el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 ------------[ cut here ]------------ kernel BUG at fs/btrfs/extent-io-tree.c:397! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 16639 Comm: syz-executor.1 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : set_state_bits fs/btrfs/extent-io-tree.c:397 [inline] pc : __set_extent_bit+0x15f8/0x1968 fs/btrfs/extent-io-tree.c:1104 lr : set_state_bits fs/btrfs/extent-io-tree.c:397 [inline] lr : __set_extent_bit+0x15f8/0x1968 fs/btrfs/extent-io-tree.c:1104 sp : ffff80009a856d90 x29: ffff80009a856e40 x28: ffff0000c94df07c x27: ffff0000c94df000 x26: ffff00012b104b00 x25: 1fffe0001929be0f x24: 1fffe0001929be00 x23: 0000000000000800 x22: 0000000000000000 x21: 0000000000000000 x20: 00000000fffffff4 x19: 0000000000000000 x18: ffff80009a8561e0 x17: 0000000000000000 x16: ffff80008a82b29c x15: 0000000000000001 x14: 1ffff00011cf5e02 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000040000 x10: 0000000000017d4a x9 : ffff8000a34ec000 x8 : 0000000000017d4b x7 : 0000000000000001 x6 : 0000000000000001 x5 : 00000000ffffffff x4 : 0000000000000820 x3 : 0000000000000820 x2 : 0000000000000038 x1 : 00000000fffffff4 x0 : 0000000000000000 Call trace: set_state_bits fs/btrfs/extent-io-tree.c:397 [inline] __set_extent_bit+0x15f8/0x1968 fs/btrfs/extent-io-tree.c:1104 set_record_extent_bits+0x68/0xa8 fs/btrfs/extent-io-tree.c:1793 qgroup_reserve_data+0x214/0x874 fs/btrfs/qgroup.c:4005 btrfs_qgroup_reserve_data+0x40/0xd8 fs/btrfs/qgroup.c:4048 btrfs_check_data_free_space+0x130/0x20c fs/btrfs/delalloc-space.c:154 btrfs_buffered_write+0x4bc/0xffc fs/btrfs/file.c:1255 btrfs_direct_write fs/btrfs/file.c:1607 [inline] btrfs_do_write_iter+0xa7c/0xd40 fs/btrfs/file.c:1684 btrfs_file_write_iter+0x2c/0x3c fs/btrfs/file.c:1704 do_iter_write+0x654/0xa78 fs/read_write.c:860 vfs_iter_write+0x88/0xac fs/read_write.c:901 iter_file_splice_write+0x628/0xc58 fs/splice.c:736 do_splice_from fs/splice.c:933 [inline] direct_splice_actor+0xe4/0x1c0 fs/splice.c:1142 splice_direct_to_actor+0x2a0/0x7e4 fs/splice.c:1088 do_splice_direct+0x20c/0x348 fs/splice.c:1194 generic_copy_file_range fs/read_write.c:1392 [inline] vfs_copy_file_range+0xa04/0x1228 fs/read_write.c:1538 __do_sys_copy_file_range fs/read_write.c:1595 [inline] __se_sys_copy_file_range fs/read_write.c:1558 [inline] __arm64_sys_copy_file_range+0x578/0x914 fs/read_write.c:1558 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 Code: aa1803e0 97974461 17ffff7a 97843702 (d4210000) ---[ end trace 0000000000000000 ]---