loop0: detected capacity change from 0 to 32768 BUG at fs/jfs/jfs_dmap.c:3010 assert(bitno < 32) ------------[ cut here ]------------ kernel BUG at fs/jfs/jfs_dmap.c:3010! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 6459 Comm: syz-executor.0 Not tainted 6.6.0-rc3-syzkaller-00018-g2e530aeb342b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3010 lr : dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3010 sp : ffff800096e07210 x29: ffff800096e07210 x28: dfff800000000000 x27: 0000000000000001 x26: ffff800096e07480 x25: 0000000000000000 x24: 0000000000000000 x23: ffff80008e74b7f0 x22: 0000000000000020 x21: 0000000000000000 x20: 0000000000000001 x19: 0000000000000000 x18: ffff800096e06860 x17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001 x14: 1ffff00012dc0d98 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000000 x10: 0000000000000000 x9 : 237c0f8d29c01100 x8 : 237c0f8d29c01100 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff800096e06b18 x4 : ffff80008e281040 x3 : ffff800082b1cfe4 x2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000030 Call trace: dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3010 dbAllocNear+0x1d0/0x334 fs/jfs/jfs_dmap.c:1247 dbAlloc+0x8b4/0xb68 fs/jfs/jfs_dmap.c:836 ea_get+0x6f8/0xef0 fs/jfs/xattr.c:514 __jfs_setxattr+0x41c/0x12f8 fs/jfs/xattr.c:718 __jfs_xattr_set+0xf8/0x190 fs/jfs/xattr.c:917 jfs_xattr_set+0x58/0x70 fs/jfs/xattr.c:941 __vfs_setxattr+0x3d8/0x400 fs/xattr.c:201 __vfs_setxattr_noperm+0x110/0x528 fs/xattr.c:235 __vfs_setxattr_locked+0x1ec/0x218 fs/xattr.c:296 vfs_setxattr+0x1a8/0x344 fs/xattr.c:322 do_setxattr fs/xattr.c:630 [inline] setxattr+0x208/0x29c fs/xattr.c:653 path_setxattr+0x17c/0x258 fs/xattr.c:672 __do_sys_setxattr fs/xattr.c:688 [inline] __se_sys_setxattr fs/xattr.c:684 [inline] __arm64_sys_setxattr+0xbc/0xd8 fs/xattr.c:684 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x58/0x16c arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 Code: f0048643 910b0063 52817842 9593cbb3 (d4210000) ---[ end trace 0000000000000000 ]---