loop0: detected capacity change from 0 to 32768 BUG at fs/jfs/jfs_dmap.c:738 assert(nblocks > 0) ------------[ cut here ]------------ kernel BUG at fs/jfs/jfs_dmap.c:738! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 5475 Comm: syz-executor.0 Not tainted 6.7.0-rc2-syzkaller-g98b1cc82c4af #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 RIP: 0010:dbAlloc+0xc8c/0xca0 fs/jfs/jfs_dmap.c:738 Code: 02 08 90 0f 0b e8 24 06 7d fe 48 c7 c7 e0 46 a2 8b 48 c7 c6 20 44 a2 8b ba e2 02 00 00 48 c7 c1 20 47 a2 8b e8 85 3d 02 08 90 <0f> 0b e8 cd 32 05 08 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 55 41 RSP: 0018:ffffc9000593f1e0 EFLAGS: 00010246 RAX: 0000000000000030 RBX: ffff88801f29e210 RCX: 4164bbaee2a24100 RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 RBP: ffffc9000593f2f0 R08: ffffffff817136dc R09: 1ffff92000b27ddc R10: dffffc0000000000 R11: fffff52000b27ddd R12: 0000000000000027 R13: 0000000000000000 R14: 0000000000000000 R15: 1ffff92000b27e48 FS: 00007fe2e92a36c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002000c380 CR3: 000000002443a000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ea_get+0x9b9/0x1280 fs/jfs/xattr.c:514 __jfs_getxattr+0xd5/0x380 fs/jfs/xattr.c:807 __vfs_getxattr+0x436/0x470 fs/xattr.c:424 smk_fetch+0xb1/0x140 security/smack/smack_lsm.c:304 smack_d_instantiate+0x74a/0xa50 security/smack/smack_lsm.c:3573 security_d_instantiate+0x9b/0xf0 security/security.c:3799 d_splice_alias+0x6f/0x330 fs/dcache.c:3145 jfs_lookup+0x2c0/0x410 fs/jfs/namei.c:1474 lookup_open fs/namei.c:3455 [inline] open_last_lookups fs/namei.c:3546 [inline] path_openat+0x1010/0x3290 fs/namei.c:3776 do_filp_open+0x234/0x490 fs/namei.c:3809 do_sys_openat2+0x13e/0x1d0 fs/open.c:1440 do_sys_open fs/open.c:1455 [inline] __do_sys_openat fs/open.c:1471 [inline] __se_sys_openat fs/open.c:1466 [inline] __x64_sys_openat+0x247/0x290 fs/open.c:1466 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x45/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7fe2e807ad39 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe2e92a30c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007fe2e819bf80 RCX: 00007fe2e807ad39 RDX: 0000000000000300 RSI: 000000002000c380 RDI: ffffffffffffff9c RBP: 00007fe2e80d7567 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007fe2e819bf80 R15: 00007ffcd7373cd8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:dbAlloc+0xc8c/0xca0 fs/jfs/jfs_dmap.c:738 Code: 02 08 90 0f 0b e8 24 06 7d fe 48 c7 c7 e0 46 a2 8b 48 c7 c6 20 44 a2 8b ba e2 02 00 00 48 c7 c1 20 47 a2 8b e8 85 3d 02 08 90 <0f> 0b e8 cd 32 05 08 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 55 41 RSP: 0018:ffffc9000593f1e0 EFLAGS: 00010246 RAX: 0000000000000030 RBX: ffff88801f29e210 RCX: 4164bbaee2a24100 RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 RBP: ffffc9000593f2f0 R08: ffffffff817136dc R09: 1ffff92000b27ddc R10: dffffc0000000000 R11: fffff52000b27ddd R12: 0000000000000027 R13: 0000000000000000 R14: 0000000000000000 R15: 1ffff92000b27e48 FS: 00007fe2e92a36c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055ac03ad1680 CR3: 000000002443a000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400