r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) openat(0xffffffffffffffff, 0x0, 0x70ac0, 0x21) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x9}, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000001000), &(0x7f0000001040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) faccessat2(r0, &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x48, 0x100) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r1, 0x0) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c775f778df701411854ce688395e63e9e30145d65c34e954190548d5cd8f357dfc4cf028229267c8c98a36b1b54382a1fa59687ad58085de2d82e0612db37f7b15eb219001879bcd1e2883f335d3e9d49d0490f3e40f0cfcfcdd22aec20620edfd4122abf290ffe9471072fb62e1a42668cbc720fef37ff2bbc5bd35676401f70fd7ae7dc2db553949cfe030a939e700e8d00c120c16e9594f616814a920ffadbbd6677951dc4d80f147ae7b49ce7b27c06e68bb10740410ea887a9843ed102c3abba0360b443098a19d61d8128f0509210b73b3c37b9d22b4eaaf734d3e10e07f492a7c7bc0a04b38a4", 0xea, r1) keyctl$KEYCTL_MOVE(0x1e, r3, r4, 0x0, 0x0)