------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 8459 Comm: syz-fuzzer Not tainted 5.14.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 f6 31 41 00 48 85 db 75 0f e8 8c 2c 41 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 7d 2c 41 00 <0f> 0b e8 76 2c 41 00 48 c7 c0 10 50 6b 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc9000167f858 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0707070707070707 RCX: 0000000000000000 RDX: ffff888026da9c40 RSI: ffffffff81346ee3 RDI: 0000000000000003 RBP: 0707070787070707 R08: 0707070787070707 R09: ffffffff81bbd585 R10: ffffffff81346e5e R11: 000000000000003f R12: 07077e8707070707 R13: ffffc9000167f8b8 R14: ffffea0000000000 R15: 0707070707070707 FS: 000000c00029a490(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000a822efc CR3: 0000000036a0c000 CR4: 00000000001526e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:899 [inline] qlink_to_cache mm/kasan/quarantine.c:120 [inline] qlist_free_all+0x76/0xc0 mm/kasan/quarantine.c:162 kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:272 __kasan_slab_alloc+0x8e/0xa0 mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook mm/slab.h:519 [inline] slab_alloc_node mm/slub.c:2956 [inline] kmem_cache_alloc_node+0x266/0x3e0 mm/slub.c:2992 __alloc_skb+0x20b/0x340 net/core/skbuff.c:414 alloc_skb_fclone include/linux/skbuff.h:1162 [inline] sk_stream_alloc_skb+0x109/0xc30 net/ipv4/tcp.c:887 tcp_sendmsg_locked+0xc78/0x2f10 net/ipv4/tcp.c:1309 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1461 inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:821 sock_sendmsg_nosec net/socket.c:703 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:723 sock_write_iter+0x289/0x3c0 net/socket.c:1056 call_write_iter include/linux/fs.h:2114 [inline] new_sync_write+0x426/0x650 fs/read_write.c:518 vfs_write+0x75a/0xa40 fs/read_write.c:605 ksys_write+0x1ee/0x250 fs/read_write.c:658 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4af19b Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 RSP: 002b:000000c000637408 EFLAGS: 00000216 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b RDX: 00000000000000f0 RSI: 000000c00000a200 RDI: 0000000000000006 RBP: 000000c000637458 R08: 000000c000637501 R09: 0000000000000004 R10: 000000c00000a1e0 R11: 0000000000000216 R12: 000000000000011e R13: 000000c0003ec000 R14: 000000000000007f R15: 000000000000021c Modules linked in: ---[ end trace 8f578d34bb6817d9 ]--- RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 f6 31 41 00 48 85 db 75 0f e8 8c 2c 41 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 7d 2c 41 00 <0f> 0b e8 76 2c 41 00 48 c7 c0 10 50 6b 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc9000167f858 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0707070707070707 RCX: 0000000000000000 RDX: ffff888026da9c40 RSI: ffffffff81346ee3 RDI: 0000000000000003 RBP: 0707070787070707 R08: 0707070787070707 R09: ffffffff81bbd585 R10: ffffffff81346e5e R11: 000000000000003f R12: 07077e8707070707 R13: ffffc9000167f8b8 R14: ffffea0000000000 R15: 0707070707070707 FS: 000000c00029a490(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffe7c5da720 CR3: 0000000036a0c000 CR4: 00000000001526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400