r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 889.300602][T15596] XFS (loop0): Invalid superblock magic number 07:17:35 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 889.465056][T15631] XFS (loop1): unknown mount option [barrier]. [ 889.469698][T15626] XFS (loop3): unknown mount option [barrier]. [ 889.481772][T15630] XFS (loop5): unknown mount option [barrier]. 07:17:35 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:35 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 889.706321][T15645] XFS (loop2): unknown mount option [barrier]. 07:17:36 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:36 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:36 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 889.852253][T15658] XFS (loop4): unknown mount option [barrier]. [ 889.922211][T15656] XFS (loop3): unknown mount option [barrier]. [ 889.995370][T15671] XFS (loop5): unknown mount option [barrier]. 07:17:36 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:36 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 890.080531][T15680] XFS (loop2): unknown mount option [barrier]. 07:17:36 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 890.207442][T15675] XFS (loop0): Invalid superblock magic number [ 890.256659][T15695] XFS (loop4): unknown mount option [barrier]. 07:17:36 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:36 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:36 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 890.605728][T15730] XFS (loop1): unknown mount option [barrier]. 07:17:36 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:37 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="7800000051ba2af4ace0393fbfb7ccbad731133d460b1eba9ebdb5cf", @ANYRES16=r1, @ANYBLOB="10002dbd7000fedbdf25040000000c0009000800010000000100580005003c0002000800020004000000080004007f00000008000300000100000800030000000000080004000800000008000300a7ffffff0800030020000000080001007564700008000100756470000800010065746800"], 0x78}, 0x1, 0x0, 0x0, 0x400c840}, 0x24000000) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 890.804385][T15740] XFS (loop3): unknown mount option [barrier]. 07:17:37 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:37 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], 0xffffffffffffffff, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:37 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:37 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:37 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 891.068469][T15762] XFS (loop2): unknown mount option [barrier]. [ 891.140104][T15758] XFS (loop0): Invalid superblock magic number 07:17:37 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="7800000051ba2af4ace0393fbfb7ccbad731133d460b1eba9ebdb5cf", @ANYRES16=r1, @ANYBLOB="10002dbd7000fedbdf25040000000c0009000800010000000100580005003c0002000800020004000000080004007f00000008000300000100000800030000000000080004000800000008000300a7ffffff0800030020000000080001007564700008000100756470000800010065746800"], 0x78}, 0x1, 0x0, 0x0, 0x400c840}, 0x24000000) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:37 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:37 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:37 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:37 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 891.500542][T15810] XFS (loop2): unknown mount option [barrier]. [ 891.601958][T15817] XFS (loop1): unknown mount option [barrier]. 07:17:37 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], 0xffffffffffffffff, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:37 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="7800000051ba2af4ace0393fbfb7ccbad731133d460b1eba9ebdb5cf", @ANYRES16=r1, @ANYBLOB="10002dbd7000fedbdf25040000000c0009000800010000000100580005003c0002000800020004000000080004007f00000008000300000100000800030000000000080004000800000008000300a7ffffff0800030020000000080001007564700008000100756470000800010065746800"], 0x78}, 0x1, 0x0, 0x0, 0x400c840}, 0x24000000) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 891.746048][T15824] XFS (loop5): unknown mount option [barrier]. 07:17:38 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:38 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:38 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:38 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 891.997435][T15845] XFS (loop0): Invalid superblock magic number [ 892.051320][T15859] XFS (loop1): unknown mount option [barrier]. 07:17:38 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000500)=""/4096) getresuid(0x0, &(0x7f00000002c0), 0x0) r1 = geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) fchdir(r2) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80001, 0x80) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:38 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:38 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 892.253728][T15874] XFS (loop5): unknown mount option [barrier]. 07:17:38 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', 0x0, 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:38 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:38 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], 0xffffffffffffffff, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 892.500112][T15899] XFS (loop2): unknown mount option [barrier]. [ 892.500617][T15897] XFS (loop1): unknown mount option [barrier]. 07:17:38 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:39 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 892.709868][T15921] XFS (loop5): unknown mount option [barrier]. [ 892.813140][T15925] XFS (loop0): Invalid superblock magic number [ 892.855822][T15947] XFS (loop4): unknown mount option [barrier]. [ 892.895803][T15952] XFS (loop2): unknown mount option [barrier]. 07:17:39 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:39 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', 0x0, 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:39 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:39 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 893.158030][T15966] XFS (loop5): unknown mount option [barrier]. 07:17:39 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:39 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', 0x0, 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:39 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:39 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="7800000051ba2af4ace0393fbfb7ccbad731133d460b1eba9ebdb5cf", @ANYRES16, @ANYBLOB="10002dbd7000fedbdf25040000000c0009000800010000000100580005003c0002000800020004000000080004007f00000008000300000100000800030000000000080004000800000008000300a7ffffff0800030020000000080001007564700008000100756470000800010065746800"], 0x78}, 0x1, 0x0, 0x0, 0x400c840}, 0x24000000) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 893.431066][T15983] XFS (loop4): unknown mount option [barrier]. 07:17:39 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:39 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:39 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 893.670201][T16015] XFS (loop1): unknown mount option [barrier]. 07:17:40 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 893.849579][T16005] XFS (loop0): Invalid superblock magic number [ 893.888266][T16046] XFS (loop4): unknown mount option [barrier]. 07:17:40 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="7800000051ba2af4ace0393fbfb7ccbad731133d460b1eba9ebdb5cf", @ANYRES16, @ANYBLOB="10002dbd7000fedbdf25040000000c0009000800010000000100580005003c0002000800020004000000080004007f00000008000300000100000800030000000000080004000800000008000300a7ffffff0800030020000000080001007564700008000100756470000800010065746800"], 0x78}, 0x1, 0x0, 0x0, 0x400c840}, 0x24000000) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 893.929107][T16048] XFS (loop3): unknown mount option [barrier]. 07:17:40 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 893.998788][T16054] XFS (loop2): unknown mount option [barrier]. 07:17:40 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="7800000051ba2af4ace0393fbfb7ccbad731133d460b1eba9ebdb5cf", @ANYRES16, @ANYBLOB="10002dbd7000fedbdf25040000000c0009000800010000000100580005003c0002000800020004000000080004007f00000008000300000100000800030000000000080004000800000008000300a7ffffff0800030020000000080001007564700008000100756470000800010065746800"], 0x78}, 0x1, 0x0, 0x0, 0x400c840}, 0x24000000) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:40 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:40 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:40 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:40 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:40 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:40 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000500)=""/4096) getresuid(0x0, &(0x7f00000002c0), 0x0) r1 = geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80001, 0x80) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 894.714559][T16097] XFS (loop1): unknown mount option [barrier]. 07:17:41 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 894.772649][T16114] XFS (loop4): unknown mount option [barrier]. [ 894.808931][T16101] XFS (loop0): Invalid superblock magic number 07:17:41 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:41 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 894.990208][T16136] XFS (loop3): unknown mount option [barrier]. 07:17:41 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:41 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:41 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:41 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 895.265177][T16144] XFS (loop2): unknown mount option [barrier]. [ 895.298355][T16151] XFS (loop4): unknown mount option [barrier]. 07:17:41 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 895.389943][T16166] XFS (loop3): unknown mount option [barrier]. 07:17:41 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 895.506006][T16181] XFS (loop5): unknown mount option [barrier]. 07:17:41 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 895.591981][T16179] XFS (loop0): Invalid superblock magic number 07:17:42 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 895.756052][T16203] XFS (loop4): unknown mount option [barrier]. [ 895.777100][T16211] XFS (loop2): unknown mount option [barrier]. 07:17:42 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 895.869133][T16220] XFS (loop1): unknown mount option [barrier]. 07:17:42 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:42 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000500)=""/4096) getresuid(0x0, &(0x7f00000002c0), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80001, 0x80) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:42 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 896.003359][T16229] XFS (loop5): unknown mount option [barrier]. 07:17:42 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], 0xffffffffffffffff, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 896.114371][T16245] XFS (loop2): unknown mount option [barrier]. 07:17:42 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:42 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:42 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000500)=""/4096) getresuid(0x0, &(0x7f00000002c0), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80001, 0x80) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 896.545516][T16255] XFS (loop0): Invalid superblock magic number 07:17:42 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 896.607964][T16276] XFS (loop3): unknown mount option [barrier]. 07:17:42 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:43 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:43 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000500)=""/4096) getresuid(0x0, &(0x7f00000002c0), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80001, 0x80) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:43 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 897.094569][T16311] XFS (loop1): unknown mount option [barrier]. 07:17:43 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="7800000051ba2af4ace0393fbfb7ccbad731133d460b1eba9ebdb5cf", @ANYRES16=r2, @ANYBLOB="10002dbd7000fedbdf25040000000c0009000800010000000100580005003c0002000800020004000000080004007f00000008000300000100000800030000000000080004000800000008000300a7ffffff0800030020000000080001007564700008000100756470000800010065746800"], 0x78}, 0x1, 0x0, 0x0, 0x400c840}, 0x24000000) 07:17:43 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], 0xffffffffffffffff, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 897.156626][T16322] XFS (loop2): unknown mount option [barrier]. 07:17:43 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:43 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:43 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:43 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000500)=""/4096) getresuid(0x0, &(0x7f00000002c0), 0x0) r1 = geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r1) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80001, 0x80) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:43 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 897.500282][T16355] XFS (loop1): unknown mount option [barrier]. [ 897.516387][T16340] XFS (loop0): Invalid superblock magic number [ 897.533953][T16364] XFS (loop2): unknown mount option [barrier]. 07:17:43 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) getresuid(0x0, &(0x7f0000000540)=0x0, 0x0) getgroups(0x1, &(0x7f0000000380)=[0xee01]) r3 = getegid() fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x3, r1}, {0x2, 0x6, r1}], {}, [{0x8, 0x2, r2}, {0x8, 0x4, r3}, {0x8, 0x2, r4}], {0x10, 0x5}, {0x20, 0x1}}, 0x4c, 0x1) geteuid() ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000500)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) sched_setscheduler(r5, 0x1, &(0x7f00000000c0)=0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x40, 0x7f, 0x40, 0x5, 0x0, 0x10000, 0x80, 0xf, 0x93, 0x8001, 0x7fff, 0x8, 0x7, 0xfffffffffffffff7, 0x0, 0xff, 0x6, 0x4, 0x1, 0x2, 0x10000, 0x1000, 0x4, 0x942, 0x3, 0x6, 0x7c3a0996, 0x6, 0x9, 0x5, 0x9, 0x4, 0x4, 0x8001, 0x0, 0x9, 0x0, 0x100000001, 0x1, @perf_bp={&(0x7f0000000140), 0x3}, 0x810, 0x6, 0x1, 0x9, 0xfffffffffffffffb, 0xffffffffffffffff, 0xffffffff80000001}, r5, 0x3, r6, 0x8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:44 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 897.748795][T16384] XFS (loop3): unknown mount option [barrier]. 07:17:44 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:44 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x40083) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:44 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000500)=""/4096) getresuid(0x0, &(0x7f00000002c0), 0x0) r1 = geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80001, 0x80) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 898.026739][T16395] XFS (loop1): unknown mount option [barrier]. 07:17:44 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:44 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], 0xffffffffffffffff, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:44 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:44 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 898.286034][T16423] XFS (loop3): unknown mount option [barrier]. 07:17:44 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(0x0, 0x600000000000000) 07:17:44 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x40083) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 898.451696][T16433] XFS (loop1): unknown mount option [barrier]. [ 898.492989][T16435] XFS (loop2): unknown mount option [barrier]. 07:17:44 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(0x0, 0x600000000000000) 07:17:44 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 898.617421][T16430] XFS (loop0): Invalid superblock magic number 07:17:44 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_IOCTL(r1, &(0x7f00000000c0)={0x20, 0xfffffffffffffffe, 0x7, {0x3, 0x4, 0x26ed, 0xda65}}, 0x20) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:45 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:45 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 898.771372][T16475] XFS (loop1): unknown mount option [barrier]. 07:17:45 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(0x0, 0x600000000000000) [ 898.837038][T16483] XFS (loop2): unknown mount option [barrier]. 07:17:45 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:45 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:45 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:45 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 899.297072][T16509] XFS (loop3): unknown mount option [barrier]. 07:17:45 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:45 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:45 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 899.568851][T16526] XFS (loop0): Invalid superblock magic number 07:17:45 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:45 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:46 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:46 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) 07:17:46 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 899.855482][T16561] XFS (loop5): unknown mount option [barrier]. [ 899.949003][T16559] XFS (loop2): unknown mount option [barrier]. 07:17:46 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 900.042780][T16572] XFS (loop1): unknown mount option [barrier]. [ 900.050674][T16575] XFS (loop3): unknown mount option [barrier]. [ 900.109726][T16574] FAT-fs (loop4): bogus number of reserved sectors 07:17:46 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:46 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 900.168819][T16574] FAT-fs (loop4): Can't find a valid FAT filesystem 07:17:46 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 900.277855][T16591] XFS (loop5): unknown mount option [barrier]. 07:17:46 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 900.331396][T16595] XFS (loop1): unknown mount option [barrier]. 07:17:46 executing program 4: accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c, 0x80800) syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x14f, 0x101000) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40000, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x80102, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x111100, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7a46, 0x467}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) write$vnet(r2, &(0x7f0000000200)={0x1, {&(0x7f0000000140)=""/28, 0x1c, &(0x7f00000001c0), 0x1, 0x3}}, 0x68) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 900.487136][T16612] XFS (loop2): unknown mount option [barrier]. [ 900.561615][T16628] XFS (loop3): unknown mount option [barrier]. 07:17:46 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:46 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) [ 900.613947][T16611] XFS (loop0): Invalid superblock magic number 07:17:47 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 900.774675][T16646] XFS (loop1): unknown mount option [barrier]. [ 900.838512][T16647] FAT-fs (loop5): bogus number of reserved sectors 07:17:47 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:47 executing program 4: accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c, 0x80800) syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x14f, 0x101000) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40000, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x80102, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x111100, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7a46, 0x467}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) write$vnet(r2, &(0x7f0000000200)={0x1, {&(0x7f0000000140)=""/28, 0x1c, &(0x7f00000001c0), 0x1, 0x3}}, 0x68) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 900.915967][T16647] FAT-fs (loop5): Can't find a valid FAT filesystem 07:17:47 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 900.983291][T16660] XFS (loop2): unknown mount option [barrier]. 07:17:47 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:47 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) [ 901.211913][T16673] XFS (loop1): unknown mount option [barrier]. 07:17:47 executing program 4: accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c, 0x80800) syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x14f, 0x101000) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40000, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x80102, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x111100, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x7a46, 0x467}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) write$vnet(r2, &(0x7f0000000200)={0x1, {&(0x7f0000000140)=""/28, 0x1c, &(0x7f00000001c0), 0x1, 0x3}}, 0x68) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 901.313145][T16684] XFS (loop0): Invalid superblock magic number 07:17:47 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 901.472238][T16702] FAT-fs (loop5): bogus number of reserved sectors 07:17:47 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:47 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 901.523769][T16702] FAT-fs (loop5): Can't find a valid FAT filesystem [ 901.598676][T16717] XFS (loop1): unknown mount option [barrier]. [ 901.705068][T16728] XFS (loop3): unknown mount option [barrier]. 07:17:48 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@empty, @in=@multicast1}}, {{@in6=@remote}}}, &(0x7f00000000c0)=0xe8) recvfrom$netrom(r2, &(0x7f00000002c0)=""/229, 0xe5, 0x40000000, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}, 0x48) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xa4800, 0x0) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f00000003c0)=0x2, &(0x7f0000000140)=0x4) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000400)) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:48 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:48 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) 07:17:48 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:48 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:48 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 902.121540][T16753] XFS (loop1): unknown mount option [barrier]. [ 902.173879][T16775] XFS (loop3): unknown mount option [barrier]. [ 902.179050][T16758] XFS (loop2): unknown mount option [barrier]. 07:17:48 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8800, 0x0) write$FUSE_BMAP(r0, &(0x7f00000001c0)={0x18, 0x0, 0x8}, 0x18) getuid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) fcntl$lock(r1, 0x5, &(0x7f00000000c0)={0x1, 0x6, 0x8, 0x2, r2}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000080)=0x2, 0x4) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) write$P9_RLINK(r0, &(0x7f0000000200)={0x7, 0x47, 0x1}, 0x7) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 902.233305][T16755] XFS (loop0): Invalid superblock magic number 07:17:48 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:48 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 902.468004][T16794] XFS (loop1): unknown mount option [barrier]. 07:17:48 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8800, 0x0) write$FUSE_BMAP(r0, &(0x7f00000001c0)={0x18, 0x0, 0x8}, 0x18) getuid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) fcntl$lock(r1, 0x5, &(0x7f00000000c0)={0x1, 0x6, 0x8, 0x2, r2}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000080)=0x2, 0x4) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) write$P9_RLINK(r0, &(0x7f0000000200)={0x7, 0x47, 0x1}, 0x7) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 902.598616][T16807] XFS (loop2): unknown mount option [barrier]. 07:17:49 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:49 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:49 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8800, 0x0) write$FUSE_BMAP(r0, &(0x7f00000001c0)={0x18, 0x0, 0x8}, 0x18) getuid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) fcntl$lock(r1, 0x5, &(0x7f00000000c0)={0x1, 0x6, 0x8, 0x2, r2}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000080)=0x2, 0x4) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) write$P9_RLINK(r0, &(0x7f0000000200)={0x7, 0x47, 0x1}, 0x7) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:49 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:49 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:49 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 902.975306][T16827] XFS (loop0): Invalid superblock magic number 07:17:49 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:49 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:49 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 903.267266][T16875] XFS (loop3): unknown mount option [barrier]. [ 903.276155][T16855] XFS (loop5): Invalid superblock magic number [ 903.335432][T16878] XFS (loop4): Invalid superblock magic number 07:17:49 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:49 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 903.463572][T16897] XFS (loop1): unknown mount option [barrier]. [ 903.495945][T16906] XFS (loop2): unknown mount option [barrier]. 07:17:49 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:50 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 903.735735][T16912] XFS (loop3): unknown mount option [barrier]. 07:17:50 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:50 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 903.942407][T16938] XFS (loop1): unknown mount option [barrier]. 07:17:50 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:50 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 904.032152][T16916] XFS (loop0): Invalid superblock magic number [ 904.114099][T16962] XFS (loop3): unknown mount option [barrier]. [ 904.153098][T16964] XFS (loop4): unknown mount option [barrier]. [ 904.212281][T16944] XFS (loop5): Invalid superblock magic number 07:17:50 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:50 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:50 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:50 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 904.575811][T16995] XFS (loop2): unknown mount option [barrier]. 07:17:50 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:50 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:51 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:51 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 904.816658][T17011] XFS (loop1): unknown mount option [barrier]. [ 904.896795][T17026] XFS (loop5): unknown mount option [barrier]. 07:17:51 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 904.997409][T17004] XFS (loop0): Invalid superblock magic number 07:17:51 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:51 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 905.119639][T17040] XFS (loop3): unknown mount option [barrier]. [ 905.244839][T17053] XFS (loop4): unknown mount option [barrier]. 07:17:51 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:51 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:51 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:51 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:51 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:51 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 905.533961][T17073] XFS (loop3): unknown mount option [barrier]. [ 905.576699][T17088] XFS (loop2): unknown mount option [barrier]. 07:17:51 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 905.685533][T17085] XFS (loop4): unknown mount option [barrier]. 07:17:52 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 905.755408][T17098] XFS (loop1): unknown mount option [barrier]. 07:17:52 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) lgetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000300)=""/255, 0xff) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x50b000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f00000001c0)={{0x6, 0x8}, {0xfff, 0x2}, 0x9e0b, 0x7, 0x20}) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3, 0x30}]]}}}]}, 0x40}}, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x7345dc8c32aa6538, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f00000000c0)={0x6}, 0x1) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 905.914589][T17092] XFS (loop0): Invalid superblock magic number [ 905.939813][T17126] XFS (loop3): unknown mount option [barrier]. 07:17:52 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 905.973061][T17128] XFS (loop4): unknown mount option [barrier]. [ 906.017010][T17135] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 07:17:52 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 906.153337][T17139] XFS (loop1): unknown mount option [barrier]. 07:17:52 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:52 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:52 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:52 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:52 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000000c0)={0x3, 0x6, 0xecf}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xc) 07:17:53 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 906.718543][T17174] XFS (loop2): unknown mount option [barrier]. [ 906.829302][T17176] XFS (loop0): Invalid superblock magic number 07:17:53 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000000c0)={0x3, 0x6, 0xecf}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xc) 07:17:53 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:53 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:53 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:53 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 907.103657][T17213] XFS (loop2): unknown mount option [barrier]. 07:17:53 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000000c0)={0x3, 0x6, 0xecf}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xc) [ 907.217396][T17219] XFS (loop3): unknown mount option [barrier]. [ 907.409391][T17236] XFS (loop1): unknown mount option [barrier]. 07:17:53 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:53 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:53 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 907.546858][T17252] XFS (loop3): unknown mount option [barrier]. 07:17:53 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:53 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:54 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) [ 907.773226][T17275] XFS (loop1): unknown mount option [barrier]. 07:17:54 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 907.839966][T17261] XFS (loop0): Invalid superblock magic number 07:17:54 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 908.009202][T17296] XFS (loop2): unknown mount option [barrier]. 07:17:54 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, 0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) 07:17:54 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() r0 = socket$inet6(0xa, 0x803, 0x6) sendmmsg(r0, &(0x7f0000000780)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'team0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)="23013e40fba0f5245d5b06bb2190d652d34db7855aefe9b569b68a257681166f2f9a3864aba4a45125b192b2a9127469f757ab6f32b7dc92915808ea2e9b2aa507c6b38f680dba67774f29c1fa7e0be9b9f0fefd9693776d18e6051ac3594524134a9cb564188488cc71f5efddb7cf924ae77507e0da522f7729b5", 0x7b}], 0x1, &(0x7f00000002c0)=[{0x48, 0x88, 0x9, "fba8eba97ab432803f396a86e019a4d49c3ed4dfe86ad7c0db58632f7686eadd2ae395f2edf06bdba4c6b94ba5ea786217db61840fc044"}], 0x48}, 0x5}, {{&(0x7f0000000340)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x40004}, 0x80, &(0x7f0000000700)=[{&(0x7f00000003c0)="57354fe7bb12ec1ee2cbc4233dbe9ff1090c6614ea519acffc57861179d87a7416356aab8292899110060a632a1912b3608c2c9abcd9accdeee897c1da0170265046c4798e8874d61ce37735f580a34ba2d11c93a8f1af8729dab0c9c8c4112758", 0x61}, {&(0x7f0000000240)}, {&(0x7f0000000440)="848fdc1f7e63aa450869a020365ba20e1b16b1f876782c78", 0x18}, {&(0x7f0000000500)="2e43734a66ff101720648ee779a61691e8031fad326815987cad4d85ed5a2321b192dbc0e1545758ae25a0b25288341ce5e27b1885ee7cd06f216ce866bf6247bbf616e19e32cba73509a57440a3b1701a6059f75a231d90d3", 0x59}, {&(0x7f0000000580)="46a8ecd6978eaa57839463e8a59be98492798a0b9470cd2740cf035ab38046649e56252c874b2eab2b59f19e83da645b2a70114c64719579ca192d771f62a3f4bbd88f549cef8445135f4ddb9c15a21b5b010e17f725b813e7", 0x59}, {&(0x7f0000000600)="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", 0xfc}, {&(0x7f0000000480)="1394e8ba", 0x4}], 0x7, &(0x7f00000021c0)=[{0x28, 0x108, 0x3, "d0cbaa0ee1465c9266a0159ed9840bfacccb389fbc9e59"}, {0xb0, 0x11d, 0x8, "49384b67c9b0b09a1d7cc9081845b780cc2f3d2953bcd3d53123a34cccbaeeb8534bb92a2e5b02700c5ab3d62efb8d38279a1cb473bb43bc736bf721c9195a588e3479357912ef64d91d5823880dfb7a232082498149eb285c0a6232ddcc1205d9dbd4ce3afcd090dbc5ca618cfa0e4f2a5fda7a541c0a2f1f1070c23ce9261b81e21e49f9ce75cdad856538c4df28f58ea095ece24c244d5fdc"}, {0x110, 0x11f, 0x80, "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"}, {0x88, 0x10f, 0x7, "7bb15a16a4de818dc8616cee78f830b4f37c41720f302eeb023ce987b4327dc6472c978b536aa0f73811021ae90484b7287f1cf5b330c3a6c35348ca32ae21fdf8c9a2249d7ee964db412504818b39a14a77b19e75cba0b28762ae94c83a01c7a6ce9e13a3177da01d560774ef253b889396a9a89c80"}, {0x1010, 0x103, 0x3, "aeed3e9a75546bbe9422078b7f9bcd9f14ecfeffbf1b09ce97c36992ec51488afcdeba7608dc4627400bdae45062c7ab5db319fb92c7d118b12ce5de405d506f9922a05def9873e43360f616a20cf0184268b909a08bffa2fbd81c384c82d77245900a007e2c6d816c62446c19b8b181d0d129551ae5b767f41442a06bcd28ab4eeeb382e878816e35411d0bf2a854460c8d1fe1056a7c9c188bcbc9f34d4dbe229b51e2d16c18111ebdcca6fd2b4b3b14da1df18b2e7f1f2d9fa2afd6e6d0db75def85b5f06971691489b5d343c06ad5cbeed22952499fcd499f85c9f99fdd15ddcc547c899d560065ecf473761b242e281c181bfdfee5dc676da3f5ec03d1c79f6b2bd73298db8fa357987629480133e25349ad241a57ecd415b7314994d9c5fde1f74a93dc2396261f019384fc6e64c1500b23bd75a23bc962da283541bfca20b2fe3a038f5b9eb8dfa233360d7c556568124fd031fb4a5624c2b432c820492352d08473583076d34c76b778d31ae616de8cb0d03d22f22064bdc82147a471e025bd8e17a16171d952b4d340691192809917f3bdff48e1993b9faa1087ab0a561577ce51a2d2c1e3323dae622d56a5d2cf8b437f880ec2010a10a458f97434711d17a9bf7a870414cc0ef8e950c618596949410ba36ff58c86c08b6abb7b8077363cba322edfb69c312f18d538c7a12cfecf675b39b114a8d1201c4fda8dfda6ed42b22b718005fe060dec415e8bc386fa9e3811aede000c56827a9608d4ab562c3b283361ce7a3d2c2e6adb6e4c54dfd53ea155bc424e7f7292a1a00f694855fb91730dcf5b02b318552dd0ce7b2a54aa8b0c1dac6dd2d5327e14a00fc86b294f1f67869c1b4d7adeeccc711cb97f19134ec2451041bcbd7c7b4bcbf172e8d1ce4f0a8542a123bfcea9b3e4ac0d8fa38feeea0b392c84403746baa84752b3cc9678018aec328ef0fa95b079220bc195e6bf708e5bd29053b6c6f5cbe951bfa672c76e1a47aec4e647dbac3f71068157066eb5f525e9d8484ed2bbdb7415b5038187d0c91286c4175d45fb10bf2c4462754683620bf0586358d053edb11ae1564b2bd628dc4bace1634102d1039bdbaf75f605aa1d645a0029036c495f05e9a31cb09ea18307e289b239d64b00ee909a38458d71d33f1809c2e627faa8741a213451c83eabccb82b73f618ccd43d81647e179f71e39bb270571e3131b2860a858081bd94e93c012a6da8a75cb143aabe62fc4371de78ff53220036514ad2b751006dd29e68a677dbbf0000383a664438dce1fc70278e7a9699f6eef5a4663e32a1c9f26956c7e563e26a7cc8249cb82bded65833763698b3b3bed878996b3f14667b22d8ced2a5dcca6e4fd8e6cf789e3333a7ab3d49df2994100cf3d3e2e6a70484866766a7b33b0d121324fd06a64e1b8535c012042fffa7075672bbc97269da43a83644dde39aa0f732814456fda0e19e9b6e279e5ca7020799fc45480ce8c71fa570312189161f21fccd1f775f42fc5dbc32018884795a4d9481c68165c6c6e287bc4189cb4928dbcb50b259a118e09bbcf1ffc065995b9035f35ad1d46ea7303300f1e999b87e335f9fbd760d0523c8936c72e93867bce83eb0216ca9c6e99b2fa54048b61b818cdba4adafa29c8fa1b39ee0b725fa7e60b00f9182cc3fca5fefcbdb3a3192ebc7d7bd60cecae8cdadd7aec729ad17e1f71a8c808fc6074b466ce45ec3a167a0802ff5321884526328b0331a8b801258063a415bcfa136dd3dc8fa4c5109add34804a90163966695ee8fcf93eae7ea71b7ca6a77a0d34cb61d102202a0f51a956770887e8d5f69194ad1f408d5219a61a6c31be2f40d70784fa8d30cfc84a482be470af2c69f13577d14db5a1969d7e8dafd60d2c47ae0cacd26dec8d59fd1cf456e43ae0af3db0d5a5483aca9fd14198cb97c7b93bfec34c6b4994d9cb1c8da5e61499f26815a64bcda50655be9b2bbda7cbe95a72919b5b26a26646572fa9183233f9eb206d20c770cf2e458528901a9878428c7d0e6ee47e06f6b98e2a9e0872d943d12e73a4759d1d3578daa88a12cf98a337b545b6a7b42c0dad8541ab08953dbc02b4e28f38eb84b6d4e16c377d6e17ac7f96984b035c718e992574f22583e74b79ff87e28d9bdf078c6e79394c24da90f3fa648308857d697795eda54fe8fef073fdca2230e5096589b64b8c97de019f3bd91c5d44c1390c6aeb1ec08a18fa9eb5b8230a42fead62cdc2618b49fa21afde97d9397ede48b731d4466ea0bffea7779028676009d38e2e8d546d925b82a0d2064ce2ea58099518034ae1b4c1e0dd36944917ac024ec37aa43b3d0745aa681ac1f487a0a2d1b71fe7208d4b8979c25f4fa156771f47bbee8eecd483614f9c0f488ddc494235e8caf918b54dcfa39edc9d0c172ab49e03fc1223e3a268a787611819e6a8a5ac3cce14628bc00bcb6f0407078140de7c5aa134010f2ff49854869f237c4233408942369a850538b8f1a7a85e93673d4a7d01f8cc5bfe257dff773dfc2de0895893aaa59d35b6c7fae77da1863e608272f00348130d17f8b107ecd3717e88ff2af5a0a030548e9631222780ff4fe848f3e1c56c109e232e2db698c926f6e7d1a3737267a0950c938a38e9450038227ad78766af7c62ea476679b4ac5c89396229fe9e7f37aae59ae36a76c898e18f0a9997e732a9644de67f0f1d0d9bcd113a331d8bc5ed662178f4d7d10bf66c58ed58724ebc66ad3c2197a5090e5c4e28e50bd514ecaae12a679b2f4c4df86281917dff879c3bb081e4965dd9da605882734978ce18a0c9c9b6019aef76be64b44eac02fb69401f338bf525e195a363a8e344c2b2d0de1a4263ed8374f4c0eaed1261850e6ac7b41e7e7a456fb51743116d33040b2b97d5cdd8694f2eeae271cafebed16d5330b0044e6b329cc2582ef38c90207644f31ca255b4b3bbcf63aa6a0cb6ffd70dd7adc2a642b1b8c0cc03ab59d68d07395f35220a79a7b620abb392c6d92fe2eba1ecb9e7247e324dc809bea0e44e1c5355cc4be937da777ece8c6f42c8b3b4e90cce88e6391f449225dca3c917048206f2347c488434c84018ddccbf9c01dfec5136614327d36eab45744aa1a58947952b066c3bc80f363176bc58fc73396268593c3dac086e369830e3bb8b279503d17eef7161c1cdf222f20d5bd036c41c0a56a80e741e1b5be3fd5f078506cce91bf78ba9ac4d557583ec1b82ef9e33509fa5617b9200fdcb01d0092d22fa2c7f26201484c21c56e27bcc42f8b0702f172f0f3a3d755fca6748d18b17773b8de5d0dff1bbcfbe6f39a443980c6fe73154775423103aa93b53df4ba5ddaa95f8357192dce67b98ea5a17533340f6d7d885d3945e5ba00af1e4b24d8c3deb5984d57f2057b4b4cea11fb88c288c3191e7962f606dc4fcf124aee8fd568c9a386853e43d9b65ba08619f44e10d2497abdc7093a51562aaff1dfeef37ffaf6f320e6980825dcaec7b11186fe368ef21280b38c4f8164dd3b57dbb92bbaf1f81fa11b99a123ed721177f36ce7ac0ed54220fc8ac36ccd6f071dfda8ef003478feec1890a707720034bf026524f564c5ff855884fc834ac40525764d1d215008ec4b21ffb80d0c817c14c4bc464519baa2282c9bad7a1f81a20f53143d44fb542283f48b8f8d8f13e104e4026ac85d9c47936f725ef127cb1f59f04dd08eb7c5031990233919786febe1e3013ca38b83f30a463fd26b15a60c0079f725a65a174fbe2041da86236c4ef38dbc624188afbbcc7d7062f25a61fe66b6378e67fb51c51072c8a4c03c279b0acf311926763429910752b920041a86bc1216b478d67fb24b215d0c8c720dc51b53da9a2cac6889f14fa0a6d3c44ee6aad5ee078a208d36f445e8e9143ff85ad2cfc891e2af2e835affbc6699b2510405b115baa1d8a0458a515bae0b3145a253920f26cbcc3e490ceadda40d2bb48d6ba9b6cc79af7f2e840ebb356346f754f8888da8e2a1273c8271b7938be7dd185f7e57ba820ddc240255447aa4803bae8121823512f20eb0644499e60074d105a6b323e85b40ae0906352eeb099bfca076a23f1f88bdb1a848239a7940c2a87fb8a20001df75bb26bb0ca8311aa7377b6a3826cb4531511a312121357e5d8958f5780ad523c90c588a197b6f7ebf4648e2010a710f2ee9d4da67f81ad5c3d6cb5038c3fb77012f83acf820808787bd992c5d9749f88833ed3aa86aa2e24672bcd36688b35dfb51f0c75941b6121f013908a65ea0904d399bb0674bffb5640f0a95b14f9dfaac52b5089933961ce552e71e09ff369ceb435e1c939bad0435d1378232957f21b2cf5f3f94e30370abe3659ee297fd4b7bb1ffd2105e3c9a40825f30b1a448aadac0c8582c12eb80fdf9450bbc65f3b957500d108d28a138139749ac2a0082798bf0ead8f4eba16800b980081be8194d213033519b31a225dd912216b3bf607f8199fcda37eb9785d24ebd3464f8552b8a27d35346ba1250ac5936ce8e757bb69953d51eccb0bec4924e8e4d07d2d322b010afc80c787c9749cea0493fd18938d43203750d91019345afc8be517567870af439d9ecca8b963d83ce1323734da40fc7e21d8c72e0d64e95763a9fd8da3c0db71e6e47bc3400841d77ff3024c6abe2024a1e890c0c2becff09d9c6da76142ed5e3bc6b42539a376c0ef934ce781d1cad8e8f7990282f020afc9b5cdcc21b8a4cb0aed04bb6c7cf829e4b8cfa221dc8a2b645caf9627c929b551ef94396f7c95e2bc80482ac9dd2020ef6217707cc69acea6e7c3b33e27db5faebab50cc5ea7d4fdd5b6a8f8cd2c9e2539bed851b8bc5fc4320cd0a4f92d3299aaa45ca21196ce1c7e81cb678f52ea9e3b8c2f7a52f7be3a2897b16ea28c5ada5840b3886db559b829a8b2b1239597e54160e03e23c0c916d4e6e7820893fa3542785f6a36ea7c7a370f86d1d43bb5686abe6344dd3221af46822de522dda8fdf639eec87ef52a09133eb1f14e5fa78aee4564fc9348564137e9a73ae356ccff78f9b133e585c6ecb206a3e1d002a85f429dc2518743b282ebdcfbd9eb47c0986c807eb7004109d826fa1c726ea1bede5314002acd7d8b0409e0966dd5d8f88b34aa3d8a7f5764632d91babec67bad31166e974e434a7e66b4fbaaaf91f0b91008f56803f31fb7b98dfa193f69c3b5482d712a828f1e070492b8ba2994b0822d17d1bc13dd7abc21d480497ae57b7c734b5eed077cd26f2638817d5c558897f65aa17fe8d1b304cec74148f97239d5f70468d33d146ea032bd155a1ac1ed159ff1398a2d6f64041ab206990d6f99b600e901e8cefbd0e756a212a70ca412f8e9dd53038edf050584f5f0947e818c04777c7bb5a561c2da38c5c3ed76839cedf492c12887bca3e82e4da0564e74b1f7063f5a82ea0827993bfa430837278fcb66a0c805495c7b8d9c6fa66882077f15d3bbefde22b6d8331754a9eae2c0f417f97e2bee4c28748be95bc624a6e1e340e7cb6960d97c819172fc29add69bc5857707e0e4bb7d192e3ac1f75f34d70dffb254d77d7520909e47231e12484174b040950a33460ccbdea5e4de7f71e9274eddba01f3d9ec8030f1ecddf2b60d80d08b6c9ef5d4c0db0e273abb3e1b2e57879e27c1a94c427e9d633af2852b773824c1a2553531e4e95c75e9561e174750125f5ed98b42e9bf28362782bb823a923360b545a3fa55b9ed55d87d7a265f9ea13475fcdd66868d4f3e1cb75f470aec566cc83ff4236acb8b03e17885110c2b822f55730f4"}, {0x100, 0x101, 0x8001, "7498e9ec4c9c48491c04b7124ec72ece82615140ce27b8e2ac41e8d8b9b5fa06d0c1daaa84d27d0d1565616ab3942688f064ed32881848ec5c3d2f2f117fdaee2c9e17c9d566f336e5379901b7dd94414d814ca426c0f3f9c0a17bdc13a8ca7966c42c38e8dc62a78c5414f9070ea00431364a524f0b387dfe8967b3c454ae1b27377e79c632150e35e93a78cc931bac1e6fa03dd492f4f31b312d56ac00be77790938fd59c5c0a381b5d5431feff2c705232dcd7b44febfdff3e937fa2d7c97d2a211afd68cd95e10cc660fd910da7058ecf924d20dcc4d025e755d9dfbef7950bd5e5d5af198b5c068f65a0d180e"}, {0x1010, 0x84, 0xb8, "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"}, {0xb0, 0x1ff, 0x8, "cd532185fb8947fdf0c8768bc5334b839c4d043f134dd626829f57fee623a2f9abb526bf62fa741a28b91cbd4a0f388e0ee6d16988a6211ebda968dc27620b6c0dc135a986fb82163b5582256878d053e9de4e9bc2e86832db89fbd64394682d207fd810f35d7c747edd0a13f7c6385721ffad2c067bb6d3d35ea29daaff10329ef0645d8148d93b5de39175daf4720ce27cfab8023cfaf21c"}], 0x2440}, 0x5}], 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:54 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:54 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 908.428824][T17329] XFS (loop3): unknown mount option [barrier]. 07:17:54 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:54 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:54 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:54 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:55 executing program 5: getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) [ 908.754826][T17345] XFS (loop1): unknown mount option [barrier]. 07:17:55 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 908.808011][T17340] XFS (loop0): Invalid superblock magic number 07:17:55 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:55 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 908.908794][T17372] XFS (loop2): unknown mount option [barrier]. 07:17:55 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 909.081279][T17384] XFS (loop4): unknown mount option [barrier]. [ 909.089191][T17381] XFS (loop1): unknown mount option [barrier]. 07:17:55 executing program 5: getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) 07:17:55 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:55 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 909.408048][T17404] XFS (loop4): unknown mount option [barrier]. 07:17:55 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:55 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700), 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:55 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 909.554130][T17424] XFS (loop1): unknown mount option [barrier]. 07:17:55 executing program 5: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:17:55 executing program 4: unshare(0x8020000) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x420401, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) [ 909.625152][T17430] XFS (loop3): unknown mount option [barrier]. 07:17:56 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:56 executing program 5: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 07:17:56 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 909.914225][T17432] XFS (loop0): Invalid superblock magic number 07:17:56 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 909.961681][T17467] XFS (loop3): unknown mount option [barrier]. [ 909.987301][T17473] XFS (loop2): unknown mount option [barrier]. 07:17:56 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x100000000000000, 0x0}) 07:17:56 executing program 5: unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 07:17:56 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 910.309197][T17500] binder: 17498:17500 transaction failed 29189/-22, size 0-0 line 2995 07:17:56 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 910.417764][ T7724] binder: undelivered TRANSACTION_ERROR: 29189 [ 910.450608][T17508] XFS (loop2): unknown mount option [barrier]. [ 910.492645][T17513] XFS (loop1): unknown mount option [barrier]. 07:17:56 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:56 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:56 executing program 4: mkdir(&(0x7f0000000bc0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) 07:17:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) clone(0x40002300001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="623ad882c0d98a0d7ed2fa6843dd3c22", 0x0, 0x0, 0x0, 0x4}, 0x20) 07:17:57 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=""/126, 0xb2}) writev(r0, &(0x7f0000000080), 0x1a6) socket$inet_udplite(0x2, 0x2, 0x88) [ 910.778837][T17536] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 07:17:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=""/126, 0xb2}) writev(r0, &(0x7f0000000080), 0x1a6) 07:17:57 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:57 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71", 0x3a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:57 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:57 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=""/126, 0xb2}) writev(r0, &(0x7f0000000080), 0x1a6) socket$inet_udplite(0x2, 0x2, 0x88) [ 911.000074][T17535] XFS (loop0): Invalid superblock magic number 07:17:57 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) llistxattr(&(0x7f0000000180)='./bus\x00', &(0x7f0000000280)=""/247, 0xf7) [ 911.050482][T17568] XFS (loop3): unknown mount option [barrier]. 07:17:57 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, &(0x7f0000000100)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 07:17:57 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:57 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71", 0x3a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:57 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:57 executing program 4: r0 = socket(0x10, 0x1000040000000003, 0x0) write(r0, &(0x7f00000000c0)="22000000140007058d000405004c0304020803330100000008000200412009e376ab", 0x22) 07:17:57 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:57 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x8004510b, &(0x7f0000000100)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 07:17:57 executing program 5: [ 911.558622][T17600] XFS (loop2): unknown mount option [barrier]. [ 911.569564][T17604] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 911.625333][T17601] XFS (loop3): unknown mount option [barrier]. 07:17:57 executing program 4: [ 911.689544][T17607] XFS (loop1): unknown mount option [barrier]. 07:17:58 executing program 5: [ 911.760063][T17611] XFS (loop0): Invalid superblock magic number 07:17:58 executing program 4: 07:17:58 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71", 0x3a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:58 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 911.980502][T17646] XFS (loop3): unknown mount option [barrier]. [ 911.996591][T17648] XFS (loop1): unknown mount option [barrier]. 07:17:58 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:58 executing program 5: 07:17:58 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:58 executing program 4: 07:17:58 executing program 5: 07:17:58 executing program 4: 07:17:58 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:58 executing program 5: 07:17:58 executing program 4: 07:17:58 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:58 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f714921620276", 0x3f, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 912.558036][T17674] XFS (loop0): Invalid superblock magic number 07:17:58 executing program 5: 07:17:58 executing program 4: [ 912.635782][T17700] XFS (loop2): unknown mount option [barrier]. 07:17:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 07:17:59 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680), r3}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:59 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 07:17:59 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f714921620276", 0x3f, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:59 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 913.138862][T17736] XFS (loop3): unknown mount option [barrier]. [ 913.155894][T17740] XFS (loop1): unknown mount option [barrier]. 07:17:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 07:17:59 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) [ 913.271607][T17745] XFS (loop0): Invalid superblock magic number [ 913.449170][T17776] XFS (loop2): unknown mount option [barrier]. 07:17:59 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:59 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f714921620276", 0x3f, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:17:59 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) 07:17:59 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:00 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680), r3}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, 0x0, &(0x7f0000000040)) 07:18:00 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:00 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0", 0x41, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = epoll_create(0x0) ioctl$KDSKBMETA(r0, 0x4b63, 0x0) 07:18:00 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 914.055345][T17816] XFS (loop3): unknown mount option [barrier]. [ 914.069461][T17820] XFS (loop1): unknown mount option [barrier]. 07:18:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) [ 914.126186][T17809] XFS (loop0): Invalid superblock magic number 07:18:00 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:00 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0", 0x41, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 914.262813][T17835] XFS (loop2): unknown mount option [barrier]. 07:18:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) [ 914.371211][T17850] XFS (loop3): unknown mount option [barrier]. 07:18:00 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:00 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = epoll_create(0x0) accept(r0, 0x0, 0x0) [ 914.480121][T17854] XFS (loop1): unknown mount option [barrier]. [ 914.563433][T17871] XFS (loop2): unknown mount option [barrier]. 07:18:00 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680), r3}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:00 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0", 0x41, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = memfd_create(0x0, 0x0) ioctl$VT_SETMODE(r0, 0x5602, 0x0) 07:18:01 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 914.792986][T17882] XFS (loop1): unknown mount option [barrier]. 07:18:01 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = memfd_create(0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 07:18:01 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:01 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db", 0x42, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:01 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 915.049083][T17889] XFS (loop0): Invalid superblock magic number 07:18:01 executing program 4: 07:18:01 executing program 5: [ 915.221426][T17920] XFS (loop1): unknown mount option [barrier]. [ 915.234307][T17924] XFS (loop3): unknown mount option [barrier]. 07:18:01 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:01 executing program 4: [ 915.396312][T17938] XFS (loop2): unknown mount option [barrier]. 07:18:01 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x0, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:01 executing program 5: 07:18:01 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db", 0x42, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:01 executing program 4: 07:18:01 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:01 executing program 5: [ 915.577067][T17952] XFS (loop1): unknown mount option [barrier]. 07:18:01 executing program 4: 07:18:02 executing program 5: [ 915.676688][T17961] XFS (loop3): unknown mount option [barrier]. [ 915.763762][T17962] XFS (loop0): Invalid superblock magic number 07:18:02 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:02 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:02 executing program 5: 07:18:02 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db", 0x42, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 915.917324][T17988] XFS (loop3): unknown mount option [barrier]. [ 916.039766][T18000] XFS (loop1): unknown mount option [barrier]. 07:18:02 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x0, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:02 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:02 executing program 4: 07:18:02 executing program 5: 07:18:02 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:02 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:02 executing program 5: 07:18:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socket$tipc(0x1e, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$pppoe(0x18, 0x1, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) socket$unix(0x1, 0x5, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) socket$alg(0x26, 0x5, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket$l2tp(0x18, 0x1, 0x1) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) socket$nl_route(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000000)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0xf856a30d67214727, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 07:18:02 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unlink(&(0x7f0000000180)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0xfffffbfffffffffe, 0x1) close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) 07:18:02 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 916.488295][T18023] XFS (loop2): Invalid superblock magic number 07:18:02 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 916.563711][T18027] XFS (loop0): Invalid superblock magic number [ 916.649735][T18065] XFS (loop1): unknown mount option [barrier]. [ 916.669590][T18061] XFS (loop3): unknown mount option [barrier]. 07:18:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_GET_PIT(r1, 0x8070ae9f, &(0x7f0000000100)) 07:18:03 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x0, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:03 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:03 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:03 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_GET_PIT(r1, 0x8070ae9f, &(0x7f0000000100)) 07:18:03 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x88040, 0x0) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x807fd) r3 = accept4$tipc(r1, 0x0, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000200)=""/60) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="66696c7465720000000000000000000000a85d312fb4c6920000000000000000000000000000000400"/111], 0x1) r5 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r6 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000180)=0xa5b) fallocate(r5, 0x11, 0x0, 0xc00000) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000340)={0x3415, 0xb, 0x4, 0x2000, {}, {0x4, 0xe, 0x0, 0x1, 0x0, 0x1f, "ba127de0"}, 0x4, 0x1, @fd=r4, 0x4}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="0adc1f123c123f31") 07:18:03 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 917.320719][T18097] XFS (loop2): Invalid superblock magic number [ 917.367724][T18108] XFS (loop0): Invalid superblock magic number 07:18:03 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 917.487197][T18145] XFS (loop3): unknown mount option [barrier]. [ 917.592356][T18152] XFS (loop1): unknown mount option [barrier]. 07:18:04 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) sched_yield() 07:18:04 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f", 0x39, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:04 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:04 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:04 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:04 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 918.073267][T18180] XFS (loop1): unknown mount option [barrier]. [ 918.190663][T18178] XFS (loop2): Invalid superblock magic number 07:18:04 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 918.253757][T18202] XFS (loop5): unknown mount option [barrier]. 07:18:04 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 918.348358][T18196] XFS (loop0): Invalid superblock magic number [ 918.400653][T18221] XFS (loop1): unknown mount option [barrier]. 07:18:04 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:04 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(0x0, 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:04 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:04 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 918.669362][T18241] XFS (loop1): unknown mount option [barrier]. 07:18:05 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:05 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 918.867187][T18255] XFS (loop3): unknown mount option [barrier]. 07:18:05 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r4, 0x1, 0x1, 0x48}}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 918.930167][T18262] XFS (loop4): unknown mount option [barrier]. [ 918.964408][T18246] XFS (loop2): Invalid superblock magic number 07:18:05 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 919.167556][T18294] XFS (loop5): unknown mount option [barrier]. [ 919.240536][T18278] XFS (loop0): Invalid superblock magic number 07:18:05 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:05 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:05 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:05 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:05 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(0x0, 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 919.579972][T18323] XFS (loop1): unknown mount option [barrier]. 07:18:05 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:05 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:05 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:06 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:06 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000003c0)="9b4b7e95624a81f682e1c112df83375d1865571cbb57978ccef39f9212bdf74814bec12a0743286f8c822669031552c23704028324c7fa5be0ef1962b9a5fa20431a3cd15787d95a3364d6a0c8611607dd839f8ecc3d4aded89595b6cc520600669207ffb46d0d6c4160a893e5adfe1eb30db82c34fae3da9de2416fa9aaa30955196d6bbd2ac492f0c56cc34e311e49e0f4e1a638b0018e8da99eb12800ba2700bcd204f356ee06da251ec3b8a116915f8c144d9b2437045b682e8b0353f1307624e6a3ef7958ca58fc9acd06727d5b5cd7c494075bedd0a3e6e0", 0xdb, 0x5edc}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 919.919104][T18351] XFS (loop3): unknown mount option [barrier]. [ 919.931512][T18347] XFS (loop4): unknown mount option [barrier]. [ 919.959255][T18338] XFS (loop2): Invalid superblock magic number [ 919.974558][T18372] XFS (loop1): unknown mount option [barrier]. [ 920.013840][T18349] XFS (loop0): Invalid superblock magic number [ 920.048009][T18379] XFS (loop5): unknown mount option [barrier]. 07:18:06 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:06 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x500, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000000c0)=0x1, &(0x7f0000000140)=0x4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:06 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:06 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) 07:18:06 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(0x0, 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:06 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x0, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 920.543605][T18405] XFS (loop3): unknown mount option [barrier]. 07:18:06 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3", 0x48, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:07 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x500, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000000c0)=0x1, &(0x7f0000000140)=0x4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:07 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 920.833661][T18447] XFS (loop3): unknown mount option [barrier]. [ 920.878332][T18427] XFS (loop0): Invalid superblock magic number 07:18:07 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x100, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x3, 0x8000, 0x81}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e20, 0x7, @local, 0x2}}}, 0x84) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x80, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 920.920228][T18421] XFS (loop2): Invalid superblock magic number [ 920.954778][T18466] XFS (loop1): unknown mount option [barrier]. 07:18:07 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:07 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) 07:18:07 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce", 0x22, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:07 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x0, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:07 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x0, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:07 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) 07:18:07 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 921.558117][T18499] XFS (loop0): Invalid superblock magic number [ 921.651434][T18522] XFS (loop3): unknown mount option [barrier]. 07:18:08 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce", 0x22, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 921.799445][T18514] XFS (loop2): Invalid superblock magic number [ 921.860667][T18545] XFS (loop1): unknown mount option [barrier]. 07:18:08 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf", 0x4a, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:08 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) 07:18:08 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x0, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:08 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce", 0x22, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 922.036167][T18557] XFS (loop3): unknown mount option [barrier]. 07:18:08 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 922.331867][T18574] XFS (loop1): unknown mount option [barrier]. 07:18:08 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x0, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:08 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) 07:18:08 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) 07:18:08 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e08980482", 0x33, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 922.454471][T18569] XFS (loop0): Invalid superblock magic number [ 922.593681][T18608] XFS (loop1): unknown mount option [barrier]. 07:18:09 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 922.713660][T18600] XFS (loop2): Invalid superblock magic number 07:18:09 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) 07:18:09 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x0, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:09 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) [ 922.890196][T18641] XFS (loop3): unknown mount option [barrier]. 07:18:09 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e08980482", 0x33, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:09 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) 07:18:09 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) [ 923.209292][T18656] XFS (loop0): Invalid superblock magic number 07:18:09 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c", 0x4b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:09 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x0, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:09 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e08980482", 0x33, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:09 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) [ 923.589409][T18697] XFS (loop1): unknown mount option [barrier]. 07:18:09 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:09 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e08980482", 0x33, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:10 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x0, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 923.691942][T18695] XFS (loop2): Invalid superblock magic number 07:18:10 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e08980482", 0x33, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 923.789144][T18718] XFS (loop3): unknown mount option [barrier]. 07:18:10 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:10 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f7149", 0x3b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:10 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e08980482", 0x33, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 924.108025][T18736] XFS (loop0): Invalid superblock magic number 07:18:10 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 924.189751][T18753] XFS (loop3): unknown mount option [barrier]. 07:18:10 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e08980482", 0x33, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 924.351514][T18766] XFS (loop4): unknown mount option [barrier]. 07:18:10 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f0000000140)="446fe76d2b86d0b91fdd9f3b322623ae0fad507d", 0x14, 0x200}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 924.422994][T18769] XFS (loop2): Invalid superblock magic number 07:18:10 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f7149", 0x3b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 924.503094][T18789] XFS (loop5): unknown mount option [barrier]. [ 924.601239][T18793] XFS (loop3): unknown mount option [barrier]. 07:18:10 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e08980482", 0x33, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:10 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x0, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 924.724425][T18806] XFS (loop1): unknown mount option [barrier]. 07:18:11 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e08980482", 0x33, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:11 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 924.798607][T18818] XFS (loop4): unknown mount option [barrier]. 07:18:11 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f7149", 0x3b, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:11 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:11 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e08980482", 0x33, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 925.054544][T18837] XFS (loop3): unknown mount option [barrier]. [ 925.070131][T18846] XFS (loop5): unknown mount option [barrier]. [ 925.074715][T18838] XFS (loop1): unknown mount option [barrier]. [ 925.084806][T18821] XFS (loop0): Invalid superblock magic number 07:18:11 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f714921620276", 0x3f, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:11 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 925.407387][T18868] XFS (loop4): unknown mount option [barrier]. [ 925.467380][T18859] XFS (loop2): Invalid superblock magic number 07:18:11 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) 07:18:11 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x0, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 925.605459][T18892] XFS (loop1): unknown mount option [barrier]. 07:18:12 executing program 5: getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) 07:18:12 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:12 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f714921620276", 0x3f, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 925.854816][T18916] XFS (loop3): unknown mount option [barrier]. 07:18:12 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2000000000000) 07:18:12 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 925.970106][T18907] XFS (loop0): Invalid superblock magic number [ 926.103507][T18934] XFS (loop1): unknown mount option [barrier]. 07:18:12 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:12 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f714921620276", 0x3f, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:12 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 926.367567][T18943] XFS (loop2): Invalid superblock magic number [ 926.412232][T18960] XFS (loop5): Invalid superblock magic number [ 926.471994][T18978] XFS (loop1): unknown mount option [barrier]. 07:18:12 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x0, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:12 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) 07:18:12 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0", 0x41, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 926.710404][T18997] XFS (loop1): unknown mount option [barrier]. 07:18:13 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 926.778753][T18994] XFS (loop0): Invalid superblock magic number [ 926.928245][T19020] XFS (loop3): unknown mount option [barrier]. 07:18:13 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:13 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) 07:18:13 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x97ffffff00000000) 07:18:13 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0", 0x41, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:13 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 927.203052][T19030] XFS (loop2): Invalid superblock magic number 07:18:13 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x0, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:13 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) 07:18:13 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:13 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0", 0x41, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:13 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:14 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x97ffffff00000000) [ 927.705816][T19069] XFS (loop0): Invalid superblock magic number [ 927.718003][T19080] XFS (loop3): unknown mount option [barrier]. [ 927.726190][T19085] XFS (loop1): unknown mount option [barrier]. 07:18:14 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x600000000000000) [ 928.023647][T19105] XFS (loop2): Invalid superblock magic number 07:18:14 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:14 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db", 0x42, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:14 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000680)=""/148, 0x94}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/unix\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f8, 0x0) 07:18:14 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044dfd, 0x0) [ 928.256362][T19132] XFS (loop3): unknown mount option [barrier]. [ 928.263587][T19136] XFS (loop1): unknown mount option [barrier]. 07:18:14 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x0, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:14 executing program 5 (fault-call:6 fault-nth:0): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x400c840}, 0x24000000) umount2(0x0, 0x0) 07:18:14 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044dfd, 0x0) 07:18:14 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0), 0x0, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:14 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db", 0x42, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 928.566653][T19161] FAULT_INJECTION: forcing a failure. [ 928.566653][T19161] name failslab, interval 1, probability 0, space 0, times 0 07:18:14 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:14 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044dfd, 0x0) [ 928.657469][T19161] CPU: 0 PID: 19161 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190408 #20 [ 928.666618][T19161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 928.676673][T19161] Call Trace: [ 928.680026][T19161] dump_stack+0x172/0x1f0 [ 928.684387][T19161] should_fail.cold+0xa/0x15 [ 928.688998][T19161] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 928.694820][T19161] ? ___might_sleep+0x163/0x280 [ 928.699682][T19161] __should_failslab+0x121/0x190 [ 928.704654][T19161] should_failslab+0x9/0x14 [ 928.709180][T19161] __kmalloc+0x2dc/0x740 [ 928.713448][T19161] ? fput_many+0x12c/0x1a0 [ 928.717898][T19161] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 928.724150][T19161] ? strnlen_user+0x1f0/0x280 [ 928.728857][T19161] ? __x64_sys_memfd_create+0x13c/0x470 [ 928.734439][T19161] __x64_sys_memfd_create+0x13c/0x470 [ 928.739844][T19161] ? memfd_fcntl+0x1820/0x1820 [ 928.744622][T19161] ? do_syscall_64+0x26/0x610 [ 928.749344][T19161] ? lockdep_hardirqs_on+0x418/0x5d0 [ 928.754683][T19161] ? trace_hardirqs_on+0x67/0x230 [ 928.759813][T19161] do_syscall_64+0x103/0x610 [ 928.764411][T19161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 928.770294][T19161] RIP: 0033:0x4582b9 [ 928.774207][T19161] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 928.795587][T19161] RSP: 002b:00007f86e4a3fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 07:18:15 executing program 5 (fault-call:6 fault-nth:1): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x400c840}, 0x24000000) umount2(0x0, 0x0) [ 928.804001][T19161] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00000000004582b9 [ 928.811976][T19161] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd207 [ 928.819947][T19161] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 928.819957][T19161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86e4a406d4 [ 928.819966][T19161] R13: 00000000004c6c5d R14: 00000000004dc638 R15: 0000000000000004 [ 928.901606][T19155] XFS (loop0): Invalid superblock magic number [ 928.920592][T19187] XFS (loop3): unknown mount option [barrier]. 07:18:15 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x80000080044dfd, 0x0) 07:18:15 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db", 0x42, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 928.983220][T19181] XFS (loop2): Invalid superblock magic number [ 929.007280][T19207] FAULT_INJECTION: forcing a failure. [ 929.007280][T19207] name failslab, interval 1, probability 0, space 0, times 0 [ 929.085606][T19207] CPU: 1 PID: 19207 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190408 #20 [ 929.094853][T19207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.104931][T19207] Call Trace: [ 929.108249][T19207] dump_stack+0x172/0x1f0 [ 929.112603][T19207] should_fail.cold+0xa/0x15 [ 929.117215][T19207] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 929.123031][T19207] ? shmem_destroy_callback+0xc0/0xc0 [ 929.128514][T19207] __should_failslab+0x121/0x190 [ 929.133481][T19207] ? shmem_destroy_callback+0xc0/0xc0 [ 929.138864][T19207] should_failslab+0x9/0x14 [ 929.143382][T19207] kmem_cache_alloc+0x2b2/0x6f0 [ 929.148264][T19207] ? __alloc_fd+0x430/0x530 [ 929.152798][T19207] ? shmem_destroy_callback+0xc0/0xc0 [ 929.158182][T19207] shmem_alloc_inode+0x1c/0x50 [ 929.162953][T19207] alloc_inode+0x66/0x190 [ 929.167291][T19207] new_inode_pseudo+0x19/0xf0 [ 929.171990][T19207] new_inode+0x1f/0x40 [ 929.176068][T19207] shmem_get_inode+0x84/0x780 [ 929.180758][T19207] __shmem_file_setup.part.0+0x7e/0x2b0 [ 929.186328][T19207] shmem_file_setup+0x66/0x90 [ 929.191133][T19207] __x64_sys_memfd_create+0x2a2/0x470 [ 929.196522][T19207] ? memfd_fcntl+0x1820/0x1820 [ 929.201301][T19207] do_syscall_64+0x103/0x610 [ 929.205910][T19207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 929.211801][T19207] RIP: 0033:0x4582b9 [ 929.215701][T19207] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:18:15 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x80000080044dfd, 0x0) [ 929.235592][T19207] RSP: 002b:00007f86e4a3fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 929.244018][T19207] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00000000004582b9 [ 929.251999][T19207] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd207 [ 929.259978][T19207] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 929.268046][T19207] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86e4a406d4 [ 929.276028][T19207] R13: 00000000004c6c5d R14: 00000000004dc638 R15: 0000000000000004 [ 929.351487][T19221] XFS (loop1): unknown mount option [barrier]. 07:18:15 executing program 5 (fault-call:6 fault-nth:2): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getresuid(0x0, &(0x7f0000002180), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x1, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x400c840}, 0x24000000) umount2(0x0, 0x0) [ 929.616180][T19236] FAULT_INJECTION: forcing a failure. [ 929.616180][T19236] name failslab, interval 1, probability 0, space 0, times 0 [ 929.629288][T19236] CPU: 0 PID: 19236 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190408 #20 [ 929.638403][T19236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.648530][T19236] Call Trace: [ 929.651827][T19236] dump_stack+0x172/0x1f0 [ 929.656158][T19236] should_fail.cold+0xa/0x15 [ 929.660751][T19236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 929.666560][T19236] ? ___might_sleep+0x163/0x280 [ 929.671409][T19236] __should_failslab+0x121/0x190 [ 929.676350][T19236] should_failslab+0x9/0x14 [ 929.680854][T19236] kmem_cache_alloc+0x2b2/0x6f0 [ 929.685701][T19236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 929.691337][T19236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 929.696799][T19236] ? lockdep_hardirqs_on+0x418/0x5d0 [ 929.702084][T19236] ? retint_kernel+0x2d/0x2d [ 929.706667][T19236] __d_alloc+0x2e/0x8c0 [ 929.711731][T19236] d_alloc_pseudo+0x22/0x70 [ 929.716231][T19236] alloc_file_pseudo+0xe2/0x280 [ 929.721081][T19236] ? alloc_file+0x4d0/0x4d0 [ 929.725581][T19236] ? clear_nlink+0xae/0xe0 [ 929.729991][T19236] ? clear_nlink+0xb6/0xe0 [ 929.734411][T19236] __shmem_file_setup.part.0+0x108/0x2b0 [ 929.740044][T19236] shmem_file_setup+0x66/0x90 [ 929.744722][T19236] __x64_sys_memfd_create+0x2a2/0x470 [ 929.750088][T19236] ? memfd_fcntl+0x1820/0x1820 [ 929.754859][T19236] ? do_syscall_64+0x26/0x610 [ 929.759531][T19236] ? lockdep_hardirqs_on+0x418/0x5d0 [ 929.764810][T19236] ? trace_hardirqs_on+0x67/0x230 [ 929.769830][T19236] do_syscall_64+0x103/0x610 [ 929.774419][T19236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 929.780303][T19236] RIP: 0033:0x4582b9 [ 929.784201][T19236] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 929.804564][T19236] RSP: 002b:00007f86e4a3fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 929.812972][T19236] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00000000004582b9 [ 929.820938][T19236] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd207 [ 929.828901][T19236] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 929.836864][T19236] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86e4a406d4 [ 929.844827][T19236] R13: 00000000004c6c5d R14: 00000000004dc638 R15: 0000000000000004 [ 929.864325][T19236] kasan: CONFIG_KASAN_INLINE enabled [ 929.869743][T19236] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 929.898558][T19236] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 929.905511][T19236] CPU: 0 PID: 19236 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190408 #20 [ 929.914602][T19236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.924666][T19236] RIP: 0010:d_alloc_pseudo+0x33/0x70 [ 929.929932][T19236] Code: 41 54 49 89 fc 48 83 ec 08 e8 39 d9 b7 ff 4c 89 ee 4c 89 e7 e8 1e f1 ff ff 48 ba 00 00 00 00 00 fc ff df 48 89 c1 48 c1 e9 03 <0f> b6 14 11 84 d2 74 05 80 fa 03 7e 10 81 08 00 00 00 40 48 83 c4 [ 929.949515][T19236] RSP: 0018:ffff88805c9f7d00 EFLAGS: 00010246 [ 929.955575][T19236] RAX: 0000000000000000 RBX: 1ffff1100b93efa8 RCX: 0000000000000000 [ 929.963527][T19236] RDX: dffffc0000000000 RSI: ffffffff81b8a01f RDI: 0000000000000282 [ 929.971490][T19236] RBP: ffff88805c9f7d18 R08: ffff8880a8764340 R09: ffffed1015d05bc8 [ 929.979457][T19236] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff8880aa38c740 [ 929.987419][T19236] R13: ffff88805c9f7d60 R14: ffff8880aa1d7a28 R15: ffff888086c56140 [ 929.995379][T19236] FS: 00007f86e4a40700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 930.004284][T19236] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 930.010855][T19236] CR2: 00007fbc023df6f0 CR3: 000000008acf0000 CR4: 00000000001406f0 [ 930.018815][T19236] Call Trace: [ 930.022111][T19236] alloc_file_pseudo+0xe2/0x280 [ 930.026951][T19236] ? alloc_file+0x4d0/0x4d0 [ 930.031452][T19236] ? clear_nlink+0xae/0xe0 [ 930.035858][T19236] ? clear_nlink+0xb6/0xe0 [ 930.040260][T19236] __shmem_file_setup.part.0+0x108/0x2b0 [ 930.045874][T19236] shmem_file_setup+0x66/0x90 [ 930.050541][T19236] __x64_sys_memfd_create+0x2a2/0x470 [ 930.055898][T19236] ? memfd_fcntl+0x1820/0x1820 [ 930.060644][T19236] ? do_syscall_64+0x26/0x610 [ 930.065323][T19236] ? lockdep_hardirqs_on+0x418/0x5d0 [ 930.070589][T19236] ? trace_hardirqs_on+0x67/0x230 [ 930.075593][T19236] do_syscall_64+0x103/0x610 [ 930.080166][T19236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.086043][T19236] RIP: 0033:0x4582b9 [ 930.089930][T19236] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 930.109529][T19236] RSP: 002b:00007f86e4a3fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 930.117917][T19236] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 00000000004582b9 [ 930.125866][T19236] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bd207 [ 930.133822][T19236] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 930.141791][T19236] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86e4a406d4 [ 930.149752][T19236] R13: 00000000004c6c5d R14: 00000000004dc638 R15: 0000000000000004 [ 930.157703][T19236] Modules linked in: [ 930.163143][T19236] ---[ end trace 38fc830db10f6262 ]--- [ 930.168682][T19236] RIP: 0010:d_alloc_pseudo+0x33/0x70 [ 930.174267][T19236] Code: 41 54 49 89 fc 48 83 ec 08 e8 39 d9 b7 ff 4c 89 ee 4c 89 e7 e8 1e f1 ff ff 48 ba 00 00 00 00 00 fc ff df 48 89 c1 48 c1 e9 03 <0f> b6 14 11 84 d2 74 05 80 fa 03 7e 10 81 08 00 00 00 40 48 83 c4 [ 930.194365][T19155] kobject: 'loop0' (0000000063e95f6a): kobject_uevent_env [ 930.194401][T19155] kobject: 'loop0' (0000000063e95f6a): fill_kobj_path: path = '/devices/virtual/block/loop0' 07:18:16 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92c6aa1e2728f87bdd1c4c9cc05faedbc8d3efe255ead4fd7ceb4eb46c1b358ea403460ab13b4e02201d7a5bdf29164851682f079048075ed29f8daaa01840bd36e4d3c0c6d1fd7d667c9221f0", 0x98, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x0, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:16 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f00000002c0)="09385ab374a8edb8a4bb16c7004074e49078c30bbd7ff90af8f3d3c539bcd052ccc11263f010241be98e0b1f23a3e9c0fa10c7113dbfcdecaf79d0440a2db35c8222bffbfacabd8d1c7fd925a84cac95e0819f5280c5cd5bf4b5b11c40be5a1f0dd3d1c3ef58ff92610db7be76ab25cd4ef377b4ca99a5d434e3e0a8c128d5f6c71fa001900704bb3b8c45aaf08d8418fe45817f73d4386f3a06da4fb187f4307b855987f44cf1890c610c7f3c90f911e99e52035d271edb56132156d30d2de394458d921596688e4651821e841f8260b007690bb169a21fd8094584dac0ba2e1d18b4ef3ecda9da", 0xe8, 0x9}, {&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786", 0x26, 0x6}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r2, 0x1, 0x1, 0x48}}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:16 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x80000080044dfd, 0x0) 07:18:16 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940)=0x0, 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db26", 0x43}], 0x0, &(0x7f0000000580)={[{@largeio='largeio'}, {@noikeep='noikeep'}, {@logdev={'logdev', 0x3d, './file0'}}, {@barrier='barrier'}, {@filestreams='filestreams'}, {@logbsize={'logbsize', 0x3d, [0x37, 0x0]}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nodevself'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000800)='trusted.overlay.redirect\x00', &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 07:18:16 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair(0x9, 0xa, 0x2, &(0x7f0000000880)={0xffffffffffffffff}) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getresuid(0x0, &(0x7f0000000940), 0x0) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000500)=[{&(0x7f00000001c0)="7a94ba63f0ba12a30e165d269ea638d09428baad09e2b63c16ede7d469699748f9ce782c7786ff0d94b667e7b3967e089804828c1390cca68f71492162027635a0db2694afab28a3aacf7c92", 0x4c, 0x6}], 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x5, 0x40000) fsetxattr$trusted_overlay_redirect(r1, 0x0, &(0x7f0000000840)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000700)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000780)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x2d, 0x0, [0x3, 0x6, 0x8, 0x9, 0x4, 0xff, 0x200, 0x4, 0x7, 0x1, 0x3, 0x7, 0x7, 0x200, 0x3, 0x5]}], r3, 0x1, 0x1, 0x48}}, 0x20) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 930.227264][T19236] RSP: 0018:ffff88805c9f7d00 EFLAGS: 00010246 [ 930.236887][T19236] RAX: 0000000000000000 RBX: 1ffff1100b93efa8 RCX: 0000000000000000 [ 930.257055][ T3879] kobject: 'loop0' (0000000063e95f6a): kobject_uevent_env 07:18:16 executing program 4: r0 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$int_in(r0, 0x80000080044dfd, 0x0) [ 930.276236][ T3879] kobject: 'loop0' (0000000063e95f6a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 930.289856][T19252] kobject: 'loop0' (0000000063e95f6a): kobject_uevent_env [ 930.301393][ T3879] kobject: 'loop3' (00000000f14e52a6): kobject_uevent_env [ 930.308699][T19252] kobject: 'loop0' (0000000063e95f6a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 930.312636][T19236] RDX: dffffc0000000000 RSI: ffffffff81b8a01f RDI: 0000000000000282 [ 930.322580][ T3879] kobject: 'loop3' (00000000f14e52a6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 930.334710][T19236] RBP: ffff88805c9f7d18 R08: ffff8880a8764340 R09: ffffed1015d05bc8 [ 930.355569][T19236] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff8880aa38c740 [ 930.360161][ T3879] kobject: 'loop1' (00000000e4215e03): kobject_uevent_env [ 930.366079][T19236] R13: ffff88805c9f7d60 R14: ffff8880aa1d7a28 R15: ffff888086c56140 [ 930.379459][T19236] FS: 00007f86e4a40700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 930.389657][ T3879] kobject: 'loop1' (00000000e4215e03): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 930.391146][T19236] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 930.401184][ T3879] kobject: 'loop3' (00000000f14e52a6): kobject_uevent_env [ 930.407210][T19246] kobject: 'loop3' (00000000f14e52a6): kobject_uevent_env 07:18:16 executing program 4: r0 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$int_in(r0, 0x80000080044dfd, 0x0) [ 930.413967][ T3879] kobject: 'loop3' (00000000f14e52a6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 930.424266][T19246] kobject: 'loop3' (00000000f14e52a6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 930.443829][T19236] CR2: 0000001b2e323000 CR3: 000000008acf0000 CR4: 00000000001406f0 [ 930.445279][ T3879] kobject: 'loop1' (00000000e4215e03): kobject_uevent_env [ 930.451930][T19236] Kernel panic - not syncing: Fatal exception [ 930.459765][T19236] Kernel Offset: disabled [ 930.470114][T19236] Rebooting in 86400 seconds..