loop0: detected capacity change from 0 to 32768 BUG at fs/jfs/jfs_dmap.c:3000 assert(bitno < 32) ------------[ cut here ]------------ kernel BUG at fs/jfs/jfs_dmap.c:3000! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6424 Comm: syz-executor.0 Not tainted 6.4.0-rc7-syzkaller-00127-ge40939bbfc68 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3000 lr : dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3000 sp : ffff800096ca7210 x29: ffff800096ca7210 x28: dfff800000000000 x27: 0000000000000001 x26: ffff800096ca7480 x25: 0000000000000000 x24: 0000000000000000 x23: ffff80008e48a970 x22: 0000000000000020 x21: 0000000000000000 x20: 0000000000000001 x19: 0000000000000000 x18: 1fffe00036842bc6 x17: ffff80008deed000 x16: ffff80008a4483a0 x15: 0000000000000002 x14: 1ffff00011bde0ac x13: dfff800000000000 x12: 0000000000000001 x11: 0000000000000000 x10: 0000000000000000 x9 : a61e20ba1732ec00 x8 : a61e20ba1732ec00 x7 : ffff80008028cc04 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800082a98004 x2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000030 Call trace: dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3000 dbAllocNear+0x1d0/0x334 fs/jfs/jfs_dmap.c:1240 dbAlloc+0x8b4/0xb68 fs/jfs/jfs_dmap.c:829 ea_get+0x6f8/0xef0 fs/jfs/xattr.c:514 __jfs_setxattr+0x41c/0x1338 fs/jfs/xattr.c:718 __jfs_xattr_set+0xf8/0x190 fs/jfs/xattr.c:917 jfs_xattr_set+0x58/0x70 fs/jfs/xattr.c:941 __vfs_setxattr+0x3d8/0x400 fs/xattr.c:201 __vfs_setxattr_noperm+0x110/0x528 fs/xattr.c:235 __vfs_setxattr_locked+0x1ec/0x218 fs/xattr.c:296 vfs_setxattr+0x1a8/0x344 fs/xattr.c:322 do_setxattr fs/xattr.c:630 [inline] setxattr+0x208/0x29c fs/xattr.c:653 path_setxattr+0x17c/0x258 fs/xattr.c:672 __do_sys_setxattr fs/xattr.c:688 [inline] __se_sys_setxattr fs/xattr.c:684 [inline] __arm64_sys_setxattr+0xbc/0xd8 fs/xattr.c:684 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x244 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:191 el0_svc+0x4c/0x160 arch/arm64/kernel/entry-common.c:647 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:665 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 Code: b00479e3 91270063 52817702 9594f323 (d4210000) ---[ end trace 0000000000000000 ]---