------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 23972 Comm: syz-executor.0 Not tainted 5.9.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0x107/0x120 arch/x86/mm/physaddr.c:28 Code: eb ab 48 c7 c1 65 0a 8f 89 80 e1 07 38 c1 0f 8c 75 ff ff ff 48 c7 c7 65 0a 8f 89 e8 e3 f8 7f 00 e9 64 ff ff ff e8 89 2e 40 00 <0f> 0b e8 82 2e 40 00 0f 0b e8 7b 2e 40 00 0f 0b 66 0f 1f 84 00 00 RSP: 0018:ffffc900063b7ac0 EFLAGS: 00010293 RAX: ffffffff8134df47 RBX: 8887788908888888 RCX: ffff88808a050100 RDX: 0000000000000000 RSI: 8887788908888888 RDI: 8887f00888888888 RBP: 8887788888888888 R08: ffffffff8134de81 R09: ffffed1025fff799 R10: ffffed1025fff799 R11: 0000000000000000 R12: ffff88821160a8c0 R13: 0000000000001000 R14: 8887f00888888888 R15: ffffea0000000000 FS: 00000000020d0940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555d7b42f660 CR3: 000000006e700000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:850 [inline] qlink_to_cache mm/kasan/quarantine.c:128 [inline] qlist_free_all mm/kasan/quarantine.c:165 [inline] quarantine_reduce+0x130/0x1c0 mm/kasan/quarantine.c:261 __kasan_kmalloc+0x32/0x130 mm/kasan/common.c:442 slab_post_alloc_hook+0x3e/0x290 mm/slab.h:518 slab_alloc mm/slab.c:3312 [inline] kmem_cache_alloc+0x1c1/0x2d0 mm/slab.c:3482 getname_flags+0xb8/0x610 fs/namei.c:138 do_sys_openat2+0x40c/0x830 fs/open.c:1162 do_sys_open fs/open.c:1184 [inline] __do_sys_open fs/open.c:1192 [inline] __se_sys_open fs/open.c:1188 [inline] __x64_sys_open+0x1af/0x1e0 fs/open.c:1188 do_syscall_64+0x31/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45b570 Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 RSP: 002b:00007ffc2e904c30 EFLAGS: 00000206 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 0000000000137150 RCX: 000000000045b570 RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007ffc2e905e10 RBP: 0000000000000d44 R08: 0000000000000000 R09: 00000000020d0940 R10: 0000000000000000 R11: 0000000000000206 R12: 00007ffc2e905e10 R13: 00007ffc2e905e00 R14: 0000000000000000 R15: 00007ffc2e905e10 Modules linked in: ---[ end trace b1ed6b0b14ba88e3 ]--- RIP: 0010:__phys_addr+0x107/0x120 arch/x86/mm/physaddr.c:28 Code: eb ab 48 c7 c1 65 0a 8f 89 80 e1 07 38 c1 0f 8c 75 ff ff ff 48 c7 c7 65 0a 8f 89 e8 e3 f8 7f 00 e9 64 ff ff ff e8 89 2e 40 00 <0f> 0b e8 82 2e 40 00 0f 0b e8 7b 2e 40 00 0f 0b 66 0f 1f 84 00 00 RSP: 0018:ffffc900063b7ac0 EFLAGS: 00010293 RAX: ffffffff8134df47 RBX: 8887788908888888 RCX: ffff88808a050100 RDX: 0000000000000000 RSI: 8887788908888888 RDI: 8887f00888888888 RBP: 8887788888888888 R08: ffffffff8134de81 R09: ffffed1025fff799 R10: ffffed1025fff799 R11: 0000000000000000 R12: ffff88821160a8c0 R13: 0000000000001000 R14: 8887f00888888888 R15: ffffea0000000000 FS: 00000000020d0940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b33238000 CR3: 000000006e700000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400