option from the mount to silence this warning. ======================================================= ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. ------------[ cut here ]------------ kernel BUG at fs/ocfs2/alloc.c:7395! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 4302 Comm: syz-executor367 Not tainted 6.1.114-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ocfs2_truncate_inline+0x744/0x748 fs/ocfs2/alloc.c:7395 lr : ocfs2_truncate_inline+0x744/0x748 fs/ocfs2/alloc.c:7395 sp : ffff800020ed7100 x29: ffff800020ed71c0 x28: 00000000fffffffd x27: 0000000000000004 x26: ffff0000e03ede48 x25: 0000000000000007 x24: 1fffe0001c07dbc9 x23: 0000000000000007 x22: ffff0000da1ea000 x21: ffff0000e5675400 x20: ffff0000e03eddf8 x19: 0000000000000004 x18: ffff800020ed72a0 x17: ffff800018aab000 x16: ffff800012290d3c x15: 0000000000000000 x14: 000000004030582b x13: ffff0000d9a7b780 x12: ffff7000041dae28 x11: 0000000000ff0100 x10: 0000000000000000 x9 : ffff800009e58e0c x8 : ffff0000d9a7b780 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000004 x2 : 0000000000000007 x1 : 0000000000000007 x0 : 0000000000000004 Call trace: ocfs2_truncate_inline+0x744/0x748 fs/ocfs2/alloc.c:7395 ocfs2_remove_inode_range+0x560/0x25c0 fs/ocfs2/file.c:1787 __ocfs2_change_file_space+0x830/0xd38 fs/ocfs2/file.c:2017 ocfs2_fallocate+0x288/0x2e4 fs/ocfs2/file.c:2127 vfs_fallocate+0x478/0x5b4 fs/open.c:323 ioctl_preallocate+0x278/0x324 fs/ioctl.c:290 do_vfs_ioctl+0x1ad8/0x26f8 fs/ioctl.c:849 __do_sys_ioctl fs/ioctl.c:868 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __arm64_sys_ioctl+0xe4/0x1c8 fs/ioctl.c:856 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Code: aa1303e0 97ac8379 17ffffc4 979a7a94 (d4210000) ---[ end trace 0000000000000000 ]---