write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x401, 0x3, &(0x7f00000002c0)=[{&(0x7f00000000c0)="c1d7ec05aee4b1c45c73ea3aeefe2fcca4ee0d9b9afb9ed699e8077e1ad29ed8bfbe2c54dd790caa7db8f5036a6c1949c90f2fe9c92902d0524f6c01e7337bf40e9ad59c18adda06e8d2df5913d448d7abf0e732f63871915418b7a83c7e24d82b31b6539cd5421e84ccb6620861b3cba791e6757622545089a591", 0x7b, 0xaa3c}, {&(0x7f0000000140)="0adb68281fa0898a05f47f5864b60d49663f11be145c9f76efa000777c6a5ee7287e2ab30fc1657e30db1fee701f451771075895d229c5530af32e8b42a449ac3055f65c4d4230ea6e5c32d49c9671899b1831f152584099f917a3e58b297d6a1d114eb53f2d1529d04f493b741c9b5e9d7fc8ec7f3f000d6a528dc70dbb832a5d168bd2a35ad59d6651dc0a5aef5c2d7b0f8c2b07f633912f0aadd3d084ab70bdae2a5422a06973ea11327ad5fb6147860954b39012d29d97dc63", 0xbb, 0x2}, {&(0x7f0000000200)="d6b16b8b4c2bc70699d0d11d1a6a7599877fe43178f703bca4a977a22a6a3a15eeae5adf247b7902c9c1a1586f014b5b5852dbf5a09628a3cf5a6b3e88aff425d76486c85f459b4fb5bc9c5375fb843a28ac050066d090c2cf86006debd74869b6366159278dd65a2af386e19f7bf752b748bb30108306d58bd757969c607fa99c1e03c810d25b7c95ee00159f0542987066bd331180737a", 0x98, 0x9}], 0x800001, &(0x7f0000000340)={[{@delalloc}, {@oldalloc}, {@delalloc}, {@stripe={'stripe', 0x3d, 0x3f44}}], [{@measure}, {@appraise}]}) r0 = socket$packet(0x11, 0x3, 0x300) r1 = accept(r0, &(0x7f00000003c0)=@sco, &(0x7f0000000440)=0x80) accept(r0, &(0x7f0000000640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, &(0x7f00000006c0)=0x80) accept$packet(r1, 0x0, &(0x7f0000001f00)) socket(0x1e, 0x80003, 0x4084b58d) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001f40), 0x802, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001f80)) lchown(&(0x7f0000002840)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = eventfd2(0x6, 0x1) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000002880), &(0x7f00000028c0)='./file0\x00', 0x8, 0x2)