divide error: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 4031 Comm: syz-executor.4 Not tainted 5.15.153-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:do_journal_end+0x12f1/0x4650 fs/reiserfs/journal.c:4089 Code: 04 30 84 c0 0f 85 74 2d 00 00 4f 8d 7c 2f 01 48 89 e8 48 c1 e8 03 42 0f b6 04 30 84 c0 0f 85 7a 2d 00 00 8b 0b 4c 89 f8 31 d2 <48> f7 f1 48 89 d3 4c 01 e3 48 8b 84 24 c8 00 00 00 42 80 3c 30 00 RSP: 0018:ffffc900042f7650 EFLAGS: 00010246 RAX: 0000000000000003 RBX: ffff88805a773014 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8880575cc000 RBP: ffff88805a773017 R08: dffffc0000000000 R09: ffff8880575cc000 R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 R13: 0000000000000002 R14: dffffc0000000000 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000580 CR3: 0000000061d31000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: reiserfs_sync_fs+0xca/0x140 fs/reiserfs/super.c:78 sync_filesystem+0xe8/0x220 fs/sync.c:56 generic_shutdown_super+0x6e/0x2c0 fs/super.c:448 kill_block_super+0x7a/0xe0 fs/super.c:1414 deactivate_locked_super+0xa0/0x110 fs/super.c:335 cleanup_mnt+0x44e/0x500 fs/namespace.c:1143 task_work_run+0x129/0x1a0 kernel/task_work.c:164 exit_task_work include/linux/task_work.h:32 [inline] do_exit+0x6a3/0x2480 kernel/exit.c:872 do_group_exit+0x144/0x310 kernel/exit.c:994 get_signal+0xc66/0x14e0 kernel/signal.c:2889 arch_do_signal_or_restart+0xc3/0x1890 arch/x86/kernel/signal.c:867 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop+0x97/0x130 kernel/entry/common.c:172 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:208 __syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline] syscall_exit_to_user_mode+0x5d/0x250 kernel/entry/common.c:301 ret_from_fork+0x15/0x30 arch/x86/entry/entry_64.S:291 RIP: 0033:0x7f5fa778bda9 Code: Unable to access opcode bytes at RIP 0x7f5fa778bd7f. RSP: 002b:00007f5fa5d0c078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: 0000000000000000 RBX: 00007f5fa78b9f80 RCX: 00007f5fa778bda9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007f5fa77d847a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f5fa78b9f80 R15: 00007ffe0ffcb228 Modules linked in: ---[ end trace 6605cc0287f3ff51 ]--- RIP: 0010:do_journal_end+0x12f1/0x4650 fs/reiserfs/journal.c:4089 Code: 04 30 84 c0 0f 85 74 2d 00 00 4f 8d 7c 2f 01 48 89 e8 48 c1 e8 03 42 0f b6 04 30 84 c0 0f 85 7a 2d 00 00 8b 0b 4c 89 f8 31 d2 <48> f7 f1 48 89 d3 4c 01 e3 48 8b 84 24 c8 00 00 00 42 80 3c 30 00 RSP: 0018:ffffc900042f7650 EFLAGS: 00010246 RAX: 0000000000000003 RBX: ffff88805a773014 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8880575cc000 RBP: ffff88805a773017 R08: dffffc0000000000 R09: ffff8880575cc000 R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 R13: 0000000000000002 R14: dffffc0000000000 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005555564c7938 CR3: 00000000556da000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 04 30 add $0x30,%al 2: 84 c0 test %al,%al 4: 0f 85 74 2d 00 00 jne 0x2d7e a: 4f 8d 7c 2f 01 lea 0x1(%r15,%r13,1),%r15 f: 48 89 e8 mov %rbp,%rax 12: 48 c1 e8 03 shr $0x3,%rax 16: 42 0f b6 04 30 movzbl (%rax,%r14,1),%eax 1b: 84 c0 test %al,%al 1d: 0f 85 7a 2d 00 00 jne 0x2d9d 23: 8b 0b mov (%rbx),%ecx 25: 4c 89 f8 mov %r15,%rax 28: 31 d2 xor %edx,%edx * 2a: 48 f7 f1 div %rcx <-- trapping instruction 2d: 48 89 d3 mov %rdx,%rbx 30: 4c 01 e3 add %r12,%rbx 33: 48 8b 84 24 c8 00 00 mov 0xc8(%rsp),%rax 3a: 00 3b: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1)