syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'lo\x00'}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000640)={0x332e, {{0xa, 0x4e20, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}, 0x0, 0x1, [{{0xa, 0x4e20, 0x7, @empty, 0x9}}]}, 0x110) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000500)={'syztnl0\x00', 0x0, 0x700, 0x7, 0x7, 0x1, {{0xe, 0x4, 0x2, 0x12, 0x38, 0x67, 0x0, 0x2, 0x4, 0x0, @loopback, @private=0xa010101, {[@lsrr={0x83, 0x23, 0x9b, [@dev={0xac, 0x14, 0x14, 0xf}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @loopback, @loopback, @rand_addr=0x64010101, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x2f}]}]}}}}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)) finit_module(0xffffffffffffffff, &(0x7f0000000240)='#\x00', 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000280)={0x1, 0x0, [0x0]})