa354ce26}, {0x1000, 0x4, 0x4, 0x3c}, {0x800, 0x80, 0x9, 0x3b3}, {0xf627, 0x2, 0x4, 0x4}, {0x9a, 0x8, 0x2, 0x80000000}, {0x3, 0x0, 0x3, 0xd9f}, {0x2, 0x7, 0xc0, 0x3}, {0x81, 0x0, 0x8, 0x57e76b16}, {0xfffe, 0x2, 0x9, 0x3}, {0x1000, 0x1f, 0x0, 0x1}, {0xfc98, 0x1, 0x4, 0x5}, {0x5, 0x8, 0x6d, 0x8}], {0x7}}}}], [], @common=@ERROR={'ERROR\x00', 0x20, {"d027f85535761233f8b35609db2f94f41841cb4ee6253b0e20385aeef264"}}}, {0x5, 0x23, 0x6006, 'bridge_slave_1\x00', 'ip6erspan0\x00', 'bridge_slave_0\x00', 'ip6tnl0\x00', @local, [0xff, 0xff, 0xff, 0x0, 0xff], @broadcast, [0xff, 0xff, 0x0, 0x0, 0xff], 0xae, 0x126, 0x19e, [@statistic={{'statistic\x00', 0x0, 0x18}, {{0x0, 0x0, 0x7, 0x1, 0x80, {0x81}}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}, @common=@ERROR={'ERROR\x00', 0x20, {"b26bbff255a4d1d535aa075495ea26d000b56a7b15ddf55b0aab3cfbfcf1"}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xe5, 0x0, 0x3, 0x1, 0x0, "6197598d6d59f9d6e07b44b8063e5e9197f9096df1ebfe9189a504f4af15b58368c5b9f972dfbd9fe8a3cc656479b047c75df050523592cd412d0b60be557393"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{0x11, 0x31, 0x88f7, 'bond_slave_0\x00', 'sit0\x00', 'veth1_to_bridge\x00', 'team0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0x0, 0x0, 0xff, 0x0, 0x101], @random="b6a3f26edda8", [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xde, 0x10e, 0x23e, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'veth1_vlan\x00', {}, 'veth1\x00', {0xff}, 0x3, 0x12}}}], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x9}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}}}}, {0x11, 0x1, 0xf5, 'bridge0\x00', 'ip6erspan0\x00', 'netdevsim0\x00', 'gre0\x00', @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x856, 0x856, 0x8ce, [@u32={{'u32\x00', 0x0, 0x7c0}, {{[{[{0x8, 0x3}, {0xfffffff9}, {0x9, 0x2}, {0x81, 0x3}, {0xffffff81}, {0x9, 0x3}, {0x6080, 0x1}, {0x0, 0x3}, {0x1602d7fd, 0x3}, {0xfffffff7, 0x2}, {0x9, 0x2}], [{0x4}, {0x7, 0x3}, {0x5, 0x80000000}, {0x0, 0xd2b}, {0xffffffff, 0x1}, {0xfffffffb, 0x5}, {0xfffffffe, 0x8}, {0x3, 0x10001}, {0x5, 0x8001}, {0x51, 0x5d}, {0xda45}], 0xb, 0x8}, {[{0xfffffff7, 0x1}, {0x7}, {0x810000}, {0x5, 0x3}, {0x4, 0x3}, {0x101, 0x3}, {0x7, 0x3}, {0x0, 0x3}, {0x1ff, 0x1}, {0x2f2}, {0xff}], [{0x1800, 0x5}, {0x6, 0x9}, {0x3, 0x101}, {0x81, 0x51a89459}, {0x9, 0x400}, {0x80000000, 0x2}, {0x8, 0xff}, {0x7fffffff, 0x5db9}, {0x101, 0x5}, {0x117, 0xffff1b9b}, {0x9, 0x7fffffff}], 0x2, 0x3}, {[{0x5}, {0x4dc4, 0x3}, {0x0, 0x1}, {0x8, 0x2}, {0x7fffffff}, {0x7e9, 0x1}, {0x6, 0x1}, {0x0, 0x3}, {}, {0x3}, {0x9, 0x3}], [{0x5, 0x101}, {0x1, 0x8001}, {0x6, 0x6}, {0x2}, {0x566a, 0x3}, {0x7, 0x1}, {0x7, 0x800}, {0x2, 0x40}, {0xfff, 0x10001}, {0x0, 0x14ef}, {0x1, 0x80000000}], 0x7, 0x8}, {[{0x20, 0x1}, {0x0, 0x2}, {0x80, 0x3}, {0x80, 0x3}, {0xffff8001}, {0x2, 0x1}, {0x3}, {0x5, 0x3}, {0x2, 0x3}, {0x2, 0x2}, {0x7, 0x3}], [{0xee, 0x6}, {0x100, 0x81}, {0x0, 0xfff}, {0xffffb067, 0x80}, {0x3, 0xbe6b}, {0x9a1e, 0x10001}, {0x2, 0x7}, {0x16d, 0xeee}, {0x0, 0x90}, {0x853c, 0x7fff}, {0xffff, 0x93de}], 0x6, 0x1}, {[{0x3}, {0x1, 0x1}, {0x1000}, {0x0, 0x2}, {0x5}, {0xfffffffd, 0x1}, {}, {0x4, 0x1}, {0x30, 0x3}, {0xfff, 0x1}, {0x8, 0x1}], [{0x4, 0x8}, {0x1, 0x100}, {0x1ff, 0x800}, {0x1, 0x3}, {0x6, 0x9e4}, {}, {0xffffffff, 0x1}, {0x0, 0x3}, {0x8, 0x80000001}, {0x1, 0x7fffffff}, {0x9, 0x7}], 0x7, 0x5}, {[{0x0, 0x1}, {0x7}, {0x6}, {0x5}, {0x7fffffff, 0x2}, {0x9, 0x1}, {0xf}, {0x7, 0x2}, {0x6, 0x1}, {0x3ff, 0x1}, {0x401, 0x3}], [{0x0, 0x2}, {0xfffffff8, 0x9}, {0x0, 0x405}, {0x9}, {0x6, 0x80000000}, {0xbd846dc, 0xb6a0000}, {0x2, 0xb2}, {0x7ff, 0x4}, {0xffffffae, 0x2}, {0x6, 0x4}, {0x800, 0x8000}], 0x8, 0x7}, {[{0x5, 0x2}, {0x401, 0x1}, {0x1f, 0x3}, {0x6, 0x3}, {0x7ff, 0x1}, {0x8, 0x2}, {0x5, 0x1}, {0x9, 0x3}, {0x6, 0x3}, {0x2}, {0x6, 0x3}], [{0x1, 0x5}, {0x8091, 0x5}, {0x3, 0x5}, {0x100, 0x6}, {0x2, 0x4}, {0x7, 0xffff8000}, {0xe1, 0x40}, {0x2, 0x20}, {0x5, 0x9}, {0x8, 0x9}, {0xf635, 0x7}], 0x9, 0x7}, {[{0x400, 0x1}, {0x5}, {0x9}, {0x10000}, {0x8, 0x2}, {}, {0x8, 0x3}, {0x5}, {0x0, 0x3}, {0x7, 0x2}, {0x1, 0x3}], [{0x80000000, 0x401}, {0x7e6ad648, 0xfc62}, {0x101}, {0x10, 0x7}, {0x0, 0x7}, {0x21e, 0x7fff}, {0x5, 0x6}, {0x6, 0x32}, {0x12000000, 0xfffffffd}, {0x40, 0x4}, {0x1, 0x9}], 0xb, 0x4}, {[{0x8001, 0x2}, {0x3}, {0xff, 0x2}, {0xff, 0x3}, {0x1f, 0x2}, {0x80}, {0x1, 0x2}, {0x800, 0x1}, {0xb185}, {0x1ff}, {0x0, 0x1}], [{0x1ff, 0x7e}, {0xfffff063, 0x1}, {0x7fffffff, 0x10001}, {0x4, 0x4986ff1f}, {0x5, 0x9}, {0x2, 0x9}, {0x401, 0x4}, {0x6, 0x75}, {}, {0x8, 0x9}, {0xbf8, 0xfffffffb}], 0x0, 0x9}, {[{0x0, 0x3}, {0x200, 0x2}, {0x95d, 0x3}, {0x3, 0x3}, {0x5}, {0x0, 0x3}, {0x88, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x8000, 0x1}, {0x3ff, 0x2}], [{0x3, 0x9}, {0x40ae, 0x6}, {0x9, 0x5}, {0xfff, 0x1}, {0x2, 0x4}, {0x26, 0x6}, {0x44c, 0x8}, {0x7a1, 0x9}, {0xa, 0x3}, {0x4, 0xdc}, {0x6, 0x9}], 0x8, 0x9}, {[{0xb48, 0x3}, {0x7fffffff, 0x2}, {0x8, 0x1}, {0x8001}, {0x8000}, {0x42de, 0x1}, {0x5}, {0x1000, 0x2}, {0x2, 0x2}, {0x6db, 0x2}, {0x2}], [{0xfed, 0x7b8}, {0x6, 0x2}, {0x80, 0x1}, {0x4, 0x4}, {0x0, 0x9}, {0x4514, 0x5}, {0xffffffff, 0x4}, {0x9}, {0x7, 0x8}, {0x7a8, 0xfffff3b5}, {0x3, 0x560}], 0x3, 0x6}]}}}], [], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0xaff, 0x0, 0x0, 0x0, "89faa70fa6fb11f9a0ce3b2a86613858409c86694409ba12e454377d88cd2f9fc3b59e441120ff21b722b0036e16a8cead1c36775e06543827c94472d1b9495a"}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{0x11, 0x8, 0x88e7, 'sit0\x00', 'veth0_to_batadv\x00', 'veth1_to_hsr\x00', 'bond0\x00', @multicast, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @multicast, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xd6, 0x13e, 0x1b6, [@mac={{'mac\x00', 0x0, 0x10}, {{@random="67067b710c4d", 0x1}}}, @pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x5, 0x1}}}], [@common=@dnat={'dnat\x00', 0x10, {{@random="165a3f703cf4", 0xfffffffffffffffc}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x5}}}], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x8000, 0x7ff, 0x0, 0x0, "e3e81a3e012570eceaf871d87c97724bdac801b68d11a2933fb0ec99bf8fab2ca566fde419319d4a826970609dccaa5aa4b7ab6c98c1970adf6a77287bceb1cc"}}}}]}]}, 0x1256) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r7, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000002040)={{r2}, "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"}) (async) ftruncate(r3, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x5, 0x11de, [0x0, 0x20000780, 0x20000c3c, 0x20001778], 0x0, &(0x7f00000000c0), &(0x7f0000000780)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x11, 0xa, 0x8100, 'caif0\x00', 'bridge0\x00', 'veth0_to_bridge\x00', 'macvtap0\x00', @random="df5388bc3dbd", [0xff, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x21}, [0x0, 0x0, 0xff], 0x2a6, 0x2a6, 0x2ee, [@bpf0={{'bpf\x00', 0x0, 0x210}, {{0x6, [{0xfff, 0x1f, 0x1f, 0x1}, {0x8, 0x20, 0x3f, 0x200}, {0x2, 0x7f, 0x3, 0xf4}, {0x9, 0xe9, 0x20, 0x401}, {0x3f, 0x1f, 0x3f, 0x3ff}, {0x8, 0x2, 0x8, 0x9ee}, {0x8, 0x4, 0x1, 0x10001}, {0x200, 0xfa, 0x81, 0x80}, {0x200, 0x3f, 0x8, 0x6}, {0x9, 0x6, 0x2, 0x40}, {0x4, 0x49, 0x9, 0x6}, {0x1000, 0xff, 0x2, 0x4c}, {0xfff, 0x9, 0x7, 0x990}, {0x20, 0x20, 0x40, 0x200}, {0x8, 0x20, 0xa, 0xcb}, {0x7, 0x3f, 0xbf, 0x7}, {0x3, 0x9, 0x9, 0x6}, {0x7ff, 0x20, 0x2, 0x5}, {0x9, 0x5, 0x0, 0xbd30}, {0x1, 0x8, 0x0, 0x5}, {0x5, 0xff, 0x8, 0x8f6f}, {0x76a7, 0x4, 0x2, 0x7f}, {0x3f, 0x81, 0x1, 0x8001}, {0x401, 0x1f, 0x0, 0x7}, {0x6, 0x0, 0x80, 0x80000000}, {0x3f, 0xe4, 0x8, 0xfffffffa}, {0x5, 0x6, 0x1}, {0x9, 0x5, 0x1, 0x100000}, {0x0, 0x0, 0x40, 0x8}, {0x9, 0x7f, 0x1f, 0x4}, {0x6, 0x3, 0xdf, 0x6}, {0x0, 0x4, 0x3a, 0x4}, {0x2, 0x3f, 0x3, 0x6}, {0x1, 0x9, 0x8, 0x1}, {0x1, 0x8, 0x5, 0x6}, {0x7, 0xea, 0x6}, {0x7, 0x1, 0x6, 0xfffffffe}, {0x7ff, 0x1f, 0x5b, 0x3}, {0xc74, 0x1, 0x1, 0xbd}, {0x1, 0x7f, 0x0, 0x2}, {0xbee, 0x7, 0x8, 0x9}, {0xfffe, 0xf8, 0x2, 0xfff}, {0x9, 0x2, 0x7, 0x4}, {0x20, 0x0, 0x4, 0x10000}, {0x448, 0x7, 0x5, 0x8}, {0x1ff, 0x1, 0xba, 0xfc6}, {0x800, 0x6, 0x8, 0x8}, {0x0, 0xd0, 0x20, 0x9}, {0x76, 0x7f, 0x6, 0x3}, {0x0, 0x7, 0x46, 0x80000001}, {0x3, 0xb6, 0x8, 0xc26}, {0x2, 0xfa, 0x5, 0x29}, {0xfff, 0x20, 0x2, 0xa354ce26}, {0x1000, 0x4, 0x4, 0x3c}, {0x800, 0x80, 0x9, 0x3b3}, {0xf627, 0x2, 0x4, 0x4}, {0x9a, 0x8, 0x2, 0x80000000}, {0x3, 0x0, 0x3, 0xd9f}, {0x2, 0x7, 0xc0, 0x3}, {0x81, 0x0, 0x8, 0x57e76b16}, {0xfffe, 0x2, 0x9, 0x3}, {0x1000, 0x1f, 0x0, 0x1}, {0xfc98, 0x1, 0x4, 0x5}, {0x5, 0x8, 0x6d, 0x8}], {0x7}}}}], [], @common=@ERROR={'ERROR\x00', 0x20, {"d027f85535761233f8b35609db2f94f41841cb4ee6253b0e20385aeef264"}}}, {0x5, 0x23, 0x6006, 'bridge_slave_1\x00', 'ip6erspan0\x00', 'bridge_slave_0\x00', 'ip6tnl0\x00', @local, [0xff, 0xff, 0xff, 0x0, 0xff], @broadcast, [0xff, 0xff, 0x0, 0x0, 0xff], 0xae, 0x126, 0x19e, [@statistic={{'statistic\x00', 0x0, 0x18}, {{0x0, 0x0, 0x7, 0x1, 0x80, {0x81}}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}, @common=@ERROR={'ERROR\x00', 0x20, {"b26bbff255a4d1d535aa075495ea26d000b56a7b15ddf55b0aab3cfbfcf1"}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xe5, 0x0, 0x3, 0x1, 0x0, "6197598d6d59f9d6e07b44b8063e5e9197f9096df1ebfe9189a504f4af15b58368c5b9f972dfbd9fe8a3cc656479b047c75df050523592cd412d0b60be557393"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{0x11, 0x31, 0x88f7, 'bond_slave_0\x00', 'sit0\x00', 'veth1_to_bridge\x00', 'team0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0x0, 0x0, 0xff, 0x0, 0x101], @random="b6a3f26edda8", [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xde, 0x10e, 0x23e, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'veth1_vlan\x00', {}, 'veth1\x00', {0xff}, 0x3, 0x12}}}], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x9}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}}}}, {0x11, 0x1, 0xf5, 'bridge0\x00', 'ip6erspan0\x00', 'netdevsim0\x00', 'gre0\x00', @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x856, 0x856, 0x8ce, [@u32={{'u32\x00', 0x0, 0x7c0}, {{[{[{0x8, 0x3}, {0xfffffff9}, {0x9, 0x2}, {0x81, 0x3}, {0xffffff81}, {0x9, 0x3}, {0x6080, 0x1}, {0x0, 0x3}, {0x1602d7fd, 0x3}, {0xfffffff7, 0x2}, {0x9, 0x2}], [{0x4}, {0x7, 0x3}, {0x5, 0x80000000}, {0x0, 0xd2b}, {0xffffffff, 0x1}, {0xfffffffb, 0x5}, {0xfffffffe, 0x8}, {0x3, 0x10001}, {0x5, 0x8001}, {0x51, 0x5d}, {0xda45}], 0xb, 0x8}, {[{0xfffffff7, 0x1}, {0x7}, {0x810000}, {0x5, 0x3}, {0x4, 0x3}, {0x101, 0x3}, {0x7, 0x3}, {0x0, 0x3}, {0x1ff, 0x1}, {0x2f2}, {0xff}], [{0x1800, 0x5}, {0x6, 0x9}, {0x3, 0x101}, {0x81, 0x51a89459}, {0x9, 0x400}, {0x80000000, 0x2}, {0x8, 0xff}, {0x7fffffff, 0x5db9}, {0x101, 0x5}, {0x117, 0xffff1b9b}, {0x9, 0x7fffffff}], 0x2, 0x3}, {[{0x5}, {0x4dc4, 0x3}, {0x0, 0x1}, {0x8, 0x2}, {0x7fffffff}, {0x7e9, 0x1}, {0x6, 0x1}, {0x0, 0x3}, {}, {0x3}, {0x9, 0x3}], [{0x5, 0x101}, {0x1, 0x8001}, {0x6, 0x6}, {0x2}, {0x566a, 0x3}, {0x7, 0x1}, {0x7, 0x800}, {0x2, 0x40}, {0xfff, 0x10001}, {0x0, 0x14ef}, {0x1, 0x80000000}], 0x7, 0x8}, {[{0x20, 0x1}, {0x0, 0x2}, {0x80, 0x3}, {0x80, 0x3}, {0xffff8001}, {0x2, 0x1}, {0x3}, {0x5, 0x3}, {0x2, 0x3}, {0x2, 0x2}, {0x7, 0x3}], [{0xee, 0x6}, {0x100, 0x81}, {0x0, 0xfff}, {0xffffb067, 0x80}, {0x3, 0xbe6b}, {0x9a1e, 0x10001}, {0x2, 0x7}, {0x16d, 0xeee}, {0x0, 0x90}, {0x853c, 0x7fff}, {0xffff, 0x93de}], 0x6, 0x1}, {[{0x3}, {0x1, 0x1}, {0x1000}, {0x0, 0x2}, {0x5}, {0xfffffffd, 0x1}, {}, {0x4, 0x1}, {0x30, 0x3}, {0xfff, 0x1}, {0x8, 0x1}], [{0x4, 0x8}, {0x1, 0x100}, {0x1ff, 0x800}, {0x1, 0x3}, {0x6, 0x9e4}, {}, {0xffffffff, 0x1}, {0x0, 0x3}, {0x8, 0x80000001}, {0x1, 0x7fffffff}, {0x9, 0x7}], 0x7, 0x5}, {[{0x0, 0x1}, {0x7}, {0x6}, {0x5}, {0x7fffffff, 0x2}, {0x9, 0x1}, {0xf}, {0x7, 0x2}, {0x6, 0x1}, {0x3ff, 0x1}, {0x401, 0x3}], [{0x0, 0x2}, {0xfffffff8, 0x9}, {0x0, 0x405}, {0x9}, {0x6, 0x80000000}, {0xbd846dc, 0xb6a0000}, {0x2, 0xb2}, {0x7ff, 0x4}, {0xffffffae, 0x2}, {0x6, 0x4}, {0x800, 0x8000}], 0x8, 0x7}, {[{0x5, 0x2}, {0x401, 0x1}, {0x1f, 0x3}, {0x6, 0x3}, {0x7ff, 0x1}, {0x8, 0x2}, {0x5, 0x1}, {0x9, 0x3}, {0x6, 0x3}, {0x2}, {0x6, 0x3}], [{0x1, 0x5}, {0x8091, 0x5}, {0x3, 0x5}, {0x100, 0x6}, {0x2, 0x4}, {0x7, 0xffff8000}, {0xe1, 0x40}, {0x2, 0x20}, {0x5, 0x9}, {0x8, 0x9}, {0xf635, 0x7}], 0x9, 0x7}, {[{0x400, 0x1}, {0x5}, {0x9}, {0x10000}, {0x8, 0x2}, {}, {0x8, 0x3}, {0x5}, {0x0, 0x3}, {0x7, 0x2}, {0x1, 0x3}], [{0x80000000, 0x401}, {0x7e6ad648, 0xfc62}, {0x101}, {0x10, 0x7}, {0x0, 0x7}, {0x21e, 0x7fff}, {0x5, 0x6}, {0x6, 0x32}, {0x12000000, 0xfffffffd}, {0x40, 0x4}, {0x1, 0x9}], 0xb, 0x4}, {[{0x8001, 0x2}, {0x3}, {0xff, 0x2}, {0xff, 0x3}, {0x1f, 0x2}, {0x80}, {0x1, 0x2}, {0x800, 0x1}, {0xb185}, {0x1ff}, {0x0, 0x1}], [{0x1ff, 0x7e}, {0xfffff063, 0x1}, {0x7fffffff, 0x10001}, {0x4, 0x4986ff1f}, {0x5, 0x9}, {0x2, 0x9}, {0x401, 0x4}, {0x6, 0x75}, {}, {0x8, 0x9}, {0xbf8, 0xfffffffb}], 0x0, 0x9}, {[{0x0, 0x3}, {0x200, 0x2}, {0x95d, 0x3}, {0x3, 0x3}, {0x5}, {0x0, 0x3}, {0x88, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x8000, 0x1}, {0x3ff, 0x2}], [{0x3, 0x9}, {0x40ae, 0x6}, {0x9, 0x5}, {0xfff, 0x1}, {0x2, 0x4}, {0x26, 0x6}, {0x44c, 0x8}, {0x7a1, 0x9}, {0xa, 0x3}, {0x4, 0xdc}, {0x6, 0x9}], 0x8, 0x9}, {[{0xb48, 0x3}, {0x7fffffff, 0x2}, {0x8, 0x1}, {0x8001}, {0x8000}, {0x42de, 0x1}, {0x5}, {0x1000, 0x2}, {0x2, 0x2}, {0x6db, 0x2}, {0x2}], [{0xfed, 0x7b8}, {0x6, 0x2}, {0x80, 0x1}, {0x4, 0x4}, {0x0, 0x9}, {0x4514, 0x5}, {0xffffffff, 0x4}, {0x9}, {0x7, 0x8}, {0x7a8, 0xfffff3b5}, {0x3, 0x560}], 0x3, 0x6}]}}}], [], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0xaff, 0x0, 0x0, 0x0, "89faa70fa6fb11f9a0ce3b2a86613858409c86694409ba12e454377d88cd2f9fc3b59e441120ff21b722b0036e16a8cead1c36775e06543827c94472d1b9495a"}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{0x11, 0x8, 0x88e7, 'sit0\x00', 'veth0_to_batadv\x00', 'veth1_to_hsr\x00', 'bond0\x00', @multicast, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @multicast, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xd6, 0x13e, 0x1b6, [@mac={{'mac\x00', 0x0, 0x10}, {{@random="67067b710c4d", 0x1}}}, @pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x5, 0x1}}}], [@common=@dnat={'dnat\x00', 0x10, {{@random="165a3f703cf4", 0xfffffffffffffffc}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x5}}}], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x8000, 0x7ff, 0x0, 0x0, "e3e81a3e012570eceaf871d87c97724bdac801b68d11a2933fb0ec99bf8fab2ca566fde419319d4a826970609dccaa5aa4b7ab6c98c1970adf6a77287bceb1cc"}}}}]}]}, 0x1256) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r6, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r7, r4, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) 16:41:12 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000006c0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 914.216692] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000680000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:12 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000002bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 914.290748] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 914.342681] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020602020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 914.385044] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:13 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000740000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 914.478908] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 914.491941] kauditd_printk_skb: 11 callbacks suppressed [ 914.491954] audit: type=1804 audit(1642437673.067:4916): pid=3337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1566/bus" dev="sda1" ino=14156 res=1 [ 914.595979] audit: type=1804 audit(1642437673.167:4917): pid=3347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1312/bus" dev="sda1" ino=14016 res=1 16:41:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000006c0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 914.677539] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:13 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000002040)={{r2}, "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"}) (async) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x5, 0x11de, [0x0, 0x20000780, 0x20000c3c, 0x20001778], 0x0, &(0x7f00000000c0), &(0x7f0000000780)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x11, 0xa, 0x8100, 'caif0\x00', 'bridge0\x00', 'veth0_to_bridge\x00', 'macvtap0\x00', @random="df5388bc3dbd", [0xff, 0x0, 0xff, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x21}, [0x0, 0x0, 0xff], 0x2a6, 0x2a6, 0x2ee, [@bpf0={{'bpf\x00', 0x0, 0x210}, {{0x6, [{0xfff, 0x1f, 0x1f, 0x1}, {0x8, 0x20, 0x3f, 0x200}, {0x2, 0x7f, 0x3, 0xf4}, {0x9, 0xe9, 0x20, 0x401}, {0x3f, 0x1f, 0x3f, 0x3ff}, {0x8, 0x2, 0x8, 0x9ee}, {0x8, 0x4, 0x1, 0x10001}, {0x200, 0xfa, 0x81, 0x80}, {0x200, 0x3f, 0x8, 0x6}, {0x9, 0x6, 0x2, 0x40}, {0x4, 0x49, 0x9, 0x6}, {0x1000, 0xff, 0x2, 0x4c}, {0xfff, 0x9, 0x7, 0x990}, {0x20, 0x20, 0x40, 0x200}, {0x8, 0x20, 0xa, 0xcb}, {0x7, 0x3f, 0xbf, 0x7}, {0x3, 0x9, 0x9, 0x6}, {0x7ff, 0x20, 0x2, 0x5}, {0x9, 0x5, 0x0, 0xbd30}, {0x1, 0x8, 0x0, 0x5}, {0x5, 0xff, 0x8, 0x8f6f}, {0x76a7, 0x4, 0x2, 0x7f}, {0x3f, 0x81, 0x1, 0x8001}, {0x401, 0x1f, 0x0, 0x7}, {0x6, 0x0, 0x80, 0x80000000}, {0x3f, 0xe4, 0x8, 0xfffffffa}, {0x5, 0x6, 0x1}, {0x9, 0x5, 0x1, 0x100000}, {0x0, 0x0, 0x40, 0x8}, {0x9, 0x7f, 0x1f, 0x4}, {0x6, 0x3, 0xdf, 0x6}, {0x0, 0x4, 0x3a, 0x4}, {0x2, 0x3f, 0x3, 0x6}, {0x1, 0x9, 0x8, 0x1}, {0x1, 0x8, 0x5, 0x6}, {0x7, 0xea, 0x6}, {0x7, 0x1, 0x6, 0xfffffffe}, {0x7ff, 0x1f, 0x5b, 0x3}, {0xc74, 0x1, 0x1, 0xbd}, {0x1, 0x7f, 0x0, 0x2}, {0xbee, 0x7, 0x8, 0x9}, {0xfffe, 0xf8, 0x2, 0xfff}, {0x9, 0x2, 0x7, 0x4}, {0x20, 0x0, 0x4, 0x10000}, {0x448, 0x7, 0x5, 0x8}, {0x1ff, 0x1, 0xba, 0xfc6}, {0x800, 0x6, 0x8, 0x8}, {0x0, 0xd0, 0x20, 0x9}, {0x76, 0x7f, 0x6, 0x3}, {0x0, 0x7, 0x46, 0x80000001}, {0x3, 0xb6, 0x8, 0xc26}, {0x2, 0xfa, 0x5, 0x29}, {0xfff, 0x20, 0x2, 0xa354ce26}, {0x1000, 0x4, 0x4, 0x3c}, {0x800, 0x80, 0x9, 0x3b3}, {0xf627, 0x2, 0x4, 0x4}, {0x9a, 0x8, 0x2, 0x80000000}, {0x3, 0x0, 0x3, 0xd9f}, {0x2, 0x7, 0xc0, 0x3}, {0x81, 0x0, 0x8, 0x57e76b16}, {0xfffe, 0x2, 0x9, 0x3}, {0x1000, 0x1f, 0x0, 0x1}, {0xfc98, 0x1, 0x4, 0x5}, {0x5, 0x8, 0x6d, 0x8}], {0x7}}}}], [], @common=@ERROR={'ERROR\x00', 0x20, {"d027f85535761233f8b35609db2f94f41841cb4ee6253b0e20385aeef264"}}}, {0x5, 0x23, 0x6006, 'bridge_slave_1\x00', 'ip6erspan0\x00', 'bridge_slave_0\x00', 'ip6tnl0\x00', @local, [0xff, 0xff, 0xff, 0x0, 0xff], @broadcast, [0xff, 0xff, 0x0, 0x0, 0xff], 0xae, 0x126, 0x19e, [@statistic={{'statistic\x00', 0x0, 0x18}, {{0x0, 0x0, 0x7, 0x1, 0x80, {0x81}}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}, @common=@ERROR={'ERROR\x00', 0x20, {"b26bbff255a4d1d535aa075495ea26d000b56a7b15ddf55b0aab3cfbfcf1"}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xe5, 0x0, 0x3, 0x1, 0x0, "6197598d6d59f9d6e07b44b8063e5e9197f9096df1ebfe9189a504f4af15b58368c5b9f972dfbd9fe8a3cc656479b047c75df050523592cd412d0b60be557393"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{0x11, 0x31, 0x88f7, 'bond_slave_0\x00', 'sit0\x00', 'veth1_to_bridge\x00', 'team0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0x0, 0x0, 0xff, 0x0, 0x101], @random="b6a3f26edda8", [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xde, 0x10e, 0x23e, [@physdev={{'physdev\x00', 0x0, 0x48}, {{'veth1_vlan\x00', {}, 'veth1\x00', {0xff}, 0x3, 0x12}}}], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x9}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7, 'system_u:object_r:pinentry_exec_t:s0\x00'}}}}, {0x11, 0x1, 0xf5, 'bridge0\x00', 'ip6erspan0\x00', 'netdevsim0\x00', 'gre0\x00', @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x856, 0x856, 0x8ce, [@u32={{'u32\x00', 0x0, 0x7c0}, {{[{[{0x8, 0x3}, {0xfffffff9}, {0x9, 0x2}, {0x81, 0x3}, {0xffffff81}, {0x9, 0x3}, {0x6080, 0x1}, {0x0, 0x3}, {0x1602d7fd, 0x3}, {0xfffffff7, 0x2}, {0x9, 0x2}], [{0x4}, {0x7, 0x3}, {0x5, 0x80000000}, {0x0, 0xd2b}, {0xffffffff, 0x1}, {0xfffffffb, 0x5}, {0xfffffffe, 0x8}, {0x3, 0x10001}, {0x5, 0x8001}, {0x51, 0x5d}, {0xda45}], 0xb, 0x8}, {[{0xfffffff7, 0x1}, {0x7}, {0x810000}, {0x5, 0x3}, {0x4, 0x3}, {0x101, 0x3}, {0x7, 0x3}, {0x0, 0x3}, {0x1ff, 0x1}, {0x2f2}, {0xff}], [{0x1800, 0x5}, {0x6, 0x9}, {0x3, 0x101}, {0x81, 0x51a89459}, {0x9, 0x400}, {0x80000000, 0x2}, {0x8, 0xff}, {0x7fffffff, 0x5db9}, {0x101, 0x5}, {0x117, 0xffff1b9b}, {0x9, 0x7fffffff}], 0x2, 0x3}, {[{0x5}, {0x4dc4, 0x3}, {0x0, 0x1}, {0x8, 0x2}, {0x7fffffff}, {0x7e9, 0x1}, {0x6, 0x1}, {0x0, 0x3}, {}, {0x3}, {0x9, 0x3}], [{0x5, 0x101}, {0x1, 0x8001}, {0x6, 0x6}, {0x2}, {0x566a, 0x3}, {0x7, 0x1}, {0x7, 0x800}, {0x2, 0x40}, {0xfff, 0x10001}, {0x0, 0x14ef}, {0x1, 0x80000000}], 0x7, 0x8}, {[{0x20, 0x1}, {0x0, 0x2}, {0x80, 0x3}, {0x80, 0x3}, {0xffff8001}, {0x2, 0x1}, {0x3}, {0x5, 0x3}, {0x2, 0x3}, {0x2, 0x2}, {0x7, 0x3}], [{0xee, 0x6}, {0x100, 0x81}, {0x0, 0xfff}, {0xffffb067, 0x80}, {0x3, 0xbe6b}, {0x9a1e, 0x10001}, {0x2, 0x7}, {0x16d, 0xeee}, {0x0, 0x90}, {0x853c, 0x7fff}, {0xffff, 0x93de}], 0x6, 0x1}, {[{0x3}, {0x1, 0x1}, {0x1000}, {0x0, 0x2}, {0x5}, {0xfffffffd, 0x1}, {}, {0x4, 0x1}, {0x30, 0x3}, {0xfff, 0x1}, {0x8, 0x1}], [{0x4, 0x8}, {0x1, 0x100}, {0x1ff, 0x800}, {0x1, 0x3}, {0x6, 0x9e4}, {}, {0xffffffff, 0x1}, {0x0, 0x3}, {0x8, 0x80000001}, {0x1, 0x7fffffff}, {0x9, 0x7}], 0x7, 0x5}, {[{0x0, 0x1}, {0x7}, {0x6}, {0x5}, {0x7fffffff, 0x2}, {0x9, 0x1}, {0xf}, {0x7, 0x2}, {0x6, 0x1}, {0x3ff, 0x1}, {0x401, 0x3}], [{0x0, 0x2}, {0xfffffff8, 0x9}, {0x0, 0x405}, {0x9}, {0x6, 0x80000000}, {0xbd846dc, 0xb6a0000}, {0x2, 0xb2}, {0x7ff, 0x4}, {0xffffffae, 0x2}, {0x6, 0x4}, {0x800, 0x8000}], 0x8, 0x7}, {[{0x5, 0x2}, {0x401, 0x1}, {0x1f, 0x3}, {0x6, 0x3}, {0x7ff, 0x1}, {0x8, 0x2}, {0x5, 0x1}, {0x9, 0x3}, {0x6, 0x3}, {0x2}, {0x6, 0x3}], [{0x1, 0x5}, {0x8091, 0x5}, {0x3, 0x5}, {0x100, 0x6}, {0x2, 0x4}, {0x7, 0xffff8000}, {0xe1, 0x40}, {0x2, 0x20}, {0x5, 0x9}, {0x8, 0x9}, {0xf635, 0x7}], 0x9, 0x7}, {[{0x400, 0x1}, {0x5}, {0x9}, {0x10000}, {0x8, 0x2}, {}, {0x8, 0x3}, {0x5}, {0x0, 0x3}, {0x7, 0x2}, {0x1, 0x3}], [{0x80000000, 0x401}, {0x7e6ad648, 0xfc62}, {0x101}, {0x10, 0x7}, {0x0, 0x7}, {0x21e, 0x7fff}, {0x5, 0x6}, {0x6, 0x32}, {0x12000000, 0xfffffffd}, {0x40, 0x4}, {0x1, 0x9}], 0xb, 0x4}, {[{0x8001, 0x2}, {0x3}, {0xff, 0x2}, {0xff, 0x3}, {0x1f, 0x2}, {0x80}, {0x1, 0x2}, {0x800, 0x1}, {0xb185}, {0x1ff}, {0x0, 0x1}], [{0x1ff, 0x7e}, {0xfffff063, 0x1}, {0x7fffffff, 0x10001}, {0x4, 0x4986ff1f}, {0x5, 0x9}, {0x2, 0x9}, {0x401, 0x4}, {0x6, 0x75}, {}, {0x8, 0x9}, {0xbf8, 0xfffffffb}], 0x0, 0x9}, {[{0x0, 0x3}, {0x200, 0x2}, {0x95d, 0x3}, {0x3, 0x3}, {0x5}, {0x0, 0x3}, {0x88, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x8000, 0x1}, {0x3ff, 0x2}], [{0x3, 0x9}, {0x40ae, 0x6}, {0x9, 0x5}, {0xfff, 0x1}, {0x2, 0x4}, {0x26, 0x6}, {0x44c, 0x8}, {0x7a1, 0x9}, {0xa, 0x3}, {0x4, 0xdc}, {0x6, 0x9}], 0x8, 0x9}, {[{0xb48, 0x3}, {0x7fffffff, 0x2}, {0x8, 0x1}, {0x8001}, {0x8000}, {0x42de, 0x1}, {0x5}, {0x1000, 0x2}, {0x2, 0x2}, {0x6db, 0x2}, {0x2}], [{0xfed, 0x7b8}, {0x6, 0x2}, {0x80, 0x1}, {0x4, 0x4}, {0x0, 0x9}, {0x4514, 0x5}, {0xffffffff, 0x4}, {0x9}, {0x7, 0x8}, {0x7a8, 0xfffff3b5}, {0x3, 0x560}], 0x3, 0x6}]}}}], [], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0xaff, 0x0, 0x0, 0x0, "89faa70fa6fb11f9a0ce3b2a86613858409c86694409ba12e454377d88cd2f9fc3b59e441120ff21b722b0036e16a8cead1c36775e06543827c94472d1b9495a"}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{0x11, 0x8, 0x88e7, 'sit0\x00', 'veth0_to_batadv\x00', 'veth1_to_hsr\x00', 'bond0\x00', @multicast, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @multicast, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xd6, 0x13e, 0x1b6, [@mac={{'mac\x00', 0x0, 0x10}, {{@random="67067b710c4d", 0x1}}}, @pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x5, 0x1}}}], [@common=@dnat={'dnat\x00', 0x10, {{@random="165a3f703cf4", 0xfffffffffffffffc}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x5}}}], @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x8000, 0x7ff, 0x0, 0x0, "e3e81a3e012570eceaf871d87c97724bdac801b68d11a2933fb0ec99bf8fab2ca566fde419319d4a826970609dccaa5aa4b7ab6c98c1970adf6a77287bceb1cc"}}}}]}]}, 0x1256) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r6, 0x0) (async) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r7, r4, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 914.716791] audit: type=1804 audit(1642437673.237:4918): pid=3342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1566/bus" dev="sda1" ino=14156 res=1 16:41:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020632020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 914.814256] audit: type=1804 audit(1642437673.387:4919): pid=3366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1567/bus" dev="sda1" ino=14156 res=1 16:41:13 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000003bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:13 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x4180, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f00000000c0)=0x421f) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 914.873983] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 914.972094] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 914.998141] audit: type=1804 audit(1642437673.567:4920): pid=3386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1568/bus" dev="sda1" ino=14119 res=1 [ 915.052454] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 915.215708] audit: type=1804 audit(1642437673.787:4921): pid=3395 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1568/bus" dev="sda1" ino=14119 res=1 16:41:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:14 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000007a0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000740000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020642020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:14 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000004bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:14 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x4180, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f00000000c0)=0x421f) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x4180, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f00000000c0)=0x421f) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r5, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r6, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) 16:41:14 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000005bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 915.679641] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:14 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000c0ed0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 915.763800] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 915.801729] audit: type=1804 audit(1642437674.377:4922): pid=3429 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1569/bus" dev="sda1" ino=15537 res=1 16:41:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000007a0000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020702020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:14 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000006bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 915.860501] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 915.965544] audit: type=1804 audit(1642437674.487:4923): pid=3434 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1313/bus" dev="sda1" ino=15553 res=1 [ 915.965876] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 916.026632] audit: type=1804 audit(1642437674.577:4924): pid=3429 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1569/bus" dev="sda1" ino=15537 res=1 16:41:14 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x4180, 0x0) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f00000000c0)=0x421f) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r5, 0x0) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r6, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 916.169596] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 916.239970] audit: type=1804 audit(1642437674.807:4925): pid=3458 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1313/bus" dev="sda1" ino=15553 res=1 [ 916.292602] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 916.402330] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x4180, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f00000000c0)=0x421f) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:15 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000f00000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000f00000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:15 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000140)=""/111, &(0x7f0000000000)=0x6f) 16:41:15 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000007bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020f72020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000300bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:15 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000008bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 917.101008] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 917.127419] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 917.199472] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020200220200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:15 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000fff0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:15 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000140)=""/111, &(0x7f0000000000)=0x6f) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) (async) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) (async) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000140)=""/111, &(0x7f0000000000)=0x6f) (async) [ 917.456552] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 917.518301] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 917.630781] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x4180, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f00000000c0)=0x421f) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:16 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000009bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020200920200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000400000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000600bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:16 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000140)=""/111, &(0x7f0000000000)=0x6f) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) (async) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) (async) getsockopt$IP_VS_SO_GET_SERVICES(r6, 0x0, 0x482, &(0x7f0000000140)=""/111, &(0x7f0000000000)=0x6f) (async) 16:41:16 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000000abf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000700bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 918.382352] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 918.401142] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 918.410915] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:17 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000000ebf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 918.438869] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:17 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000800000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020200a20200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000900bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 918.760413] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 918.804496] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x4180, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f00000000c0)=0x421f) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:17 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000c00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:17 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000020bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202220200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000a00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:17 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x2, 0x40000, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x8300}, r1, 0x7, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 919.428804] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:18 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000ffff1f00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:18 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000023bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 919.488560] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202520200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 919.537160] kauditd_printk_skb: 13 callbacks suppressed [ 919.537173] audit: type=1804 audit(1642437678.107:4939): pid=3659 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1574/bus" dev="sda1" ino=15969 res=1 [ 919.568439] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:18 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000003fbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 919.676156] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 919.753321] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000e00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 919.798471] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 919.905451] audit: type=1804 audit(1642437678.187:4940): pid=3663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1316/bus" dev="sda1" ino=14016 res=1 [ 919.946658] audit: type=1804 audit(1642437678.267:4941): pid=3666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1574/bus" dev="sda1" ino=15969 res=1 [ 920.057749] audit: type=1804 audit(1642437678.517:4942): pid=3687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1316/bus" dev="sda1" ino=14016 res=1 16:41:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x4180, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f00000000c0)=0x421f) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:19 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020205520200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:19 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x2, 0x40000, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x8300}, r1, 0x7, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x2, 0x40000, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x8300}, r1, 0x7, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) 16:41:19 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000004000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:19 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000040bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000002000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 920.730226] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 920.739721] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:19 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020206020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:19 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fffff000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 920.800663] audit: type=1804 audit(1642437679.377:4943): pid=3723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1575/bus" dev="sda1" ino=16743 res=1 [ 920.804442] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000002300bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:19 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000043bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 920.914726] audit: type=1804 audit(1642437679.487:4944): pid=3730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1575/bus" dev="sda1" ino=16743 res=1 [ 921.022716] audit: type=1804 audit(1642437679.537:4945): pid=3731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1317/bus" dev="sda1" ino=16851 res=1 [ 921.057698] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:19 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x2, 0x40000, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x8300}, r1, 0x7, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000003f00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 921.122858] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 921.241547] audit: type=1804 audit(1642437679.817:4946): pid=3772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1576/bus" dev="sda1" ino=15654 res=1 [ 921.288733] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 921.334649] audit: type=1804 audit(1642437679.907:4947): pid=3779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1317/bus" dev="sda1" ino=16851 res=1 16:41:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@deltfilter={0x2c, 0x2d, 0x100, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, {0xfff3, 0xa}, {0x9, 0xfff1}, {0xffff, 0xfff2}}, [@TCA_CHAIN={0x8, 0xb, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc840}, 0x24000880) 16:41:20 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000045bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020206320200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:20 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x853}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x40000, 0x11) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) r6 = timerfd_create(0x5, 0x800) sendfile(r6, r5, 0x0, 0x80) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:20 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000001000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000004000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 922.125277] audit: type=1804 audit(1642437680.697:4948): pid=3799 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1577/bus" dev="sda1" ino=14220 res=1 16:41:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000004300bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:20 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000048bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 922.174908] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 922.247917] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 922.312268] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 922.339088] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020206420200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000004500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:21 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000002000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:21 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000004cbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 922.596720] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 922.606319] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x853}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x40000, 0x11) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) r6 = timerfd_create(0x5, 0x800) sendfile(r6, r5, 0x0, 0x80) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:21 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x853}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x40000, 0x11) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) r6 = timerfd_create(0x5, 0x800) sendfile(r6, r5, 0x0, 0x80) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x853}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x40000, 0x11) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) timerfd_create(0x5, 0x800) (async) sendfile(r6, r5, 0x0, 0x80) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) 16:41:21 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000003000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000004800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020207020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:21 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000068bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 922.886988] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020f720200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 922.956880] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:21 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000006cbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000004c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:21 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000004000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 923.027095] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 923.103539] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:21 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x853}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x40000, 0x11) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) r6 = timerfd_create(0x5, 0x800) sendfile(r6, r5, 0x0, 0x80) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 923.226947] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202002200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 923.400761] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 923.458688] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 923.470203] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000006800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:22 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000074bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202009200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:22 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000005000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:22 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000340)="7d9229f7f5c55980d4ad52bb2a2644b1931d3428e1496d7f8f574fe623ac1210ff6cf9d1fd62f4af1a8531f98a2c2d32ea33dc7f3fb999eb611f5670c624f6bb3dc0221528c18721eef5dd575ab5df51aafb0ddc3852283940803699191abfec0571fd7e65a396483b3d7c29ed1949183b3e61bc131d4ed02d44eda413150fcc665412fa14a2ebf39e6d6e4440505fdb0af241756c9f4381fdf51f465d6f2ec279595b709c9a", 0xa6, 0x10, &(0x7f0000000140)={0xa, 0x4e20, 0x37cf, @loopback, 0x3}, 0x1c) ioctl$DRM_IOCTL_AUTH_MAGIC(r6, 0x40046411, &(0x7f00000000c0)=0xffffb0fc) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020200a200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 924.181964] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000006c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 924.287747] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:22 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000007abf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 924.344326] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 924.367424] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000007400bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:23 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000006000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 924.546040] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:23 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000027ebf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 924.720247] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:23 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000340)="7d9229f7f5c55980d4ad52bb2a2644b1931d3428e1496d7f8f574fe623ac1210ff6cf9d1fd62f4af1a8531f98a2c2d32ea33dc7f3fb999eb611f5670c624f6bb3dc0221528c18721eef5dd575ab5df51aafb0ddc3852283940803699191abfec0571fd7e65a396483b3d7c29ed1949183b3e61bc131d4ed02d44eda413150fcc665412fa14a2ebf39e6d6e4440505fdb0af241756c9f4381fdf51f465d6f2ec279595b709c9a", 0xa6, 0x10, &(0x7f0000000140)={0xa, 0x4e20, 0x37cf, @loopback, 0x3}, 0x1c) (async) ioctl$DRM_IOCTL_AUTH_MAGIC(r6, 0x40046411, &(0x7f00000000c0)=0xffffb0fc) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202022200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:23 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000ffffff8cbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000007a00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:23 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000007000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000340)="7d9229f7f5c55980d4ad52bb2a2644b1931d3428e1496d7f8f574fe623ac1210ff6cf9d1fd62f4af1a8531f98a2c2d32ea33dc7f3fb999eb611f5670c624f6bb3dc0221528c18721eef5dd575ab5df51aafb0ddc3852283940803699191abfec0571fd7e65a396483b3d7c29ed1949183b3e61bc131d4ed02d44eda413150fcc665412fa14a2ebf39e6d6e4440505fdb0af241756c9f4381fdf51f465d6f2ec279595b709c9a", 0xa6, 0x10, &(0x7f0000000140)={0xa, 0x4e20, 0x37cf, @loopback, 0x3}, 0x1c) ioctl$DRM_IOCTL_AUTH_MAGIC(r6, 0x40046411, &(0x7f00000000c0)=0xffffb0fc) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000f000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 925.290306] kauditd_printk_skb: 22 callbacks suppressed [ 925.290318] audit: type=1804 audit(1642437683.867:4971): pid=4059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1581/bus" dev="sda1" ino=14233 res=1 16:41:24 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000edc0bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 925.354705] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 925.388566] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 925.397337] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:24 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000008000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 925.447013] audit: type=1804 audit(1642437683.957:4972): pid=4067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1321/bus" dev="sda1" ino=14234 res=1 [ 925.495286] audit: type=1804 audit(1642437684.057:4973): pid=4059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1581/bus" dev="sda1" ino=14233 res=1 [ 925.517994] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000fff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202025200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:24 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fffffff0bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 925.706058] audit: type=1804 audit(1642437684.277:4974): pid=4076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1321/bus" dev="sda1" ino=14234 res=1 16:41:24 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendto$inet6(r5, &(0x7f0000000340)="7d9229f7f5c55980d4ad52bb2a2644b1931d3428e1496d7f8f574fe623ac1210ff6cf9d1fd62f4af1a8531f98a2c2d32ea33dc7f3fb999eb611f5670c624f6bb3dc0221528c18721eef5dd575ab5df51aafb0ddc3852283940803699191abfec0571fd7e65a396483b3d7c29ed1949183b3e61bc131d4ed02d44eda413150fcc665412fa14a2ebf39e6d6e4440505fdb0af241756c9f4381fdf51f465d6f2ec279595b709c9a", 0xa6, 0x10, &(0x7f0000000140)={0xa, 0x4e20, 0x37cf, @loopback, 0x3}, 0x1c) ioctl$DRM_IOCTL_AUTH_MAGIC(r6, 0x40046411, &(0x7f00000000c0)=0xffffb0fc) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) sendto$inet6(r5, &(0x7f0000000340)="7d9229f7f5c55980d4ad52bb2a2644b1931d3428e1496d7f8f574fe623ac1210ff6cf9d1fd62f4af1a8531f98a2c2d32ea33dc7f3fb999eb611f5670c624f6bb3dc0221528c18721eef5dd575ab5df51aafb0ddc3852283940803699191abfec0571fd7e65a396483b3d7c29ed1949183b3e61bc131d4ed02d44eda413150fcc665412fa14a2ebf39e6d6e4440505fdb0af241756c9f4381fdf51f465d6f2ec279595b709c9a", 0xa6, 0x10, &(0x7f0000000140)={0xa, 0x4e20, 0x37cf, @loopback, 0x3}, 0x1c) (async) ioctl$DRM_IOCTL_AUTH_MAGIC(r6, 0x40046411, &(0x7f00000000c0)=0xffffb0fc) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) [ 925.816164] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000200bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 925.863589] audit: type=1804 audit(1642437684.437:4975): pid=4108 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1582/bus" dev="sda1" ino=14225 res=1 [ 925.925258] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 926.002430] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 926.138261] audit: type=1804 audit(1642437684.637:4976): pid=4117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1582/bus" dev="sda1" ino=14225 res=1 16:41:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:25 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000009000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:25 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000000003f4bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202055200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:25 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) fgetxattr(r2, &(0x7f0000000000)=@random={'os2.', 'tls\x00'}, &(0x7f0000000140)=""/70, 0x46) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) 16:41:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000300bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000400bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:25 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fffffff5bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 926.705190] audit: type=1804 audit(1642437685.278:4977): pid=4162 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1583/bus" dev="sda1" ino=14230 res=1 [ 926.771062] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 926.880849] audit: type=1804 audit(1642437685.368:4978): pid=4167 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1322/bus" dev="sda1" ino=14342 res=1 [ 926.950641] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:25 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fffffff6bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 927.017715] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 927.027427] audit: type=1804 audit(1642437685.588:4979): pid=4173 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1322/bus" dev="sda1" ino=14342 res=1 16:41:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202060200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:25 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000a000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 927.471126] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 927.512429] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) fgetxattr(r2, &(0x7f0000000000)=@random={'os2.', 'tls\x00'}, &(0x7f0000000140)=""/70, 0x46) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) 16:41:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000600bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:26 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fffffffbbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000b000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:26 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) fgetxattr(r2, &(0x7f0000000000)=@random={'os2.', 'tls\x00'}, &(0x7f0000000140)=""/70, 0x46) (async) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) 16:41:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202063200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 928.091562] audit: type=1804 audit(1642437686.668:4980): pid=4236 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1584/bus" dev="sda1" ino=16209 res=1 [ 928.095419] net_ratelimit: 1 callbacks suppressed [ 928.095428] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 928.206304] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202064200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:26 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000000007fcbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000700bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 928.255493] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 928.284772] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 928.481839] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:27 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fffffdfcbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202070200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 928.629006] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 928.837915] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) fgetxattr(r2, &(0x7f0000000000)=@random={'os2.', 'tls\x00'}, &(0x7f0000000140)=""/70, 0x46) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) 16:41:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:27 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000d000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:27 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) fgetxattr(r2, &(0x7f0000000000)=@random={'os2.', 'tls\x00'}, &(0x7f0000000140)=""/70, 0x46) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) 16:41:27 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fffffdfdbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020f7200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 929.112204] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 929.128414] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:27 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000e000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000900bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:27 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fffffffebf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 929.256924] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 929.328010] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:28 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020020000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000a00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 929.446913] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:28 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000020000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 929.764703] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 929.792673] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:29 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:29 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000fffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020090000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:29 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000023000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:29 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) ftruncate(0xffffffffffffffff, 0x10000) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000e00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 930.672706] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 930.695501] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 930.733005] kauditd_printk_skb: 3 callbacks suppressed [ 930.733018] audit: type=1804 audit(1642437689.308:4984): pid=4392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1586/bus" dev="sda1" ino=17114 res=1 16:41:29 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000003f000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020200a0000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:29 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000001fffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 930.789388] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 930.907162] audit: type=1804 audit(1642437689.478:4985): pid=4394 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1586/bus" dev="sda1" ino=17114 res=1 16:41:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000002300bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 931.033363] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 931.124992] audit: type=1804 audit(1642437689.588:4986): pid=4403 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1325/bus" dev="sda1" ino=17129 res=1 [ 931.173565] audit: type=1804 audit(1642437689.748:4987): pid=4408 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1325/bus" dev="sda1" ino=17129 res=1 16:41:29 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) ftruncate(0xffffffffffffffff, 0x10000) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) ftruncate(0xffffffffffffffff, 0x10000) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) [ 931.304163] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 931.349127] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 931.525795] audit: type=1804 audit(1642437690.088:4988): pid=4432 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1587/bus" dev="sda1" ino=17119 res=1 [ 931.576236] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 931.705206] audit: type=1804 audit(1642437690.278:4989): pid=4435 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1587/bus" dev="sda1" ino=17119 res=1 16:41:30 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000040000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:30 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000f0ffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020220000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000004300bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000002040)="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", 0x2000, &(0x7f0000000a00)={&(0x7f0000000140)={0x50, 0x0, 0x7f, {0x7, 0x23, 0x0, 0x80000, 0xca3, 0x200, 0x3, 0x6}}, &(0x7f00000000c0)={0x18, 0x0, 0x2, {0x3f}}, &(0x7f0000000200)={0x18, 0xffffffffffffffda, 0x203, {0x8}}, &(0x7f0000000240)={0x18, 0xffffffffffffffda, 0xffffffff, {0x4}}, &(0x7f00000002c0)={0x18, 0x0, 0x3, {0x101}}, &(0x7f0000000340)={0x28, 0x0, 0x7, {{0x1, 0x400, 0x2, r1}}}, &(0x7f0000000380)={0x60, 0x0, 0xffffffffffffff00, {{0x0, 0x41, 0xff, 0x5, 0x0, 0x0, 0x59, 0x8}}}, &(0x7f0000000400)={0x18, 0x0, 0xffff, {0xfffffffd}}, &(0x7f0000000440)={0x12, 0xfffffffffffffff5, 0xfffffffffffffffa, {'}\x00'}}, &(0x7f0000000480)={0x20, 0x0, 0xffff, {0x0, 0x1}}, &(0x7f00000004c0)={0x78, 0x0, 0x2, {0x101, 0xfff, 0x0, {0x4, 0x20, 0x9e, 0x3, 0xeaf6, 0x60d9b68c, 0x0, 0x0, 0x7ff, 0x2000, 0x20, 0x0, 0x0, 0x9, 0x401}}}, &(0x7f0000000540)={0x90, 0x0, 0x3, {0x5, 0x3, 0x1, 0x6, 0x4, 0x0, {0x0, 0x502c, 0x1, 0x5, 0x9, 0x6, 0x3ff, 0x7ff, 0xffffffff, 0xa000, 0xf0, 0x0, 0xffffffffffffffff, 0x3, 0x8}}}, &(0x7f0000000600)={0x70, 0xfffffffffffffffe, 0x8001, [{0x1, 0xc86, 0x2, 0x7, '\xff\xff'}, {0x1, 0x6, 0x7, 0xe28f, '\'\x1e}]=:#'}, {0x4, 0x7, 0x1, 0x3, '$'}]}, &(0x7f0000000880)={0xb0, 0x0, 0x7, [{{0x6, 0x0, 0x0, 0x0, 0x5, 0x6b1598b1, {0x2, 0x1, 0x20, 0x1, 0x1000, 0x9, 0x98, 0xc0d, 0x15, 0xa000, 0x100, 0x0, 0xee01, 0x42d, 0x7f}}, {0x5, 0x1, 0x1, 0x0, '\x00'}}]}, &(0x7f0000000940)={0xa0, 0x0, 0x200, {{0x0, 0x0, 0x7fffffff, 0x4, 0x2, 0x0, {0x1, 0x8, 0x0, 0x3f, 0x1000, 0x8, 0x4, 0xffffffff, 0x8, 0x2000, 0x5, r2, 0xee01, 0xc8000, 0x7b}}, {0x0, 0xb}}}, &(0x7f00000006c0)={0x20, 0xfffffffffffffffe, 0x7fff, {0x7, 0x4, 0x5, 0x3f}}}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:30 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) ftruncate(0xffffffffffffffff, 0x10000) (async) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:30 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fcfdffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 932.243829] audit: type=1804 audit(1642437690.818:4990): pid=4473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1588/bus" dev="sda1" ino=17117 res=1 [ 932.262567] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000004500bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 932.312704] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:30 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x440800, 0x8) r6 = syz_mount_image$hfsplus(&(0x7f00000000c0), &(0x7f0000000140)='./bus\x00', 0xffffffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000000340)="c75f9e1aba254dc4d03cffb88965a832bd846888a096b93e5bac06d3ed12c7b13373b5951a8a8ee31439f07f79810e48952ec7a50882301bf5f71499692d6951a0c4bbd6145d7eaa9a00d006a1df33f8b7e444acd5cb63283da885f88debe6c889bfd6e37161a83d37b49cbe0326a5ac1ff3b8772da804332fef96b38e7c458b2871f1bcfd2d2b6195fd", 0x8a, 0x3f}, {&(0x7f0000000400)="46b42e8e5432f6a69eeb83a82b1e8469f3b4f7cd039019ab68d3eebb17f9002d8d16415f4d935481a4d82e8977edc46b69989606a66a8e78cb8853f2bb4be9814ea8bf65445fc1b3ae8c7b1435dd62078940a339f001526db497c1e09ba35964676e036114724c094d6becdead981f3b6c20b0bd2ab56577e0aad8c7bd0b872a534d354056474ffc6932a3bc422771761e53e9bfec290480a2c110ad34dddaf5fad7830f68e53dc9184129748fea81e85700e589b8ca3510b7019fdb2ae7b6445a041252d9a797b44ae841e040f00bd43215d91ab9083b53b851", 0xda, 0x180000000000}], 0x2440c0, &(0x7f0000000200)={[{@nls={'nls', 0x3d, 'cp863'}}, {@uid}], [{@dont_measure}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x50, r6, 0x140bc000) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:30 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fdfdffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 932.361323] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 932.365417] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020250000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 932.469336] audit: type=1804 audit(1642437690.868:4991): pid=4479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1326/bus" dev="sda1" ino=16273 res=1 16:41:31 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000043000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 932.520376] audit: type=1804 audit(1642437690.908:4992): pid=4464 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1588/bus" dev="sda1" ino=17117 res=1 16:41:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000004800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:31 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00007fffffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 932.733498] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 932.745517] ieee802154 phy0 wpan0: encryption failed: -22 [ 932.751375] ieee802154 phy1 wpan1: encryption failed: -22 [ 932.767290] audit: type=1804 audit(1642437691.168:4993): pid=4487 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1326/bus" dev="sda1" ino=16273 res=1 [ 932.889844] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020550000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 932.996280] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:31 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000045000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 933.303534] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 933.323330] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000004c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00008cffffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:32 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x440800, 0x8) (async) r6 = syz_mount_image$hfsplus(&(0x7f00000000c0), &(0x7f0000000140)='./bus\x00', 0xffffffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000000340)="c75f9e1aba254dc4d03cffb88965a832bd846888a096b93e5bac06d3ed12c7b13373b5951a8a8ee31439f07f79810e48952ec7a50882301bf5f71499692d6951a0c4bbd6145d7eaa9a00d006a1df33f8b7e444acd5cb63283da885f88debe6c889bfd6e37161a83d37b49cbe0326a5ac1ff3b8772da804332fef96b38e7c458b2871f1bcfd2d2b6195fd", 0x8a, 0x3f}, {&(0x7f0000000400)="46b42e8e5432f6a69eeb83a82b1e8469f3b4f7cd039019ab68d3eebb17f9002d8d16415f4d935481a4d82e8977edc46b69989606a66a8e78cb8853f2bb4be9814ea8bf65445fc1b3ae8c7b1435dd62078940a339f001526db497c1e09ba35964676e036114724c094d6becdead981f3b6c20b0bd2ab56577e0aad8c7bd0b872a534d354056474ffc6932a3bc422771761e53e9bfec290480a2c110ad34dddaf5fad7830f68e53dc9184129748fea81e85700e589b8ca3510b7019fdb2ae7b6445a041252d9a797b44ae841e040f00bd43215d91ab9083b53b851", 0xda, 0x180000000000}], 0x2440c0, &(0x7f0000000200)={[{@nls={'nls', 0x3d, 'cp863'}}, {@uid}], [{@dont_measure}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x50, r6, 0x140bc000) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000048000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020600000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 933.746213] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 933.773996] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000f0ffffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020630000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000004c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:32 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x440800, 0x8) r6 = syz_mount_image$hfsplus(&(0x7f00000000c0), &(0x7f0000000140)='./bus\x00', 0xffffffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000000340)="c75f9e1aba254dc4d03cffb88965a832bd846888a096b93e5bac06d3ed12c7b13373b5951a8a8ee31439f07f79810e48952ec7a50882301bf5f71499692d6951a0c4bbd6145d7eaa9a00d006a1df33f8b7e444acd5cb63283da885f88debe6c889bfd6e37161a83d37b49cbe0326a5ac1ff3b8772da804332fef96b38e7c458b2871f1bcfd2d2b6195fd", 0x8a, 0x3f}, {&(0x7f0000000400)="46b42e8e5432f6a69eeb83a82b1e8469f3b4f7cd039019ab68d3eebb17f9002d8d16415f4d935481a4d82e8977edc46b69989606a66a8e78cb8853f2bb4be9814ea8bf65445fc1b3ae8c7b1435dd62078940a339f001526db497c1e09ba35964676e036114724c094d6becdead981f3b6c20b0bd2ab56577e0aad8c7bd0b872a534d354056474ffc6932a3bc422771761e53e9bfec290480a2c110ad34dddaf5fad7830f68e53dc9184129748fea81e85700e589b8ca3510b7019fdb2ae7b6445a041252d9a797b44ae841e040f00bd43215d91ab9083b53b851", 0xda, 0x180000000000}], 0x2440c0, &(0x7f0000000200)={[{@nls={'nls', 0x3d, 'cp863'}}, {@uid}], [{@dont_measure}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x50, r6, 0x140bc000) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x440800, 0x8) (async) syz_mount_image$hfsplus(&(0x7f00000000c0), &(0x7f0000000140)='./bus\x00', 0xffffffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000000340)="c75f9e1aba254dc4d03cffb88965a832bd846888a096b93e5bac06d3ed12c7b13373b5951a8a8ee31439f07f79810e48952ec7a50882301bf5f71499692d6951a0c4bbd6145d7eaa9a00d006a1df33f8b7e444acd5cb63283da885f88debe6c889bfd6e37161a83d37b49cbe0326a5ac1ff3b8772da804332fef96b38e7c458b2871f1bcfd2d2b6195fd", 0x8a, 0x3f}, {&(0x7f0000000400)="46b42e8e5432f6a69eeb83a82b1e8469f3b4f7cd039019ab68d3eebb17f9002d8d16415f4d935481a4d82e8977edc46b69989606a66a8e78cb8853f2bb4be9814ea8bf65445fc1b3ae8c7b1435dd62078940a339f001526db497c1e09ba35964676e036114724c094d6becdead981f3b6c20b0bd2ab56577e0aad8c7bd0b872a534d354056474ffc6932a3bc422771761e53e9bfec290480a2c110ad34dddaf5fad7830f68e53dc9184129748fea81e85700e589b8ca3510b7019fdb2ae7b6445a041252d9a797b44ae841e040f00bd43215d91ab9083b53b851", 0xda, 0x180000000000}], 0x2440c0, &(0x7f0000000200)={[{@nls={'nls', 0x3d, 'cp863'}}, {@uid}], [{@dont_measure}]}) (async) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x50, r6, 0x140bc000) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) [ 933.903016] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000006800bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000f5ffffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 934.019399] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 934.124027] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 934.148751] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020640000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:33 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x1510c0, 0x18) ftruncate(r1, 0x2007ffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f0000000340)={0x2020}, 0x2020) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000080)=0x4) sendfile(r4, r2, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:33 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000060000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:33 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000f6ffffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000006c00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 934.993956] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 935.002928] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000007400bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:33 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x1510c0, 0x18) ftruncate(r1, 0x2007ffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f0000000340)={0x2020}, 0x2020) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000080)=0x4) sendfile(r4, r2, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x1510c0, 0x18) (async) ftruncate(r1, 0x2007ffb) (async) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) (async) read$FUSE(r5, &(0x7f0000000340)={0x2020}, 0x2020) (async) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000080)=0x4) (async) sendfile(r4, r2, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) 16:41:33 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000fbffffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:33 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000068000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 935.107322] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 935.112750] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020700000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 935.182792] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:33 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x1510c0, 0x18) ftruncate(r1, 0x2007ffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f0000000340)={0x2020}, 0x2020) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000080)=0x4) sendfile(r4, r2, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x1510c0, 0x18) (async) ftruncate(r1, 0x2007ffb) (async) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) (async) read$FUSE(r5, &(0x7f0000000340)={0x2020}, 0x2020) (async) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000080)=0x4) (async) sendfile(r4, r2, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) [ 935.462960] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 935.557296] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 935.584225] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000007a00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:34 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000feffffffbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:34 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) capget(&(0x7f0000000140)={0x20071026, r1}, &(0x7f0000000180)={0x7, 0x7, 0x800, 0x3c5d, 0xffff, 0xfffffffb}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe63c, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:34 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000006c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020f70000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 936.130528] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure 16:41:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000f000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:34 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000074000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 936.170818] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 936.205849] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 936.237941] kauditd_printk_skb: 16 callbacks suppressed [ 936.237954] audit: type=1804 audit(1642437694.818:5010): pid=4729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1595/bus" dev="sda1" ino=14303 res=1 [ 936.269599] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:34 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000020000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000003bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 936.272587] audit: type=1804 audit(1642437694.818:5011): pid=4732 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1329/bus" dev="sda1" ino=14497 res=1 16:41:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020830300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 936.355083] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:35 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000007a000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 936.426783] audit: type=1804 audit(1642437694.988:5012): pid=4744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1595/bus" dev="sda1" ino=14303 res=1 [ 936.619549] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) sendfile(r2, r4, &(0x7f0000000000)=0x3, 0x8) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r5 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r7, r5, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:36 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000030000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020850300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:36 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) capget(&(0x7f0000000140)={0x20071026, r1}, &(0x7f0000000180)={0x7, 0x7, 0x800, 0x3c5d, 0xffff, 0xfffffffb}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe63c, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) (async, rerun: 32) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async, rerun: 32) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async, rerun: 32) sendfile(r5, r3, 0x0, 0x800100020016) (async, rerun: 32) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000005bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:36 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000ffffff8c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:36 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000040000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000006bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 937.607538] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 937.629277] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:36 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000edc0000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 937.660151] audit: type=1804 audit(1642437696.238:5013): pid=4784 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1596/bus" dev="sda1" ino=14881 res=1 16:41:36 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) capget(&(0x7f0000000140)={0x20071026, r1}, &(0x7f0000000180)={0x7, 0x7, 0x800, 0x3c5d, 0xffff, 0xfffffffb}) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe63c, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020b20300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 937.737624] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 937.758446] audit: type=1804 audit(1642437696.258:5014): pid=4794 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1330/bus" dev="sda1" ino=14914 res=1 16:41:36 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000050000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 937.894454] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 937.924163] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 937.962094] audit: type=1804 audit(1642437696.498:5015): pid=4821 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1597/bus" dev="sda1" ino=14737 res=1 [ 938.054823] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 938.197248] audit: type=1804 audit(1642437696.568:5016): pid=4824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1330/bus" dev="sda1" ino=14914 res=1 [ 938.238167] audit: type=1804 audit(1642437696.618:5017): pid=4811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1597/bus" dev="sda1" ino=14737 res=1 16:41:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) sendfile(r2, r4, &(0x7f0000000000)=0x3, 0x8) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r5 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r7, r5, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000007bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000000)=0x9, 0x4) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "483f5a49b5ba5565", '\x00', "20040100", "0000000000000014"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:37 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fffffff0000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020b30300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:37 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000060000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000009bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:37 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000070000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 938.812089] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 938.842920] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020b40300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 938.861820] audit: type=1804 audit(1642437697.438:5018): pid=4868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1598/bus" dev="sda1" ino=15106 res=1 16:41:37 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fffffff5000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 939.024101] net_ratelimit: 1 callbacks suppressed [ 939.024111] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 939.041731] audit: type=1804 audit(1642437697.508:5019): pid=4871 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1331/bus" dev="sda1" ino=15154 res=1 16:41:37 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000080000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 939.243190] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 939.279191] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000000)=0x9, 0x4) (async) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f0000000080)) (async) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) (async) sendfile(r1, r1, 0x0, 0x8080fffffffe) (async) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "483f5a49b5ba5565", '\x00', "20040100", "0000000000000014"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020b50300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:38 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fffffff6000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:38 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000090000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:38 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000000a0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 939.984248] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000000)=0x9, 0x4) (async) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f0000000080)) (async) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) (async) sendfile(r1, r1, 0x0, 0x8080fffffffe) (async, rerun: 64) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 64) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r5, 0x0) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async, rerun: 32) open(0x0, 0x0, 0x4) (async, rerun: 32) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "483f5a49b5ba5565", '\x00', "20040100", "0000000000000014"}, 0x28) (async) sendfile(r6, r4, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000ebf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 940.094592] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:38 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000000c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 940.155623] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:38 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fffffffb000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 940.206753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 940.209835] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020b60300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 940.572375] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 940.608770] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:39 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020206c00000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:39 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000020bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:39 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000000e0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:39 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020b70300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:39 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fffffdfc000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:39 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 941.430607] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:40 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fffffdfd000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000023bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020b80300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:40 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000230000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 941.475349] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 941.492412] kauditd_printk_skb: 70 callbacks suppressed [ 941.492424] audit: type=1804 audit(1642437700.068:5090): pid=5004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1601/bus" dev="sda1" ino=14950 res=1 [ 941.576386] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 941.706788] audit: type=1804 audit(1642437700.278:5091): pid=5004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1601/bus" dev="sda1" ino=14950 res=1 16:41:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000003fbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:40 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000430000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 941.765893] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 941.776172] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 941.799383] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:40 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000340)={0x2, {{0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, '\x00', 0x22}, 0xffffffff}}}, 0x88) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020b90300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:40 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fffffffe000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000040bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000043bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 942.029047] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 942.157353] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 942.183076] audit: type=1804 audit(1642437700.758:5092): pid=5064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1334/bus" dev="sda1" ino=14951 res=1 16:41:40 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020ba0300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:40 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000450000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:40 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000fff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 942.212166] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 942.411226] audit: type=1804 audit(1642437700.978:5093): pid=5070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1334/bus" dev="sda1" ino=14951 res=1 [ 942.683650] audit: type=1804 audit(1642437701.258:5094): pid=5078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1602/bus" dev="sda1" ino=15522 res=1 [ 942.718159] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:41 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020bb0300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 942.732500] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 942.761562] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:41 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000480000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:41 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) [ 942.810838] audit: type=1804 audit(1642437701.388:5095): pid=5095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1602/bus" dev="sda1" ino=15522 res=1 [ 943.021491] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 943.086024] audit: type=1804 audit(1642437701.658:5096): pid=5108 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1603/bus" dev="sda1" ino=15362 res=1 [ 943.117200] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 943.226523] audit: type=1804 audit(1642437701.798:5097): pid=5115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1603/bus" dev="sda1" ino=15362 res=1 [ 943.313381] audit: type=1804 audit(1642437701.888:5098): pid=5119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1603/bus" dev="sda1" ino=15362 res=1 [ 943.339352] audit: type=1804 audit(1642437701.888:5099): pid=5120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1603/bus" dev="sda1" ino=15362 res=1 16:41:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, 0xffffffffffffffff, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:42 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000001fffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000045bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020209a2600000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:42 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000004c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:42 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 943.653432] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 943.719725] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000048bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:42 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000680000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020a52600000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 943.817908] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 943.839619] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:42 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000f0ffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:42 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r4, r2, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:42 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000006c0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 944.084214] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 944.143768] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 944.214630] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(0xffffffffffffffff, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000004cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020a92600000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:43 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007ffb) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r4, r2, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r1, 0x2007ffb) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r4, r2, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) 16:41:43 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fcfdffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:43 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000740000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 944.664289] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000068bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 944.716409] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:43 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000007a0000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:43 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fdfdffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 944.761259] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 944.792238] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020f7ff00000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:43 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) setsockopt$inet6_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x304}, "2557be19305ca9dd", "2a3d1deeed79cb4421556f034f0fa23945b3ae3f320aefbdef7cf37445504b7f", "d76d38bb", "e64181f757725d5d"}, 0x38) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:43 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000f00000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 945.179963] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 945.201796] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 945.291355] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) setsockopt$inet6_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x304}, "2557be19305ca9dd", "2a3d1deeed79cb4421556f034f0fa23945b3ae3f320aefbdef7cf37445504b7f", "d76d38bb", "e64181f757725d5d"}, 0x38) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000006cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:44 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000007e0200bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:44 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020007fffffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020ffe0f5050000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:44 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) setsockopt$inet6_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x304}, "2557be19305ca9dd", "2a3d1deeed79cb4421556f034f0fa23945b3ae3f320aefbdef7cf37445504b7f", "d76d38bb", "e64181f757725d5d"}, 0x38) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020f7ffffff0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 945.757998] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 945.880152] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 945.907636] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:44 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000300bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:44 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020008cffffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020f7ffffffffffffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 945.941959] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000074bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:44 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) setsockopt$inet6_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x304}, "2557be19305ca9dd", "2a3d1deeed79cb4421556f034f0fa23945b3ae3f320aefbdef7cf37445504b7f", "d76d38bb", "e64181f757725d5d"}, 0x38) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) setsockopt$inet6_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x304}, "2557be19305ca9dd", "2a3d1deeed79cb4421556f034f0fa23945b3ae3f320aefbdef7cf37445504b7f", "d76d38bb", "e64181f757725d5d"}, 0x38) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) [ 946.064133] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 946.262170] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 946.287485] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 946.314683] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 946.584577] kauditd_printk_skb: 19 callbacks suppressed [ 946.584591] audit: type=1804 audit(1642437705.158:5119): pid=5344 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1609/bus" dev="sda1" ino=15956 res=1 16:41:45 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020f7ffffffffffffff00bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:45 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000f40300bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:45 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000f0ffffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200200000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:45 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000007abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:45 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{0x40, 0x4}, 'port1\x00', 0x0, 0x400, 0x515311e6, 0x7, 0x4743, 0x8000, 0x8, 0x0, 0x3, 0x8f}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)={0x80, 0x5e6, 0x0, 0x7ff, 0x7, 0xfe5}) [ 947.117103] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 947.137951] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:45 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000f0bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:45 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000f5ffffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 947.209758] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 947.228224] audit: type=1804 audit(1642437705.808:5120): pid=5385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1610/bus" dev="sda1" ino=16034 res=1 16:41:45 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000500bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 947.277596] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 947.380866] audit: type=1804 audit(1642437705.958:5121): pid=5389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1610/bus" dev="sda1" ino=16034 res=1 16:41:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) setsockopt$inet6_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000000)=@gcm_256={{0x304}, "2557be19305ca9dd", "2a3d1deeed79cb4421556f034f0fa23945b3ae3f320aefbdef7cf37445504b7f", "d76d38bb", "e64181f757725d5d"}, 0x38) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:46 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{0x40, 0x4}, 'port1\x00', 0x0, 0x400, 0x515311e6, 0x7, 0x4743, 0x8000, 0x8, 0x0, 0x3, 0x8f}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)={0x80, 0x5e6, 0x0, 0x7ff, 0x7, 0xfe5}) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{0x40, 0x4}, 'port1\x00', 0x0, 0x400, 0x515311e6, 0x7, 0x4743, 0x8000, 0x8, 0x0, 0x3, 0x8f}) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f00000000c0)) (async) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)={0x80, 0x5e6, 0x0, 0x7ff, 0x7, 0xfe5}) (async) 16:41:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000fffbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:46 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000600bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:46 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000f6ffffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 947.604335] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 947.687777] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 947.705593] audit: type=1804 audit(1642437706.268:5122): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1611/bus" dev="sda1" ino=16034 res=1 [ 947.722824] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200400000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000002bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 947.810987] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 947.907901] audit: type=1804 audit(1642437706.328:5123): pid=5424 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1339/bus" dev="sda1" ino=14397 res=1 [ 948.086928] audit: type=1804 audit(1642437706.458:5124): pid=5430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1611/bus" dev="sda1" ino=16034 res=1 [ 948.112720] audit: type=1804 audit(1642437706.588:5125): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1611/bus" dev="sda1" ino=16034 res=1 [ 948.197162] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:46 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{0x40, 0x4}, 'port1\x00', 0x0, 0x400, 0x515311e6, 0x7, 0x4743, 0x8000, 0x8, 0x0, 0x3, 0x8f}) (async, rerun: 32) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) (async, rerun: 64) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (rerun: 64) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async, rerun: 32) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f00000000c0)) (async, rerun: 32) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)={0x80, 0x5e6, 0x0, 0x7ff, 0x7, 0xfe5}) 16:41:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200500000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000003bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:46 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000700bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 948.251044] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:46 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000fbffffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 948.403993] audit: type=1804 audit(1642437706.718:5126): pid=5450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1339/bus" dev="sda1" ino=14397 res=1 [ 948.452380] audit: type=1804 audit(1642437706.938:5127): pid=5468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1612/bus" dev="sda1" ino=14855 res=1 [ 948.531122] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 948.657705] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{0x40, 0x4}, 'port1\x00', 0x0, 0x400, 0x515311e6, 0x7, 0x4743, 0x8000, 0x8, 0x0, 0x3, 0x8f}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000140)={0x80, 0x5e6, 0x0, 0x7ff, 0x7, 0xfe5}) 16:41:47 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1, 0x7, 0x0, 0x1, 0x0, 0xffff, 0x19200, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x7988000000, 0x800}, 0x90, 0x5, 0x4e, 0x2, 0x2, 0x758, 0x8, 0x0, 0x53cf, 0x0, 0xd4}, r1, 0xa, r6, 0x2) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) sendto$inet6(r0, &(0x7f0000000000)="429e33697f7faa336715778efee850aacd80e1f831d6103da566ac0d33dc31d67c9503a6aa3b4400", 0x28, 0x4045000, &(0x7f00000000c0)={0xa, 0x4e23, 0x300, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80000001}, 0x1c) 16:41:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000004bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:47 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200600000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:47 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000fc0700bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:47 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000feffffff000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 949.211030] audit: type=1804 audit(1642437707.788:5128): pid=5512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1340/bus" dev="sda1" ino=14409 res=1 16:41:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000005bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 949.272241] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 949.329650] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 949.351545] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:47 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000900bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 949.375969] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:48 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000020000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200700000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000006bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:48 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000a00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 949.747695] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 949.817806] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1, 0x7, 0x0, 0x1, 0x0, 0xffff, 0x19200, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x7988000000, 0x800}, 0x90, 0x5, 0x4e, 0x2, 0x2, 0x758, 0x8, 0x0, 0x53cf, 0x0, 0xd4}, r1, 0xa, r6, 0x2) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) sendto$inet6(r0, &(0x7f0000000000)="429e33697f7faa336715778efee850aacd80e1f831d6103da566ac0d33dc31d67c9503a6aa3b4400", 0x28, 0x4045000, &(0x7f00000000c0)={0xa, 0x4e23, 0x300, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80000001}, 0x1c) 16:41:49 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1, 0x7, 0x0, 0x1, 0x0, 0xffff, 0x19200, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x7988000000, 0x800}, 0x90, 0x5, 0x4e, 0x2, 0x2, 0x758, 0x8, 0x0, 0x53cf, 0x0, 0xd4}, r1, 0xa, r6, 0x2) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) sendto$inet6(r0, &(0x7f0000000000)="429e33697f7faa336715778efee850aacd80e1f831d6103da566ac0d33dc31d67c9503a6aa3b4400", 0x28, 0x4045000, &(0x7f00000000c0)={0xa, 0x4e23, 0x300, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80000001}, 0x1c) 16:41:49 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000030000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200800000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000007bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:49 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000c00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000008bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 950.542495] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:49 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000040000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 950.593705] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 950.611537] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:49 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000e00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:49 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) r6 = open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1, 0x7, 0x0, 0x1, 0x0, 0xffff, 0x19200, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x7988000000, 0x800}, 0x90, 0x5, 0x4e, 0x2, 0x2, 0x758, 0x8, 0x0, 0x53cf, 0x0, 0xd4}, r1, 0xa, r6, 0x2) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) sendto$inet6(r0, &(0x7f0000000000)="429e33697f7faa336715778efee850aacd80e1f831d6103da566ac0d33dc31d67c9503a6aa3b4400", 0x28, 0x4045000, &(0x7f00000000c0)={0xa, 0x4e23, 0x300, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80000001}, 0x1c) 16:41:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200900000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 950.791816] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000009bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 950.880516] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 950.924884] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 951.098385] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:50 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000050000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:50 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000002000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:50 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = dup2(r0, r3) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_int(r5, 0x29, 0xde450b6fbcc49e28, &(0x7f0000000000)=0x70cb, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200a00000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:50 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000002300bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 951.841827] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 951.872095] kauditd_printk_skb: 9 callbacks suppressed 16:41:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000ebf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 951.872110] audit: type=1804 audit(1642437710.449:5138): pid=5671 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1616/bus" dev="sda1" ino=17173 res=1 [ 951.891071] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:50 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000060000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 951.967807] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200c00000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 952.077629] audit: type=1804 audit(1642437710.659:5139): pid=5668 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1342/bus" dev="sda1" ino=17175 res=1 [ 952.086955] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:50 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000003f00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000023bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 952.240878] audit: type=1804 audit(1642437710.819:5140): pid=5688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1342/bus" dev="sda1" ino=17175 res=1 [ 952.309719] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 952.322411] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = dup2(r0, r3) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_int(r5, 0x29, 0xde450b6fbcc49e28, &(0x7f0000000000)=0x70cb, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:51 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 32) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 32) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = dup2(r0, r3) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) (async, rerun: 32) setsockopt$inet6_int(r5, 0x29, 0xde450b6fbcc49e28, &(0x7f0000000000)=0x70cb, 0x4) (rerun: 32) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200e00000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:51 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000070000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:51 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000004000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000043bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 953.224401] audit: type=1804 audit(1642437711.799:5141): pid=5731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1617/bus" dev="sda1" ino=14492 res=1 16:41:51 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000080000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 953.300983] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 953.345190] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020202300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 953.429156] audit: type=1804 audit(1642437711.829:5142): pid=5731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1617/bus" dev="sda1" ino=14492 res=1 16:41:52 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000004300bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:52 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async, rerun: 64) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 64) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = dup2(r0, r3) (async) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_int(r5, 0x29, 0xde450b6fbcc49e28, &(0x7f0000000000)=0x70cb, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async, rerun: 32) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async, rerun: 32) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000045bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 953.550968] audit: type=1804 audit(1642437711.839:5143): pid=5731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1617/bus" dev="sda1" ino=14492 res=1 [ 953.587802] audit: type=1804 audit(1642437711.849:5144): pid=5731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1617/bus" dev="sda1" ino=14492 res=1 [ 953.642552] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 953.685408] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:52 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000090000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 953.762317] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 953.771960] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 953.830318] audit: type=1804 audit(1642437711.849:5145): pid=5731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1617/bus" dev="sda1" ino=14492 res=1 [ 954.010172] audit: type=1804 audit(1642437711.869:5146): pid=5739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1617/bus" dev="sda1" ino=14492 res=1 [ 954.061392] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 954.137710] audit: type=1804 audit(1642437711.949:5147): pid=5731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1617/bus" dev="sda1" ino=14492 res=1 16:41:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:53 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000004500bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000048bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020204300000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:53 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x5, 0x0, 0x2, 0x0, 0x7f, 0x6e6e17c2e74afd42, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x40, 0x0, 0x3}, 0x0, 0xffffffeffffffffd, r0, 0xa) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffc) r3 = open(&(0x7f0000000300)='./bus\x00', 0x6360c1, 0x44) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e32, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0x3}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x7, 0xfffa}, 0x8) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x303}, "20a51729554d35ab", "4a85800ee64f264feee76f6c09e36c3e", "c17ea2c2", "adc0aa40567a46f2"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) connect(r3, &(0x7f0000000140)=@caif=@dgm={0x25, 0xd6, 0xa}, 0x80) 16:41:53 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000a0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:53 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000004800bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:53 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000b0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 954.550712] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000004cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 954.656810] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:53 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000004c00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020204500000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 954.760515] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 954.855208] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:53 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000006800bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 955.056596] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:54 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000c0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:54 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) (async) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x5, 0x0, 0x2, 0x0, 0x7f, 0x6e6e17c2e74afd42, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x40, 0x0, 0x3}, 0x0, 0xffffffeffffffffd, r0, 0xa) (async, rerun: 64) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (rerun: 64) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffc) r3 = open(&(0x7f0000000300)='./bus\x00', 0x6360c1, 0x44) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async, rerun: 32) listen(r4, 0x0) (async, rerun: 32) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e32, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0x3}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x7, 0xfffa}, 0x8) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x303}, "20a51729554d35ab", "4a85800ee64f264feee76f6c09e36c3e", "c17ea2c2", "adc0aa40567a46f2"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async, rerun: 32) creat(&(0x7f0000000040)='./bus\x00', 0x0) (rerun: 32) connect(r3, &(0x7f0000000140)=@caif=@dgm={0x25, 0xd6, 0xa}, 0x80) 16:41:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000068bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020204800000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:54 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000006c00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:54 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000007400bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000006cbf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 955.869445] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:54 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x5, 0x0, 0x2, 0x0, 0x7f, 0x6e6e17c2e74afd42, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x40, 0x0, 0x3}, 0x0, 0xffffffeffffffffd, r0, 0xa) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffc) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x6360c1, 0x44) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e32, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0x3}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x7, 0xfffa}, 0x8) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x303}, "20a51729554d35ab", "4a85800ee64f264feee76f6c09e36c3e", "c17ea2c2", "adc0aa40567a46f2"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) connect(r3, &(0x7f0000000140)=@caif=@dgm={0x25, 0xd6, 0xa}, 0x80) [ 955.940582] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 955.943173] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020204c00000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000d0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000074bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 956.283583] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 956.385170] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:55 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000007a00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000000c0)="0f20e06635000004000f22e06766c7442400007000006766c7442402050000006766c744240600000000670f0114240f01c8e38336f08301dc660f38816bad0f01d566b9ae0b000066b80000000066ba000000800f30d9ed260f01c9", 0x5c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a08}, r4, 0xfffffff000000001, 0xffffffffffffffff, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x2a2402, 0x100) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 16:41:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000007abf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020206000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:55 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000e0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020206800000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 956.955495] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:55 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000027e00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf020000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020206c00000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 957.100765] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 957.147824] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 957.191824] kauditd_printk_skb: 46 callbacks suppressed [ 957.191839] audit: type=1804 audit(1642437715.769:5194): pid=5969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1346/bus" dev="sda1" ino=17195 res=1 16:41:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000000c0)="0f20e06635000004000f22e06766c7442400007000006766c7442402050000006766c744240600000000670f0114240f01c8e38336f08301dc660f38816bad0f01d566b9ae0b000066b80000000066ba000000800f30d9ed260f01c9", 0x5c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) (async, rerun: 32) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) (async) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a08}, r4, 0xfffffff000000001, 0xffffffffffffffff, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) sendfile(r3, r3, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x2a2402, 0x100) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r5, 0x0) (async, rerun: 64) socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) 16:41:55 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000230000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 957.246832] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 957.373286] audit: type=1804 audit(1642437715.949:5195): pid=5987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1346/bus" dev="sda1" ino=17195 res=1 [ 957.557255] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 957.566909] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:56 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, 0x0, 0x0) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:56 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000f000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf030000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000000c0)="0f20e06635000004000f22e06766c7442400007000006766c7442402050000006766c744240600000000670f0114240f01c8e38336f08301dc660f38816bad0f01d566b9ae0b000066b80000000066ba000000800f30d9ed260f01c9", 0x5c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a08}, r4, 0xfffffff000000001, 0xffffffffffffffff, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r3, r3, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x2a2402, 0x100) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) (async) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (async) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000000c0)="0f20e06635000004000f22e06766c7442400007000006766c7442402050000006766c744240600000000670f0114240f01c8e38336f08301dc660f38816bad0f01d566b9ae0b000066b80000000066ba000000800f30d9ed260f01c9", 0x5c}], 0x1, 0x0, 0x0, 0x0) (async) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) (async) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) (async) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) (async) ioctl$KVM_RUN(r2, 0xae80, 0x0) (async) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a08}, r4, 0xfffffff000000001, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) sendfile(r3, r3, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x2a2402, 0x100) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r5, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) 16:41:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020207400000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:56 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000430000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 958.183075] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:56 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) sendto$inet6(r6, &(0x7f0000000000), 0x0, 0x4000094, 0x0, 0x0) 16:41:56 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000450000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:56 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000003f400bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 958.284379] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf040000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020207a00000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 958.392698] audit: type=1804 audit(1642437716.969:5196): pid=6039 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1347/bus" dev="sda1" ino=17192 res=1 [ 958.462969] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:57 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000007fc00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 958.511602] audit: type=1804 audit(1642437717.059:5197): pid=6042 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1625/bus" dev="sda1" ino=14453 res=1 [ 958.634036] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 958.642768] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 958.660200] audit: type=1804 audit(1642437717.239:5198): pid=6041 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1347/bus" dev="sda1" ino=17192 res=1 16:41:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:57 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) (async) sendto$inet6(r6, &(0x7f0000000000), 0x0, 0x4000094, 0x0, 0x0) 16:41:57 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0000000fff00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:57 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf050000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:57 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000480000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020f000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:57 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000200bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 959.419330] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:58 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000004c0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 959.473846] audit: type=1804 audit(1642437718.049:5199): pid=6097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1626/bus" dev="sda1" ino=17217 res=1 [ 959.486494] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 959.544025] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 959.610415] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:41:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf060000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:58 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000300bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200003000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 959.696459] audit: type=1804 audit(1642437718.079:5200): pid=6093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1626/bus" dev="sda1" ino=17217 res=1 [ 959.832820] audit: type=1804 audit(1642437718.159:5201): pid=6109 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1348/bus" dev="sda1" ino=14527 res=1 [ 959.859564] audit: type=1804 audit(1642437718.369:5202): pid=6109 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1348/bus" dev="sda1" ino=14527 res=1 16:41:58 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000600000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 959.930524] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 960.133653] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 960.178558] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:41:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf070000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:59 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000400bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200005000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000680000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:59 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) sendto$inet6(r6, &(0x7f0000000000), 0x0, 0x4000094, 0x0, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) (async) open(0x0, 0x0, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) (async) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) sendfile(r5, r3, 0x0, 0x800100020016) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) (async) read$FUSE(r6, &(0x7f0000000340)={0x2020}, 0x2020) (async) sendto$inet6(r6, &(0x7f0000000000), 0x0, 0x4000094, 0x0, 0x0) (async) 16:41:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000006c0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 960.664147] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:59 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000500bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 960.806033] audit: type=1804 audit(1642437719.369:5203): pid=6177 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1627/bus" dev="sda1" ino=17236 res=1 [ 960.818492] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 960.886885] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:41:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf080000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:41:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200006000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 960.938633] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:41:59 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3a}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:41:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000740000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 961.259309] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 961.269521] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 961.375677] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 961.469649] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:42:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf090000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:00 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000600bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:00 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000007a0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200007000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:00 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3a}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0a0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:01 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000f00000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 962.455255] kauditd_printk_skb: 6 callbacks suppressed [ 962.455269] audit: type=1804 audit(1642437721.029:5210): pid=6246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1629/bus" dev="sda1" ino=17227 res=1 [ 962.463869] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 962.496577] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:01 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000700bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 962.573036] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020fc07000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 962.648812] audit: type=1804 audit(1642437721.189:5211): pid=6268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1350/bus" dev="sda1" ino=17244 res=1 [ 962.666342] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0c0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 962.827716] audit: type=1804 audit(1642437721.199:5212): pid=6264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1629/bus" dev="sda1" ino=17227 res=1 [ 963.010581] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:01 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000300000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 963.042498] audit: type=1804 audit(1642437721.399:5213): pid=6276 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1350/bus" dev="sda1" ino=17244 res=1 [ 963.226392] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 963.407391] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3a}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0e0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:02 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000800bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200009000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:02 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000500000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 963.816579] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 963.857384] audit: type=1804 audit(1642437722.429:5214): pid=6325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1351/bus" dev="sda1" ino=13967 res=1 [ 963.941078] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 964.042951] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 964.082926] audit: type=1804 audit(1642437722.659:5215): pid=6327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1351/bus" dev="sda1" ino=13967 res=1 16:42:02 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3a}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:02 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000900bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf230000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000a000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:02 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000600000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf430000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:02 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000a00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 964.370245] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 964.396738] audit: type=1804 audit(1642437722.979:5216): pid=6359 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1630/bus" dev="sda1" ino=14066 res=1 [ 964.436895] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 964.501750] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 964.580795] audit: type=1804 audit(1642437723.159:5217): pid=6370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1630/bus" dev="sda1" ino=14066 res=1 16:42:03 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) lstat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ftruncate(r4, 0x4) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:03 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000700000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf450000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000c000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:03 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000c00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 965.150196] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 965.165218] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 965.263981] audit: type=1804 audit(1642437723.839:5218): pid=6405 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1352/bus" dev="sda1" ino=14242 res=1 [ 965.292412] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:04 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:42:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf480000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000e000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000900000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000e00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 965.516842] audit: type=1804 audit(1642437724.089:5219): pid=6417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1352/bus" dev="sda1" ino=14242 res=1 16:42:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf4c0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000a00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 965.591340] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 965.610565] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 965.730557] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 965.865836] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:42:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000002300bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200020000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf680000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000b00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:04 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:42:05 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000004300bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 966.449789] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 966.512897] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 966.524833] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf6c0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000c00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:05 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000004500bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 966.615245] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200023000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf740000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 966.801389] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 966.979475] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r7, &(0x7f0000000140)='./bus\x00', 0x2a) 16:42:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000d00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf7a0000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:05 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000004800bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020003f000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 967.144013] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 967.236592] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 967.262651] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:06 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000000)) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bff00000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:06 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000004c00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:06 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000e00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200040000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000000)) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:06 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000006800bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000300000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 967.791186] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 967.821644] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200043000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 967.902822] kauditd_printk_skb: 6 callbacks suppressed [ 967.902836] audit: type=1804 audit(1642437726.479:5226): pid=6581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1633/bus" dev="sda1" ino=14689 res=1 [ 967.942997] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:06 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000002000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 967.982558] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 967.994298] audit: type=1804 audit(1642437726.499:5227): pid=6578 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1355/bus" dev="sda1" ino=14753 res=1 16:42:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000500000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:06 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000006c00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 968.152299] audit: type=1804 audit(1642437726.729:5228): pid=6585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1633/bus" dev="sda1" ino=14689 res=1 [ 968.229654] audit: type=1804 audit(1642437726.809:5229): pid=6593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1355/bus" dev="sda1" ino=14753 res=1 [ 968.376941] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 968.448152] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200045000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000002300000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:07 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000007400bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:07 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100022ee0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000600000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 969.069053] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 969.083198] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 969.193226] audit: type=1804 audit(1642437727.769:5230): pid=6637 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1634/bus" dev="sda1" ino=14849 res=1 16:42:07 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r6, &(0x7f0000000140)='./bus\x00', 0x2a) 16:42:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000700000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:07 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000007a00bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200048000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:07 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000003f00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 969.247062] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 969.407347] audit: type=1804 audit(1642437727.989:5231): pid=6639 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1634/bus" dev="sda1" ino=14849 res=1 16:42:08 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000f000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000900000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 969.496343] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 969.521456] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020004c000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 969.611007] audit: type=1804 audit(1642437728.189:5232): pid=6665 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1356/bus" dev="sda1" ino=13969 res=1 [ 969.612424] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000004000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 969.747666] audit: type=1804 audit(1642437728.329:5233): pid=6671 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1356/bus" dev="sda1" ino=13969 res=1 16:42:08 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000007e02bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 969.827239] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 969.862515] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:09 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100022007) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000a00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200060000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:09 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000004300000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:09 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000003bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100022007) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000c00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 970.574233] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200068000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:09 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000f403bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000e00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 970.711567] audit: type=1804 audit(1642437729.289:5234): pid=6735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1357/bus" dev="sda1" ino=13952 res=1 [ 970.747766] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 970.802978] audit: type=1804 audit(1642437729.339:5235): pid=6732 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1635/bus" dev="sda1" ino=15121 res=1 [ 970.844914] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:09 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000004500000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:09 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100022007) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf002000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:09 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000005bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 971.076485] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020006c000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 971.146295] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 971.173309] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf002300000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:09 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000006bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 971.414761] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020017) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000004800000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200074000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf003f00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:10 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000007bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000004c00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 972.108732] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 972.133351] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf004000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020007a000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:10 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000fc07bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:10 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020017) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 972.373916] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 972.427436] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 972.502190] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf004300000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000006000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 972.686518] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 972.922047] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="fcffffbf00d0f0744d593b2c78c8"]) mkdirat(r6, &(0x7f0000000140)='./bus\x00', 0x2a) 16:42:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020c0ed000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:12 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000009bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf004500000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:12 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000006800000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:12 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020015) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:12 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000000abf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf004800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 973.681594] kauditd_printk_skb: 7 callbacks suppressed [ 973.681608] audit: type=1804 audit(1642437732.260:5243): pid=6889 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1638/bus" dev="sda1" ino=15233 res=1 [ 973.736768] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 973.783184] audit: type=1804 audit(1642437732.360:5244): pid=6893 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1359/bus" dev="sda1" ino=13880 res=1 [ 973.787661] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 973.876141] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 973.883654] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:12 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000006c00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000f0000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 973.982276] audit: type=1804 audit(1642437732.480:5245): pid=6894 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1359/bus" dev="sda1" ino=13880 res=1 16:42:12 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000000cbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 974.099183] audit: type=1804 audit(1642437732.550:5246): pid=6903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1638/bus" dev="sda1" ino=15233 res=1 16:42:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf004c00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020007) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 974.157642] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:12 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000007400000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 974.266286] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:12 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000000ebf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202007fc000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf006800000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 974.487931] audit: type=1804 audit(1642437733.070:5247): pid=6937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1360/bus" dev="sda1" ino=15345 res=1 [ 974.497949] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 974.583183] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 974.681627] audit: type=1804 audit(1642437733.190:5248): pid=6950 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1360/bus" dev="sda1" ino=15345 res=1 [ 974.866610] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:13 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020015) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:13 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000020bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:13 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000007a00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf006c00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200fff000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf007400000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:13 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000c0ed00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 975.077832] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 975.206378] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 975.214160] audit: type=1804 audit(1642437733.790:5249): pid=6986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1639/bus" dev="sda1" ino=13942 res=1 [ 975.268368] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 975.409607] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 975.452758] audit: type=1804 audit(1642437734.030:5250): pid=6986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1639/bus" dev="sda1" ino=13942 res=1 16:42:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) (fail_nth: 1) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r2]) mkdirat(0xffffffffffffffff, 0x0, 0x0) 16:42:14 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000023bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000040000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf007a00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:14 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000f000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 975.926863] audit: type=1804 audit(1642437734.510:5251): pid=7021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1361/bus" dev="sda1" ino=14647 res=1 [ 975.968895] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 976.006489] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 976.063986] FAULT_INJECTION: forcing a failure. [ 976.063986] name failslab, interval 1, probability 0, space 0, times 0 [ 976.081992] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 976.143084] audit: type=1804 audit(1642437734.670:5252): pid=7028 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1361/bus" dev="sda1" ino=14647 res=1 [ 976.167633] CPU: 1 PID: 7021 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 976.175467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.184832] Call Trace: [ 976.187439] dump_stack+0x1fc/0x2ef [ 976.191085] should_fail.cold+0xa/0xf [ 976.194903] ? setup_fault_attr+0x200/0x200 [ 976.199239] ? lock_acquire+0x170/0x3c0 [ 976.203235] __should_failslab+0x115/0x180 [ 976.207492] should_failslab+0x5/0x10 [ 976.211320] kmem_cache_alloc_trace+0x284/0x380 [ 976.216006] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 976.220876] alloc_pipe_info+0xb8/0x470 [ 976.224861] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 976.229634] splice_direct_to_actor+0x6dd/0x8d0 [ 976.234325] ? retint_kernel+0x2d/0x2d [ 976.238228] ? generic_pipe_buf_nosteal+0x10/0x10 [ 976.243092] ? do_splice_to+0x160/0x160 [ 976.247076] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 976.251939] do_splice_direct+0x1a7/0x270 [ 976.256106] ? splice_direct_to_actor+0x8d0/0x8d0 [ 976.260955] ? security_file_permission+0x1c0/0x220 [ 976.265968] do_sendfile+0x550/0xc30 [ 976.269689] ? do_compat_pwritev64+0x1b0/0x1b0 [ 976.274266] ? vfs_write+0x393/0x540 [ 976.277992] __se_sys_sendfile64+0x147/0x160 [ 976.282417] ? __se_sys_sendfile+0x180/0x180 [ 976.286831] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 976.292208] ? trace_hardirqs_off_caller+0x6e/0x210 [ 976.297234] ? do_syscall_64+0x21/0x620 [ 976.301207] do_syscall_64+0xf9/0x620 [ 976.305005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.310294] RIP: 0033:0x7f1f6b2cbfe9 [ 976.314008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 976.332905] RSP: 002b:00007f1f69c20168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 16:42:15 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) open(0x0, 0x0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020015) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bfc0ed00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:15 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000003fbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 976.340621] RAX: ffffffffffffffda RBX: 00007f1f6b3df030 RCX: 00007f1f6b2cbfe9 [ 976.347891] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000014 [ 976.355156] RBP: 00007f1f69c201d0 R08: 0000000000000000 R09: 0000000000000000 [ 976.362415] R10: 0000800100020016 R11: 0000000000000246 R12: 0000000000000001 [ 976.369680] R13: 00007ffcefec9ddf R14: 00007f1f69c20300 R15: 0000000000022000 16:42:15 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000fff00000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000080000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) (fail_nth: 2) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r2]) mkdirat(0xffffffffffffffff, 0x0, 0x0) 16:42:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00f000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:15 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000040bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 976.663386] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 976.700880] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf0fff00000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:15 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000043bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 976.715772] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 976.775424] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 976.785446] FAULT_INJECTION: forcing a failure. [ 976.785446] name failslab, interval 1, probability 0, space 0, times 0 [ 976.797212] CPU: 0 PID: 7056 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 976.805022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.814413] Call Trace: [ 976.817016] dump_stack+0x1fc/0x2ef [ 976.820670] should_fail.cold+0xa/0xf [ 976.824479] ? setup_fault_attr+0x200/0x200 [ 976.828808] ? lock_acquire+0x170/0x3c0 [ 976.832794] __should_failslab+0x115/0x180 [ 976.837038] should_failslab+0x5/0x10 [ 976.840847] __kmalloc+0x2ab/0x3c0 [ 976.844415] ? alloc_pipe_info+0x193/0x470 [ 976.848658] alloc_pipe_info+0x193/0x470 [ 976.852731] splice_direct_to_actor+0x6dd/0x8d0 [ 976.857408] ? apparmor_getprocattr+0x11e0/0x11e0 [ 976.862257] ? check_preemption_disabled+0x41/0x280 [ 976.867292] ? generic_pipe_buf_nosteal+0x10/0x10 [ 976.872143] ? do_splice_to+0x160/0x160 [ 976.876123] ? security_file_permission+0x1c0/0x220 [ 976.881151] do_splice_direct+0x1a7/0x270 [ 976.885315] ? splice_direct_to_actor+0x8d0/0x8d0 [ 976.890166] ? retint_kernel+0x2d/0x2d [ 976.894071] do_sendfile+0x550/0xc30 [ 976.897795] ? do_compat_pwritev64+0x1b0/0x1b0 [ 976.902382] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 976.906972] ? rcu_nmi_exit+0xb3/0x180 [ 976.910865] __se_sys_sendfile64+0x147/0x160 [ 976.915277] ? __se_sys_sendfile+0x180/0x180 [ 976.919690] ? do_syscall_64+0x4f/0x620 [ 976.923670] do_syscall_64+0xf9/0x620 [ 976.927478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.932667] RIP: 0033:0x7f1f6b2cbfe9 [ 976.936385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 976.955375] RSP: 002b:00007f1f69c20168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 976.963090] RAX: ffffffffffffffda RBX: 00007f1f6b3df030 RCX: 00007f1f6b2cbfe9 16:42:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000c0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 976.970371] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000014 [ 976.977642] RBP: 00007f1f69c201d0 R08: 0000000000000000 R09: 0000000000000000 [ 976.984919] R10: 0000800100020016 R11: 0000000000000246 R12: 0000000000000001 [ 976.992189] R13: 00007ffcefec9ddf R14: 00007f1f69c20300 R15: 0000000000022000 16:42:15 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000004000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 977.307072] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 977.421518] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:16 executing program 1: getpgid(0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) sendfile(r3, r1, 0x0, 0x800100020016) (fail_nth: 1) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000004000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) (fail_nth: 3) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r2]) mkdirat(0xffffffffffffffff, 0x0, 0x0) 16:42:16 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000045bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020ffff1f0000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000008000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000008000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:16 executing program 1: getpgid(0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) sendfile(r3, r1, 0x0, 0x800100020016) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 978.090447] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 978.129166] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:16 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000048bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000400000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000c000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 978.181705] FAULT_INJECTION: forcing a failure. [ 978.181705] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 978.194544] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 978.210004] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 978.281119] CPU: 1 PID: 7124 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 978.288953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.298318] Call Trace: [ 978.300925] dump_stack+0x1fc/0x2ef [ 978.304571] should_fail.cold+0xa/0xf [ 978.308396] ? setup_fault_attr+0x200/0x200 [ 978.312731] ? perf_event_alloc.part.0+0x2eb0/0x2eb0 [ 978.317865] __alloc_pages_nodemask+0x239/0x2890 [ 978.322639] ? ctx_sched_in+0x134/0x790 [ 978.326615] ? __perf_event_task_sched_in+0x795/0x9b0 [ 978.331815] ? lock_downgrade+0x720/0x720 [ 978.335966] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 978.340814] ? mark_held_locks+0xa6/0xf0 [ 978.344870] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 978.349625] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 978.354379] ? rcu_nmi_exit+0xb3/0x180 [ 978.358348] ? retint_kernel+0x2d/0x2d [ 978.362235] alloc_pages_current+0x193/0x2a0 [ 978.366641] skb_page_frag_refill+0x258/0x550 [ 978.371132] sk_page_frag_refill+0x4a/0x1d0 [ 978.375447] sk_alloc_sg+0x154/0x850 [ 978.379165] tls_sw_sendpage+0x4e1/0xd00 [ 978.383229] ? lock_downgrade+0x720/0x720 [ 978.387370] ? tls_sw_sendmsg+0x1210/0x1210 [ 978.391685] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 978.396868] ? tls_sw_sendmsg+0x1210/0x1210 [ 978.401184] inet_sendpage+0x164/0x650 [ 978.405069] ? current_time+0x13c/0x1c0 [ 978.409060] ? inet_accept+0x770/0x770 [ 978.413022] sock_sendpage+0xdf/0x140 [ 978.416816] pipe_to_sendpage+0x268/0x330 [ 978.420954] ? sockfs_setattr+0x160/0x160 [ 978.425100] ? direct_splice_actor+0x160/0x160 [ 978.429708] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 978.435072] __splice_from_pipe+0x389/0x800 [ 978.439390] ? direct_splice_actor+0x160/0x160 [ 978.443967] generic_splice_sendpage+0xd4/0x140 [ 978.448626] ? __splice_from_pipe+0x800/0x800 [ 978.453120] ? __splice_from_pipe+0x800/0x800 [ 978.457609] direct_splice_actor+0x115/0x160 [ 978.462013] splice_direct_to_actor+0x33f/0x8d0 [ 978.466679] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 978.471435] ? generic_pipe_buf_nosteal+0x10/0x10 [ 978.476280] ? do_splice_to+0x160/0x160 [ 978.480274] do_splice_direct+0x1a7/0x270 [ 978.484432] ? splice_direct_to_actor+0x8d0/0x8d0 [ 978.489278] ? security_file_permission+0x1c0/0x220 [ 978.494339] do_sendfile+0x550/0xc30 [ 978.498073] ? do_compat_pwritev64+0x1b0/0x1b0 [ 978.502649] ? vfs_write+0x393/0x540 [ 978.506359] __se_sys_sendfile64+0x147/0x160 [ 978.510761] ? __se_sys_sendfile+0x180/0x180 [ 978.515167] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 978.520524] ? trace_hardirqs_off_caller+0x6e/0x210 [ 978.525537] ? do_syscall_64+0x21/0x620 [ 978.529503] do_syscall_64+0xf9/0x620 [ 978.533301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.538483] RIP: 0033:0x7f1f6b2cbfe9 [ 978.542202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 978.561107] RSP: 002b:00007f1f69c20168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 978.569096] RAX: ffffffffffffffda RBX: 00007f1f6b3df030 RCX: 00007f1f6b2cbfe9 16:42:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000c000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 978.576374] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000014 [ 978.583650] RBP: 00007f1f69c201d0 R08: 0000000000000000 R09: 0000000000000000 [ 978.590913] R10: 0000800100020016 R11: 0000000000000246 R12: 0000000000000001 [ 978.598172] R13: 00007ffcefec9ddf R14: 00007f1f69c20300 R15: 0000000000022000 [ 978.633876] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020fffff00000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 978.708417] kauditd_printk_skb: 8 callbacks suppressed [ 978.708430] audit: type=1804 audit(1642437737.290:5261): pid=7154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1642/bus" dev="sda1" ino=13880 res=1 [ 978.749370] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 16:42:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bfffff1f000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 978.792020] rock: corrupted directory entry. extent=32, offset=60672, size=0 16:42:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r6, r4, 0x0, 0x800100020016) (fail_nth: 4) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r2]) mkdirat(0xffffffffffffffff, 0x0, 0x0) 16:42:17 executing program 1: getpgid(0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) sendfile(r3, r1, 0x0, 0x800100020010) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:42:17 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000ffff1f000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 978.943730] audit: type=1804 audit(1642437737.520:5262): pid=7172 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1643/bus" dev="sda1" ino=14621 res=1 [ 978.946042] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:42:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bffffff0000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:17 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf00000000004cbf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000100000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) [ 979.028681] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 979.043726] audit: type=1804 audit(1642437737.620:5263): pid=7182 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1643/bus" dev="sda1" ino=14621 res=1 [ 979.144695] audit: type=1804 audit(1642437737.720:5264): pid=7190 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1364/bus" dev="sda1" ino=13943 res=1 [ 979.162746] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 979.202832] FAULT_INJECTION: forcing a failure. [ 979.202832] name failslab, interval 1, probability 0, space 0, times 0 [ 979.217426] CPU: 1 PID: 7190 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 979.225236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.225299] Call Trace: [ 979.225323] dump_stack+0x1fc/0x2ef [ 979.240977] should_fail.cold+0xa/0xf [ 979.244795] ? setup_fault_attr+0x200/0x200 [ 979.249130] ? lock_acquire+0x170/0x3c0 [ 979.253124] __should_failslab+0x115/0x180 [ 979.257403] should_failslab+0x5/0x10 [ 979.261226] __kmalloc+0x2ab/0x3c0 [ 979.264771] ? tls_push_record+0xff/0x1370 [ 979.269020] tls_push_record+0xff/0x1370 [ 979.273095] ? sk_alloc_sg+0x5d8/0x850 [ 979.276999] tls_sw_sendpage+0x8c6/0xd00 [ 979.281087] ? tls_sw_sendmsg+0x1210/0x1210 [ 979.285438] ? tls_sw_sendmsg+0x1210/0x1210 [ 979.289774] inet_sendpage+0x164/0x650 [ 979.293664] ? inet_accept+0x770/0x770 [ 979.297544] sock_sendpage+0xdf/0x140 [ 979.301346] pipe_to_sendpage+0x268/0x330 [ 979.305490] ? sockfs_setattr+0x160/0x160 [ 979.309639] ? direct_splice_actor+0x160/0x160 [ 979.314219] ? __sanitizer_cov_trace_pc+0x4/0x50 [ 979.318972] __splice_from_pipe+0x389/0x800 [ 979.323291] ? direct_splice_actor+0x160/0x160 [ 979.327937] generic_splice_sendpage+0xd4/0x140 [ 979.332599] ? __splice_from_pipe+0x800/0x800 [ 979.337092] ? add_to_pipe+0x360/0x360 [ 979.340970] ? __splice_from_pipe+0x800/0x800 [ 979.345472] direct_splice_actor+0x115/0x160 [ 979.349874] splice_direct_to_actor+0x33f/0x8d0 [ 979.354540] ? generic_pipe_buf_nosteal+0x10/0x10 [ 979.359379] ? do_splice_to+0x160/0x160 [ 979.363352] do_splice_direct+0x1a7/0x270 [ 979.367495] ? splice_direct_to_actor+0x8d0/0x8d0 [ 979.372335] ? security_file_permission+0x1c0/0x220 [ 979.377369] do_sendfile+0x550/0xc30 [ 979.381086] ? do_compat_pwritev64+0x1b0/0x1b0 [ 979.385697] ? vfs_write+0x393/0x540 [ 979.389411] __se_sys_sendfile64+0x147/0x160 [ 979.393814] ? __se_sys_sendfile+0x180/0x180 [ 979.398217] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 979.403575] ? trace_hardirqs_off_caller+0x6e/0x210 [ 979.408583] ? do_syscall_64+0x21/0x620 [ 979.412549] do_syscall_64+0xf9/0x620 [ 979.416344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.421524] RIP: 0033:0x7f1f6b2cbfe9 [ 979.425231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 979.444290] RSP: 002b:00007f1f69c20168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 16:42:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000010000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 979.451993] RAX: ffffffffffffffda RBX: 00007f1f6b3df030 RCX: 00007f1f6b2cbfe9 [ 979.459261] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000014 [ 979.466525] RBP: 00007f1f69c201d0 R08: 0000000000000000 R09: 0000000000000000 [ 979.473789] R10: 0000800100020016 R11: 0000000000000246 R12: 0000000000000001 [ 979.481052] R13: 00007ffcefec9ddf R14: 00007f1f69c20300 R15: 0000000000022000 [ 979.532961] audit: type=1804 audit(1642437738.110:5265): pid=7199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir303199518/syzkaller.sPDwZm/1364/bus" dev="sda1" ino=13943 res=1 [ 979.581576] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 979.615722] kasan: CONFIG_KASAN_INLINE enabled [ 979.620815] kasan: GPF could be caused by NULL-ptr deref or user memory access 16:42:18 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000040000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000380)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000000000ed", 0x7a, 0xe000}], 0x0, &(0x7f0000000080)) [ 979.655035] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 979.661305] CPU: 1 PID: 7190 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 979.669100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.678471] RIP: 0010:scatterwalk_copychunks+0x4db/0x6a0 [ 979.683924] Code: ff df 80 3c 02 00 0f 85 98 01 00 00 49 8d 44 24 08 4d 89 26 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 9f 01 00 00 48 b8 00 00 00 00 [ 979.702835] RSP: 0018:ffff88804f987238 EFLAGS: 00010202 [ 979.708205] RAX: dffffc0000000000 RBX: 000000000000401d RCX: ffffc90006024000 [ 979.715479] RDX: 0000000000000001 RSI: ffffffff83739e63 RDI: 0000000000000007 [ 979.722762] RBP: 000000000000401d R08: 0000000000000001 R09: 0000000000000000 [ 979.730041] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 979.737322] R13: 0000000000001000 R14: ffff88804f9872e8 R15: 0000000000000001 [ 979.744606] FS: 00007f1f69c20700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 979.752844] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 979.758733] CR2: 00007fb257839902 CR3: 00000000987c0000 CR4: 00000000003406e0 [ 979.766155] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 979.773434] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 979.780708] Call Trace: [ 979.783317] scatterwalk_map_and_copy+0x121/0x1a0 [ 979.788172] ? scatterwalk_ffwd+0x370/0x370 [ 979.792500] ? aesni_gcm_enc_avx2+0x196/0x1b0 [ 979.797004] ? kernel_fpu_enable+0x1f/0x40 [ 979.801237] ? kernel_fpu_end+0x11b/0x170 [ 979.805397] ? kernel_fpu_enable+0x40/0x40 [ 979.809627] gcmaes_encrypt.constprop.0+0x89f/0xd90 [ 979.814646] ? gcmaes_crypt_by_sg.constprop.0+0x1790/0x1790 [ 979.820347] ? inet_sendpage+0x164/0x650 [ 979.824400] ? sock_sendpage+0xdf/0x140 [ 979.828369] ? pipe_to_sendpage+0x268/0x330 [ 979.832683] ? __splice_from_pipe+0x389/0x800 [ 979.837168] ? generic_splice_sendpage+0xd4/0x140 [ 979.842004] ? direct_splice_actor+0x115/0x160 [ 979.846577] ? splice_direct_to_actor+0x33f/0x8d0 [ 979.851410] ? do_splice_direct+0x1a7/0x270 [ 979.855729] ? do_sendfile+0x550/0xc30 [ 979.859613] ? __se_sys_sendfile64+0x147/0x160 [ 979.864215] ? do_syscall_64+0xf9/0x620 [ 979.868183] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.873542] ? mark_held_locks+0xa6/0xf0 [ 979.877595] ? usleep_range+0x170/0x170 [ 979.881561] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 979.886312] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 979.890885] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 979.895642] ? mark_held_locks+0xa6/0xf0 [ 979.899697] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 979.904446] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 979.909023] ? generic_gcmaes_encrypt+0x108/0x160 [ 979.913857] ? generic_gcmaes_encrypt+0x108/0x160 [ 979.918691] ? helper_rfc4106_encrypt+0x310/0x310 [ 979.923532] ? gcmaes_wrapper_encrypt+0x157/0x1f0 [ 979.928369] ? tls_push_record+0x9d7/0x1370 [ 979.932684] ? tls_sw_sendpage+0x518/0xd00 [ 979.937260] ? tls_sw_sendpage+0x8c6/0xd00 [ 979.941491] ? tls_sw_sendmsg+0x1210/0x1210 [ 979.945842] ? tls_sw_sendmsg+0x1210/0x1210 [ 979.950156] ? inet_sendpage+0x164/0x650 [ 979.954209] ? inet_accept+0x770/0x770 [ 979.958090] ? sock_sendpage+0xdf/0x140 [ 979.962073] ? pipe_to_sendpage+0x268/0x330 [ 979.966392] ? sockfs_setattr+0x160/0x160 [ 979.970545] ? direct_splice_actor+0x160/0x160 [ 979.975129] ? __sanitizer_cov_trace_pc+0x4/0x50 [ 979.979898] ? __splice_from_pipe+0x389/0x800 [ 979.984420] ? direct_splice_actor+0x160/0x160 [ 979.989006] ? generic_splice_sendpage+0xd4/0x140 [ 979.993847] ? __splice_from_pipe+0x800/0x800 [ 979.998342] ? add_to_pipe+0x360/0x360 [ 980.002221] ? __splice_from_pipe+0x800/0x800 [ 980.006711] ? direct_splice_actor+0x115/0x160 [ 980.011287] ? splice_direct_to_actor+0x33f/0x8d0 [ 980.016127] ? generic_pipe_buf_nosteal+0x10/0x10 [ 980.020963] ? do_splice_to+0x160/0x160 [ 980.024940] ? do_splice_direct+0x1a7/0x270 [ 980.029259] ? splice_direct_to_actor+0x8d0/0x8d0 [ 980.034095] ? security_file_permission+0x1c0/0x220 [ 980.039124] ? do_sendfile+0x550/0xc30 [ 980.043008] ? do_compat_pwritev64+0x1b0/0x1b0 [ 980.047584] ? vfs_write+0x393/0x540 [ 980.051295] ? __se_sys_sendfile64+0x147/0x160 [ 980.055869] ? __se_sys_sendfile+0x180/0x180 [ 980.060277] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 980.065636] ? trace_hardirqs_off_caller+0x6e/0x210 [ 980.070642] ? do_syscall_64+0x21/0x620 [ 980.074611] ? do_syscall_64+0xf9/0x620 [ 980.078585] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.083940] Modules linked in: 16:42:18 executing program 1: getpgid(0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007ffb) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) sendfile(r3, r1, 0x0, 0x800100020015) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 980.108024] ISO 9660 Extensions: Microsoft Joliet Level 0 [ 980.169435] audit: type=1804 audit(1642437738.750:5266): pid=7217 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1644/bus" dev="sda1" ino=14621 res=1 [ 980.195068] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 980.197808] ---[ end trace bc9514fec741bdf4 ]--- [ 980.210536] RIP: 0010:scatterwalk_copychunks+0x4db/0x6a0 16:42:18 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000068bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}], 0x0, &(0x7f0000000080)) [ 980.221171] Code: ff df 80 3c 02 00 0f 85 98 01 00 00 49 8d 44 24 08 4d 89 26 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 9f 01 00 00 48 b8 00 00 00 00 [ 980.242500] RSP: 0018:ffff88804f987238 EFLAGS: 00010202 [ 980.249724] RAX: dffffc0000000000 RBX: 000000000000401d RCX: ffffc90006024000 [ 980.250242] ISO 9660 Extensions: Microsoft Joliet Level 0 [ 980.262731] RDX: 0000000000000001 RSI: ffffffff83739e63 RDI: 0000000000000007 [ 980.266566] ISO 9660 Extensions: Microsoft Joliet Level 0 [ 980.284474] audit: type=1804 audit(1642437738.860:5267): pid=7223 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir433520613/syzkaller.MlHVUs/1644/bus" dev="sda1" ino=14621 res=1 [ 980.298053] RBP: 000000000000401d R08: 0000000000000001 R09: 0000000000000000 [ 980.315990] rock: corrupted directory entry. extent=32, offset=0, size=1426063597 [ 980.317339] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 980.331496] R13: 0000000000001000 R14: ffff88804f9872e8 R15: 0000000000000001 [ 980.342522] FS: 00007f1f69c20700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 980.351439] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 980.355000] ISO 9660 Extensions: Microsoft Joliet Level 0 16:42:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000200000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000055", 0x84, 0xe000}], 0x0, &(0x7f0000000080)) 16:42:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000020000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000380)="0243443030310100004c000200000000000000200020002000200020002000200020002000203811004300440052004f004d00200020002000200020002000200020002000200020000000000000e000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xe000}], 0x0, &(0x7f0000000080)) [ 980.368683] CR2: 00007effca846000 CR3: 00000000987c0000 CR4: 00000000003406e0 [ 980.374547] ISO 9660 Extensions: Microsoft Joliet Level 0 [ 980.382719] rock: corrupted directory entry. extent=32, offset=60672, size=0 [ 980.399371] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 980.408011] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 980.415669] Kernel panic - not syncing: Fatal exception [ 980.421302] Kernel Offset: disabled [ 980.424931] Rebooting in 86400 seconds..