r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x140084, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x2004, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='net/snmp\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000440)={0x14, 0x69, 0x1, {0x4, 0x1, 0x3}}, 0x14) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0xa0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000540)=ANY=[@ANYRES16=r0, @ANYRESDEC, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00./file1\x00']) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='mnt/encrypted_dir\x00', 0x180) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000500)}, 0x50008, 0x0, 0x1fe, 0x8, 0x4, 0xfffffffb, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f0000000640)='./file0\x00') chown(&(0x7f0000000240)='./file0\x00', 0x0, 0xee01) add_key$keyring(&(0x7f0000000300), 0x0, 0x0, 0x0, 0xfffffffffffffff8)