option from the mount to silence this warning.
=======================================================
ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode.
------------[ cut here ]------------
kernel BUG at fs/ocfs2/alloc.c:7395!
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 4302 Comm: syz-executor367 Not tainted 6.1.114-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : ocfs2_truncate_inline+0x744/0x748 fs/ocfs2/alloc.c:7395
lr : ocfs2_truncate_inline+0x744/0x748 fs/ocfs2/alloc.c:7395
sp : ffff800020ed7100
x29: ffff800020ed71c0 x28: 00000000fffffffd x27: 0000000000000004
x26: ffff0000e03ede48 x25: 0000000000000007 x24: 1fffe0001c07dbc9
x23: 0000000000000007 x22: ffff0000da1ea000 x21: ffff0000e5675400
x20: ffff0000e03eddf8 x19: 0000000000000004 x18: ffff800020ed72a0
x17: ffff800018aab000 x16: ffff800012290d3c x15: 0000000000000000
x14: 000000004030582b x13: ffff0000d9a7b780 x12: ffff7000041dae28
x11: 0000000000ff0100 x10: 0000000000000000 x9 : ffff800009e58e0c
x8 : ffff0000d9a7b780 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000004
x2 : 0000000000000007 x1 : 0000000000000007 x0 : 0000000000000004
Call trace:
ocfs2_truncate_inline+0x744/0x748 fs/ocfs2/alloc.c:7395
ocfs2_remove_inode_range+0x560/0x25c0 fs/ocfs2/file.c:1787
__ocfs2_change_file_space+0x830/0xd38 fs/ocfs2/file.c:2017
ocfs2_fallocate+0x288/0x2e4 fs/ocfs2/file.c:2127
vfs_fallocate+0x478/0x5b4 fs/open.c:323
ioctl_preallocate+0x278/0x324 fs/ioctl.c:290
do_vfs_ioctl+0x1ad8/0x26f8 fs/ioctl.c:849
__do_sys_ioctl fs/ioctl.c:868 [inline]
__se_sys_ioctl fs/ioctl.c:856 [inline]
__arm64_sys_ioctl+0xe4/0x1c8 fs/ioctl.c:856
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140
do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:204
el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Code: aa1303e0 97ac8379 17ffffc4 979a7a94 (d4210000)
---[ end trace 0000000000000000 ]---