__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x104 arch/arm64/kernel/syscall.c:193 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 ------------[ cut here ]------------ kernel BUG at fs/btrfs/extent-io-tree.c:379! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 10466 Comm: syz-executor.0 Not tainted 6.2.0-rc6-syzkaller-17549-gca72d58361ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] pc : __set_extent_bit+0x10c0/0x1174 fs/btrfs/extent-io-tree.c:1042 lr : set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] lr : __set_extent_bit+0x10c0/0x1174 fs/btrfs/extent-io-tree.c:1042 sp : ffff800018abb7f0 x29: ffff800018abb870 x28: ffff00011fd3e598 x27: ffff00011bbc3e00 x26: 0000000000000800 x25: 0000000000000000 x24: 0000000000007fff x23: 0000000000000fff x22: ffff00011fd3e578 x21: 00000000fffffff4 x20: ffff00011fd3e578 x19: ffff00011bc7ad80 x18: 00000000000000c0 x17: 376434302d313935 x16: ffff80000ddcb118 x15: ffff00011cf81a00 x14: 0000000000000000 x13: 00000000ffffffff x12: 0000000000040000 x11: 000000000003ffff x10: ffff800013155000 x9 : ffff80000925d934 x8 : 0000000000040000 x7 : ffff80000c138a2c x6 : 0000000000000000 x5 : 00000000ffffffff x4 : 0000000000000a20 x3 : 0000000000000080 x2 : 0000000000000038 x1 : 00000000fffffff4 x0 : 0000000000000000 Call trace: set_state_bits fs/btrfs/extent-io-tree.c:379 [inline] __set_extent_bit+0x10c0/0x1174 fs/btrfs/extent-io-tree.c:1042 set_record_extent_bits+0x74/0xb0 fs/btrfs/extent-io-tree.c:1690 qgroup_reserve_data+0x134/0x374 fs/btrfs/qgroup.c:3777 btrfs_qgroup_reserve_data+0x40/0xd0 fs/btrfs/qgroup.c:3820 btrfs_check_data_free_space+0xbc/0x138 fs/btrfs/delalloc-space.c:154 btrfs_buffered_write+0x240/0xe38 fs/btrfs/file.c:1253 btrfs_do_write_iter+0x12c/0x888 fs/btrfs/file.c:1677 btrfs_file_write_iter+0x2c/0x3c fs/btrfs/file.c:1698 do_iter_write+0x318/0x560 fs/read_write.c:861 vfs_writev fs/read_write.c:934 [inline] do_pwritev+0x130/0x1e8 fs/read_write.c:1031 __do_sys_pwritev2 fs/read_write.c:1090 [inline] __se_sys_pwritev2 fs/read_write.c:1081 [inline] __arm64_sys_pwritev2+0x5c/0x90 fs/read_write.c:1081 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x104 arch/arm64/kernel/syscall.c:193 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 Code: d4210000 97c13fb3 d4210000 97c13fb1 (d4210000) ---[ end trace 0000000000000000 ]---