------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 3523 Comm: systemd-udevd Not tainted 5.14.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 56 2e 41 00 48 85 db 75 0f e8 ec 28 41 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 dd 28 41 00 <0f> 0b e8 d6 28 41 00 48 c7 c0 10 50 6b 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc9000bf4fd60 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0007700000000000 RCX: 0000000000000000 RDX: ffff88802caf8000 RSI: ffffffff81347ee3 RDI: 0000000000000003 RBP: 0007700080000000 R08: 0007700080000000 R09: 00000000ffffff00 R10: ffffffff81347e5e R11: 0000000000000000 R12: 0007e78000000000 R13: ffff888022d74c00 R14: ffff888145b60bc8 R15: ffff888034fcd028 FS: 00007fbb44eb58c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055c310030dd8 CR3: 00000000883f8000 CR4: 00000000001526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:899 [inline] kfree+0x5d/0x530 mm/slub.c:4259 kvfree+0x42/0x50 mm/util.c:616 seq_release+0x4f/0x80 fs/seq_file.c:355 kernfs_fop_release+0xee/0x190 fs/kernfs/file.c:761 __fput+0x288/0x920 fs/file_table.c:280 task_work_run+0xdd/0x1a0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:209 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:302 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbb43cbda4b Code: 48 8b 34 24 eb c5 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ff ff ff ff eb c8 0f 1f 80 00 00 00 00 48 63 7f 70 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 f3 c3 0f 1f 00 48 8b 15 19 74 32 00 f7 d8 RSP: 002b:00007ffdb2966e08 EFLAGS: 00000206 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 000055c31003a240 RCX: 00007fbb43cbda4b RDX: 00007fbb43fe1900 RSI: 0000000000000001 RDI: 000000000000000f RBP: 00007fbb43fe2440 R08: 00007fbb44eb58c0 R09: 000055c31003a240 R10: 00007fbb44eb58c0 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000001000 R15: 00007ffdb2966fe0 Modules linked in: ---[ end trace 5f080864cc632c36 ]--- RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 56 2e 41 00 48 85 db 75 0f e8 ec 28 41 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 dd 28 41 00 <0f> 0b e8 d6 28 41 00 48 c7 c0 10 50 6b 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc9000bf4fd60 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0007700000000000 RCX: 0000000000000000 RDX: ffff88802caf8000 RSI: ffffffff81347ee3 RDI: 0000000000000003 RBP: 0007700080000000 R08: 0007700080000000 R09: 00000000ffffff00 R10: ffffffff81347e5e R11: 0000000000000000 R12: 0007e78000000000 R13: ffff888022d74c00 R14: ffff888145b60bc8 R15: ffff888034fcd028 FS: 00007fbb44eb58c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007efc7c02a000 CR3: 00000000883f8000 CR4: 00000000001526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400