assertion failed: block_start != EXTENT_MAP_HOLE, in fs/btrfs/extent_io.c:1356 ------------[ cut here ]------------ kernel BUG at fs/btrfs/extent_io.c:1356! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 8069 Comm: syz-executor.5 Not tainted 6.7.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 RIP: 0010:__extent_writepage_io.constprop.0+0xbd4/0xf50 fs/btrfs/extent_io.c:1356 Code: e8 fd 90 0f 0b e8 0c 00 06 fe b9 4c 05 00 00 48 c7 c2 60 73 17 8b 48 c7 c6 c0 81 17 8b 48 c7 c7 00 74 17 8b e8 dd dc e8 fd 90 <0f> 0b e8 35 aa 5c fe e9 30 f9 ff ff e8 db ff 05 fe 49 8b 6f 08 31 RSP: 0018:ffffc900159877c8 EFLAGS: 00010282 RAX: 000000000000004e RBX: 0000000000000000 RCX: ffffc9000ff50000 RDX: 0000000000000000 RSI: ffffffff816ae702 RDI: 0000000000000005 RBP: ffff888015be99c0 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000080000000 R11: 0000000000000001 R12: 0000000000012000 R13: fffffffffffffffd R14: ffff88807ab3c000 R15: ffffea000208c380 FS: 00007f696df3b6c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31f3d000 CR3: 0000000026dab000 CR4: 0000000000350ef0 Call Trace: __extent_writepage fs/btrfs/extent_io.c:1446 [inline] extent_write_cache_pages+0x83f/0x1b80 fs/btrfs/extent_io.c:2108 extent_writepages+0x21b/0x4a0 fs/btrfs/extent_io.c:2230 do_writepages+0x1b4/0x690 mm/page-writeback.c:2553 filemap_fdatawrite_wbc mm/filemap.c:387 [inline] filemap_fdatawrite_wbc+0x144/0x1b0 mm/filemap.c:377 __filemap_fdatawrite_range+0xba/0x100 mm/filemap.c:420 btrfs_release_file+0x131/0x180 fs/btrfs/file.c:1726 __fput+0x270/0xb70 fs/file_table.c:394 task_work_run+0x14d/0x240 kernel/task_work.c:180 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop kernel/entry/common.c:171 [inline] exit_to_user_mode_prepare+0x217/0x240 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] syscall_exit_to_user_mode+0x1e/0x60 kernel/entry/common.c:296 do_syscall_64+0x4d/0x110 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7f696d27cba9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f696df3b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffe4 RBX: 00007f696d39c390 RCX: 00007f696d27cba9 RDX: 0000000000000000 RSI: 000000000014927e RDI: 0000000020000180 RBP: 00007f696d2c847a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007f696d39c390 R15: 00007ffe67c9f5e8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__extent_writepage_io.constprop.0+0xbd4/0xf50 fs/btrfs/extent_io.c:1356 Code: e8 fd 90 0f 0b e8 0c 00 06 fe b9 4c 05 00 00 48 c7 c2 60 73 17 8b 48 c7 c6 c0 81 17 8b 48 c7 c7 00 74 17 8b e8 dd dc e8 fd 90 <0f> 0b e8 35 aa 5c fe e9 30 f9 ff ff e8 db ff 05 fe 49 8b 6f 08 31 RSP: 0018:ffffc900159877c8 EFLAGS: 00010282 RAX: 000000000000004e RBX: 0000000000000000 RCX: ffffc9000ff50000 RDX: 0000000000000000 RSI: ffffffff816ae702 RDI: 0000000000000005 RBP: ffff888015be99c0 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000080000000 R11: 0000000000000001 R12: 0000000000012000 R13: fffffffffffffffd R14: ffff88807ab3c000 R15: ffffea000208c380 FS: 00007f696df3b6c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31f40000 CR3: 0000000026dab000 CR4: 0000000000350ef0