R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006
R13: 00007ffc0165a4c0 R14: 00007ffc0165a4a0 R15: 0000000000000008
 </TASK>
------------[ cut here ]------------
kernel BUG at fs/btrfs/extent-io-tree.c:379!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 5156 Comm: syz-executor422 Not tainted 6.4.0-rc1-next-20230512-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
RIP: 0010:set_state_bits.isra.0+0x17b/0x1c0 fs/btrfs/extent-io-tree.c:379
Code: 38 d0 7c 04 84 d2 75 31 44 8b 73 7c e8 fe aa f7 fd 44 89 e0 44 09 f0 89 43 7c 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 e5 aa f7 fd <0f> 0b 4c 89 ef e8 3b a7 4a fe e9 e6 fe ff ff 4c 89 ef e8 2e a7 4a
RSP: 0018:ffffc9000418f7c8 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff888022a45d80 RCX: 0000000000000000
RDX: ffff88807a5f5940 RSI: ffffffff838c6b4b RDI: 0000000000000005
RBP: 00000000fffffff4 R08: 0000000000000005 R09: 0000000000000000
R10: 00000000fffffff4 R11: 0000000000000001 R12: 0000000000000800
R13: ffff888022a45dfc R14: 000000000000ffff R15: 0000000000000000
FS:  0000555556430300(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffcccf3cdf8 CR3: 0000000076c37000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 __set_extent_bit+0xb81/0x15f0 fs/btrfs/extent-io-tree.c:1042
 set_record_extent_bits+0x5c/0x90 fs/btrfs/extent-io-tree.c:1690
 qgroup_reserve_data+0x233/0xa80 fs/btrfs/qgroup.c:3786
 btrfs_qgroup_reserve_data+0x2f/0xd0 fs/btrfs/qgroup.c:3829
 btrfs_zero_range fs/btrfs/file.c:2988 [inline]
 btrfs_fallocate+0x1441/0x27f0 fs/btrfs/file.c:3105
 vfs_fallocate+0x48b/0xe40 fs/open.c:324
 ioctl_preallocate+0x18e/0x200 fs/ioctl.c:290
 file_ioctl fs/ioctl.c:335 [inline]
 do_vfs_ioctl+0x129a/0x1670 fs/ioctl.c:849
 __do_sys_ioctl fs/ioctl.c:868 [inline]
 __se_sys_ioctl fs/ioctl.c:856 [inline]
 __x64_sys_ioctl+0x10c/0x210 fs/ioctl.c:856
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f42e570fb49
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc0165a458 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f42e570fb49
RDX: 0000000020000000 RSI: 0000000040305839 RDI: 0000000000000005
RBP: 00007ffc0165a480 R08: 0000000000000002 R09: 00007ffc0165a490
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006
R13: 00007ffc0165a4c0 R14: 00007ffc0165a4a0 R15: 0000000000000008
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:set_state_bits.isra.0+0x17b/0x1c0 fs/btrfs/extent-io-tree.c:379
Code: 38 d0 7c 04 84 d2 75 31 44 8b 73 7c e8 fe aa f7 fd 44 89 e0 44 09 f0 89 43 7c 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 e5 aa f7 fd <0f> 0b 4c 89 ef e8 3b a7 4a fe e9 e6 fe ff ff 4c 89 ef e8 2e a7 4a
RSP: 0018:ffffc9000418f7c8 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff888022a45d80 RCX: 0000000000000000
RDX: ffff88807a5f5940 RSI: ffffffff838c6b4b RDI: 0000000000000005
RBP: 00000000fffffff4 R08: 0000000000000005 R09: 0000000000000000
R10: 00000000fffffff4 R11: 0000000000000001 R12: 0000000000000800
R13: ffff888022a45dfc R14: 000000000000ffff R15: 0000000000000000
FS:  0000555556430300(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffcccf3cdf8 CR3: 0000000076c37000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400