loop0: detected capacity change from 0 to 32768 BUG at fs/jfs/jfs_dmap.c:738 assert(nblocks > 0) ------------[ cut here ]------------ kernel BUG at fs/jfs/jfs_dmap.c:738! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 6571 Comm: syz-executor.0 Not tainted 6.7.0-rc6-syzkaller-00090-gaafe7ad77b91 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : dbAlloc+0xafc/0xb68 fs/jfs/jfs_dmap.c:738 lr : dbAlloc+0xafc/0xb68 fs/jfs/jfs_dmap.c:738 sp : ffff800097046f40 x29: ffff800097047000 x28: ffff0000e07816b0 x27: dfff800000000000 x26: 0000000000000027 x25: ffff8000970470e0 x24: ffff0000c24bc000 x23: ffff700012e08df0 x22: ffff0000c5288c00 x21: 0000000000000000 x20: ffff800097046f80 x19: ffff0000c5288c10 x18: 1fffe0003682a5ce x17: ffff80008e4ed000 x16: ffff80008a82b138 x15: 0000000000000001 x14: 1ffff00012e08d40 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000001 x10: 0000000000ff0100 x9 : 25cde17c88a78a00 x8 : 25cde17c88a78a00 x7 : ffff80008028df50 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800082b78914 x2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000030 Call trace: dbAlloc+0xafc/0xb68 fs/jfs/jfs_dmap.c:738 ea_get+0x6f8/0xef0 fs/jfs/xattr.c:514 __jfs_getxattr+0xd4/0x484 fs/jfs/xattr.c:807 jfs_xattr_get+0x50/0x68 fs/jfs/xattr.c:931 __vfs_getxattr+0x394/0x3c0 fs/xattr.c:424 smk_fetch+0xc8/0x150 security/smack/smack_lsm.c:304 smack_d_instantiate+0x594/0x880 security/smack/smack_lsm.c:3573 security_d_instantiate+0x98/0xf0 security/security.c:3799 d_splice_alias+0x70/0x310 fs/dcache.c:3145 jfs_lookup+0x270/0x39c fs/jfs/namei.c:1474 lookup_open fs/namei.c:3455 [inline] open_last_lookups fs/namei.c:3546 [inline] path_openat+0xc90/0x2888 fs/namei.c:3776 do_filp_open+0x1bc/0x3cc fs/namei.c:3809 do_sys_openat2+0x124/0x1b8 fs/open.c:1437 do_sys_open fs/open.c:1452 [inline] __do_sys_openat fs/open.c:1468 [inline] __se_sys_openat fs/open.c:1463 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1463 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 Code: d00495c3 911e8063 52805c42 95931e95 (d4210000) ---[ end trace 0000000000000000 ]---