0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:41 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 338.357795] REISERFS (device loop1): using ordered data mode [ 338.393282] reiserfs: using flush barriers [ 338.416910] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 338.450177] REISERFS (device loop1): checking transaction log (loop1) 05:10:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 339.447929] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 339.457972] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 339.468854] REISERFS (device loop1): Remounting filesystem read-only [ 339.475843] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 339.489028] REISERFS (device loop1): Using tea hash to sort names 05:10:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000), 0x0, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e15"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f01"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 339.741784] REISERFS (device loop1): found reiserfs format "3.6" with standard journal 05:10:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 339.873946] REISERFS (device loop1): using ordered data mode 05:10:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 339.942818] reiserfs: using flush barriers [ 339.974714] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 340.023054] REISERFS (device loop1): checking transaction log (loop1) 05:10:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 341.053544] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 341.063533] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 341.073426] REISERFS (device loop1): Remounting filesystem read-only [ 341.080300] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 341.093313] REISERFS (device loop1): Using tea hash to sort names 05:10:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000), 0x0, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:44 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:44 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:44 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000), 0x0, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:44 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 341.271448] REISERFS (device loop5): found reiserfs format "3.6" with standard journal [ 341.287815] REISERFS (device loop5): using ordered data mode [ 341.304163] reiserfs: using flush barriers 05:10:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:45 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:45 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 341.555017] REISERFS (device loop5): journal params: device loop5, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 341.601213] REISERFS (device loop5): checking transaction log (loop5) [ 341.653637] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 341.673178] REISERFS (device loop1): using ordered data mode [ 341.695039] reiserfs: using flush barriers [ 341.711863] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:10:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:45 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 341.925981] REISERFS (device loop1): checking transaction log (loop1) [ 343.171470] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 343.181560] REISERFS error (device loop5): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 343.196324] REISERFS (device loop5): Remounting filesystem read-only [ 343.202982] REISERFS error (device loop5): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 343.220220] REISERFS (device loop5): Using tea hash to sort names [ 343.266707] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 343.276621] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 343.286539] REISERFS (device loop1): Remounting filesystem read-only [ 343.293123] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 343.306461] REISERFS (device loop1): Using tea hash to sort names 05:10:46 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000", 0x23, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:46 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:46 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:46 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 343.810966] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 343.860636] REISERFS (device loop1): using ordered data mode [ 343.881025] reiserfs: using flush barriers [ 343.890697] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 343.908452] REISERFS (device loop1): checking transaction log (loop1) [ 344.820977] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 344.832161] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 344.842902] REISERFS (device loop1): Remounting filesystem read-only [ 344.849750] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 344.862934] REISERFS (device loop1): Using tea hash to sort names 05:10:48 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000", 0x23, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:48 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e0"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 345.069515] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 345.083001] REISERFS (device loop1): using ordered data mode [ 345.097155] reiserfs: using flush barriers 05:10:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 345.234660] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:10:48 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 345.317146] REISERFS (device loop1): checking transaction log (loop1) 05:10:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 346.455366] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 346.466417] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 346.476331] REISERFS (device loop1): Remounting filesystem read-only [ 346.482814] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 346.495718] REISERFS (device loop1): Using tea hash to sort names 05:10:50 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000", 0x23, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e15"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000), 0x0, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 347.070959] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 347.081005] REISERFS (device loop4): using ordered data mode [ 347.088724] reiserfs: using flush barriers [ 347.093399] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 347.124517] REISERFS (device loop4): journal params: device loop4, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 347.168210] REISERFS (device loop1): using ordered data mode [ 347.366832] reiserfs: using flush barriers [ 347.404172] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 347.435288] REISERFS (device loop4): checking transaction log (loop4) [ 347.475035] REISERFS (device loop1): checking transaction log (loop1) [ 348.561279] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 348.572339] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 348.583183] REISERFS (device loop1): Remounting filesystem read-only [ 348.590331] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 348.604317] REISERFS (device loop1): Using tea hash to sort names [ 348.660352] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 348.670476] REISERFS error (device loop4): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 348.684213] REISERFS (device loop4): Remounting filesystem read-only [ 348.691004] REISERFS error (device loop4): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 348.708316] REISERFS (device loop4): Using tea hash to sort names 05:10:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f01000100000002", 0x35, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000", 0x23, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 349.049099] REISERFS (device loop1): found reiserfs format "3.6" with standard journal 05:10:52 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 349.113908] REISERFS (device loop1): using ordered data mode [ 349.137061] reiserfs: using flush barriers [ 349.153763] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 349.178091] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 349.186767] REISERFS (device loop4): using ordered data mode 05:10:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f01"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 349.318882] reiserfs: using flush barriers [ 349.336360] REISERFS (device loop4): journal params: device loop4, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:10:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 349.380096] REISERFS (device loop1): checking transaction log (loop1) [ 349.410359] REISERFS (device loop4): checking transaction log (loop4) [ 350.723301] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 350.738022] REISERFS error (device loop4): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 350.747953] REISERFS (device loop4): Remounting filesystem read-only [ 350.754444] REISERFS error (device loop4): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 350.754961] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 350.770649] REISERFS (device loop4): Using tea hash to sort names [ 350.781651] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 350.794634] REISERFS (device loop1): Remounting filesystem read-only [ 350.801305] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 350.814370] REISERFS (device loop1): Using tea hash to sort names 05:10:54 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f01000100000002", 0x35, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 351.297828] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 351.332397] REISERFS (device loop1): using ordered data mode [ 351.360187] reiserfs: using flush barriers [ 351.365600] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:10:55 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 351.638523] REISERFS (device loop1): checking transaction log (loop1) [ 352.485543] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 352.496597] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 352.506488] REISERFS (device loop1): Remounting filesystem read-only [ 352.513028] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 352.526065] REISERFS (device loop1): Using tea hash to sort names 05:10:56 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f01000100000002", 0x35, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 352.908002] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 352.936148] REISERFS (device loop1): using ordered data mode [ 352.981561] reiserfs: using flush barriers [ 353.003332] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 353.039792] REISERFS (device loop1): checking transaction log (loop1) 05:10:56 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 353.956427] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 353.967584] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 353.978425] REISERFS (device loop1): Remounting filesystem read-only [ 353.985401] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 353.998569] REISERFS (device loop1): Using tea hash to sort names 05:10:57 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401", 0x3e, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 354.228970] REISERFS (device loop1): found reiserfs format "3.6" with standard journal 05:10:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 354.411358] REISERFS (device loop1): using ordered data mode [ 354.449934] reiserfs: using flush barriers 05:10:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 354.460220] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 354.482996] REISERFS (device loop1): checking transaction log (loop1) 05:10:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 355.465997] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 355.477055] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 355.487757] REISERFS (device loop1): Remounting filesystem read-only [ 355.494247] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 355.507721] REISERFS (device loop1): Using tea hash to sort names 05:10:59 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401", 0x3e, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 355.869221] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 355.896786] REISERFS (device loop1): using ordered data mode [ 355.902598] reiserfs: using flush barriers 05:10:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 355.949928] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 356.009675] REISERFS (device loop1): checking transaction log (loop1) 05:10:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 357.096313] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 357.107374] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 357.117991] REISERFS (device loop1): Remounting filesystem read-only [ 357.124859] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 357.138005] REISERFS (device loop1): Using tea hash to sort names 05:11:00 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401", 0x3e, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:01 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 357.588418] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 357.624200] REISERFS (device loop1): using ordered data mode [ 357.662985] reiserfs: using flush barriers [ 357.680594] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 357.710565] REISERFS (device loop1): checking transaction log (loop1) 05:11:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) [ 358.713516] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 358.724709] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 358.734630] REISERFS (device loop1): Remounting filesystem read-only [ 358.741109] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 358.753967] REISERFS (device loop1): Using tea hash to sort names 05:11:02 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f40100000200", 0x42, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:02 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 358.990674] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 358.999889] REISERFS (device loop1): using ordered data mode [ 359.007352] reiserfs: using flush barriers 05:11:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:02 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 359.157710] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 359.230280] REISERFS (device loop1): checking transaction log (loop1) 05:11:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 360.205643] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 360.216714] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 360.227223] REISERFS (device loop1): Remounting filesystem read-only [ 360.233711] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 360.247178] REISERFS (device loop1): Using tea hash to sort names 05:11:03 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f40100000200", 0x42, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:03 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:03 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 360.471893] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 360.481752] REISERFS (device loop1): using ordered data mode 05:11:04 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, 0x0, &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:04 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) [ 360.621830] reiserfs: using flush barriers [ 360.627487] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 360.644862] REISERFS (device loop1): checking transaction log (loop1) 05:11:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, 0x0, &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 361.812530] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 361.823659] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 361.833582] REISERFS (device loop1): Remounting filesystem read-only [ 361.840123] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 361.853043] REISERFS (device loop1): Using tea hash to sort names 05:11:05 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f40100000200", 0x42, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, 0x0, &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 362.080136] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 362.088391] REISERFS (device loop1): using ordered data mode [ 362.095472] reiserfs: using flush barriers 05:11:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 362.328930] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 362.377177] REISERFS (device loop1): checking transaction log (loop1) 05:11:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 363.473461] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 363.484657] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 363.495741] REISERFS (device loop1): Remounting filesystem read-only [ 363.502230] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 363.516190] REISERFS (device loop1): Using tea hash to sort names 05:11:07 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000", 0x44, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 363.983157] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 364.000954] REISERFS (device loop1): using ordered data mode [ 364.008267] reiserfs: using flush barriers [ 364.018069] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 364.075871] REISERFS (device loop1): checking transaction log (loop1) 05:11:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:08 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 365.328040] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 365.339370] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 365.349999] REISERFS (device loop1): Remounting filesystem read-only [ 365.356963] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 365.370241] REISERFS (device loop1): Using tea hash to sort names 05:11:09 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000", 0x44, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 366.000013] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 366.011588] REISERFS (device loop1): using ordered data mode [ 366.018545] reiserfs: using flush barriers [ 366.029286] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 366.046585] REISERFS (device loop1): checking transaction log (loop1) 05:11:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 367.062850] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 367.074362] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 367.084492] REISERFS (device loop1): Remounting filesystem read-only [ 367.090976] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 367.103946] REISERFS (device loop1): Using tea hash to sort names 05:11:10 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000", 0x44, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={0x0, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:10 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 367.329201] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 367.337548] REISERFS (device loop1): using ordered data mode [ 367.343425] reiserfs: using flush barriers 05:11:11 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 367.533686] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:11:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={0x0, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 367.593855] REISERFS (device loop1): checking transaction log (loop1) 05:11:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 368.583635] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 368.595749] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 368.606667] REISERFS (device loop1): Remounting filesystem read-only [ 368.613183] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 368.626999] REISERFS (device loop1): Using tea hash to sort names 05:11:12 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a4", 0x45, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={0x0, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 369.155393] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 369.171535] REISERFS (device loop1): using ordered data mode [ 369.193300] reiserfs: using flush barriers [ 369.210018] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 369.241779] REISERFS (device loop1): checking transaction log (loop1) 05:11:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 370.152661] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 370.163703] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 370.173586] REISERFS (device loop1): Remounting filesystem read-only [ 370.180123] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 370.193024] REISERFS (device loop1): Using tea hash to sort names 05:11:13 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a4", 0x45, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:13 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 370.422194] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 370.431347] REISERFS (device loop1): using ordered data mode [ 370.437492] reiserfs: using flush barriers [ 370.442754] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:11:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 370.641942] REISERFS (device loop1): checking transaction log (loop1) 05:11:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 371.590500] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 371.601648] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 371.612326] REISERFS (device loop1): Remounting filesystem read-only [ 371.619182] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 371.632386] REISERFS (device loop1): Using tea hash to sort names 05:11:15 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a4", 0x45, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 371.867500] REISERFS (device loop1): found reiserfs format "3.6" with standard journal 05:11:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 371.986280] REISERFS (device loop1): using ordered data mode [ 371.992470] reiserfs: using flush barriers [ 372.014176] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 372.088678] REISERFS (device loop1): checking transaction log (loop1) 05:11:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 372.958131] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 372.969170] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 372.979079] REISERFS (device loop1): Remounting filesystem read-only [ 372.985648] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 372.998519] REISERFS (device loop1): Using tea hash to sort names 05:11:16 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 373.221748] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 373.231238] REISERFS (device loop1): using ordered data mode [ 373.237160] reiserfs: using flush barriers 05:11:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f96", 0x46}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 373.372234] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:11:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 373.468793] REISERFS (device loop1): checking transaction log (loop1) 05:11:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 374.407562] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 374.417554] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 374.428089] REISERFS (device loop1): Remounting filesystem read-only [ 374.435246] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 374.448407] REISERFS (device loop1): Using tea hash to sort names 05:11:18 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f96", 0x46}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 374.681307] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 374.689605] REISERFS (device loop1): using ordered data mode [ 374.697949] reiserfs: using flush barriers 05:11:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f96", 0x46}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 374.838090] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 374.921923] REISERFS (device loop1): checking transaction log (loop1) 05:11:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 375.922613] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 375.932649] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 375.942562] REISERFS (device loop1): Remounting filesystem read-only [ 375.949091] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 375.961973] REISERFS (device loop1): Using tea hash to sort names 05:11:19 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:19 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8b", 0x69}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8b", 0x69}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 376.339291] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 376.368600] REISERFS (device loop1): using ordered data mode 05:11:19 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 376.391801] reiserfs: using flush barriers [ 376.428805] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 376.461875] REISERFS (device loop1): checking transaction log (loop1) 05:11:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 377.326597] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 377.336597] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 377.346741] REISERFS (device loop1): Remounting filesystem read-only [ 377.353272] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 377.366154] REISERFS (device loop1): Using tea hash to sort names 05:11:21 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8b", 0x69}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1a", 0x7b}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 377.766623] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 377.791962] REISERFS (device loop1): using ordered data mode [ 377.817154] reiserfs: using flush barriers [ 377.836821] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 377.854282] REISERFS (device loop1): checking transaction log (loop1) 05:11:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 378.740693] REISERFS (device loop1): Using tea hash to sort names [ 378.747271] ------------[ cut here ]------------