------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:27! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 26672 Comm: modprobe Not tainted 4.19.107-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:27 Code: 1f 5d 08 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 90 98 37 00 48 85 db 75 0d e8 f6 96 37 00 4c 89 e0 5b 5d 41 5c c3 e8 e9 96 37 00 <0f> 0b e8 e2 96 37 00 48 c7 c0 10 50 a7 88 48 ba 00 00 00 00 00 fc RSP: 0018:ffff888204cdf830 EFLAGS: 00010293 RAX: ffff88807a6305c0 RBX: 8888888888888888 RCX: ffffffff81300178 RDX: 0000000000000000 RSI: ffffffff813001d7 RDI: 0000000000000006 RBP: 8888888908888888 R08: ffff88807a6305c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 8889000888888888 R13: ffff888204cdf888 R14: 0000000000000000 R15: 0000000000000282 FS: 00007f2e3a8e7700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055f0cef9e1e8 CR3: 000000009f341000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:653 [inline] qlink_to_cache mm/kasan/quarantine.c:127 [inline] qlist_free_all+0xbb/0x140 mm/kasan/quarantine.c:163 quarantine_reduce+0x164/0x1a0 mm/kasan/quarantine.c:259 kasan_kmalloc+0x95/0xe0 mm/kasan/kasan.c:538 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x145/0x770 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] kzalloc include/linux/slab.h:709 [inline] ext4_htree_store_dirent+0x88/0x600 fs/ext4/dir.c:458 htree_dirblock_to_tree+0x299/0x5e0 fs/ext4/namei.c:1037 ext4_htree_fill_tree+0x224/0x990 fs/ext4/namei.c:1114 ext4_dx_readdir fs/ext4/dir.c:582 [inline] ext4_readdir+0x150c/0x2e20 fs/ext4/dir.c:125 iterate_dir+0x472/0x5c0 fs/readdir.c:51 __do_sys_getdents fs/readdir.c:268 [inline] __se_sys_getdents fs/readdir.c:249 [inline] __x64_sys_getdents+0x1dd/0x370 fs/readdir.c:249 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f2e3a1d7575 Code: 83 c7 13 e9 ed 53 fd ff 90 90 90 90 90 90 90 90 90 90 90 90 90 41 56 49 89 f0 48 63 ff b8 4e 00 00 00 41 55 41 54 55 53 0f 05 <48> 3d 00 f0 ff ff 77 58 4d 8d 24 00 49 89 c5 4d 39 e0 73 40 4c 89 RSP: 002b:00007ffef5867cc0 EFLAGS: 00000246 ORIG_RAX: 000000000000004e RAX: ffffffffffffffda RBX: 000055f0cef961b0 RCX: 00007f2e3a1d7575 RDX: 0000000000008000 RSI: 000055f0cef961e0 RDI: 0000000000000000 RBP: 00007ffef5867f60 R08: 000055f0cef961e0 R09: 00007f2e3a4b5e90 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffef5867e38 R13: ffffffffffffffa8 R14: 0000000000000000 R15: 00055facc785c680 Modules linked in: ---[ end trace b2e867582ffbc9cf ]--- RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:27 Code: 1f 5d 08 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 90 98 37 00 48 85 db 75 0d e8 f6 96 37 00 4c 89 e0 5b 5d 41 5c c3 e8 e9 96 37 00 <0f> 0b e8 e2 96 37 00 48 c7 c0 10 50 a7 88 48 ba 00 00 00 00 00 fc RSP: 0018:ffff888204cdf830 EFLAGS: 00010293 RAX: ffff88807a6305c0 RBX: 8888888888888888 RCX: ffffffff81300178 RDX: 0000000000000000 RSI: ffffffff813001d7 RDI: 0000000000000006 RBP: 8888888908888888 R08: ffff88807a6305c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 8889000888888888 R13: ffff888204cdf888 R14: 0000000000000000 R15: 0000000000000282 FS: 00007f2e3a8e7700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055f0cef9e1e8 CR3: 000000009f341000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400