------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 9422 Comm: syz-executor.3 Not tainted 5.6.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:28 Code: 73 32 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 00 e1 3e 00 48 85 db 75 0d e8 66 df 3e 00 4c 89 e0 5b 5d 41 5c c3 e8 59 df 3e 00 <0f> 0b e8 52 df 3e 00 48 c7 c0 10 50 67 89 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc900023b7a28 EFLAGS: 00010293 RAX: ffff88806b6643c0 RBX: 0007700077777777 RCX: ffffffff81334568 RDX: 0000000000000000 RSI: ffffffff813345c7 RDI: 0000000000000006 RBP: 00077000f7777777 R08: ffff88806b6643c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0007e78077777777 R13: ffffc900023b7a80 R14: 0000000000000000 R15: 0000000000000286 FS: 0000000000000000(0000) GS:ffff8880ae700000(0063) knlGS:00000000086d6900 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 000000000869258a CR3: 000000006b5f7000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:721 [inline] qlink_to_cache mm/kasan/quarantine.c:128 [inline] qlist_free_all+0xbb/0x140 mm/kasan/quarantine.c:164 quarantine_reduce+0x159/0x190 mm/kasan/quarantine.c:260 __kasan_kmalloc.constprop.0+0x97/0xd0 mm/kasan/common.c:496 slab_post_alloc_hook mm/slab.h:584 [inline] slab_alloc_node mm/slab.c:3263 [inline] kmem_cache_alloc_node+0x13c/0x760 mm/slab.c:3575 alloc_task_struct_node kernel/fork.c:169 [inline] dup_task_struct kernel/fork.c:868 [inline] copy_process+0x5e7/0x7290 kernel/fork.c:1920 _do_fork+0x12d/0x1010 kernel/fork.c:2430 __do_compat_sys_x86_clone arch/x86/ia32/sys_ia32.c:253 [inline] __se_compat_sys_x86_clone arch/x86/ia32/sys_ia32.c:236 [inline] __ia32_compat_sys_x86_clone+0x17b/0x210 arch/x86/ia32/sys_ia32.c:236 do_syscall_32_irqs_on arch/x86/entry/common.c:337 [inline] do_fast_syscall_32+0x270/0xe8f arch/x86/entry/common.c:408 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 Modules linked in: ---[ end trace 20824bc057e67388 ]--- RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:28 Code: 73 32 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 00 e1 3e 00 48 85 db 75 0d e8 66 df 3e 00 4c 89 e0 5b 5d 41 5c c3 e8 59 df 3e 00 <0f> 0b e8 52 df 3e 00 48 c7 c0 10 50 67 89 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc900023b7a28 EFLAGS: 00010293 RAX: ffff88806b6643c0 RBX: 0007700077777777 RCX: ffffffff81334568 RDX: 0000000000000000 RSI: ffffffff813345c7 RDI: 0000000000000006 RBP: 00077000f7777777 R08: ffff88806b6643c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0007e78077777777 R13: ffffc900023b7a80 R14: 0000000000000000 R15: 0000000000000286 FS: 0000000000000000(0000) GS:ffff8880ae600000(0063) knlGS:00000000086d6900 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000081300f0 CR3: 000000006b5f7000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600