divide error: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 6701 Comm: syz.1.199 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 RIP: 0010:do_journal_end+0x135f/0x4860 fs/reiserfs/journal.c:4096 Code: 0f b6 04 20 84 c0 0f 85 1f 30 00 00 49 8d 44 1d 01 4c 89 f1 48 c1 e9 03 42 0f b6 0c 21 84 c9 0f 85 26 30 00 00 41 8b 0f 31 d2 <48> f7 f1 49 89 d6 4c 03 74 24 08 48 8b 84 24 d8 00 00 00 42 80 3c RSP: 0018:ffffc900189ff4e0 EFLAGS: 00010246 RAX: 0000000000000003 RBX: 0000000000000002 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8abcd100 RDI: ffff88802fcacff4 RBP: ffffc900189ff750 R08: 424c724573496552 R09: 424c724573496552 R10: dffffc0000000000 R11: ffffed1005f95a00 R12: dffffc0000000000 R13: 0000000000000000 R14: ffff88804e4f5017 R15: ffff88804e4f5014 FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb518181f13 CR3: 0000000060c23000 CR4: 00000000003506e0 Call Trace: do_journal_release+0x4ef/0x550 fs/reiserfs/journal.c:1940 journal_release+0x1f/0x30 fs/reiserfs/journal.c:1971 reiserfs_put_super+0x222/0x480 fs/reiserfs/super.c:616 generic_shutdown_super+0x134/0x2b0 fs/super.c:693 kill_block_super+0x44/0x90 fs/super.c:1660 deactivate_locked_super+0x97/0x100 fs/super.c:481 cleanup_mnt+0x429/0x4c0 fs/namespace.c:1250 task_work_run+0x1ce/0x250 kernel/task_work.c:239 exit_task_work include/linux/task_work.h:43 [inline] do_exit+0x90b/0x23c0 kernel/exit.c:883 do_group_exit+0x21b/0x2d0 kernel/exit.c:1024 get_signal+0x12fc/0x1400 kernel/signal.c:2902 arch_do_signal_or_restart+0x96/0x780 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop+0x70/0x110 kernel/entry/common.c:174 exit_to_user_mode_prepare+0xf6/0x180 kernel/entry/common.c:210 irqentry_exit_to_user_mode+0x9/0x40 kernel/entry/common.c:315 exc_page_fault+0x8f/0x110 arch/x86/mm/fault.c:1524 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:608 RIP: 0033:0x7face2b8ebb1 Code: Unable to access opcode bytes at 0x7face2b8eb87. RSP: 002b:fffffffffffffe70 EFLAGS: 00010217 RAX: 0000000000000000 RBX: 00007face2dd6090 RCX: 00007face2b8eba9 RDX: 0000000000000000 RSI: fffffffffffffe70 RDI: 0000000000008000 RBP: 00007face2c11e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 00007face2dd6128 R14: 00007face2dd6090 R15: 00007ffce0219708 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:do_journal_end+0x135f/0x4860 fs/reiserfs/journal.c:4096 Code: 0f b6 04 20 84 c0 0f 85 1f 30 00 00 49 8d 44 1d 01 4c 89 f1 48 c1 e9 03 42 0f b6 0c 21 84 c9 0f 85 26 30 00 00 41 8b 0f 31 d2 <48> f7 f1 49 89 d6 4c 03 74 24 08 48 8b 84 24 d8 00 00 00 42 80 3c RSP: 0018:ffffc900189ff4e0 EFLAGS: 00010246 RAX: 0000000000000003 RBX: 0000000000000002 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8abcd100 RDI: ffff88802fcacff4 RBP: ffffc900189ff750 R08: 424c724573496552 R09: 424c724573496552 R10: dffffc0000000000 R11: ffffed1005f95a00 R12: dffffc0000000000 R13: 0000000000000000 R14: ffff88804e4f5017 R15: ffff88804e4f5014 FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f9d995a4198 CR3: 000000002594d000 CR4: 00000000003506e0 ---------------- Code disassembly (best guess): 0: 0f b6 04 20 movzbl (%rax,%riz,1),%eax 4: 84 c0 test %al,%al 6: 0f 85 1f 30 00 00 jne 0x302b c: 49 8d 44 1d 01 lea 0x1(%r13,%rbx,1),%rax 11: 4c 89 f1 mov %r14,%rcx 14: 48 c1 e9 03 shr $0x3,%rcx 18: 42 0f b6 0c 21 movzbl (%rcx,%r12,1),%ecx 1d: 84 c9 test %cl,%cl 1f: 0f 85 26 30 00 00 jne 0x304b 25: 41 8b 0f mov (%r15),%ecx 28: 31 d2 xor %edx,%edx * 2a: 48 f7 f1 div %rcx <-- trapping instruction 2d: 49 89 d6 mov %rdx,%r14 30: 4c 03 74 24 08 add 0x8(%rsp),%r14 35: 48 8b 84 24 d8 00 00 mov 0xd8(%rsp),%rax 3c: 00 3d: 42 rex.X 3e: 80 .byte 0x80 3f: 3c .byte 0x3c