done bcachefs (loop5): alloc_read... done bcachefs (loop5): snapshots_read... done bcachefs (loop5): done starting filesystem ------------[ cut here ]------------ WARNING: CPU: 1 PID: 7816 at block/bio.c:513 bio_alloc_bioset+0xb98/0xf9c block/bio.c:-1 Modules linked in: CPU: 1 UID: 0 PID: 7816 Comm: syz.5.362 Not tainted 6.16.0-rc1-syzkaller-g39dfc971e42d #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : bio_alloc_bioset+0xb98/0xf9c block/bio.c:-1 lr : bio_alloc_bioset+0xb94/0xf9c block/bio.c:513 sp : ffff80009ffa70a0 x29: ffff80009ffa70c0 x28: dfff800000000000 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000001 x23: 0000000000000cc0 x22: 0000000000000000 x21: 0000000000000000 x20: 0000000000000100 x19: ffff0000ee8c8948 x18: 00000000ffffffff x17: ffff80009331f000 x16: ffff800080520d04 x15: 0000000000000001 x14: 1fffffbff87a59d0 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000080000 x10: 000000000000a71a x9 : ffff8000a1c69000 x8 : 000000000000a71b x7 : ffff800080cb67f4 x6 : 0000000000000000 x5 : 0000000000000001 x4 : ffff0000ee8c8948 x3 : 0000000000000cc0 x2 : 0000000000000001 x1 : 0000000000000100 x0 : 0000000000000000 Call trace: bio_alloc_bioset+0xb98/0xf9c block/bio.c:-1 (P) bch2_writepage_io_alloc fs/bcachefs/fs-io-buffered.c:502 [inline] __bch2_writepage+0xdc8/0x1b3c fs/bcachefs/fs-io-buffered.c:636 write_cache_pages+0x6c/0x108 mm/page-writeback.c:2614 bch2_writepages+0xfc/0x294 fs/bcachefs/fs-io-buffered.c:666 do_writepages+0x270/0x468 mm/page-writeback.c:2636 filemap_fdatawrite_wbc mm/filemap.c:386 [inline] __filemap_fdatawrite_range mm/filemap.c:419 [inline] filemap_write_and_wait_range+0x1ac/0x29c mm/filemap.c:691 bchfs_truncate+0x55c/0xa40 fs/bcachefs/fs-io.c:-1 bch2_setattr+0x198/0x20c fs/bcachefs/fs.c:1243 notify_change+0x9a4/0xc50 fs/attr.c:552 do_truncate+0x198/0x210 fs/open.c:68 vfs_truncate+0x398/0x444 fs/open.c:118 do_sys_truncate+0xe4/0x1a8 fs/open.c:141 __do_sys_truncate fs/open.c:153 [inline] __se_sys_truncate fs/open.c:151 [inline] __arm64_sys_truncate+0x5c/0x74 fs/open.c:151 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 irq event stamp: 63166 hardirqs last enabled at (63165): [] lruvec_stat_mod_folio include/linux/vmstat.h:546 [inline] hardirqs last enabled at (63165): [] __folio_start_writeback+0x664/0x980 mm/page-writeback.c:3098 hardirqs last disabled at (63166): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:511 softirqs last enabled at (62952): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (62950): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 ---[ end trace 0000000000000000 ]--- Unable to handle kernel paging request at virtual address fffffffffffffc98 KASAN: maybe wild-memory-access in range [0x0003ffffffffe4c0-0x0003ffffffffe4c7] Mem abort info: ESR = 0x0000000096000046 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000 CM = 0, WnR = 1, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 swapper pgtable: 4k pages, 48-bit VAs, pgdp=000000020730e000 [fffffffffffffc98] pgd=0000000000000000, p4d=000000020b076403, pud=000000020b077403, pmd=0000000000000000 Internal error: Oops: 0000000096000046 [#1] SMP Modules linked in: CPU: 1 UID: 0 PID: 7816 Comm: syz.5.362 Tainted: G W 6.16.0-rc1-syzkaller-g39dfc971e42d #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : bch2_writepage_io_alloc fs/bcachefs/fs-io-buffered.c:508 [inline] pc : __bch2_writepage+0xe0c/0x1b3c fs/bcachefs/fs-io-buffered.c:636 lr : bch2_writepage_io_alloc fs/bcachefs/fs-io-buffered.c:502 [inline] lr : __bch2_writepage+0xdc8/0x1b3c fs/bcachefs/fs-io-buffered.c:636 sp : ffff80009ffa7120 x29: ffff80009ffa72a0 x28: 0000000000000008 x27: 1fffe00019968080 x26: 0000000000000000 x25: ffff0000ccb40400 x24: ffff0000d0a3ac40 x23: 0000000000000008 x22: ffff0000ccb4041a x21: ffff0000ccb40408 x20: dfff800000000000 x19: fffffffffffffc98 x18: 00000000ffffffff x17: ffff80009331f000 x16: ffff800080520d04 x15: 0000000000000001 x14: 1fffffbff87a59d0 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000080000 x10: 000000000000a71a x9 : ffff0000f5c98798 x8 : 1fffe00019968081 x7 : ffff800080cb67f4 x6 : 0000000000000000 x5 : 0000000000000001 x4 : ffff0000ee8c8948 x3 : 0000000000000cc0 x2 : 0000000000000001 x1 : 0000000000000100 x0 : 0000000000000000 Call trace: bch2_writepage_io_alloc fs/bcachefs/fs-io-buffered.c:510 [inline] (P) __bch2_writepage+0xe0c/0x1b3c fs/bcachefs/fs-io-buffered.c:636 (P) write_cache_pages+0x6c/0x108 mm/page-writeback.c:2614 bch2_writepages+0xfc/0x294 fs/bcachefs/fs-io-buffered.c:666 do_writepages+0x270/0x468 mm/page-writeback.c:2636 filemap_fdatawrite_wbc mm/filemap.c:386 [inline] __filemap_fdatawrite_range mm/filemap.c:419 [inline] filemap_write_and_wait_range+0x1ac/0x29c mm/filemap.c:691 bchfs_truncate+0x55c/0xa40 fs/bcachefs/fs-io.c:-1 bch2_setattr+0x198/0x20c fs/bcachefs/fs.c:1243 notify_change+0x9a4/0xc50 fs/attr.c:552 do_truncate+0x198/0x210 fs/open.c:68 vfs_truncate+0x398/0x444 fs/open.c:118 do_sys_truncate+0xe4/0x1a8 fs/open.c:141 __do_sys_truncate fs/open.c:153 [inline] __se_sys_truncate fs/open.c:151 [inline] __arm64_sys_truncate+0x5c/0x74 fs/open.c:151 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Code: aa1303e0 978ba352 f85c83a9 d343fea8 (f9000269) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: aa1303e0 mov x0, x19 4: 978ba352 bl 0xfffffffffe2e8d4c 8: f85c83a9 ldur x9, [x29, #-56] c: d343fea8 lsr x8, x21, #3 * 10: f9000269 str x9, [x19] <-- trapping instruction