loop0: detected capacity change from 0 to 32768 BUG at fs/jfs/jfs_dmap.c:3000 assert(bitno < 32) ------------[ cut here ]------------ kernel BUG at fs/jfs/jfs_dmap.c:3000! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6438 Comm: syz-executor.0 Not tainted 6.4.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3000 lr : dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3000 sp : ffff80001f287210 x29: ffff80001f287210 x28: dfff800000000000 x27: 0000000000000001 x26: ffff80001f287480 x25: 0000000000000000 x24: 0000000000000000 x23: ffff800016449cd0 x22: 0000000000000020 x21: 0000000000000000 x20: 0000000000000001 x19: 0000000000000000 x18: ffff80001f286860 x17: 0000000000000000 x16: ffff80001243078c x15: 0000000000000001 x14: 0000000000000000 x13: 0000000000000001 x12: 0000000000000001 x11: 0000000000000000 x10: 0000000000000000 x9 : a3fdbd0d43f49400 x8 : a3fdbd0d43f49400 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff80001f286b18 x4 : ffff800015f8e880 x3 : ffff80000aa8e264 x2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000030 Call trace: dbFindBits+0x1e0/0x1e4 fs/jfs/jfs_dmap.c:3000 dbAllocNear+0x1d0/0x334 fs/jfs/jfs_dmap.c:1240 dbAlloc+0x8b4/0xb68 fs/jfs/jfs_dmap.c:829 ea_get+0x6f8/0xef0 fs/jfs/xattr.c:514 __jfs_setxattr+0x41c/0x1338 fs/jfs/xattr.c:718 __jfs_xattr_set+0xf8/0x190 fs/jfs/xattr.c:917 jfs_xattr_set+0x58/0x70 fs/jfs/xattr.c:941 __vfs_setxattr+0x3d8/0x400 fs/xattr.c:201 __vfs_setxattr_noperm+0x110/0x528 fs/xattr.c:235 __vfs_setxattr_locked+0x1ec/0x218 fs/xattr.c:296 vfs_setxattr+0x1a8/0x344 fs/xattr.c:322 do_setxattr fs/xattr.c:630 [inline] setxattr+0x208/0x29c fs/xattr.c:653 path_setxattr+0x17c/0x258 fs/xattr.c:672 __do_sys_setxattr fs/xattr.c:688 [inline] __se_sys_setxattr fs/xattr.c:684 [inline] __arm64_sys_setxattr+0xbc/0xd8 fs/xattr.c:684 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:193 el0_svc+0x4c/0x15c arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 Code: 90047903 91020063 52817702 95953c9a (d4210000) ---[ end trace 0000000000000000 ]---