el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x58/0x16c arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 ------------[ cut here ]------------ kernel BUG at fs/btrfs/extent-io-tree.c:379! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6541 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00071-gfe4469582053 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] pc : __set_extent_bit+0x15e0/0x195c fs/btrfs/extent-io-tree.c:1057 lr : set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] lr : __set_extent_bit+0x15e0/0x195c fs/btrfs/extent-io-tree.c:1057 sp : ffff800097587380 x29: ffff800097587430 x28: dfff800000000000 x27: ffff0000cbca6c00 x26: ffff0000cbca6c7c x25: 1fffe00019794d8f x24: 0000000000000fff x23: 0000000000000000 x22: 1fffe00019794d80 x21: 0000000000000000 x20: 00000000fffffff4 x19: 1fffe00019794d81 x18: ffff8000975869a0 x17: 0000000000000000 x16: ffff80008a572e30 x15: 0000000000000001 x14: 1ffff00011c6ab5a x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000001 x10: 0000000000000000 x9 : 0000000000000000 x8 : ffff0000d606b780 x7 : 0000000000000001 x6 : 0000000000000001 x5 : 00000000ffffffff x4 : 0000000000000820 x3 : 0000000000000820 x2 : 0000000000000038 x1 : 00000000fffffff4 x0 : 0000000000000000 Call trace: set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] __set_extent_bit+0x15e0/0x195c fs/btrfs/extent-io-tree.c:1057 set_record_extent_bits+0x68/0xa8 fs/btrfs/extent-io-tree.c:1705 qgroup_reserve_data+0x214/0x870 fs/btrfs/qgroup.c:3800 btrfs_qgroup_reserve_data+0x40/0xec fs/btrfs/qgroup.c:3843 btrfs_fallocate+0xf1c/0x19ac fs/btrfs/file.c:3134 vfs_fallocate+0x478/0x5b4 fs/open.c:324 ioctl_preallocate+0x278/0x324 fs/ioctl.c:290 do_vfs_ioctl+0x1ad8/0x26f8 fs/ioctl.c:849 __do_sys_ioctl fs/ioctl.c:868 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __arm64_sys_ioctl+0xe4/0x1c8 fs/ioctl.c:856 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x58/0x16c arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 Code: aa1303e0 9798449e 17ffff7a 9785e421 (d4210000) ---[ end trace 0000000000000000 ]---