------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 PID: 535 Comm: syz-executor.0 Not tainted 6.9.0-rc1-next-20240328-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:__phys_addr+0x162/0x170 arch/x86/mm/physaddr.c:28 Code: e8 e3 4b 53 00 48 c7 c7 00 73 1a 8e 4c 89 f6 4c 89 fa e8 e1 8e a5 03 e9 45 ff ff ff e8 c7 4b 53 00 90 0f 0b e8 bf 4b 53 00 90 <0f> 0b e8 b7 4b 53 00 90 0f 0b 0f 1f 40 00 90 90 90 90 90 90 90 90 RSP: 0018:ffffc90003f4f7d0 EFLAGS: 00010046 RAX: ffffffff81421f11 RBX: 0000000000000001 RCX: 0000000000040000 RDX: ffffc9001633d000 RSI: 000000000003ffff RDI: 0000000000040000 RBP: ffffffff81ee9651 R08: ffffffff81421e5c R09: 1ffffffff292a5f4 R10: dffffc0000000000 R11: fffffbfff292a5f5 R12: 0000000000402800 R13: 0000000000000240 R14: 0000408003f4f860 R15: 000000000000002e FS: 00007f65929306c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3e7937e1f8 CR3: 000000004701a000 CR4: 00000000003526f0 Call Trace: virt_to_folio include/linux/mm.h:1307 [inline] virt_to_slab mm/kasan/../slab.h:204 [inline] poison_slab_object+0x1a/0x150 mm/kasan/common.c:222 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2180 [inline] memcg_alloc_abort_single+0x71/0x1c0 mm/slub.c:4372 memcg_slab_post_alloc_hook mm/slub.c:2097 [inline] slab_post_alloc_hook mm/slub.c:3888 [inline] slab_alloc_node mm/slub.c:3927 [inline] kmem_cache_alloc_lru_noprof+0x201/0x2b0 mm/slub.c:3946 xas_alloc lib/xarray.c:375 [inline] xas_create+0x10c1/0x16b0 lib/xarray.c:677 xas_store+0xa3/0x1980 lib/xarray.c:787 __filemap_add_folio+0xacc/0x19d0 mm/filemap.c:914 filemap_add_folio+0x157/0x650 mm/filemap.c:970 page_cache_ra_unbounded+0x212/0x7f0 mm/readahead.c:252 do_page_cache_ra mm/readahead.c:303 [inline] force_page_cache_ra+0x2a7/0x310 mm/readahead.c:334 force_page_cache_readahead mm/internal.h:239 [inline] generic_fadvise+0x528/0x840 mm/fadvise.c:106 ksys_readahead mm/readahead.c:739 [inline] __do_sys_readahead mm/readahead.c:747 [inline] __se_sys_readahead mm/readahead.c:745 [inline] __x64_sys_readahead+0x1b2/0x240 mm/readahead.c:745 do_syscall_64+0xfb/0x240 entry_SYSCALL_64_after_hwframe+0x6d/0x75 RIP: 0033:0x7f6591c7dda9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f65929300c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000bb RAX: ffffffffffffffda RBX: 00007f6591dac050 RCX: 00007f6591c7dda9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f6591cca47a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007f6591dac050 R15: 00007ffc6c3ae528 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__phys_addr+0x162/0x170 arch/x86/mm/physaddr.c:28 Code: e8 e3 4b 53 00 48 c7 c7 00 73 1a 8e 4c 89 f6 4c 89 fa e8 e1 8e a5 03 e9 45 ff ff ff e8 c7 4b 53 00 90 0f 0b e8 bf 4b 53 00 90 <0f> 0b e8 b7 4b 53 00 90 0f 0b 0f 1f 40 00 90 90 90 90 90 90 90 90 RSP: 0018:ffffc90003f4f7d0 EFLAGS: 00010046 RAX: ffffffff81421f11 RBX: 0000000000000001 RCX: 0000000000040000 RDX: ffffc9001633d000 RSI: 000000000003ffff RDI: 0000000000040000 RBP: ffffffff81ee9651 R08: ffffffff81421e5c R09: 1ffffffff292a5f4 R10: dffffc0000000000 R11: fffffbfff292a5f5 R12: 0000000000402800 R13: 0000000000000240 R14: 0000408003f4f860 R15: 000000000000002e FS: 00007f65929306c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3e7937e1f8 CR3: 000000004701a000 CR4: 00000000003526f0