Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffec1c6cea8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f4210a957d9 RDX: 000000000000275a RSI: 0000000020000040 RDI: 00000000ffffff9c RBP: 00007ffec1c6cef0 R08: 0000000000000002 R09: aaaaaaaaaaaa0102 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 R13: 00007f4210b0877c R14: 0000000000000003 R15: 0000000000000001 ------------[ cut here ]------------ kernel BUG at fs/btrfs/extent-tree.c:3284! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 5083 Comm: syz-executor237 Not tainted 6.2.0-rc2-next-20230105-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:btrfs_free_tree_block+0x266/0x990 fs/btrfs/extent-tree.c:3284 Code: 00 48 8b 74 24 10 31 d2 4c 89 e7 e8 64 36 17 00 31 ff 89 c6 89 44 24 10 e8 67 c7 22 fe 8b 44 24 10 85 c0 74 26 e8 aa ca 22 fe <0f> 0b e8 a3 ca 22 fe 48 89 ee 48 c7 c7 fa ff ff ff c6 44 24 58 01 RSP: 0018:ffffc90003c6f178 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff888028161170 RCX: 0000000000000000 RDX: ffff888021549d40 RSI: ffffffff835ee4d6 RDI: 0000000000000005 RBP: 0000000000000005 R08: 0000000000000005 R09: 0000000000000000 R10: 00000000fffffff4 R11: 0000000000000000 R12: ffff888073524000 R13: 1ffff9200078de33 R14: 0000000000000001 R15: ffff888022ed4000 FS: 00005555555a13c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4208a8b000 CR3: 000000007c546000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __btrfs_cow_block+0x1033/0x1420 fs/btrfs/ctree.c:591 btrfs_cow_block+0x2fa/0x970 fs/btrfs/ctree.c:696 btrfs_search_slot+0x11c7/0x2c90 fs/btrfs/ctree.c:2141 btrfs_insert_empty_items+0xbd/0x1c0 fs/btrfs/ctree.c:4206 btrfs_create_new_inode+0x7be/0x26f0 fs/btrfs/inode.c:6482 btrfs_create_common+0x1d4/0x260 fs/btrfs/inode.c:6713 btrfs_create+0x116/0x160 fs/btrfs/inode.c:6753 lookup_open.isra.0+0xee7/0x1270 fs/namei.c:3413 open_last_lookups fs/namei.c:3481 [inline] path_openat+0x97a/0x2b40 fs/namei.c:3711 do_filp_open+0x1ba/0x410 fs/namei.c:3741 do_sys_openat2+0x16d/0x4c0 fs/open.c:1310 do_sys_open fs/open.c:1326 [inline] __do_sys_openat fs/open.c:1342 [inline] __se_sys_openat fs/open.c:1337 [inline] __x64_sys_openat+0x143/0x1f0 fs/open.c:1337 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f4210a957d9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffec1c6cea8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f4210a957d9 RDX: 000000000000275a RSI: 0000000020000040 RDI: 00000000ffffff9c RBP: 00007ffec1c6cef0 R08: 0000000000000002 R09: aaaaaaaaaaaa0102 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 R13: 00007f4210b0877c R14: 0000000000000003 R15: 0000000000000001 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:btrfs_free_tree_block+0x266/0x990 fs/btrfs/extent-tree.c:3284 Code: 00 48 8b 74 24 10 31 d2 4c 89 e7 e8 64 36 17 00 31 ff 89 c6 89 44 24 10 e8 67 c7 22 fe 8b 44 24 10 85 c0 74 26 e8 aa ca 22 fe <0f> 0b e8 a3 ca 22 fe 48 89 ee 48 c7 c7 fa ff ff ff c6 44 24 58 01 RSP: 0018:ffffc90003c6f178 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff888028161170 RCX: 0000000000000000 RDX: ffff888021549d40 RSI: ffffffff835ee4d6 RDI: 0000000000000005 RBP: 0000000000000005 R08: 0000000000000005 R09: 0000000000000000 R10: 00000000fffffff4 R11: 0000000000000000 R12: ffff888073524000 R13: 1ffff9200078de33 R14: 0000000000000001 R15: ffff888022ed4000 FS: 00005555555a13c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005625098b4098 CR3: 000000007c546000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 28 00 sub %al,(%rax) 2: 00 00 add %al,(%rax) 4: 75 05 jne 0xb 6: 48 83 c4 28 add $0x28,%rsp a: c3 retq b: e8 71 17 00 00 callq 0x1781 10: 90 nop 11: 48 89 f8 mov %rdi,%rax 14: 48 89 f7 mov %rsi,%rdi 17: 48 89 d6 mov %rdx,%rsi 1a: 48 89 ca mov %rcx,%rdx 1d: 4d 89 c2 mov %r8,%r10 20: 4d 89 c8 mov %r9,%r8 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 28: 0f 05 syscall * 2a: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction 30: 73 01 jae 0x33 32: c3 retq 33: 48 c7 c1 c0 ff ff ff mov $0xffffffffffffffc0,%rcx 3a: f7 d8 neg %eax 3c: 64 89 01 mov %eax,%fs:(%rcx) 3f: 48 rex.W