syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r0 = open$dir(&(0x7f0000000200)='mnt/encrypted_dir/../file0\x00', 0x0, 0x156) mkdirat(r0, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x1}, 0x50008, 0x0, 0x81, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') getdents64(0xffffffffffffffff, &(0x7f0000000d40)=""/4096, 0x1000) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x61) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='mnt/encrypted_dir\x00', 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000600)='./mnt\x00', &(0x7f0000000780)={{0x0, 0xea60}, {0x77359400}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) openat(0xffffffffffffffff, &(0x7f00000001c0)='mnt/encrypted_dir/../file0\x00', 0xe2514abdea254a6, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc, 0xffffffffffffff8b, 0x0, 0x8420, &(0x7f0000000540)={[{@nr_inodes={'nr_inodes', 0x3d, [0x30]}}], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@euid_eq}, {@fowner_gt}, {@permit_directio}, {@uid_lt}, {@euid_eq}, {@dont_measure}, {@audit}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'batadv0\x00'}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14)