perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x100}) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x100}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000400)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/stat\x00', 0x0, 0x0) clone3(&(0x7f0000000300)={0x200292000, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0), {0x1e}, &(0x7f0000000200)=""/9, 0x9, &(0x7f00000004c0)=""/262, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) r1 = syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6772706a71756f74613d2e2f66696c75312c6d61785f62617463685f74696d653d3078303030303030303030303030303665322c7573726a71756f74613d2c746573745f64756d6d795f656e6372797067696f6e2c626172726965723d3078303030303030303030303031303030302c64656c616c6c6f632c736d61636b667366dbd8fc1ec6b55c59d8ebb7b56c6f6f723d2c6861736860c2802341bd42d7746578743d73797374656d5f752c657569643e4a12fc5ba9e717df59b91fd3d0c7a42b7c2aabec096efb7f1d4c3f305bb055c3b1accf", @ANYRESDEC=0xee00, @ANYBLOB="2d6d6173efc2abac12f007707851e340476b3d5ec79e3dc3526209000000b88d5294ac289871a6d687a9d966c0efcf9fcff0be2f74d1bc108c48975ee9122dfcffffffffffffff2fe2f77a9342d4cb92c894ca28238d8b0fea789e8c37e0cbc83274415d6b4fc81f6a46e12b"]) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='devtmpfs\x00', 0x1000812, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(0xee00, 0x0, 0x0) statx(r1, &(0x7f00000003c0)='./file0\x00', 0x6000, 0x4, &(0x7f0000000780)) keyctl$update(0x2, r0, &(0x7f0000000000)="a7", 0x1)