loop0: detected capacity change from 0 to 16384
Oops: general protection fault, probably for non-canonical address 0xdffffc00000000d2: 0000 [#1] SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000690-0x0000000000000697]
CPU: 0 UID: 0 PID: 6001 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
RIP: 0010:bch2_disk_path_to_text+0x105/0x2b0 fs/bcachefs/disk_groups.c:407
Code: 8b be 4b 03 00 00 48 c7 c2 00 58 d4 8b e8 b3 8f 64 fd 49 81 c4 90 06 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 e7 e8 8d 23 ea fd 4d 8b 24 24 e8 34 d6 40
RSP: 0018:ffffc90002bbec40 EFLAGS: 00010206
RAX: 00000000000000d2 RBX: ffffffff8438f7df RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff8be33860 RDI: ffffffff8be33820
RBP: ffffc90002bbf59c R08: 0000000000000000 R09: ffffffff8438f7df
R10: dffffc0000000000 R11: ffffed1020d95dea R12: 0000000000000690
R13: 0000000000000001 R14: 1ffff92000577eb3 R15: ffffc90002bbf580
FS:  00007f94a7bd86c0(0000) GS:ffff8880b8618000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f94a6d733e0 CR3: 0000000029fc2000 CR4: 00000000000006f0
Call Trace:
 <TASK>
 bch2_stripe_to_text+0x224/0xca0 fs/bcachefs/ec.c:166
 journal_entry_btree_keys_to_text+0x361/0x710 fs/bcachefs/journal_io.c:446
 bch2_sb_clean_to_text+0x14c/0x250 fs/bcachefs/sb-clean.c:256
 bch2_sb_field_validate+0x1c6/0x280 fs/bcachefs/super-io.c:1380
 bch2_sb_validate+0x1569/0x1980 fs/bcachefs/super-io.c:560
 __bch2_read_super+0xba4/0x1040 fs/bcachefs/super-io.c:925
 bch2_fs_open+0x1fe/0x2600 fs/bcachefs/super.c:2401
 bch2_fs_get_tree+0x44f/0x1520 fs/bcachefs/fs.c:2472
 vfs_get_tree+0x92/0x2b0 fs/super.c:1815
 do_new_mount+0x2a2/0x9e0 fs/namespace.c:3808
 do_mount fs/namespace.c:4136 [inline]
 __do_sys_mount fs/namespace.c:4347 [inline]
 __se_sys_mount+0x317/0x410 fs/namespace.c:4324
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f94a6d9038a
Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f94a7bd7e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f94a7bd7ef0 RCX: 00007f94a6d9038a
RDX: 0000200000024c80 RSI: 0000200000000000 RDI: 00007f94a7bd7eb0
RBP: 0000200000024c80 R08: 00007f94a7bd7ef0 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000200000000000
R13: 00007f94a7bd7eb0 R14: 0000000000024c65 R15: 0000200000000180
 </TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:bch2_disk_path_to_text+0x105/0x2b0 fs/bcachefs/disk_groups.c:407
Code: 8b be 4b 03 00 00 48 c7 c2 00 58 d4 8b e8 b3 8f 64 fd 49 81 c4 90 06 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 e7 e8 8d 23 ea fd 4d 8b 24 24 e8 34 d6 40
RSP: 0018:ffffc90002bbec40 EFLAGS: 00010206
RAX: 00000000000000d2 RBX: ffffffff8438f7df RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff8be33860 RDI: ffffffff8be33820
RBP: ffffc90002bbf59c R08: 0000000000000000 R09: ffffffff8438f7df
R10: dffffc0000000000 R11: ffffed1020d95dea R12: 0000000000000690
R13: 0000000000000001 R14: 1ffff92000577eb3 R15: ffffc90002bbf580
FS:  00007f94a7bd86c0(0000) GS:ffff8880b8618000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055d20b3890b8 CR3: 0000000029fc2000 CR4: 00000000000006f0
----------------
Code disassembly (best guess):
   0:	8b be 4b 03 00 00    	mov    0x34b(%rsi),%edi
   6:	48 c7 c2 00 58 d4 8b 	mov    $0xffffffff8bd45800,%rdx
   d:	e8 b3 8f 64 fd       	call   0xfd648fc5
  12:	49 81 c4 90 06 00 00 	add    $0x690,%r12
  19:	4c 89 e0             	mov    %r12,%rax
  1c:	48 c1 e8 03          	shr    $0x3,%rax
  20:	48 b9 00 00 00 00 00 	movabs $0xdffffc0000000000,%rcx
  27:	fc ff df
* 2a:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1) <-- trapping instruction
  2e:	74 08                	je     0x38
  30:	4c 89 e7             	mov    %r12,%rdi
  33:	e8 8d 23 ea fd       	call   0xfdea23c5
  38:	4d 8b 24 24          	mov    (%r12),%r12
  3c:	e8                   	.byte 0xe8
  3d:	34 d6                	xor    $0xd6,%al
  3f:	40                   	rex
