------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 2987 Comm: udevadm Not tainted 6.0.0-rc1-next-20220816-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 56 30 45 00 48 85 db 75 0f e8 6c 33 45 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 5d 33 45 00 <0f> 0b e8 56 33 45 00 48 c7 c0 10 50 cb 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc9000215fc20 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff000000000000 RCX: 0000000000000000 RDX: ffff88807d751d80 RSI: ffffffff8136e1c3 RDI: 0000000000000006 RBP: ffff000080000000 R08: 0000000000000006 R09: ffff000080000000 R10: ffff778000000000 R11: 0000000000000000 R12: ffff778000000000 R13: ffffc9000215fc88 R14: ffff000000000000 R15: 0000000000000000 FS: 00007fa10fdbc840(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000559b12165008 CR3: 00000000253ca000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_folio include/linux/mm.h:856 [inline] virt_to_slab mm/kasan/../slab.h:175 [inline] qlink_to_cache mm/kasan/quarantine.c:131 [inline] qlist_free_all+0x86/0x170 mm/kasan/quarantine.c:184 kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:294 __kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:447 kasan_slab_alloc include/linux/kasan.h:224 [inline] slab_post_alloc_hook mm/slab.h:727 [inline] slab_alloc_node mm/slub.c:3243 [inline] slab_alloc mm/slub.c:3251 [inline] kmem_cache_alloc_trace+0x2c0/0x3e0 mm/slub.c:3282 kmalloc include/linux/slab.h:606 [inline] kzalloc include/linux/slab.h:739 [inline] kernfs_iop_get_link fs/kernfs/symlink.c:135 [inline] kernfs_iop_get_link+0x6a/0x710 fs/kernfs/symlink.c:126 vfs_readlink+0x1d7/0x390 fs/namei.c:5003 do_readlinkat+0x27e/0x2f0 fs/stat.c:468 __do_sys_readlink fs/stat.c:489 [inline] __se_sys_readlink fs/stat.c:486 [inline] __x64_sys_readlink+0x74/0xb0 fs/stat.c:486 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fa10f927277 Code: 73 01 c3 48 8b 0d 01 dc 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 59 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d d1 db 0c 00 f7 d8 64 89 01 48 RSP: 002b:00007ffecaab72d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 RAX: ffffffffffffffda RBX: 00007ffecaab72e8 RCX: 00007fa10f927277 RDX: 0000000000000400 RSI: 00007ffecaab72e8 RDI: 00007ffecaab77c8 RBP: 0000000000000400 R08: 000000003fffffff R09: 0000000000000000 R10: 0000000000000012 R11: 0000000000000246 R12: 00007ffecaab77c8 R13: 00007ffecaab7738 R14: 0000559b1215c910 R15: 0000559b1215ca60 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 56 30 45 00 48 85 db 75 0f e8 6c 33 45 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 5d 33 45 00 <0f> 0b e8 56 33 45 00 48 c7 c0 10 50 cb 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc9000215fc20 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff000000000000 RCX: 0000000000000000 RDX: ffff88807d751d80 RSI: ffffffff8136e1c3 RDI: 0000000000000006 RBP: ffff000080000000 R08: 0000000000000006 R09: ffff000080000000 R10: ffff778000000000 R11: 0000000000000000 R12: ffff778000000000 R13: ffffc9000215fc88 R14: ffff000000000000 R15: 0000000000000000 FS: 00007fa10fdbc840(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000559b12165008 CR3: 00000000253ca000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400