loop0: detected capacity change from 0 to 32768
BUG at fs/jfs/jfs_dmap.c:2999 assert(bitno < 32)
------------[ cut here ]------------
kernel BUG at fs/jfs/jfs_dmap.c:2999!
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 4997 Comm: syz-executor.0 Not tainted 6.2.0-rc7-syzkaller-00135-g2d3827b3f393 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : dbFindBits fs/jfs/jfs_dmap.c:2999 [inline]
pc : dbAllocNear+0x2c0/0x2c4 fs/jfs/jfs_dmap.c:1239
lr : dbFindBits fs/jfs/jfs_dmap.c:2999 [inline]
lr : dbAllocNear+0x2c0/0x2c4 fs/jfs/jfs_dmap.c:1239
sp : ffff800010fc3720
x29: ffff800010fc3720 x28: 0000000000000000 x27: 0000000000000000
x26: 0000000000000000 x25: 0000000000000020 x24: 0000000000000001
x23: 0000000000000020 x22: ffff0000ca190000 x21: ffff0000d192a800
x20: 0000000000000001 x19: ffff800010fc3800 x18: 00000000000c6f48
x17: ffff80000bfae9bc x16: ffff0000c62c8a98 x15: ffff80000dbd2118
x14: ffff0000c62c8000 x13: 00000000ffffffff x12: ffff0000c62c8000
x11: ff808000081bbb4c x10: 0000000000000000 x9 : 8a35e31ba2b5c400
x8 : 8a35e31ba2b5c400 x7 : ffff8000081634cc x6 : 0000000000000000
x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000
x2 : ffff0001fefbff08 x1 : 0000000100000000 x0 : 0000000000000030
Call trace:
 dbFindBits fs/jfs/jfs_dmap.c:2999 [inline]
 dbAllocNear+0x2c0/0x2c4 fs/jfs/jfs_dmap.c:1239
 dbAlloc+0x4e8/0x67c fs/jfs/jfs_dmap.c:828
 ea_get+0x360/0x554 fs/jfs/xattr.c:514
 __jfs_setxattr+0x29c/0xa00 fs/jfs/xattr.c:718
 __jfs_xattr_set+0x84/0x108 fs/jfs/xattr.c:917
 jfs_xattr_set+0x58/0x70 fs/jfs/xattr.c:941
 __vfs_setxattr+0x28c/0x298 fs/xattr.c:202
 __vfs_setxattr_noperm+0xcc/0x320 fs/xattr.c:236
 __vfs_setxattr_locked+0x168/0x190 fs/xattr.c:297
 vfs_setxattr+0xf4/0x1f4 fs/xattr.c:323
 do_setxattr fs/xattr.c:608 [inline]
 setxattr+0x24c/0x2cc fs/xattr.c:631
 path_setxattr+0xd0/0x17c fs/xattr.c:650
 __do_sys_setxattr fs/xattr.c:666 [inline]
 __se_sys_setxattr fs/xattr.c:662 [inline]
 __arm64_sys_setxattr+0x2c/0x40 fs/xattr.c:662
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall+0x64/0x178 arch/arm64/kernel/syscall.c:52
 el0_svc_common+0xbc/0x180 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x48/0x110 arch/arm64/kernel/syscall.c:193
 el0_svc+0x58/0x14c arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591
Code: b001f9a3 913b2863 528176e2 94c8f22b (d4210000) 
---[ end trace 0000000000000000 ]---