syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udp(0xa, 0x2, 0x0) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r4}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc", 0xe9, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x7}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce0920", 0x46, 0x4}], 0x0, &(0x7f0000000940)={[{@mode={'mode', 0x3d, 0x6}}, {@huge_advise}, {@size={'size', 0x3d, [0x34, 0x74, 0x37, 0x36, 0x68, 0x1a]}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500"/28]) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="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"]})