divide error: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 20189 Comm: syz-executor.5 Not tainted 5.15.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:netem_enqueue+0x1474/0x3550 net/sched/sch_netem.c:516 Code: 74 1f 4c 89 44 24 20 89 4c 24 18 89 44 24 10 e8 72 cd 70 fa 4c 8b 44 24 20 8b 4c 24 18 8b 44 24 10 48 8b 34 24 31 d2 2b 4e 74 f1 48 b8 00 00 00 00 00 fc ff df 48 01 d3 48 89 d9 48 c1 e9 03 RSP: 0018:ffffc9000aaa74f0 EFLAGS: 00010246 RAX: 00000000a22f44c9 RBX: ffff88807ece9c00 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff88803d97d640 RDI: ffff88803d97d6b4 RBP: ffff888022f26330 R08: ffff88803d97d710 R09: 0000000000000000 R10: ffffffff83d6707d R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000080 R14: ffff888022f26000 R15: 0000000000000000 FS: 00007ff4c3c35700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f28a7aaa4c2 CR3: 000000003dc06000 CR4: 0000000000350ef0 Call Trace: netem_enqueue+0x2048/0x3550 net/sched/sch_netem.c:483 dev_qdisc_enqueue+0x40/0x300 net/core/dev.c:3785 __dev_xmit_skb net/core/dev.c:3869 [inline] __dev_queue_xmit+0x1f6e/0x3630 net/core/dev.c:4194 __netlink_deliver_tap_skb net/netlink/af_netlink.c:303 [inline] __netlink_deliver_tap net/netlink/af_netlink.c:321 [inline] netlink_deliver_tap+0x9cb/0xc30 net/netlink/af_netlink.c:334 netlink_deliver_tap_kernel net/netlink/af_netlink.c:343 [inline] netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x5e5/0x7d0 net/netlink/af_netlink.c:1345 netlink_sendmsg+0x86d/0xda0 net/netlink/af_netlink.c:1916 sock_sendmsg_nosec net/socket.c:704 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:724 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409 ___sys_sendmsg+0xf3/0x170 net/socket.c:2463 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7ff4c66e0ae9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff4c3c35188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007ff4c67f4020 RCX: 00007ff4c66e0ae9 RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000007 RBP: 00007ff4c673af25 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcdd0a340f R14: 00007ff4c3c35300 R15: 0000000000022000 Modules linked in: ---[ end trace 6ce86530fe57a83a ]--- RIP: 0010:netem_enqueue+0x1474/0x3550 net/sched/sch_netem.c:516 Code: 74 1f 4c 89 44 24 20 89 4c 24 18 89 44 24 10 e8 72 cd 70 fa 4c 8b 44 24 20 8b 4c 24 18 8b 44 24 10 48 8b 34 24 31 d2 2b 4e 74 f1 48 b8 00 00 00 00 00 fc ff df 48 01 d3 48 89 d9 48 c1 e9 03 RSP: 0018:ffffc9000aaa74f0 EFLAGS: 00010246 RAX: 00000000a22f44c9 RBX: ffff88807ece9c00 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff88803d97d640 RDI: ffff88803d97d6b4 RBP: ffff888022f26330 R08: ffff88803d97d710 R09: 0000000000000000 R10: ffffffff83d6707d R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000080 R14: ffff888022f26000 R15: 0000000000000000 FS: 00007ff4c3c35700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f28a7aaa4c2 CR3: 000000003dc06000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 74 1f je 0x21 2: 4c 89 44 24 20 mov %r8,0x20(%rsp) 7: 89 4c 24 18 mov %ecx,0x18(%rsp) b: 89 44 24 10 mov %eax,0x10(%rsp) f: e8 72 cd 70 fa callq 0xfa70cd86 14: 4c 8b 44 24 20 mov 0x20(%rsp),%r8 19: 8b 4c 24 18 mov 0x18(%rsp),%ecx 1d: 8b 44 24 10 mov 0x10(%rsp),%eax 21: 48 8b 34 24 mov (%rsp),%rsi 25: 31 d2 xor %edx,%edx 27: 2b 4e 74 sub 0x74(%rsi),%ecx * 2a: f7 f1 div %ecx <-- trapping instruction 2c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 33: fc ff df 36: 48 01 d3 add %rdx,%rbx 39: 48 89 d9 mov %rbx,%rcx 3c: 48 c1 e9 03 shr $0x3,%rcx