------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:27! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 30763 Comm: blkid Not tainted 5.5.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0xb3/0x120 arch/x86/mm/physaddr.c:27 Code: 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 c6 04 40 00 48 85 db 75 0f e8 1c 03 40 00 4c 89 e0 5b 41 5c 41 5d 5d c3 e8 0d 03 40 00 <0f> 0b e8 06 03 40 00 48 c7 c0 10 50 87 89 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc9000733fa18 EFLAGS: 00010293 RAX: ffff888097d664c0 RBX: 001800000b95d440 RCX: ffffffff81352a82 RDX: 0000000000000000 RSI: ffffffff81352ae3 RDI: 0000000000000006 RBP: ffffc9000733fa30 R08: ffff888097d664c0 R09: fffffbfff1659bbd R10: fffffbfff1659bbc R11: ffffffff8b2cdde7 R12: 001877800b95d440 R13: 001800008b95d440 R14: ffffc9000733fa80 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000738008 CR3: 0000000046766000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:731 [inline] qlink_to_cache mm/kasan/quarantine.c:128 [inline] qlist_free_all+0xc7/0x150 mm/kasan/quarantine.c:164 quarantine_reduce+0x15e/0x1a0 mm/kasan/quarantine.c:260 __kasan_kmalloc.constprop.0+0xa3/0xe0 mm/kasan/common.c:494 kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:521 slab_post_alloc_hook mm/slab.h:584 [inline] slab_alloc mm/slab.c:3320 [inline] kmem_cache_alloc+0x121/0x710 mm/slab.c:3484 vm_area_alloc+0x20/0x110 kernel/fork.c:351 mmap_region+0x964/0x1760 mm/mmap.c:1754 do_mmap+0x837/0x1150 mm/mmap.c:1555 do_mmap_pgoff include/linux/mm.h:2338 [inline] vm_mmap_pgoff+0x1c5/0x230 mm/util.c:506 ksys_mmap_pgoff+0xf7/0x630 mm/mmap.c:1607 __do_sys_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] __se_sys_mmap arch/x86/kernel/sys_x86_64.c:91 [inline] __x64_sys_mmap+0xe9/0x1b0 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0xfa/0x790 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f8bb34793ea Code: 48 8d 3d 81 69 00 00 b2 84 e8 52 ec ff ff f7 d8 89 05 ae ad 20 00 eb c6 90 90 90 90 90 90 90 90 49 89 ca b8 09 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 8a ad 20 00 31 d2 48 29 c2 89 RSP: 002b:00007ffc24e3db48 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 0000000000002000 RCX: 00007f8bb34793ea RDX: 0000000000000003 RSI: 0000000000002000 RDI: 0000000000000000 RBP: 00000000000014a0 R08: 00000000ffffffff R09: 0000000000000000 R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000002 R14: 00007f8bb3684bc8 R15: 000000000000000f Modules linked in: ---[ end trace 80f659c7b8698744 ]--- RIP: 0010:__phys_addr+0xb3/0x120 arch/x86/mm/physaddr.c:27 Code: 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 c6 04 40 00 48 85 db 75 0f e8 1c 03 40 00 4c 89 e0 5b 41 5c 41 5d 5d c3 e8 0d 03 40 00 <0f> 0b e8 06 03 40 00 48 c7 c0 10 50 87 89 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc9000733fa18 EFLAGS: 00010293 RAX: ffff888097d664c0 RBX: 001800000b95d440 RCX: ffffffff81352a82 RDX: 0000000000000000 RSI: ffffffff81352ae3 RDI: 0000000000000006 RBP: ffffc9000733fa30 R08: ffff888097d664c0 R09: fffffbfff1659bbd R10: fffffbfff1659bbc R11: ffffffff8b2cdde7 R12: 001877800b95d440 R13: 001800008b95d440 R14: ffffc9000733fa80 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000714158 CR3: 0000000046766000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400