el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:193
 el0_svc+0x4c/0x15c arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591
------------[ cut here ]------------
WARNING: CPU: 0 PID: 26033 at fs/xfs/xfs_dquot.c:801 xfs_qm_dqget_cache_insert+0x130/0x138 fs/xfs/xfs_dquot.c:801
Modules linked in:
CPU: 0 PID: 26033 Comm: syz-executor.1 Not tainted 6.3.0-rc7-syzkaller-g14f8db1c0f9a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : xfs_qm_dqget_cache_insert+0x130/0x138 fs/xfs/xfs_dquot.c:801
lr : xfs_qm_dqget_cache_insert+0x130/0x138 fs/xfs/xfs_dquot.c:801
sp : ffff80002d3174e0
x29: ffff80002d3174e0 x28: 0000000000000000 x27: dfff800000000000
x26: ffff80002d317580 x25: ffff0000cf1389c0 x24: 0000000000000002
x23: ffff0000d58770a0 x22: ffff0000d5877000 x21: ffff0000cf1389c0
x20: 00000000fffffff4 x19: ffff0000d58770f0 x18: 1fffe0003684a5b6
x17: 0000000000000000 x16: ffff8000084fa124 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000002 x12: 00000000ffffffef
x11: 0000000000040000 x10: 0000000000012722 x9 : ffff80002110a000
x8 : 0000000000012723 x7 : fffffffffffc1a30 x6 : fffffffffffc19f0
x5 : ffff80002d3169d8 x4 : ffff800015e1d5a8 x3 : ffff80000acca4d8
x2 : 0000000000000001 x1 : ffff8000163708f0 x0 : 00000000fffffff4
Call trace:
 xfs_qm_dqget_cache_insert+0x130/0x138 fs/xfs/xfs_dquot.c:801
 xfs_qm_dqget+0x278/0x790 fs/xfs/xfs_dquot.c:874
 xfs_qm_vop_dqalloc+0x724/0xcfc fs/xfs/xfs_qm.c:1742
 xfs_fileattr_set+0x34c/0x1448 fs/xfs/xfs_ioctl.c:1336
 vfs_fileattr_set+0x70c/0xad4 fs/ioctl.c:696
 do_vfs_ioctl+0x14cc/0x26f8
 __do_sys_ioctl fs/ioctl.c:868 [inline]
 __se_sys_ioctl fs/ioctl.c:856 [inline]
 __arm64_sys_ioctl+0xe4/0x1c8 fs/ioctl.c:856
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:193
 el0_svc+0x4c/0x15c arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591
irq event stamp: 91808
hardirqs last  enabled at (91807): [<ffff80001236c19c>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:84 [inline]
hardirqs last  enabled at (91807): [<ffff80001236c19c>] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:94
hardirqs last disabled at (91808): [<ffff800012369e90>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (91802): [<ffff800008020c1c>] softirq_handle_end kernel/softirq.c:414 [inline]
softirqs last  enabled at (91802): [<ffff800008020c1c>] __do_softirq+0xac0/0xd54 kernel/softirq.c:600
softirqs last disabled at (91539): [<ffff80000802a658>] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80
---[ end trace 0000000000000000 ]---