syz_mount_image$ext4(&(0x7f0000000ec0)='ext4\x00', &(0x7f0000000f00)='./file0\x00', 0x8, 0x3, &(0x7f0000001180)=[{&(0x7f0000000f40)="acb759106154795c34d5e48e39a0c6289ad79fd55f7dc2e1b7644d7b80058fd7b7cca8826d85da055a0e8c8a0b96e36885a027e5e24d0bc949532b29f43f177cc93ce2d972875abec7b864548b149a54b8d6e48ddf255bd98335353a0f4da46ea19b412cbcb55fe0be48c13e8cbe5e62a5b11ed67a3bb20b851010fd719f993fde85334d6f212dc969779f1c93990621d5c08672843006dd74e2448301278d1c82b79cd88c8e9f4bc9abc0d96b7f381b7bbf7ded056ce6dc6db1b4ecdaf3f7c069d29441c3ff5adde2e7cdf48ff9de960066adfd6e7cac7eb7887f0f8c29b53513", 0xe1, 0xffdd}, {&(0x7f0000001040)="fc1cde59bf0360efd71b842d800ad324b806f22c7283fb9747a9feb2c54a6f2dcd917ffa556c4b2b4250b3daadcd0c66945416900e14d2553637b94d4b0a6026f6de4654f0dd47430f879e10c691afd789a281651ffff6b4cdc15a2fe61560fb4c64aaf10b0de6", 0x67, 0xff}, {&(0x7f00000010c0)="8141ead1216db5cd80ff62f1f5865a2588709959c9d07bf3a0ceffa330317cfd4ed1a90c121136fb6dc5d13087e25c4479a45484def009aa3ae962c06d71e04de44269ea3c2362bb10c6c1e0ee553fb7f5d1f0365b6f2564a8d6fd34d21788cd229a955b04757c7fd8e2cae5c9df897987cc9330fc305e4c97809a5288b36dc3f321561e2ff48b45ecc1ff83ba3107ac37aeb4ffc19b3c9782ed29adb9778370e860fb4485fcd1e36e80b5ff7d012d5444a48a8f9c72", 0xb6, 0xf7}], 0x40, &(0x7f0000001300)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff9}}, {@init_itable_val={'init_itable', 0x3d, 0x7fff}}, {@nogrpid}, {@block_validity}, {@nobarrier}, {@auto_da_alloc}, {@barrier}], [{@context={'context', 0x3d, 'system_u'}}, {@uid_eq}, {@obj_user={'obj_user', 0x3d, '&}!{'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}) setxattr$security_capability(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840), &(0x7f0000001880)=@v2={0x2000000, [{0x3ff, 0x9}, {0x3, 0x5}]}, 0x14, 0x0)