el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 ------------[ cut here ]------------ kernel BUG at fs/btrfs/extent-io-tree.c:381! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 4309 Comm: syz-executor283 Not tainted 6.1.28-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : set_state_bits fs/btrfs/extent-io-tree.c:381 [inline] pc : __set_extent_bit+0x134c/0x1650 fs/btrfs/extent-io-tree.c:1022 lr : set_state_bits fs/btrfs/extent-io-tree.c:381 [inline] lr : __set_extent_bit+0x134c/0x1650 fs/btrfs/extent-io-tree.c:1022 sp : ffff80001dc87380 x29: ffff80001dc87430 x28: 0000000000001000 x27: 0000000000000fff x26: ffff0000d0241840 x25: ffff0000d02418bc x24: dfff800000000000 x23: 1fffe0001a048317 x22: 0000000000000000 x21: 0000000000000fff x20: 00000000fffffff4 x19: 0000000000000fff x18: ffff80001dc86700 x17: 0000000000000000 x16: ffff8000120e8d94 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000001 x12: 0000000000000001 x11: ff8080000a31f260 x10: 0000000000000000 x9 : ffff80000a31f260 x8 : ffff0000ce418000 x7 : 0000000000000001 x6 : 0000000000000001 x5 : 00000000ffffffff x4 : 0000000000000a20 x3 : 0000000000000a20 x2 : 0000000000000038 x1 : 00000000fffffff4 x0 : 0000000000000000 Call trace: set_state_bits fs/btrfs/extent-io-tree.c:381 [inline] __set_extent_bit+0x134c/0x1650 fs/btrfs/extent-io-tree.c:1022 set_record_extent_bits+0x68/0x98 fs/btrfs/extent-io-tree.c:1607 qgroup_reserve_data+0x214/0x90c fs/btrfs/qgroup.c:3767 btrfs_qgroup_reserve_data+0x40/0xec fs/btrfs/qgroup.c:3810 btrfs_fallocate+0xf30/0x19b0 fs/btrfs/file.c:3134 vfs_fallocate+0x478/0x5b4 fs/open.c:323 ioctl_preallocate+0x278/0x324 fs/ioctl.c:290 do_vfs_ioctl+0x1ad8/0x26f8 fs/ioctl.c:849 __do_sys_ioctl fs/ioctl.c:868 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __arm64_sys_ioctl+0xe4/0x1c8 fs/ioctl.c:856 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 Code: aa1403e0 979934ea 17ffff7d 97876e19 (d4210000) ---[ end trace 0000000000000000 ]---