------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 29551 Comm: syz-executor.5 Not tainted 5.14.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 56 2e 41 00 48 85 db 75 0f e8 ec 28 41 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 dd 28 41 00 <0f> 0b e8 d6 28 41 00 48 c7 c0 10 50 6b 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc900107dfa98 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff88801b948000 RSI: ffffffff81347ee3 RDI: 0000000000000003 RBP: 0000000080000000 R08: 0000000080000000 R09: ffff8880adb2006f R10: ffffffff81347e5e R11: 000000000000003f R12: 0000778000000000 R13: 0000000000000000 R14: 00000000004180c0 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00007fff22dc7960 CR3: 0000000148e35000 CR4: 00000000001526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:899 [inline] kmem_cache_free+0x43/0x5b0 mm/slub.c:3226 pgtable_pte_page_dtor include/linux/mm.h:2259 [inline] ___pte_free_tlb+0x19/0x1a0 arch/x86/mm/pgtable.c:55 __pte_free_tlb arch/x86/include/asm/pgalloc.h:61 [inline] free_pte_range mm/memory.c:231 [inline] free_pmd_range mm/memory.c:249 [inline] free_pud_range mm/memory.c:283 [inline] free_p4d_range mm/memory.c:317 [inline] free_pgd_range+0x48d/0xbe0 mm/memory.c:397 free_pgtables+0x230/0x2f0 mm/memory.c:429 exit_mmap+0x1df/0x620 mm/mmap.c:3202 __mmput+0x122/0x470 kernel/fork.c:1101 mmput+0x58/0x60 kernel/fork.c:1122 exit_mm kernel/exit.c:501 [inline] do_exit+0xae2/0x2a60 kernel/exit.c:812 do_group_exit+0x125/0x310 kernel/exit.c:922 __do_sys_exit_group kernel/exit.c:933 [inline] __se_sys_exit_group kernel/exit.c:931 [inline] __ia32_sys_exit_group+0x3a/0x50 kernel/exit.c:931 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline] __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178 do_fast_syscall_32+0x2f/0x70 arch/x86/entry/common.c:203 entry_SYSENTER_compat_after_hwframe+0x4d/0x5c RIP: 0023:0xf7faf549 Code: Unable to access opcode bytes at RIP 0xf7faf51f. RSP: 002b:00000000086cfd1c EFLAGS: 00000206 ORIG_RAX: 00000000000000fc RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000 RDX: 00000000ffffffff RSI: 0000000000000003 RDI: 000000000816c000 RBP: 000000000000001e R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: ---[ end trace 0b309fb964e47510 ]--- RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 56 2e 41 00 48 85 db 75 0f e8 ec 28 41 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 dd 28 41 00 <0f> 0b e8 d6 28 41 00 48 c7 c0 10 50 6b 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc900107dfa98 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff88801b948000 RSI: ffffffff81347ee3 RDI: 0000000000000003 RBP: 0000000080000000 R08: 0000000080000000 R09: ffff8880adb2006f R10: ffffffff81347e5e R11: 000000000000003f R12: 0000778000000000 R13: 0000000000000000 R14: 00000000004180c0 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00007fff22dc7960 CR3: 0000000148e35000 CR4: 00000000001526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: e3 44 jrcxz 0x46 2: 89 e9 mov %ebp,%ecx 4: 31 ff xor %edi,%edi 6: 48 d3 eb shr %cl,%rbx 9: 48 89 de mov %rbx,%rsi c: e8 56 2e 41 00 callq 0x412e67 11: 48 85 db test %rbx,%rbx 14: 75 0f jne 0x25 16: e8 ec 28 41 00 callq 0x412907 1b: 4c 89 e0 mov %r12,%rax 1e: 5b pop %rbx 1f: 5d pop %rbp 20: 41 5c pop %r12 22: 41 5d pop %r13 24: c3 retq 25: e8 dd 28 41 00 callq 0x412907 2a: 0f 0b ud2 <-- trapping instruction 2c: e8 d6 28 41 00 callq 0x412907 31: 48 c7 c0 10 50 6b 8b mov $0xffffffff8b6b5010,%rax 38: 48 rex.W 39: ba 00 00 00 00 mov $0x0,%edx 3e: 00 fc add %bh,%ah