el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 ------------[ cut here ]------------ kernel BUG at fs/btrfs/extent-io-tree.c:379! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 14882 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] pc : __set_extent_bit+0x15e0/0x195c fs/btrfs/extent-io-tree.c:1057 lr : set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] lr : __set_extent_bit+0x15e0/0x195c fs/btrfs/extent-io-tree.c:1057 sp : ffff80009b517380 x29: ffff80009b517430 x28: dfff800000000000 x27: ffff0000c406d540 x26: ffff0000c406d5bc x25: 1fffe0001880dab7 x24: 000000000000cfff x23: 0000000000000000 x22: 1fffe0001880daa8 x21: 0000000000000000 x20: 00000000fffffff4 x19: 1fffe0001880daa9 x18: ffff80009b5167e0 x17: 0000000000000000 x16: ffff80008a71b23c x15: 0000000000000001 x14: 1ffff00011cbf62e x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000040000 x10: 0000000000012f78 x9 : ffff800096fc9000 x8 : 0000000000012f79 x7 : 0000000000000001 x6 : 0000000000000001 x5 : 00000000ffffffff x4 : 0000000000000820 x3 : 0000000000000820 x2 : 0000000000000038 x1 : 00000000fffffff4 x0 : 0000000000000000 Call trace: set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] __set_extent_bit+0x15e0/0x195c fs/btrfs/extent-io-tree.c:1057 set_record_extent_bits+0x68/0xa8 fs/btrfs/extent-io-tree.c:1705 qgroup_reserve_data+0x214/0x870 fs/btrfs/qgroup.c:3803 btrfs_qgroup_reserve_data+0x40/0xec fs/btrfs/qgroup.c:3846 btrfs_fallocate+0xeb0/0x1a24 fs/btrfs/file.c:3142 vfs_fallocate+0x478/0x5b4 fs/open.c:324 ioctl_preallocate+0x278/0x324 fs/ioctl.c:291 do_vfs_ioctl+0x1ae4/0x2704 fs/ioctl.c:850 __do_sys_ioctl fs/ioctl.c:869 [inline] __se_sys_ioctl fs/ioctl.c:857 [inline] __arm64_sys_ioctl+0xe4/0x1c8 fs/ioctl.c:857 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 Code: aa1303e0 9797d3db 17ffff7a 978515f8 (d4210000) ---[ end trace 0000000000000000 ]---