perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x100}) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x100}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000400)) clone3(&(0x7f0000000300)={0x200292000, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0), {0x1e}, &(0x7f0000000200)=""/9, 0x9, &(0x7f00000004c0)=""/262, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x9862, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB='grpjquota=./file1,max_batch_time=0x00000000000006e2,usrjquota=,test_dummy_encryption,barrier=0x0000000000010000,delalloc,smackfsfloor=,hash,rootcontext=system_u,euid>', @ANYRESDEC=0xee00, @ANYBLOB="2d6d6173efc2abac12f007707851e340476b3d5ec79e3dc3526209000000b88d5294ac289871a6d687a9d966c0efcf9fcff0be2f74d1bc108c48975ee9122dfcffffffffffffff2fe2f77a9342d4cb92c894ca28238d8b0fea789e8c37e0cbc83274415d6b4fc81f6a46e12b"]) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='devtmpfs\x00', 0x1000812, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000)