loop2: detected capacity change from 0 to 32768 ======================================================= WARNING: The mand mount option has been deprecated and and is ignored by this kernel. Remove the mand option from the mount to silence this warning. ======================================================= Oops: divide error: 0000 [#1] SMP PTI CPU: 1 UID: 0 PID: 3359 Comm: syz.2.16 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(undef) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:bch2_sb_members_v2_to_text+0x5c/0x170 fs/bcachefs/sb-members.c:347 Code: 05 00 00 00 e8 b5 d8 01 00 48 89 c1 41 8b 06 49 8d 04 c6 48 29 c8 48 83 c0 f8 41 0f b7 4e 08 48 89 c2 48 c1 ea 20 74 0a 48 99 <48> f7 f9 49 89 c4 eb 07 31 d2 f7 f1 41 89 c4 41 0f b6 4f 7b 41 39 RSP: 0018:ffffc9000329b5a8 EFLAGS: 00010a06 RAX: ffff88810eff4368 RBX: ffffc9000329b918 RCX: 0000000000000000 RDX: ffffffffffffffff RSI: 0000000000000005 RDI: ffff88810eff4000 RBP: 0000000000000000 R08: 000000000000003a R09: 000000000000003a R10: 0000000000000000 R11: ffffffff81c310e0 R12: 00000000fffff6fa R13: 000000000000000b R14: ffff88810eff4330 R15: ffff88810eff4000 FS: 00007f201b42a6c0(0000) GS:ffff8882b32da000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f201a571d60 CR3: 000000010dfb0000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bch2_sb_field_validate+0xbc/0x100 fs/bcachefs/super-io.c:1380 bch2_sb_validate+0x5b9/0x690 fs/bcachefs/super-io.c:552 __bch2_read_super+0x505/0x530 fs/bcachefs/super-io.c:925 bch2_fs_open+0x144/0x500 fs/bcachefs/super.c:2383 bch2_fs_get_tree+0x22c/0x760 fs/bcachefs/fs.c:2473 vfs_get_tree+0x26/0xb0 fs/super.c:1759 do_new_mount+0x13f/0x380 fs/namespace.c:3884 do_mount fs/namespace.c:4224 [inline] __do_sys_mount fs/namespace.c:4435 [inline] __se_sys_mount+0x147/0x1b0 fs/namespace.c:4412 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x8f/0x170 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f201a5900ca Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f201b429e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f201b429ef0 RCX: 00007f201a5900ca RDX: 0000200000000000 RSI: 0000200000011a40 RDI: 00007f201b429eb0 RBP: 0000200000000000 R08: 00007f201b429ef0 R09: 00000000028080c9 R10: 00000000028080c9 R11: 0000000000000246 R12: 0000200000011a40 R13: 00007f201b429eb0 R14: 00000000000119f9 R15: 0000200000013d00 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:bch2_sb_members_v2_to_text+0x5c/0x170 fs/bcachefs/sb-members.c:347 Code: 05 00 00 00 e8 b5 d8 01 00 48 89 c1 41 8b 06 49 8d 04 c6 48 29 c8 48 83 c0 f8 41 0f b7 4e 08 48 89 c2 48 c1 ea 20 74 0a 48 99 <48> f7 f9 49 89 c4 eb 07 31 d2 f7 f1 41 89 c4 41 0f b6 4f 7b 41 39 RSP: 0018:ffffc9000329b5a8 EFLAGS: 00010a06 RAX: ffff88810eff4368 RBX: ffffc9000329b918 RCX: 0000000000000000 RDX: ffffffffffffffff RSI: 0000000000000005 RDI: ffff88810eff4000 RBP: 0000000000000000 R08: 000000000000003a R09: 000000000000003a R10: 0000000000000000 R11: ffffffff81c310e0 R12: 00000000fffff6fa R13: 000000000000000b R14: ffff88810eff4330 R15: ffff88810eff4000 FS: 00007f201b42a6c0(0000) GS:ffff8882b32da000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f201a571d60 CR3: 000000010dfb0000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 05 00 00 00 e8 add $0xe8000000,%eax 5: b5 d8 mov $0xd8,%ch 7: 01 00 add %eax,(%rax) 9: 48 89 c1 mov %rax,%rcx c: 41 8b 06 mov (%r14),%eax f: 49 8d 04 c6 lea (%r14,%rax,8),%rax 13: 48 29 c8 sub %rcx,%rax 16: 48 83 c0 f8 add $0xfffffffffffffff8,%rax 1a: 41 0f b7 4e 08 movzwl 0x8(%r14),%ecx 1f: 48 89 c2 mov %rax,%rdx 22: 48 c1 ea 20 shr $0x20,%rdx 26: 74 0a je 0x32 28: 48 99 cqto * 2a: 48 f7 f9 idiv %rcx <-- trapping instruction 2d: 49 89 c4 mov %rax,%r12 30: eb 07 jmp 0x39 32: 31 d2 xor %edx,%edx 34: f7 f1 div %ecx 36: 41 89 c4 mov %eax,%r12d 39: 41 0f b6 4f 7b movzbl 0x7b(%r15),%ecx 3e: 41 rex.B 3f: 39 .byte 0x39