r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1c08a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) r1 = open$dir(&(0x7f0000000200)='./mnt\x00', 0x40040, 0x10) mkdirat(r1, &(0x7f0000000280)='mnt/encrypted_dir/../file0\x00', 0x20) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir/../file0\x00', 0x80, 0x3e4fcec92923ce05) perf_event_open(&(0x7f00000003c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x50008, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="02000000000000006d6e742f656e637279707465645f6469722f2e2e2f66696c653000"]) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') getdents64(0xffffffffffffffff, &(0x7f0000000d40)=""/4096, 0x1000) socket$inet_udp(0x2, 0x2, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x61) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @private0, 0x82}, 0x1c) unlinkat(0xffffffffffffffff, &(0x7f0000000440)='mnt/encrypted_dir\x00', 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat(0xffffffffffffffff, &(0x7f00000001c0)='mnt/encrypted_dir/../file0\x00', 0xe2514abdea254a6, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x8420, &(0x7f0000000140)={[{@nr_inodes={'nr_inodes', 0x3d, [0x30]}}]}) socket$nl_audit(0x10, 0x3, 0x9)