syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f00000014c0)='./file0\x00', 0x40004, 0x3, &(0x7f0000000f40)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x6}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRES16=0x0]) stat(&(0x7f0000000140)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r1 = fork() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) openat2(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)={0x400400, 0x50, 0x1}, 0x18) ptrace(0x10, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x18000, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c776654dd646e6f3d", @ANYRESHEX, @ANYBLOB=',cache=mmap,dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',cache=none,appraise_type=imasig,seclabel,func=BPRM_CHECK,mask=^MAY_APPEND,fscontext=staff_u,obj_user=security.ima\x00,\x00']) lchown(&(0x7f0000000040)='./file0\x00', r0, r3) ptrace(0x10, r1) lsetxattr$security_ima(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)=@md5={0x1, "e58f0111d40713e4b8630b1baa0bd3d5"}, 0x11, 0x0)