loop2: detected capacity change from 0 to 32768 BUG: unable to handle page fault for address: 000000000004b608 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 8000000170b5c067 P4D 8000000170b5c067 PUD 0 Oops: Oops: 0000 [#1] SMP PTI CPU: 0 UID: 0 PID: 3356 Comm: syz.2.17 Not tainted 6.16.0-rc6-syzkaller #0 PREEMPT(none) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:__bch2_err_trace+0x3/0x90 fs/bcachefs/bcachefs.h:1150 Code: da 02 0f 85 f0 fe ff ff 0f 1f 44 00 00 e9 e6 fe ff ff 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 53 89 f3 <48> 8b 87 08 b6 04 00 65 48 ff 80 f0 02 00 00 48 8d 0d 00 00 00 00 RSP: 0018:ffffc90003293b88 EFLAGS: 00010246 RAX: ffff888103f4fc20 RBX: 00000000fffff716 RCX: 0000000000000000 RDX: 0000000000000001 RSI: 00000000fffff716 RDI: 0000000000000000 RBP: ffff888103f4fc20 R08: 0000000000080000 R09: 0000000000000000 R10: 0000000000000000 R11: ffff888171149258 R12: 00000000fffff716 R13: ffffc90003293be8 R14: ffffc90003293d08 R15: ffffc90003293ba0 FS: 00007fa6942186c0(0000) GS:ffff8882b322b000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000004b608 CR3: 0000000179ba4000 CR4: 00000000003506f0 Call Trace: bch2_fs_open+0x44f/0x490 fs/bcachefs/super.c:2546 bch2_fs_get_tree+0x22c/0x760 fs/bcachefs/fs.c:2432 vfs_get_tree+0x29/0xb0 fs/super.c:1804 do_new_mount+0x13f/0x380 fs/namespace.c:3902 do_mount fs/namespace.c:4239 [inline] __do_sys_mount fs/namespace.c:4450 [inline] __se_sys_mount+0x147/0x1b0 fs/namespace.c:4427 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x8f/0x250 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fa69339030a Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa694217e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fa694217ef0 RCX: 00007fa69339030a RDX: 00002000000058c0 RSI: 0000200000000000 RDI: 00007fa694217eb0 RBP: 00002000000058c0 R08: 00007fa694217ef0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000200000000000 R13: 00007fa694217eb0 R14: 0000000000005921 R15: 0000200000000380 Modules linked in: CR2: 000000000004b608 ---[ end trace 0000000000000000 ]--- RIP: 0010:__bch2_err_trace+0x3/0x90 fs/bcachefs/bcachefs.h:1150 Code: da 02 0f 85 f0 fe ff ff 0f 1f 44 00 00 e9 e6 fe ff ff 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 53 89 f3 <48> 8b 87 08 b6 04 00 65 48 ff 80 f0 02 00 00 48 8d 0d 00 00 00 00 RSP: 0018:ffffc90003293b88 EFLAGS: 00010246 RAX: ffff888103f4fc20 RBX: 00000000fffff716 RCX: 0000000000000000 RDX: 0000000000000001 RSI: 00000000fffff716 RDI: 0000000000000000 RBP: ffff888103f4fc20 R08: 0000000000080000 R09: 0000000000000000 R10: 0000000000000000 R11: ffff888171149258 R12: 00000000fffff716 R13: ffffc90003293be8 R14: ffffc90003293d08 R15: ffffc90003293ba0 FS: 00007fa6942186c0(0000) GS:ffff8882b322b000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000004b608 CR3: 0000000179ba4000 CR4: 00000000003506f0 ---------------- Code disassembly (best guess): 0: da 02 fiaddl (%rdx) 2: 0f 85 f0 fe ff ff jne 0xfffffef8 8: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) d: e9 e6 fe ff ff jmp 0xfffffef8 12: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: 90 nop 23: 90 nop 24: 90 nop 25: 90 nop 26: 90 nop 27: 53 push %rbx 28: 89 f3 mov %esi,%ebx * 2a: 48 8b 87 08 b6 04 00 mov 0x4b608(%rdi),%rax <-- trapping instruction 31: 65 48 ff 80 f0 02 00 incq %gs:0x2f0(%rax) 38: 00 39: 48 8d 0d 00 00 00 00 lea 0x0(%rip),%rcx # 0x40