0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:41 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 338.357795] REISERFS (device loop1): using ordered data mode [ 338.393282] reiserfs: using flush barriers [ 338.416910] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 338.450177] REISERFS (device loop1): checking transaction log (loop1) 05:10:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 339.447929] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 339.457972] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 339.468854] REISERFS (device loop1): Remounting filesystem read-only [ 339.475843] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 339.489028] REISERFS (device loop1): Using tea hash to sort names 05:10:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000), 0x0, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e15"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f01"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 339.741784] REISERFS (device loop1): found reiserfs format "3.6" with standard journal 05:10:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 339.873946] REISERFS (device loop1): using ordered data mode 05:10:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 339.942818] reiserfs: using flush barriers [ 339.974714] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 340.023054] REISERFS (device loop1): checking transaction log (loop1) 05:10:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 341.053544] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 341.063533] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 341.073426] REISERFS (device loop1): Remounting filesystem read-only [ 341.080300] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 341.093313] REISERFS (device loop1): Using tea hash to sort names 05:10:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000), 0x0, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:44 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:44 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:44 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000), 0x0, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:44 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 341.271448] REISERFS (device loop5): found reiserfs format "3.6" with standard journal [ 341.287815] REISERFS (device loop5): using ordered data mode [ 341.304163] reiserfs: using flush barriers 05:10:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:45 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:45 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 341.555017] REISERFS (device loop5): journal params: device loop5, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 341.601213] REISERFS (device loop5): checking transaction log (loop5) [ 341.653637] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 341.673178] REISERFS (device loop1): using ordered data mode [ 341.695039] reiserfs: using flush barriers [ 341.711863] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:10:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:45 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 341.925981] REISERFS (device loop1): checking transaction log (loop1) [ 343.171470] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 343.181560] REISERFS error (device loop5): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 343.196324] REISERFS (device loop5): Remounting filesystem read-only [ 343.202982] REISERFS error (device loop5): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 343.220220] REISERFS (device loop5): Using tea hash to sort names [ 343.266707] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 343.276621] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 343.286539] REISERFS (device loop1): Remounting filesystem read-only [ 343.293123] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 343.306461] REISERFS (device loop1): Using tea hash to sort names 05:10:46 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000", 0x23, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:46 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:46 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:46 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 343.810966] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 343.860636] REISERFS (device loop1): using ordered data mode [ 343.881025] reiserfs: using flush barriers [ 343.890697] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 343.908452] REISERFS (device loop1): checking transaction log (loop1) [ 344.820977] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 344.832161] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 344.842902] REISERFS (device loop1): Remounting filesystem read-only [ 344.849750] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 344.862934] REISERFS (device loop1): Using tea hash to sort names 05:10:48 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000", 0x23, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:48 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 345.069515] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 345.083001] REISERFS (device loop1): using ordered data mode [ 345.097155] reiserfs: using flush barriers 05:10:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 345.234660] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:10:48 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 345.317146] REISERFS (device loop1): checking transaction log (loop1) 05:10:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 346.455366] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 346.466417] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 346.476331] REISERFS (device loop1): Remounting filesystem read-only [ 346.482814] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 346.495718] REISERFS (device loop1): Using tea hash to sort names 05:10:50 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000", 0x23, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000), 0x0, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 347.070959] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 347.081005] REISERFS (device loop4): using ordered data mode [ 347.088724] reiserfs: using flush barriers [ 347.093399] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 347.124517] REISERFS (device loop4): journal params: device loop4, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 347.168210] REISERFS (device loop1): using ordered data mode [ 347.366832] reiserfs: using flush barriers [ 347.404172] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 347.435288] REISERFS (device loop4): checking transaction log (loop4) [ 347.475035] REISERFS (device loop1): checking transaction log (loop1) [ 348.561279] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 348.572339] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 348.583183] REISERFS (device loop1): Remounting filesystem read-only [ 348.590331] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 348.604317] REISERFS (device loop1): Using tea hash to sort names [ 348.660352] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 348.670476] REISERFS error (device loop4): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 348.684213] REISERFS (device loop4): Remounting filesystem read-only [ 348.691004] REISERFS error (device loop4): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 348.708316] REISERFS (device loop4): Using tea hash to sort names 05:10:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f01000100000002", 0x35, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000", 0x23, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 349.049099] REISERFS (device loop1): found reiserfs format "3.6" with standard journal 05:10:52 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 349.113908] REISERFS (device loop1): using ordered data mode [ 349.137061] reiserfs: using flush barriers [ 349.153763] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 349.178091] REISERFS (device loop4): found reiserfs format "3.6" with standard journal [ 349.186767] REISERFS (device loop4): using ordered data mode 05:10:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 349.318882] reiserfs: using flush barriers [ 349.336360] REISERFS (device loop4): journal params: device loop4, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:10:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 349.380096] REISERFS (device loop1): checking transaction log (loop1) [ 349.410359] REISERFS (device loop4): checking transaction log (loop4) [ 350.723301] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 350.738022] REISERFS error (device loop4): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 350.747953] REISERFS (device loop4): Remounting filesystem read-only [ 350.754444] REISERFS error (device loop4): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 350.754961] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 350.770649] REISERFS (device loop4): Using tea hash to sort names [ 350.781651] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 350.794634] REISERFS (device loop1): Remounting filesystem read-only [ 350.801305] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 350.814370] REISERFS (device loop1): Using tea hash to sort names 05:10:54 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f01000100000002", 0x35, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e15"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 351.297828] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 351.332397] REISERFS (device loop1): using ordered data mode [ 351.360187] reiserfs: using flush barriers [ 351.365600] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:10:55 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 351.638523] REISERFS (device loop1): checking transaction log (loop1) [ 352.485543] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 352.496597] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 352.506488] REISERFS (device loop1): Remounting filesystem read-only [ 352.513028] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 352.526065] REISERFS (device loop1): Using tea hash to sort names 05:10:56 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f01000100000002", 0x35, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 352.908002] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 352.936148] REISERFS (device loop1): using ordered data mode [ 352.981561] reiserfs: using flush barriers [ 353.003332] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 353.039792] REISERFS (device loop1): checking transaction log (loop1) 05:10:56 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 353.956427] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 353.967584] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 353.978425] REISERFS (device loop1): Remounting filesystem read-only [ 353.985401] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 353.998569] REISERFS (device loop1): Using tea hash to sort names 05:10:57 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401", 0x3e, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 354.228970] REISERFS (device loop1): found reiserfs format "3.6" with standard journal 05:10:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:57 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 354.411358] REISERFS (device loop1): using ordered data mode [ 354.449934] reiserfs: using flush barriers 05:10:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 354.460220] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 354.482996] REISERFS (device loop1): checking transaction log (loop1) 05:10:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 355.465997] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 355.477055] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 355.487757] REISERFS (device loop1): Remounting filesystem read-only [ 355.494247] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 355.507721] REISERFS (device loop1): Using tea hash to sort names 05:10:59 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401", 0x3e, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:10:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:10:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 355.869221] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 355.896786] REISERFS (device loop1): using ordered data mode [ 355.902598] reiserfs: using flush barriers 05:10:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 355.949928] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 356.009675] REISERFS (device loop1): checking transaction log (loop1) 05:10:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 357.096313] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 357.107374] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 357.117991] REISERFS (device loop1): Remounting filesystem read-only [ 357.124859] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 357.138005] REISERFS (device loop1): Using tea hash to sort names 05:11:00 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401", 0x3e, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:01 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 357.588418] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 357.624200] REISERFS (device loop1): using ordered data mode [ 357.662985] reiserfs: using flush barriers [ 357.680594] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 357.710565] REISERFS (device loop1): checking transaction log (loop1) 05:11:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) [ 358.713516] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 358.724709] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 358.734630] REISERFS (device loop1): Remounting filesystem read-only [ 358.741109] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 358.753967] REISERFS (device loop1): Using tea hash to sort names 05:11:02 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f40100000200", 0x42, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:02 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 358.990674] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 358.999889] REISERFS (device loop1): using ordered data mode [ 359.007352] reiserfs: using flush barriers 05:11:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) 05:11:02 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 359.157710] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 359.230280] REISERFS (device loop1): checking transaction log (loop1) 05:11:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 360.205643] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 360.216714] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 360.227223] REISERFS (device loop1): Remounting filesystem read-only [ 360.233711] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 360.247178] REISERFS (device loop1): Using tea hash to sort names 05:11:03 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f40100000200", 0x42, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:03 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:03 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) 05:11:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 360.471893] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 360.481752] REISERFS (device loop1): using ordered data mode 05:11:04 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, 0x0, &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:04 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) [ 360.621830] reiserfs: using flush barriers [ 360.627487] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 360.644862] REISERFS (device loop1): checking transaction log (loop1) 05:11:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, 0x0, &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 361.812530] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 361.823659] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 361.833582] REISERFS (device loop1): Remounting filesystem read-only [ 361.840123] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 361.853043] REISERFS (device loop1): Using tea hash to sort names 05:11:05 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f40100000200", 0x42, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, 0x0, &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 362.080136] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 362.088391] REISERFS (device loop1): using ordered data mode [ 362.095472] reiserfs: using flush barriers 05:11:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 362.328930] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 362.377177] REISERFS (device loop1): checking transaction log (loop1) 05:11:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 363.473461] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 363.484657] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 363.495741] REISERFS (device loop1): Remounting filesystem read-only [ 363.502230] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 363.516190] REISERFS (device loop1): Using tea hash to sort names 05:11:07 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000", 0x44, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 363.983157] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 364.000954] REISERFS (device loop1): using ordered data mode [ 364.008267] reiserfs: using flush barriers [ 364.018069] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 364.075871] REISERFS (device loop1): checking transaction log (loop1) 05:11:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:08 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 365.328040] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 365.339370] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 365.349999] REISERFS (device loop1): Remounting filesystem read-only [ 365.356963] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 365.370241] REISERFS (device loop1): Using tea hash to sort names 05:11:09 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000", 0x44, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 366.000013] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 366.011588] REISERFS (device loop1): using ordered data mode [ 366.018545] reiserfs: using flush barriers [ 366.029286] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 366.046585] REISERFS (device loop1): checking transaction log (loop1) 05:11:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 367.062850] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 367.074362] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 367.084492] REISERFS (device loop1): Remounting filesystem read-only [ 367.090976] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 367.103946] REISERFS (device loop1): Using tea hash to sort names 05:11:10 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000", 0x44, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={0x0, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:10 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 367.329201] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 367.337548] REISERFS (device loop1): using ordered data mode [ 367.343425] reiserfs: using flush barriers 05:11:11 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 367.533686] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:11:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={0x0, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 367.593855] REISERFS (device loop1): checking transaction log (loop1) 05:11:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 368.583635] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 368.595749] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 368.606667] REISERFS (device loop1): Remounting filesystem read-only [ 368.613183] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 368.626999] REISERFS (device loop1): Using tea hash to sort names 05:11:12 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a4", 0x45, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={0x0, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 369.155393] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 369.171535] REISERFS (device loop1): using ordered data mode [ 369.193300] reiserfs: using flush barriers [ 369.210018] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 369.241779] REISERFS (device loop1): checking transaction log (loop1) 05:11:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 370.152661] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 370.163703] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 370.173586] REISERFS (device loop1): Remounting filesystem read-only [ 370.180123] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 370.193024] REISERFS (device loop1): Using tea hash to sort names 05:11:13 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a4", 0x45, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:13 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 370.422194] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 370.431347] REISERFS (device loop1): using ordered data mode [ 370.437492] reiserfs: using flush barriers [ 370.442754] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:11:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 370.641942] REISERFS (device loop1): checking transaction log (loop1) 05:11:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 371.590500] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 371.601648] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 371.612326] REISERFS (device loop1): Remounting filesystem read-only [ 371.619182] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 371.632386] REISERFS (device loop1): Using tea hash to sort names 05:11:15 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a4", 0x45, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 371.867500] REISERFS (device loop1): found reiserfs format "3.6" with standard journal 05:11:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 371.986280] REISERFS (device loop1): using ordered data mode [ 371.992470] reiserfs: using flush barriers [ 372.014176] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 372.088678] REISERFS (device loop1): checking transaction log (loop1) 05:11:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 372.958131] REISERFS warning: reiserfs-5082 is_leaf: free space seems wrong: level=1, nr_items=2, free_space=3932 rdkey [ 372.969170] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 372.979079] REISERFS (device loop1): Remounting filesystem read-only [ 372.985648] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 372.998519] REISERFS (device loop1): Using tea hash to sort names 05:11:16 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 373.221748] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 373.231238] REISERFS (device loop1): using ordered data mode [ 373.237160] reiserfs: using flush barriers 05:11:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f96", 0x46}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 373.372234] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 05:11:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 373.468793] REISERFS (device loop1): checking transaction log (loop1) 05:11:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 374.407562] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 374.417554] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 374.428089] REISERFS (device loop1): Remounting filesystem read-only [ 374.435246] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 374.448407] REISERFS (device loop1): Using tea hash to sort names 05:11:18 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f96", 0x46}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 374.681307] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 374.689605] REISERFS (device loop1): using ordered data mode [ 374.697949] reiserfs: using flush barriers 05:11:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f96", 0x46}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 374.838090] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 374.921923] REISERFS (device loop1): checking transaction log (loop1) 05:11:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 375.922613] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 375.932649] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 375.942562] REISERFS (device loop1): Remounting filesystem read-only [ 375.949091] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 375.961973] REISERFS (device loop1): Using tea hash to sort names 05:11:19 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000010100)="000000000000000000000000010000000300"/32, 0x20, 0x100c0}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:19 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8b", 0x69}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8b", 0x69}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 376.339291] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 376.368600] REISERFS (device loop1): using ordered data mode 05:11:19 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 376.391801] reiserfs: using flush barriers [ 376.428805] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 376.461875] REISERFS (device loop1): checking transaction log (loop1) 05:11:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000600000001050001000000000014000300fc8ac4e90db2a1af4c8f21274d2ecbf0aa78020000000000000000000000000000050001000000002028f6e8e3f54b1261400be9755feefb1f23c288df40579e492800000000000000c8312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab25dc37c9f5f8e7ffc871c058db45eeac6111786c987cab7fd8fae00f0846aa35c88f1f93fd953dc1b724a0f54dad36ea741a15bfe603c514120324cc40c8124fddc052e3cef632da264b91f93867ac131aaeb2f8e306411d63f44a4ed1a6dfbc94c8297e62db0723cee02102f0914cabca8f3cc95c287937fec1171de723dbd7e0836843f2a07206c568d55da81270e28f112a3f3dbd4035d2c7732e1a6e3e10630aed130f1ad319fe1ea3c67265997c174d5e00b4d0bbafe21beb79e0d4949983427c44849c169b04535f6acb92165eba40f7b95c41e8eeb0243b71d5afa63956a1471b9da7f60a5365f523df2985b042fffe1d2fe72e2ee5ef05327268d48c5944b233a6c2a025c2c0c6914f1a5449cc7a59bb88db96adc1aa5a54a4d5a8648594c5859ee47318958635f56fc3fdcba6fc690f476c22486b4f80ccef3c2e804e22f8490bf3ea42ff102060ad18e7d975ee947127a91f46edbd961d5dc7d05c3e0635bc56b19e1909c2db1c1dcf996a455a82d172ff6c7449ebecbd027687ad127eec9058e038b291089b51ba7e0016a7cfb274cf796e8e2dd55ce3f983d3ad99538c63c2594c86c8e9e42e0c82b9c89c03d157c24dd5c5cae0b69b9ef1b5ccf05f5e247a801dc08a21d38259e6bbb92ba14a07d47759ba4f75c2afcad2d519babb2ac55f7110b33caf6cd2f5be23498b6240c035473e4419c8648567f8c9884663769a51950100008000a2c7f9658a2791db189a66e18b3d904213edf352e1c36a0d34c607eff812f86c8c8681214193f666260097b8eb0db1504c746753e69858034173285d884fd739d3343b45dc53c2b443a97c0343e2a435d476888105aa37ed20d0096a444739fe1a2d61fd2054834cd08be464bf142a2e147ceae439bd44954a36607e205d0b283a7560ffcc7a986ab6ef305cb0f153d784ca129dd9af3b3f02c3368e7c0b74250932991ee4d6cf0e3ab3bec157ec359a2e7e76c987dea27975e03b5e156f0114"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 377.326597] REISERFS warning: reiserfs-5090 is_tree_node: node level 0 does not match to the expected one 1 [ 377.336597] REISERFS error (device loop1): vs-5150 search_by_key: invalid format found in block 8211. Fsck? [ 377.346741] REISERFS (device loop1): Remounting filesystem read-only [ 377.353272] REISERFS error (device loop1): vs-13070 reiserfs_read_locked_inode: i/o failure occurred trying to find stat data of [1 2 0x0 SD] [ 377.366154] REISERFS (device loop1): Using tea hash to sort names 05:11:21 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f0000132000001200000000000000002000000004000073564d38840300001e000000000000000010cc030200010052654973457232467300000001000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e003bc1655f004eed00", 0x80, 0x10000}, {&(0x7f0000011000)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46, 0x2013000}, {&(0x7f0000011100)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x2013fa0}], 0x0, &(0x7f0000011200)=ANY=[@ANYBLOB]) 05:11:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8b", 0x69}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1a", 0x7b}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:11:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 377.766623] REISERFS (device loop1): found reiserfs format "3.6" with standard journal [ 377.791962] REISERFS (device loop1): using ordered data mode [ 377.817154] reiserfs: using flush barriers [ 377.836821] REISERFS (device loop1): journal params: device loop1, size 8192, journal first block 18, max trans len 1024, max batch 900, max commit age 30, max trans age 30 [ 377.854282] REISERFS (device loop1): checking transaction log (loop1) 05:11:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000400), &(0x7f00000004c0)=""/225, 0xe1, &(0x7f0000000680)={&(0x7f0000000440)={'sha3-384\x00'}, &(0x7f00000005c0)="66614d556c357b22f889ff291170bd1073f833c5dc89cea83735dfa519106d94a6cbd34e3c5740718ada7decdef1983ca192e51d88105a5b971946e9e0b1c86f52c6a4a65f9663024fc3bb2300c718815b2a861ba288644914de9bea7a5a3734d782e8205dd4668e8ba667142b70d9b57a9dd20406581549699a1ab218ccae0ef8077cc91200c6a4ebc2578d", 0x8c}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000001cc0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2008480, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYRES32=r1, @ANYRES64, @ANYBLOB="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"], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 378.740693] REISERFS (device loop1): Using tea hash to sort names [ 378.747271] ------------[ cut here ]------------ [ 378.752346] WARNING: CPU: 0 PID: 24404 at fs/inode.c:967 unlock_new_inode+0x9a/0xc0 [ 378.760113] Kernel panic - not syncing: panic_on_warn set ... [ 378.760113] [ 378.767509] CPU: 0 PID: 24404 Comm: syz-executor.1 Not tainted 4.14.198-syzkaller #0 [ 378.775362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.784689] Call Trace: [ 378.787314] dump_stack+0x1b2/0x283 [ 378.790960] panic+0x1f9/0x42d [ 378.794128] ? add_taint.cold+0x16/0x16 [ 378.798077] ? unlock_new_inode+0x9a/0xc0 [ 378.802200] ? __warn.cold+0x5/0x4b [ 378.805806] ? unlock_new_inode+0x9a/0xc0 [ 378.809933] __warn.cold+0x20/0x4b [ 378.813447] ? ist_end_non_atomic+0x10/0x10 [ 378.817748] ? unlock_new_inode+0x9a/0xc0 [ 378.821865] report_bug+0x208/0x249 [ 378.825477] do_error_trap+0x195/0x2d0 [ 378.829342] ? math_error+0x2d0/0x2d0 [ 378.833168] ? trace_hardirqs_on+0x10/0x10 [ 378.837432] ? reiserfs_write_lock_nested+0x59/0xd0 [ 378.842467] ? __mutex_lock+0x360/0x1310 [ 378.846511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 378.851338] invalid_op+0x1b/0x40 [ 378.854764] RIP: 0010:unlock_new_inode+0x9a/0xc0 [ 378.859497] RSP: 0018:ffff8880a734f6d8 EFLAGS: 00010246 [ 378.864839] RAX: 0000000000040000 RBX: ffff88804b5b11a8 RCX: ffffc900129e7000 [ 378.872107] RDX: 0000000000040000 RSI: ffffffff819310aa RDI: ffff88804b5b1234 [ 378.879347] RBP: 0000000000000000 R08: ffffffff8a0ab7e8 R09: 00000000000408cb [ 378.886593] R10: ffff888054dc6bc0 R11: ffff888054dc62c0 R12: ffff88804b5b1280 [ 378.893843] R13: ffff88804b5b1230 R14: 0000000000000000 R15: 00000000fffffff4 [ 378.901095] ? unlock_new_inode+0x9a/0xc0 [ 378.905226] ? unlock_new_inode+0x9a/0xc0 [ 378.909391] reiserfs_new_inode+0x3a4/0x2100 [ 378.913770] ? __mutex_lock+0x360/0x1310 [ 378.917806] ? reiserfs_fh_to_parent+0x180/0x180 [ 378.922538] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 378.927961] ? __mutex_unlock_slowpath+0x75/0x770 [ 378.932775] ? wait_for_completion_io+0x10/0x10 [ 378.937415] ? wait_for_completion_io+0x10/0x10 [ 378.942060] ? do_journal_begin_r+0x9bf/0xca0 [ 378.946547] reiserfs_mkdir+0x41d/0x8b0 [ 378.950498] ? reiserfs_mknod+0x690/0x690 [ 378.954655] reiserfs_xattr_init+0x393/0xa49 [ 378.959039] reiserfs_fill_super+0x1b10/0x28b6 [ 378.963607] ? reiserfs_remount+0x1390/0x1390 [ 378.968102] ? lock_downgrade+0x740/0x740 [ 378.972223] ? snprintf+0xa5/0xd0 [ 378.975692] mount_bdev+0x2b3/0x360 [ 378.979294] ? reiserfs_remount+0x1390/0x1390 [ 378.983772] mount_fs+0x92/0x2a0 [ 378.987122] vfs_kern_mount.part.0+0x5b/0x470 [ 378.991593] do_mount+0xe53/0x2a00 [ 378.995113] ? copy_mount_string+0x40/0x40 [ 378.999372] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 379.004369] ? copy_mnt_ns+0xa30/0xa30 [ 379.008237] ? copy_mount_options+0x1fa/0x2f0 [ 379.012739] ? copy_mnt_ns+0xa30/0xa30 [ 379.016604] SyS_mount+0xa8/0x120 [ 379.020030] ? copy_mnt_ns+0xa30/0xa30 [ 379.023899] do_syscall_64+0x1d5/0x640 [ 379.027772] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 379.032934] RIP: 0033:0x46004a [ 379.036093] RSP: 002b:00007f5f75576a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 379.043775] RAX: ffffffffffffffda RBX: 00007f5f75576b20 RCX: 000000000046004a [ 379.051028] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f5f75576ae0 [ 379.058270] RBP: 00007f5f75576ae0 R08: 00007f5f75576b20 R09: 0000000020000000 [ 379.065518] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 379.072771] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020011200 [ 379.081708] Kernel Offset: disabled [ 379.085779] [ 379.087375] ====================================================== [ 379.093655] WARNING: possible circular locking dependency detected [ 379.099935] 4.14.198-syzkaller #0 Not tainted [ 379.104390] ------------------------------------------------------ [ 379.110681] syz-executor.1/24404 is trying to acquire lock: [ 379.116354] ((fb_notifier_list).rwsem){++++}, at: [] blocking_notifier_call_chain+0x63/0x90 [ 379.126523] [ 379.126523] but task is already holding lock: [ 379.132459] (&sb->s_type->i_lock_key#34){+.+.}, at: [] unlock_new_inode+0x2c/0xc0 [ 379.141870] [ 379.141870] which lock already depends on the new lock. [ 379.141870] [ 379.150162] [ 379.150162] the existing dependency chain (in reverse order) is: [ 379.157746] [ 379.157746] -> #4 (&sb->s_type->i_lock_key#34){+.+.}: [ 379.164386] _raw_spin_lock+0x2a/0x40 [ 379.168673] iget5_locked+0x299/0x450 [ 379.173003] reiserfs_fill_super+0xe29/0x28b6 [ 379.177987] mount_bdev+0x2b3/0x360 [ 379.182149] mount_fs+0x92/0x2a0 [ 379.186013] vfs_kern_mount.part.0+0x5b/0x470 [ 379.191040] do_mount+0xe53/0x2a00 [ 379.195105] SyS_mount+0xa8/0x120 [ 379.199049] do_syscall_64+0x1d5/0x640 [ 379.203458] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 379.209135] [ 379.209135] -> #3 (inode_hash_lock){+.+.}: [ 379.214827] _raw_spin_lock+0x2a/0x40 [ 379.219115] iget_locked+0x6c/0x400 [ 379.223274] kernfs_get_inode+0x4c/0x520 [ 379.227822] kernfs_mount_ns+0x402/0x770 [ 379.232392] sysfs_mount+0xa1/0x160 [ 379.236520] mount_fs+0x92/0x2a0 [ 379.240373] vfs_kern_mount.part.0+0x5b/0x470 [ 379.245356] do_mount+0xe53/0x2a00 [ 379.249394] SyS_mount+0xa8/0x120 [ 379.253336] do_syscall_64+0x1d5/0x640 [ 379.257706] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 379.263377] [ 379.263377] -> #2 (kernfs_mutex){+.+.}: [ 379.268803] __mutex_lock+0xc4/0x1310 [ 379.273090] kernfs_add_one+0x4c/0x3a0 [ 379.277464] kernfs_create_dir_ns+0x166/0x200 [ 379.282447] sysfs_create_dir_ns+0xb7/0x1d0 [ 379.287265] kobject_add_internal+0x279/0x810 [ 379.292245] kobject_add+0x11f/0x180 [ 379.296477] get_device_parent+0x3e1/0x5b0 [ 379.301199] device_add+0x28c/0x1510 [ 379.305399] device_create_groups_vargs+0x1dc/0x250 [ 379.310901] device_create_with_groups+0xd4/0x100 [ 379.316231] vtconsole_class_init+0xef/0x1af [ 379.321124] do_one_initcall+0x88/0x202 [ 379.325588] kernel_init_freeable+0x558/0x619 [ 379.330568] kernel_init+0xd/0x15b [ 379.334596] ret_from_fork+0x24/0x30 [ 379.338795] [ 379.338795] -> #1 (gdp_mutex){+.+.}: [ 379.343956] __mutex_lock+0xc4/0x1310 [ 379.348254] get_device_parent+0xd2/0x5b0 [ 379.352885] device_add+0x28c/0x1510 [ 379.357084] device_create_groups_vargs+0x1dc/0x250 [ 379.362585] device_create_with_groups+0xd4/0x100 [ 379.367941] do_take_over_console+0x322/0x4a0 [ 379.372960] do_fbcon_takeover+0xe4/0x1c0 [ 379.377593] fbcon_event_notify+0x12f8/0x1760 [ 379.382575] notifier_call_chain+0x108/0x1a0 [ 379.387560] blocking_notifier_call_chain+0x79/0x90 [ 379.393109] register_framebuffer+0x52a/0x8e0 [ 379.398091] vga16fb_probe+0x681/0x77e [ 379.402491] platform_drv_probe+0x85/0x170 [ 379.407212] driver_probe_device+0x541/0x750 [ 379.412118] __device_attach_driver+0x229/0x310 [ 379.417275] bus_for_each_drv+0x13b/0x1a0 [ 379.421917] __device_attach+0x259/0x360 [ 379.426462] bus_probe_device+0x1db/0x290 [ 379.431101] device_add+0x9e5/0x1510 [ 379.435301] platform_device_add+0x280/0x650 [ 379.440196] vga16fb_init+0x11e/0x173 [ 379.444482] do_one_initcall+0x88/0x202 [ 379.448945] kernel_init_freeable+0x558/0x619 [ 379.454044] kernel_init+0xd/0x15b [ 379.458071] ret_from_fork+0x24/0x30 [ 379.462293] [ 379.462293] -> #0 ((fb_notifier_list).rwsem){++++}: [ 379.468771] lock_acquire+0x170/0x3f0 [ 379.473058] down_read+0x36/0x80 [ 379.476916] blocking_notifier_call_chain+0x63/0x90 [ 379.482419] fb_blank+0x94/0x190 [ 379.486271] fbcon_blank+0x7ed/0xd50 [ 379.490508] do_unblank_screen+0x1fd/0x4e0 [ 379.495232] panic+0x290/0x42d [ 379.498912] __warn.cold+0x20/0x4b [ 379.502938] report_bug+0x208/0x249 [ 379.507060] do_error_trap+0x195/0x2d0 [ 379.511550] invalid_op+0x1b/0x40 [ 379.515500] unlock_new_inode+0x9a/0xc0 [ 379.519961] reiserfs_new_inode+0x3a4/0x2100 [ 379.524857] reiserfs_mkdir+0x41d/0x8b0 [ 379.529318] reiserfs_xattr_init+0x393/0xa49 [ 379.534209] reiserfs_fill_super+0x1b10/0x28b6 [ 379.539275] mount_bdev+0x2b3/0x360 [ 379.543390] mount_fs+0x92/0x2a0 [ 379.547248] vfs_kern_mount.part.0+0x5b/0x470 [ 379.552231] do_mount+0xe53/0x2a00 [ 379.556278] SyS_mount+0xa8/0x120 [ 379.560244] do_syscall_64+0x1d5/0x640 [ 379.564706] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 379.570408] [ 379.570408] other info that might help us debug this: [ 379.570408] [ 379.578520] Chain exists of: [ 379.578520] (fb_notifier_list).rwsem --> inode_hash_lock --> &sb->s_type->i_lock_key#34 [ 379.578520] [ 379.591149] Possible unsafe locking scenario: [ 379.591149] [ 379.597180] CPU0 CPU1 [ 379.601827] ---- ---- [ 379.606456] lock(&sb->s_type->i_lock_key#34); [ 379.611090] lock(inode_hash_lock); [ 379.617286] lock(&sb->s_type->i_lock_key#34); [ 379.624438] lock((fb_notifier_list).rwsem); [ 379.628903] [ 379.628903] *** DEADLOCK *** [ 379.628903] [ 379.635037] 4 locks held by syz-executor.1/24404: [ 379.639842] #0: (&type->s_umount_key#21/1){+.+.}, at: [] sget_userns+0x556/0xc10 [ 379.649177] #1: (&type->i_mutex_dir_key#9){+.+.}, at: [] reiserfs_xattr_init+0x2c0/0xa49 [ 379.659122] #2: (&sbi->lock){+.+.}, at: [] reiserfs_write_lock_nested+0x59/0xd0 [ 379.668375] #3: (&sb->s_type->i_lock_key#34){+.+.}, at: [] unlock_new_inode+0x2c/0xc0 [ 379.678056] [ 379.678056] stack backtrace: [ 379.682521] CPU: 0 PID: 24404 Comm: syz-executor.1 Not tainted 4.14.198-syzkaller #0 [ 379.690366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.699688] Call Trace: [ 379.702245] dump_stack+0x1b2/0x283 [ 379.705842] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 379.711607] __lock_acquire+0x2e0e/0x3f20 [ 379.715725] ? trace_hardirqs_on+0x10/0x10 [ 379.719929] ? soft_cursor+0x50f/0xa50 [ 379.723789] ? bit_cursor+0x9ba/0x1620 [ 379.727643] lock_acquire+0x170/0x3f0 [ 379.731414] ? blocking_notifier_call_chain+0x63/0x90 [ 379.736571] down_read+0x36/0x80 [ 379.739906] ? blocking_notifier_call_chain+0x63/0x90 [ 379.745064] blocking_notifier_call_chain+0x63/0x90 [ 379.750053] fb_blank+0x94/0x190 [ 379.753403] ? fb_set_logocmap+0x450/0x450 [ 379.757604] fbcon_blank+0x7ed/0xd50 [ 379.761285] ? trace_hardirqs_on+0x10/0x10 [ 379.765501] ? vprintk_emit+0x170/0x620 [ 379.769444] ? fbcon_set_font+0x7c0/0x7c0 [ 379.773569] ? lock_acquire+0x170/0x3f0 [ 379.777515] ? __printk_safe_flush+0x27/0x2e0 [ 379.781984] ? printk_safe_flush+0x96/0x110 [ 379.786285] ? kmsg_dump+0x30c/0x4b0 [ 379.789965] ? lock_acquire+0x170/0x3f0 [ 379.793906] ? lock_downgrade+0x740/0x740 [ 379.798030] do_unblank_screen+0x1fd/0x4e0 [ 379.802258] panic+0x290/0x42d [ 379.805430] ? add_taint.cold+0x16/0x16 [ 379.809375] ? unlock_new_inode+0x9a/0xc0 [ 379.813497] ? __warn.cold+0x5/0x4b [ 379.817093] ? unlock_new_inode+0x9a/0xc0 [ 379.821209] __warn.cold+0x20/0x4b [ 379.824717] ? ist_end_non_atomic+0x10/0x10 [ 379.829002] ? unlock_new_inode+0x9a/0xc0 [ 379.833116] report_bug+0x208/0x249 [ 379.836714] do_error_trap+0x195/0x2d0 [ 379.840582] ? math_error+0x2d0/0x2d0 [ 379.844350] ? trace_hardirqs_on+0x10/0x10 [ 379.848553] ? reiserfs_write_lock_nested+0x59/0xd0 [ 379.853535] ? __mutex_lock+0x360/0x1310 [ 379.857561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 379.862384] invalid_op+0x1b/0x40 [ 379.865809] RIP: 0010:unlock_new_inode+0x9a/0xc0 [ 379.870529] RSP: 0018:ffff8880a734f6d8 EFLAGS: 00010246 [ 379.875867] RAX: 0000000000040000 RBX: ffff88804b5b11a8 RCX: ffffc900129e7000 [ 379.883106] RDX: 0000000000040000 RSI: ffffffff819310aa RDI: ffff88804b5b1234 [ 379.890344] RBP: 0000000000000000 R08: ffffffff8a0ab7e8 R09: 00000000000408cb [ 379.897583] R10: ffff888054dc6bc0 R11: ffff888054dc62c0 R12: ffff88804b5b1280 [ 379.904825] R13: ffff88804b5b1230 R14: 0000000000000000 R15: 00000000fffffff4 [ 379.912069] ? unlock_new_inode+0x9a/0xc0 [ 379.916186] ? unlock_new_inode+0x9a/0xc0 [ 379.920340] reiserfs_new_inode+0x3a4/0x2100 [ 379.924729] ? __mutex_lock+0x360/0x1310 [ 379.928760] ? reiserfs_fh_to_parent+0x180/0x180 [ 379.933484] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 379.938901] ? __mutex_unlock_slowpath+0x75/0x770 [ 379.943711] ? wait_for_completion_io+0x10/0x10 [ 379.948361] ? wait_for_completion_io+0x10/0x10 [ 379.953000] ? do_journal_begin_r+0x9bf/0xca0 [ 379.957490] reiserfs_mkdir+0x41d/0x8b0 [ 379.961433] ? reiserfs_mknod+0x690/0x690 [ 379.965552] reiserfs_xattr_init+0x393/0xa49 [ 379.969933] reiserfs_fill_super+0x1b10/0x28b6 [ 379.974484] ? reiserfs_remount+0x1390/0x1390 [ 379.978945] ? lock_downgrade+0x740/0x740 [ 379.983180] ? snprintf+0xa5/0xd0 [ 379.986605] mount_bdev+0x2b3/0x360 [ 379.990200] ? reiserfs_remount+0x1390/0x1390 [ 379.994664] mount_fs+0x92/0x2a0 [ 379.997997] vfs_kern_mount.part.0+0x5b/0x470 [ 380.002460] do_mount+0xe53/0x2a00 [ 380.005983] ? copy_mount_string+0x40/0x40 [ 380.010185] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 380.015168] ? copy_mnt_ns+0xa30/0xa30 [ 380.019053] ? copy_mount_options+0x1fa/0x2f0 [ 380.023530] ? copy_mnt_ns+0xa30/0xa30 [ 380.027394] SyS_mount+0xa8/0x120 [ 380.030813] ? copy_mnt_ns+0xa30/0xa30 [ 380.034672] do_syscall_64+0x1d5/0x640 [ 380.038527] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 380.043682] RIP: 0033:0x46004a [ 380.046839] RSP: 002b:00007f5f75576a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 380.054541] RAX: ffffffffffffffda RBX: 00007f5f75576b20 RCX: 000000000046004a [ 380.061778] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f5f75576ae0 [ 380.069015] RBP: 00007f5f75576ae0 R08: 00007f5f75576b20 R09: 0000000020000000 [ 380.076253] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 380.083529] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020011200 [ 380.093880] Rebooting in 86400 seconds..