bond130: Enslaving veth827 as an active interface with an up link ------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:27! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 3688 Comm: systemd-journal Not tainted 4.19.124-syzkaller #0 bond130: Enslaving veth829 as an active interface with an up link Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:27 Code: 52 5d 08 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 c0 b8 37 00 48 85 db 75 0d e8 26 b7 37 00 4c 89 e0 5b 5d 41 5c c3 e8 19 b7 37 00 <0f> 0b e8 12 b7 37 00 48 c7 c0 10 50 a7 88 48 ba 00 00 00 00 00 fc RSP: 0018:ffff888093c17d00 EFLAGS: 00010293 RAX: ffff888093c08180 RBX: 0007000700070700 RCX: ffffffff812fd178 RDX: 0000000000000000 RSI: ffffffff812fd1d7 RDI: 0000000000000006 RBP: 0007000780070700 R08: ffff888093c08180 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0007778700070700 R13: 0007000700070700 R14: ffff888093c17d60 R15: 0000000000000000 FS: 00007efdd5be88c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000b90004 CR3: 0000000093cca000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:653 [inline] qlink_to_cache+0x5/0x30 mm/kasan/quarantine.c:127 qlist_free_all+0xb6/0x110 mm/kasan/quarantine.c:163 quarantine_reduce+0x164/0x1a0 mm/kasan/quarantine.c:259 kasan_kmalloc+0x95/0xc0 mm/kasan/kasan.c:538 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] kmem_cache_alloc+0x111/0x370 mm/slab.c:3557 getname_flags+0xce/0x590 fs/namei.c:140 do_sys_open+0x294/0x510 fs/open.c:1079 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7efdd4ea470d Code: 30 2c 00 00 75 10 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 fe 9d 01 00 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 47 9e 01 00 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007ffcc0cb3aa0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 0000556e0a9e0c40 RCX: 00007efdd4ea470d RDX: 00000000000001b6 RSI: 0000000000080000 RDI: 00007ffcc0cb3b80 RBP: 0000000000000008 R08: 0000000000000008 R09: 0000000000000001 R10: 0000000000080000 R11: 0000000000000293 R12: 00007efdd58ec7b4 R13: 0000000000000001 R14: 00007ffcc0cb4700 R15: 0000556e0a9dd1d0 Modules linked in: ieee80211 phy508: Selected rate control algorithm 'minstrel_ht' bond131: Enslaving veth831 as an active interface with an up link bond131: Enslaving veth833 as an active interface with an up link ieee80211 phy509: Selected rate control algorithm 'minstrel_ht' bond132: Enslaving veth835 as an active interface with an up link ieee80211 phy510: Selected rate control algorithm 'minstrel_ht' nla_parse: 9 callbacks suppressed netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. ---[ end trace d59540322ebbb0a7 ]--- bond132: Enslaving veth837 as an active interface with an up link RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:27 Code: 52 5d 08 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 c0 b8 37 00 48 85 db 75 0d e8 26 b7 37 00 4c 89 e0 5b 5d 41 5c c3 e8 19 b7 37 00 <0f> 0b e8 12 b7 37 00 48 c7 c0 10 50 a7 88 48 ba 00 00 00 00 00 fc RSP: 0018:ffff888093c17d00 EFLAGS: 00010293 ieee80211 phy511: Selected rate control algorithm 'minstrel_ht' RAX: ffff888093c08180 RBX: 0007000700070700 RCX: ffffffff812fd178 RDX: 0000000000000000 RSI: ffffffff812fd1d7 RDI: 0000000000000006 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. RBP: 0007000780070700 R08: ffff888093c08180 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0007778700070700 R13: 0007000700070700 R14: ffff888093c17d60 R15: 0000000000000000 FS: 00007efdd5be88c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 bond133: Enslaving veth839 as an active interface with an up link CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffea0dc72a8 CR3: 0000000093cca000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400