ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000000)={@id={0x2, 0x0, @c}}) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000180)="1821efe6541b56f284277b3fa442db06c93ed1fbb75b5cba37600fa16c2f1e02d2eeb449ff63b184e998ed632a980fb10aec5c967365a5b31946a5fa7770b819d4b786d7635578f156b65e82f4327b77725152f711859f78a1e3a9ffe5d5766c", 0x60, 0xd183}], 0x2146080, &(0x7f00000002c0)={[], [{@measure}, {@dont_measure}]}) faccessat(r0, &(0x7f0000000340)='./file0\x00', 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380), 0x2e4640, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mknodat$loop(0xffffffffffffffff, &(0x7f0000001840)='./file0\x00', 0x200, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000001880)) recvmmsg$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000003780)={0x0, 0x989680}) getdents64(0xffffffffffffffff, &(0x7f00000037c0)=""/109, 0x6d) readlinkat(0xffffffffffffffff, &(0x7f0000003840)='./file0\x00', &(0x7f0000003880)=""/135, 0x87) r2 = syz_mount_image$tmpfs(&(0x7f0000003980), &(0x7f00000039c0)='./file0\x00', 0x8, 0x3, &(0x7f0000003c40)=[{&(0x7f0000003a00), 0x0, 0x2}, {&(0x7f0000003a40)="c3d142947475bafbc3bae2acb800ac04eb5b0963312fb996ec5e4797f51ff850676e3df2e1ca0e31c453a43318d019df89044fa2edcb41aae92c076dc576770d2917af69b5d336c5c4cf1fba7fb8485b8eb2", 0x52}, {&(0x7f0000003b40)="e8b866beea4626fd566df62668d5", 0xe, 0x4}], 0x80000, &(0x7f0000003cc0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x0]}}, {}, {@mpol={'mpol', 0x3d, {'default', '=relative', @void}}}, {@gid}, {@gid}, {@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x6b]}}, {@huge_within_size}], [{@obj_type={'obj_type', 0x3d, '\xed'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, 0x0)