__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x104 arch/arm64/kernel/syscall.c:193 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 ------------[ cut here ]------------ kernel BUG at fs/btrfs/extent-io-tree.c:379! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 18281 Comm: syz-executor.1 Not tainted 6.2.0-rc5-syzkaller-17295-g1dc22be1f91f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] pc : __set_extent_bit+0x10c0/0x1174 fs/btrfs/extent-io-tree.c:1042 lr : set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] lr : __set_extent_bit+0x10c0/0x1174 fs/btrfs/extent-io-tree.c:1042 sp : ffff800013aeb940 x29: ffff800013aeb9c0 x28: ffff00011a568a08 x27: ffff00011a2a4980 x26: 0000000000000800 x25: 0000000000000000 x24: 00000000ffffffff x23: 00000000ffffffff x22: ffff00011a5689e8 x21: 00000000fffffff4 x20: ffff00011a5689e8 x19: ffff00011a2a4380 x18: 00000000000000c0 x17: 6e69676e45206574 x16: ffff80000dd97118 x15: ffff0001190f0000 x14: 0000000000000000 x13: 00000000ffffffff x12: 0000000000040000 x11: 0000000000011be7 x10: ffff80001350f000 x9 : ffff8000092696e4 x8 : 0000000000011be8 x7 : ffff80000c12c9f4 x6 : 0000000000000000 x5 : 00000000ffffffff x4 : 0000000000000a20 x3 : 0000000000000080 x2 : 0000000000000038 x1 : 00000000fffffff4 x0 : 0000000000000000 Call trace: set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] __set_extent_bit+0x10c0/0x1174 fs/btrfs/extent-io-tree.c:1042 set_record_extent_bits+0x74/0xb0 fs/btrfs/extent-io-tree.c:1690 qgroup_reserve_data+0x134/0x374 fs/btrfs/qgroup.c:3777 btrfs_qgroup_reserve_data+0x40/0xd0 fs/btrfs/qgroup.c:3820 btrfs_fallocate+0x778/0xdd0 fs/btrfs/file.c:3147 vfs_fallocate+0x328/0x38c fs/open.c:323 ioctl_preallocate+0x16c/0x1bc fs/ioctl.c:290 do_vfs_ioctl+0x123c/0x16a4 fs/ioctl.c:849 __do_sys_ioctl fs/ioctl.c:868 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __arm64_sys_ioctl+0x98/0x140 fs/ioctl.c:856 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x104 arch/arm64/kernel/syscall.c:193 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 Code: d4210000 97c12b72 d4210000 97c12b70 (d4210000) ---[ end trace 0000000000000000 ]---