loop0: detected capacity change from 0 to 32768 ======================================================= WARNING: The mand mount option has been deprecated and and is ignored by this kernel. Remove the mand option from the mount to silence this warning. ======================================================= Oops: divide error: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 5842 Comm: syz-executor227 Not tainted 6.16.0-rc1-next-20250610-syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:bch2_sb_members_v2_to_text+0x10a/0x3c0 fs/bcachefs/sb-members.c:347 Code: 49 89 f4 49 c1 ec 03 43 0f b6 0c 34 84 c9 48 89 b4 24 a0 00 00 00 0f 85 67 02 00 00 0f b7 0e 48 89 c2 48 c1 ea 20 74 07 48 99 <48> f7 f9 eb 04 31 d2 f7 f1 48 89 84 24 b0 00 00 00 48 8b 84 24 c8 RSP: 0018:ffffc9000434ed40 EFLAGS: 00010a02 RAX: ffff88807b3f8368 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffffffffffffffff RSI: ffff88807b3f8338 RDI: 000000000000000e RBP: ffffc9000434ef70 R08: 000000000000003a R09: 000000000000003a R10: dffffc0000000000 R11: ffffffff844fcfb0 R12: 1ffff1100f67f067 R13: 000000000000000b R14: dffffc0000000000 R15: 1ffff92000869dc4 FS: 000055556af99380(0000) GS:ffff888125c4b000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000056367c34f6a8 CR3: 00000000770e4000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bch2_sb_field_validate+0x1c6/0x280 fs/bcachefs/super-io.c:1380 bch2_sb_validate+0x14bd/0x1980 fs/bcachefs/super-io.c:552 __bch2_read_super+0xba4/0x1040 fs/bcachefs/super-io.c:925 bch2_fs_open+0x1fe/0x2570 fs/bcachefs/super.c:2382 bch2_fs_get_tree+0x437/0x14f0 fs/bcachefs/fs.c:2473 vfs_get_tree+0x8f/0x2b0 fs/super.c:1802 do_new_mount+0x24a/0xa40 fs/namespace.c:3885 do_mount fs/namespace.c:4222 [inline] __do_sys_mount fs/namespace.c:4433 [inline] __se_sys_mount+0x317/0x410 fs/namespace.c:4410 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fb499d6198a Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 5e 04 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffe1a446798 EFLAGS: 00000282 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ffe1a4467b0 RCX: 00007fb499d6198a RDX: 0000200000000000 RSI: 0000200000011a40 RDI: 00007ffe1a4467b0 RBP: 0000200000000000 R08: 00007ffe1a4467f0 R09: 00000000000119f3 R10: 00000000028080c9 R11: 0000000000000282 R12: 0000200000011a40 R13: 0000000000000004 R14: 0000000000000003 R15: 00007ffe1a4467f0 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:bch2_sb_members_v2_to_text+0x10a/0x3c0 fs/bcachefs/sb-members.c:347 Code: 49 89 f4 49 c1 ec 03 43 0f b6 0c 34 84 c9 48 89 b4 24 a0 00 00 00 0f 85 67 02 00 00 0f b7 0e 48 89 c2 48 c1 ea 20 74 07 48 99 <48> f7 f9 eb 04 31 d2 f7 f1 48 89 84 24 b0 00 00 00 48 8b 84 24 c8 RSP: 0018:ffffc9000434ed40 EFLAGS: 00010a02 RAX: ffff88807b3f8368 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffffffffffffffff RSI: ffff88807b3f8338 RDI: 000000000000000e RBP: ffffc9000434ef70 R08: 000000000000003a R09: 000000000000003a R10: dffffc0000000000 R11: ffffffff844fcfb0 R12: 1ffff1100f67f067 R13: 000000000000000b R14: dffffc0000000000 R15: 1ffff92000869dc4 FS: 000055556af99380(0000) GS:ffff888125d4b000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000056367c3149f8 CR3: 00000000770e4000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 49 89 f4 mov %rsi,%r12 3: 49 c1 ec 03 shr $0x3,%r12 7: 43 0f b6 0c 34 movzbl (%r12,%r14,1),%ecx c: 84 c9 test %cl,%cl e: 48 89 b4 24 a0 00 00 mov %rsi,0xa0(%rsp) 15: 00 16: 0f 85 67 02 00 00 jne 0x283 1c: 0f b7 0e movzwl (%rsi),%ecx 1f: 48 89 c2 mov %rax,%rdx 22: 48 c1 ea 20 shr $0x20,%rdx 26: 74 07 je 0x2f 28: 48 99 cqto * 2a: 48 f7 f9 idiv %rcx <-- trapping instruction 2d: eb 04 jmp 0x33 2f: 31 d2 xor %edx,%edx 31: f7 f1 div %ecx 33: 48 89 84 24 b0 00 00 mov %rax,0xb0(%rsp) 3a: 00 3b: 48 rex.W 3c: 8b .byte 0x8b 3d: 84 24 c8 test %ah,(%rax,%rcx,8)