assertion failed: block_start != EXTENT_MAP_HOLE, in fs/btrfs/extent_io.c:1356
------------[ cut here ]------------
kernel BUG at fs/btrfs/extent_io.c:1356!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 8069 Comm: syz-executor.5 Not tainted 6.7.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
RIP: 0010:__extent_writepage_io.constprop.0+0xbd4/0xf50 fs/btrfs/extent_io.c:1356
Code: e8 fd 90 0f 0b e8 0c 00 06 fe b9 4c 05 00 00 48 c7 c2 60 73 17 8b 48 c7 c6 c0 81 17 8b 48 c7 c7 00 74 17 8b e8 dd dc e8 fd 90 <0f> 0b e8 35 aa 5c fe e9 30 f9 ff ff e8 db ff 05 fe 49 8b 6f 08 31
RSP: 0018:ffffc900159877c8 EFLAGS: 00010282
RAX: 000000000000004e RBX: 0000000000000000 RCX: ffffc9000ff50000
RDX: 0000000000000000 RSI: ffffffff816ae702 RDI: 0000000000000005
RBP: ffff888015be99c0 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000080000000 R11: 0000000000000001 R12: 0000000000012000
R13: fffffffffffffffd R14: ffff88807ab3c000 R15: ffffea000208c380
FS:  00007f696df3b6c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31f3d000 CR3: 0000000026dab000 CR4: 0000000000350ef0
Call Trace:
 <TASK>
 __extent_writepage fs/btrfs/extent_io.c:1446 [inline]
 extent_write_cache_pages+0x83f/0x1b80 fs/btrfs/extent_io.c:2108
 extent_writepages+0x21b/0x4a0 fs/btrfs/extent_io.c:2230
 do_writepages+0x1b4/0x690 mm/page-writeback.c:2553
 filemap_fdatawrite_wbc mm/filemap.c:387 [inline]
 filemap_fdatawrite_wbc+0x144/0x1b0 mm/filemap.c:377
 __filemap_fdatawrite_range+0xba/0x100 mm/filemap.c:420
 btrfs_release_file+0x131/0x180 fs/btrfs/file.c:1726
 __fput+0x270/0xb70 fs/file_table.c:394
 task_work_run+0x14d/0x240 kernel/task_work.c:180
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:171 [inline]
 exit_to_user_mode_prepare+0x217/0x240 kernel/entry/common.c:204
 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
 syscall_exit_to_user_mode+0x1e/0x60 kernel/entry/common.c:296
 do_syscall_64+0x4d/0x110 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
RIP: 0033:0x7f696d27cba9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f696df3b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffe4 RBX: 00007f696d39c390 RCX: 00007f696d27cba9
RDX: 0000000000000000 RSI: 000000000014927e RDI: 0000000020000180
RBP: 00007f696d2c847a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007f696d39c390 R15: 00007ffe67c9f5e8
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__extent_writepage_io.constprop.0+0xbd4/0xf50 fs/btrfs/extent_io.c:1356
Code: e8 fd 90 0f 0b e8 0c 00 06 fe b9 4c 05 00 00 48 c7 c2 60 73 17 8b 48 c7 c6 c0 81 17 8b 48 c7 c7 00 74 17 8b e8 dd dc e8 fd 90 <0f> 0b e8 35 aa 5c fe e9 30 f9 ff ff e8 db ff 05 fe 49 8b 6f 08 31
RSP: 0018:ffffc900159877c8 EFLAGS: 00010282
RAX: 000000000000004e RBX: 0000000000000000 RCX: ffffc9000ff50000
RDX: 0000000000000000 RSI: ffffffff816ae702 RDI: 0000000000000005
RBP: ffff888015be99c0 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000080000000 R11: 0000000000000001 R12: 0000000000012000
R13: fffffffffffffffd R14: ffff88807ab3c000 R15: ffffea000208c380
FS:  00007f696df3b6c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31f40000 CR3: 0000000026dab000 CR4: 0000000000350ef0