loop0: detected capacity change from 0 to 32768 BUG at fs/jfs/jfs_dmap.c:2999 assert(bitno < 32) ------------[ cut here ]------------ kernel BUG at fs/jfs/jfs_dmap.c:2999! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 4997 Comm: syz-executor.0 Not tainted 6.2.0-rc7-syzkaller-00135-g2d3827b3f393 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : dbFindBits fs/jfs/jfs_dmap.c:2999 [inline] pc : dbAllocNear+0x2c0/0x2c4 fs/jfs/jfs_dmap.c:1239 lr : dbFindBits fs/jfs/jfs_dmap.c:2999 [inline] lr : dbAllocNear+0x2c0/0x2c4 fs/jfs/jfs_dmap.c:1239 sp : ffff800010fc3720 x29: ffff800010fc3720 x28: 0000000000000000 x27: 0000000000000000 x26: 0000000000000000 x25: 0000000000000020 x24: 0000000000000001 x23: 0000000000000020 x22: ffff0000ca190000 x21: ffff0000d192a800 x20: 0000000000000001 x19: ffff800010fc3800 x18: 00000000000c6f48 x17: ffff80000bfae9bc x16: ffff0000c62c8a98 x15: ffff80000dbd2118 x14: ffff0000c62c8000 x13: 00000000ffffffff x12: ffff0000c62c8000 x11: ff808000081bbb4c x10: 0000000000000000 x9 : 8a35e31ba2b5c400 x8 : 8a35e31ba2b5c400 x7 : ffff8000081634cc x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 x2 : ffff0001fefbff08 x1 : 0000000100000000 x0 : 0000000000000030 Call trace: dbFindBits fs/jfs/jfs_dmap.c:2999 [inline] dbAllocNear+0x2c0/0x2c4 fs/jfs/jfs_dmap.c:1239 dbAlloc+0x4e8/0x67c fs/jfs/jfs_dmap.c:828 ea_get+0x360/0x554 fs/jfs/xattr.c:514 __jfs_setxattr+0x29c/0xa00 fs/jfs/xattr.c:718 __jfs_xattr_set+0x84/0x108 fs/jfs/xattr.c:917 jfs_xattr_set+0x58/0x70 fs/jfs/xattr.c:941 __vfs_setxattr+0x28c/0x298 fs/xattr.c:202 __vfs_setxattr_noperm+0xcc/0x320 fs/xattr.c:236 __vfs_setxattr_locked+0x168/0x190 fs/xattr.c:297 vfs_setxattr+0xf4/0x1f4 fs/xattr.c:323 do_setxattr fs/xattr.c:608 [inline] setxattr+0x24c/0x2cc fs/xattr.c:631 path_setxattr+0xd0/0x17c fs/xattr.c:650 __do_sys_setxattr fs/xattr.c:666 [inline] __se_sys_setxattr fs/xattr.c:662 [inline] __arm64_sys_setxattr+0x2c/0x40 fs/xattr.c:662 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x64/0x178 arch/arm64/kernel/syscall.c:52 el0_svc_common+0xbc/0x180 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x110 arch/arm64/kernel/syscall.c:193 el0_svc+0x58/0x14c arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 Code: b001f9a3 913b2863 528176e2 94c8f22b (d4210000) ---[ end trace 0000000000000000 ]---