syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) getxattr(&(0x7f0000000280)='./file1\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="74723c75737465642ee7ae6bb40f0e362d60abaf5fda303c0dcf77c051ef93b5b85bfcee44feeaffcf8dfd0f2e7369bd38df36c9edac2ac9a253cdbc82c6f266189c274f11c78680038af234e22931152503791e43eef9162fd592f1fb717ae34f4d2c8aa337d8ab36560e1eae47dec695774375e42a2859390038c934e82a327ddd7747edab077824006b404d1a5393f9959e8325abdd971897d95234162d6f34e15b98ad57b9a8c3b592475830dda526fc7b63596f0fb5a87658152059efb21bdd44c963e107"], &(0x7f0000000400)=""/19, 0x13)