loop0: detected capacity change from 0 to 32768 BUG at fs/jfs/jfs_dmap.c:3030 assert(bitno < 32) ------------[ cut here ]------------ kernel BUG at fs/jfs/jfs_dmap.c:3030! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 5226 Comm: syz.0.222 Not tainted 6.1.111-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3030 lr : dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3030 sp : ffff800022e96b90 x29: ffff800022e96b90 x28: 00000000ffffffff x27: 1ffff000045d2d7c x26: dfff800000000000 x25: 0000000000000000 x24: 0000000000000000 x23: ffff800015f71790 x22: 0000000000000020 x21: 0000000000000000 x20: 0000000000000001 x19: 0000000000000000 x18: ffff800022e960e0 x17: 0000000000000000 x16: ffff800012297edc x15: 0000000000000002 x14: 00000000ffffffff x13: 0000000000000001 x12: 0000000000040000 x11: 000000000000bfe8 x10: ffff8000218f9000 x9 : 2aac3b08da6c9d00 x8 : 2aac3b08da6c9d00 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff800022e96498 x4 : ffff800015ab2d80 x3 : ffff80000aaaa12c x2 : ffff0001b3d19cd0 x1 : 0000000100000000 x0 : 0000000000000030 Call trace: dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3030 dbAllocDmapLev+0x194/0x414 fs/jfs/jfs_dmap.c:1985 dbAllocCtl+0x104/0x844 fs/jfs/jfs_dmap.c:1825 dbAllocAG+0x208/0xe4c fs/jfs/jfs_dmap.c:1364 dbAlloc+0x520/0xb68 fs/jfs/jfs_dmap.c:888 dtSplitUp fs/jfs/jfs_dtree.c:981 [inline] dtInsert+0xb18/0x573c fs/jfs/jfs_dtree.c:870 jfs_create+0x698/0xa1c fs/jfs/namei.c:137 lookup_open fs/namei.c:3484 [inline] open_last_lookups fs/namei.c:3552 [inline] path_openat+0xeac/0x2548 fs/namei.c:3782 do_filp_open+0x1bc/0x3cc fs/namei.c:3812 do_sys_openat2+0x128/0x3e0 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_openat fs/open.c:1350 [inline] __se_sys_openat fs/open.c:1345 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1345 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Code: b0046d23 91180063 52817ac2 9595f0a4 (d4210000) ---[ end trace 0000000000000000 ]---