Hi, I was testing btrfs with fsfuzzer and encountered a divide error on mount, kernel version 3.19 and 4.0-rc1. I found a similar bug on kernel bugzilla https://bugzilla.kernel.org/show_bug.cgi?id=88611 Please find the fuzzed btrfs image in the buzilla, and the following command will reproduce: mount -o loop btrfs.img /mnt/btrfs Thanks, Eryu Guan [ 309.200469] loop: module loaded [ 309.372689] BTRFS: device fsid 1c0ed5d6-550d-4010-b1b4-ce1828270713 devid 1 transid 4 /dev/loop0 [ 309.384037] BTRFS: super block crcs don't match, older mkfs detected [ 309.385449] BTRFS info (device loop0): disk space caching is enabled [ 309.390429] divide error: 0000 [#1] SMP [ 309.390791] Modules linked in: loop btrfs xor raid6_pq ppdev parport_pc i2c_piix4 parport virtio_balloon pcspkr i2c_core serio_raw xfs sd_mod ata_generic pata_acpi virtio_pci virtio virtio_ring floppy ata_piix libata 8139too 8139cp mii [ 309.391373] CPU: 2 PID: 1855 Comm: mount Not tainted 3.19.0 #15 [ 309.391373] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2007 [ 309.391373] task: ffff880035068d70 ti: ffff8800360f0000 task.ti: ffff8800360f0000 [ 309.391373] RIP: 0010:[<ffffffffa03073a6>] [<ffffffffa03073a6>] __btrfs_map_block+0x176/0x1180 [btrfs] [ 309.391373] RSP: 0018:ffff8800360f38f8 EFLAGS: 00010206 [ 309.391373] RAX: 0000000000020000 RBX: 0000000000020000 RCX: 000000d9000000a9 [ 309.391373] RDX: 0000000000000000 RSI: 00000000c1400000 RDI: ffffffff8f018100 [ 309.391373] RBP: ffff8800360f39e8 R08: 0000000000000000 R09: 0000000000000001 [ 309.391373] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000020000 [ 309.391373] R13: ffff8802157e56c0 R14: 0000000000020000 R15: 000000008f018100 [ 309.391373] FS: 00007fcf592eb880(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 309.391373] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 309.391373] CR2: 00007f9e367fc034 CR3: 0000000035e6e000 CR4: 00000000000006e0 [ 309.391373] Stack: [ 309.391373] 0000000000001000 ffff880212fc6a68 0000000000000000 ffff880211a98040 [ 309.391373] ffff8800360f3928 ffffffff812eb7be ffff8800360f3988 ffffffffa0300a82 [ 309.391373] ffff8800360f3a50 ffff880035e7f000 0000000000000000 ffff880035e7ff60 [ 309.391373] Call Trace: [ 309.391373] [<ffffffff812eb7be>] ? bio_add_page+0x5e/0x70 [ 309.391373] [<ffffffffa0300a82>] ? submit_extent_page.isra.34+0xe2/0x1d0 [btrfs] [ 309.406845] [<ffffffffa0302a20>] ? btrfs_create_repair_bio+0x110/0x110 [btrfs] [ 309.406845] [<ffffffffa030d8d6>] btrfs_map_bio+0x96/0x550 [btrfs] [ 309.406845] [<ffffffff811d10b1>] ? kmem_cache_alloc+0x1a1/0x220 [ 309.406845] [<ffffffffa02d9fca>] btree_submit_bio_hook+0x5a/0x100 [btrfs] [ 309.406845] [<ffffffffa02fcc38>] submit_one_bio+0x68/0xa0 [btrfs] [ 309.406845] [<ffffffffa0304ab0>] read_extent_buffer_pages+0x270/0x330 [btrfs] [ 309.406845] [<ffffffffa02d7120>] ? free_root_pointers+0x60/0x60 [btrfs] [ 309.406845] [<ffffffffa02d8393>] btree_read_extent_buffer_pages.constprop.52+0xb3/0x120 [btrfs] [ 309.406845] [<ffffffffa02da270>] read_tree_block+0x40/0x70 [btrfs] [ 309.406845] [<ffffffffa02ddcdc>] open_ctree+0x143c/0x2140 [btrfs] [ 309.406845] [<ffffffffa02b333e>] btrfs_mount+0x76e/0x900 [btrfs] [ 309.406845] [<ffffffff81197604>] ? pcpu_alloc+0x364/0x680 [ 309.406845] [<ffffffff811f2e09>] mount_fs+0x39/0x1b0 [ 309.406845] [<ffffffff81197955>] ? __alloc_percpu+0x15/0x20 [ 309.406845] [<ffffffff8120ea0b>] vfs_kern_mount+0x6b/0x110 [ 309.406845] [<ffffffff812117fc>] do_mount+0x22c/0xb60 [ 309.406845] [<ffffffff811926e6>] ? memdup_user+0x46/0x80 [ 309.406845] [<ffffffff81212472>] SyS_mount+0xa2/0x110 [ 309.406845] [<ffffffff816b76e9>] system_call_fastpath+0x12/0x17 [ 309.406845] Code: 23 10 00 00 48 81 c4 c8 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 45 89 c8 31 d2 41 29 c0 48 89 d8 4d 63 c0 4c 0f af c7 45 89 c2 <49> f7 f2 4c 0f af c0 f7 c1 f8 01 00 00 4c 89 85 70 ff ff ff 0f [ 309.406845] RIP [<ffffffffa03073a6>] __btrfs_map_block+0x176/0x1180 [btrfs] [ 309.406845] RSP <ffff8800360f38f8> -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html