divide error: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 22 Comm: ksoftirqd/1 Not tainted 6.5.0-syzkaller-10885-g0468be89b3fa #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 RIP: 0010:ath9k_htc_choose_bslot drivers/net/wireless/ath/ath9k/htc_drv_beacon.c:277 [inline] RIP: 0010:ath9k_htc_swba+0x1be/0xc70 drivers/net/wireless/ath/ath9k/htc_drv_beacon.c:310 Code: 00 48 8b 13 0f b7 c9 bb 01 00 00 00 4d 8d bd b0 03 00 00 4c 89 ff 48 0f ca 48 89 d0 c1 ea 0a 48 c1 e8 20 c1 e0 16 09 d0 31 d2 f1 8d 04 12 31 d2 f7 f1 29 c3 e8 22 8e 53 04 48 63 c3 48 83 f8 RSP: 0018:ffffc900001c7c28 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff888072e237f0 RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffff888072e23440 R14: 0000000000000210 R15: ffff888072e237f0 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020001038 CR3: 00000000253cb000 CR4: 0000000000350ee0 Call Trace: ath9k_wmi_event_tasklet+0x34e/0x460 drivers/net/wireless/ath/ath9k/wmi.c:165 tasklet_action_common.constprop.0+0x242/0x3d0 kernel/softirq.c:780 __do_softirq+0x218/0x965 kernel/softirq.c:553 run_ksoftirqd kernel/softirq.c:921 [inline] run_ksoftirqd+0x31/0x60 kernel/softirq.c:913 smpboot_thread_fn+0x67d/0xa00 kernel/smpboot.c:164 kthread+0x33a/0x430 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:ath9k_htc_choose_bslot drivers/net/wireless/ath/ath9k/htc_drv_beacon.c:277 [inline] RIP: 0010:ath9k_htc_swba+0x1be/0xc70 drivers/net/wireless/ath/ath9k/htc_drv_beacon.c:310 Code: 00 48 8b 13 0f b7 c9 bb 01 00 00 00 4d 8d bd b0 03 00 00 4c 89 ff 48 0f ca 48 89 d0 c1 ea 0a 48 c1 e8 20 c1 e0 16 09 d0 31 d2 f1 8d 04 12 31 d2 f7 f1 29 c3 e8 22 8e 53 04 48 63 c3 48 83 f8 RSP: 0018:ffffc900001c7c28 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff888072e237f0 RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffff888072e23440 R14: 0000000000000210 R15: ffff888072e237f0 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020001038 CR3: 00000000253cb000 CR4: 0000000000350ee0 ---------------- Code disassembly (best guess): 0: 00 48 8b add %cl,-0x75(%rax) 3: 13 0f adc (%rdi),%ecx 5: b7 c9 mov $0xc9,%bh 7: bb 01 00 00 00 mov $0x1,%ebx c: 4d 8d bd b0 03 00 00 lea 0x3b0(%r13),%r15 13: 4c 89 ff mov %r15,%rdi 16: 48 0f ca bswap %rdx 19: 48 89 d0 mov %rdx,%rax 1c: c1 ea 0a shr $0xa,%edx 1f: 48 c1 e8 20 shr $0x20,%rax 23: c1 e0 16 shl $0x16,%eax 26: 09 d0 or %edx,%eax 28: 31 d2 xor %edx,%edx * 2a: f7 f1 div %ecx <-- trapping instruction 2c: 8d 04 12 lea (%rdx,%rdx,1),%eax 2f: 31 d2 xor %edx,%edx 31: f7 f1 div %ecx 33: 29 c3 sub %eax,%ebx 35: e8 22 8e 53 04 call 0x4538e5c 3a: 48 63 c3 movslq %ebx,%rax 3d: 48 rex.W 3e: 83 .byte 0x83 3f: f8 clc