Oops: divide error: 0000 [#1] SMP KASAN NOPTI CPU: 0 UID: 0 PID: 10698 Comm: kworker/u8:15 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:comedi_inc_scan_progress+0x1cc/0x340 drivers/comedi/drivers.c:556 Code: 00 00 00 03 43 2c 48 ba 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 0f b6 14 11 84 d2 74 09 80 fa 03 0f 8e 53 01 00 00 31 d2 b3 80 00 00 00 89 53 2c e8 b6 be ce f8 48 8d 7b 34 48 b8 00 00 RSP: 0000:ffffc90000007da0 EFLAGS: 00010046 RAX: 0000000000000001 RBX: ffff888035767000 RCX: 1ffff11006aece10 RDX: 0000000000000000 RSI: ffffffff88ed2948 RDI: ffff888035767080 RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000002 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888124720000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000351030 CR3: 00000000440df000 CR4: 00000000003526f0 Call Trace: comedi_buf_write_samples+0x406/0x640 drivers/comedi/comedi_buf.c:603 parport_interrupt+0xec/0x150 drivers/comedi/drivers/comedi_parport.c:218 __handle_irq_event_percpu+0x229/0x7d0 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0xab/0x1e0 kernel/irq/handle.c:210 handle_edge_irq+0x28e/0xab0 kernel/irq/chip.c:797 generic_handle_irq_desc include/linux/irqdesc.h:173 [inline] handle_irq arch/x86/kernel/irq.c:254 [inline] call_irq_handler arch/x86/kernel/irq.c:266 [inline] __common_interrupt+0xe2/0x250 arch/x86/kernel/irq.c:292 common_interrupt+0xba/0xe0 arch/x86/kernel/irq.c:285 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 RIP: 0010:rcu_preempt_read_exit kernel/rcu/tree_plugin.h:396 [inline] RIP: 0010:__rcu_read_unlock+0x3d/0x580 kernel/rcu/tree_plugin.h:435 Code: 53 48 8d bd 44 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 <84> d2 0f 85 42 02 00 00 65 4c 8b 25 8b c7 2d 12 49 8d bc 24 44 04 RSP: 0000:ffffc9001c0476f8 EFLAGS: 00000202 RAX: 0000000000000007 RBX: ffffc9001c047eb8 RCX: ffffc9001c0476ec RDX: 0000000000000000 RSI: ffffffff8de0aca5 RDI: ffff8880370ba884 RBP: ffff8880370ba440 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 00000000000134ef R12: ffffc9001c0477e8 R13: ffffc9001c047798 R14: ffffc9001c047eb8 R15: ffffc9001c0477cc rcu_read_unlock include/linux/rcupdate.h:873 [inline] class_rcu_destructor include/linux/rcupdate.h:1155 [inline] unwind_next_frame+0x3fe/0x20a0 arch/x86/kernel/unwind_orc.c:479 arch_stack_walk+0x94/0x100 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2381 [inline] slab_free mm/slub.c:4643 [inline] kmem_cache_free+0x2d1/0x4d0 mm/slub.c:4745 putname+0x154/0x1a0 fs/namei.c:297 kern_path+0x3f/0x50 fs/namei.c:2827 tomoyo_realpath_nofollow+0x87/0xf0 security/tomoyo/realpath.c:303 tomoyo_find_next_domain+0x2a8/0x20b0 security/tomoyo/domain.c:730 tomoyo_bprm_check_security security/tomoyo/tomoyo.c:102 [inline] tomoyo_bprm_check_security+0x12e/0x1d0 security/tomoyo/tomoyo.c:92 security_bprm_check+0x1b9/0x1e0 security/security.c:1302 search_binary_handler fs/exec.c:1660 [inline] exec_binprm fs/exec.c:1702 [inline] bprm_execve fs/exec.c:1754 [inline] bprm_execve+0x810/0x1650 fs/exec.c:1730 kernel_execve+0x2ef/0x3b0 fs/exec.c:1920 call_usermodehelper_exec_async+0x255/0x4c0 kernel/umh.c:109 ret_from_fork+0x5d4/0x6f0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:comedi_inc_scan_progress+0x1cc/0x340 drivers/comedi/drivers.c:556 Code: 00 00 00 03 43 2c 48 ba 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 0f b6 14 11 84 d2 74 09 80 fa 03 0f 8e 53 01 00 00 31 d2 b3 80 00 00 00 89 53 2c e8 b6 be ce f8 48 8d 7b 34 48 b8 00 00 RSP: 0000:ffffc90000007da0 EFLAGS: 00010046 RAX: 0000000000000001 RBX: ffff888035767000 RCX: 1ffff11006aece10 RDX: 0000000000000000 RSI: ffffffff88ed2948 RDI: ffff888035767080 RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000002 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888124720000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000351030 CR3: 00000000440df000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 00 00 add %al,(%rax) 2: 03 43 2c add 0x2c(%rbx),%eax 5: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx c: fc ff df f: 48 89 f9 mov %rdi,%rcx 12: 48 c1 e9 03 shr $0x3,%rcx 16: 0f b6 14 11 movzbl (%rcx,%rdx,1),%edx 1a: 84 d2 test %dl,%dl 1c: 74 09 je 0x27 1e: 80 fa 03 cmp $0x3,%dl 21: 0f 8e 53 01 00 00 jle 0x17a 27: 31 d2 xor %edx,%edx * 29: f7 b3 80 00 00 00 divl 0x80(%rbx) <-- trapping instruction 2f: 89 53 2c mov %edx,0x2c(%rbx) 32: e8 b6 be ce f8 call 0xf8cebeed 37: 48 8d 7b 34 lea 0x34(%rbx),%rdi 3b: 48 rex.W 3c: b8 .byte 0xb8