divide error: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 5072 Comm: syz-executor247 Not tainted 6.7.0-rc8-syzkaller-00130-g6d0dc8559c84 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 RIP: 0010:do_journal_end+0x172e/0x4f10 fs/reiserfs/journal.c:4090 Code: c6 41 84 f0 0f 85 83 37 00 00 83 e2 07 38 d1 40 0f 9e c6 84 c9 0f 95 c2 40 84 d6 0f 85 6c 37 00 00 8b 4b 14 48 8d 7d 18 31 d2 <48> f7 f1 4a 8d 34 22 48 89 fa 48 b8 00 00 00 00 00 fc ff df 48 c1 RSP: 0018:ffffc90003a2f9f8 EFLAGS: 00010246 RAX: 0000000000000003 RBX: ffff8880715c7000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff888028ee1018 RBP: ffff888028ee1000 R08: 0000000000000001 R09: 424c724573496552 R10: ffff888079ca7000 R11: 0000000000000003 R12: 0000000000000000 R13: 0000000000001000 R14: ffffc90003a2fbe8 R15: ffff88807e2543a0 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff7425f0db8 CR3: 0000000028103000 CR4: 0000000000350ef0 Call Trace: reiserfs_sync_fs+0x10e/0x140 fs/reiserfs/super.c:78 sync_filesystem+0x109/0x280 fs/sync.c:56 generic_shutdown_super+0x7e/0x3d0 fs/super.c:669 kill_block_super+0x3b/0x90 fs/super.c:1667 deactivate_locked_super+0xbc/0x1a0 fs/super.c:484 deactivate_super+0xde/0x100 fs/super.c:517 cleanup_mnt+0x222/0x450 fs/namespace.c:1256 task_work_run+0x14d/0x240 kernel/task_work.c:180 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0xa8a/0x2ad0 kernel/exit.c:869 do_group_exit+0xd4/0x2a0 kernel/exit.c:1018 __do_sys_exit_group kernel/exit.c:1029 [inline] __se_sys_exit_group kernel/exit.c:1027 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1027 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7ff7425a6849 Code: Unable to access opcode bytes at 0x7ff7425a681f. RSP: 002b:00007ffcd1d45e98 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007ff7425a6849 RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 RBP: 00007ff7426232d0 R08: ffffffffffffffb8 R09: 00007ffcd1d45f70 R10: 00007ffcd1d45f70 R11: 0000000000000246 R12: 00007ff7426232d0 R13: 0000000000000000 R14: 00007ff742624040 R15: 00007ff742574d70 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:do_journal_end+0x172e/0x4f10 fs/reiserfs/journal.c:4090 Code: c6 41 84 f0 0f 85 83 37 00 00 83 e2 07 38 d1 40 0f 9e c6 84 c9 0f 95 c2 40 84 d6 0f 85 6c 37 00 00 8b 4b 14 48 8d 7d 18 31 d2 <48> f7 f1 4a 8d 34 22 48 89 fa 48 b8 00 00 00 00 00 fc ff df 48 c1 RSP: 0018:ffffc90003a2f9f8 EFLAGS: 00010246 RAX: 0000000000000003 RBX: ffff8880715c7000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff888028ee1018 RBP: ffff888028ee1000 R08: 0000000000000001 R09: 424c724573496552 R10: ffff888079ca7000 R11: 0000000000000003 R12: 0000000000000000 R13: 0000000000001000 R14: ffffc90003a2fbe8 R15: ffff88807e2543a0 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b83591d6a8 CR3: 000000000cd77000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: c6 41 84 f0 movb $0xf0,-0x7c(%rcx) 4: 0f 85 83 37 00 00 jne 0x378d a: 83 e2 07 and $0x7,%edx d: 38 d1 cmp %dl,%cl f: 40 0f 9e c6 setle %sil 13: 84 c9 test %cl,%cl 15: 0f 95 c2 setne %dl 18: 40 84 d6 test %dl,%sil 1b: 0f 85 6c 37 00 00 jne 0x378d 21: 8b 4b 14 mov 0x14(%rbx),%ecx 24: 48 8d 7d 18 lea 0x18(%rbp),%rdi 28: 31 d2 xor %edx,%edx * 2a: 48 f7 f1 div %rcx <-- trapping instruction 2d: 4a 8d 34 22 lea (%rdx,%r12,1),%rsi 31: 48 89 fa mov %rdi,%rdx 34: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 3b: fc ff df 3e: 48 rex.W 3f: c1 .byte 0xc1