__do_sys_ioctl fs/ioctl.c:868 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __arm64_sys_ioctl+0x98/0x140 fs/ioctl.c:856 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x140 arch/arm64/kernel/syscall.c:197 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 ------------[ cut here ]------------ kernel BUG at fs/btrfs/file.c:786! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 13097 Comm: syz-executor.4 Not tainted 6.1.0-rc7-syzkaller-33054-gcdb931b58ff5 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : btrfs_drop_extents+0x11e8/0x12a0 fs/btrfs/file.c:786 lr : btrfs_drop_extents+0x11e8/0x12a0 fs/btrfs/file.c:786 sp : ffff800013b638a0 x29: ffff800013b639c0 x28: 0000000002001000 x27: ffff800013b63a88 x26: 0000000002001000 x25: 0000000000000000 x24: 0000000000000107 x23: 0000000000000001 x22: 0000000000000000 x21: ffff0001113cb0e0 x20: ffff0000ca628380 x19: 00000000fffffff4 x18: 00000000000000c0 x17: 6e69676e45206574 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000002 x13: 0000000000000002 x12: 0000000000040000 x11: 00000000000156ad x10: ffff80001d99c000 x9 : ffff80000914355c x8 : 00000000000156ae x7 : ffff80000c091344 x6 : 0000000000000000 x5 : 0000000000000080 x4 : 00000000ffffffff x3 : 0000000000000c40 x2 : ffff0000c01a3c00 x1 : 00000000fffffff4 x0 : 0000000000000000 Call trace: btrfs_drop_extents+0x11e8/0x12a0 fs/btrfs/file.c:786 btrfs_replace_file_extents+0x1e4/0xe40 fs/btrfs/file.c:2690 btrfs_punch_hole fs/btrfs/file.c:3015 [inline] btrfs_fallocate+0xcc8/0xdcc fs/btrfs/file.c:3367 vfs_fallocate+0x328/0x38c fs/open.c:323 ioctl_preallocate+0x16c/0x1bc fs/ioctl.c:290 do_vfs_ioctl+0x123c/0x16a4 fs/ioctl.c:849 __do_sys_ioctl fs/ioctl.c:868 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __arm64_sys_ioctl+0x98/0x140 fs/ioctl.c:856 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x140 arch/arm64/kernel/syscall.c:197 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 Code: d4210000 97c5890b d4210000 97c58909 (d4210000) ---[ end trace 0000000000000000 ]---