------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 21318 Comm: syz-executor.4 Not tainted 5.7.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:28 Code: a2 55 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 60 9a 3f 00 48 85 db 75 0d e8 c6 98 3f 00 4c 89 e0 5b 5d 41 5c c3 e8 b9 98 3f 00 <0f> 0b e8 b2 98 3f 00 48 c7 c0 10 10 88 89 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc90001ab7c40 EFLAGS: 00010216 RAX: 0000000000040000 RBX: 0077077000770770 RCX: ffffc90012249000 RDX: 000000000000dc88 RSI: ffffffff81339ab7 RDI: 0000000000000006 RBP: 0077077080770770 R08: ffff888097a10400 R09: fffffbfff185cf57 R10: ffffffff8c2e7ab7 R11: fffffbfff185cf56 R12: 00777ef000770770 R13: ffffc90001ab7c98 R14: 0000000000000000 R15: 0000000000000286 FS: 0000000000000000(0000) GS:ffff8880ae700000(0063) knlGS:00000000f5d2eb40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000f5d2dd80 CR3: 000000009781f000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:833 [inline] qlink_to_cache mm/kasan/quarantine.c:128 [inline] qlist_free_all+0xbb/0x140 mm/kasan/quarantine.c:164 quarantine_reduce+0x159/0x190 mm/kasan/quarantine.c:260 __kasan_kmalloc.constprop.0+0x97/0xd0 mm/kasan/common.c:476 kmalloc_node include/linux/slab.h:578 [inline] kvmalloc_node+0x61/0xf0 mm/util.c:574 kvmalloc include/linux/mm.h:757 [inline] newque+0x80/0x630 ipc/msg.c:150 ipcget_new ipc/util.c:344 [inline] ipcget+0xf0/0xcb0 ipc/util.c:643 ksys_msgget ipc/msg.c:307 [inline] __do_sys_msgget ipc/msg.c:312 [inline] __se_sys_msgget ipc/msg.c:310 [inline] __ia32_sys_msgget+0x10f/0x170 ipc/msg.c:310 do_syscall_32_irqs_on arch/x86/entry/common.c:337 [inline] do_fast_syscall_32+0x270/0xe90 arch/x86/entry/common.c:396 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 Modules linked in: ---[ end trace b5dc206c2b9adf69 ]--- RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:28 Code: a2 55 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 60 9a 3f 00 48 85 db 75 0d e8 c6 98 3f 00 4c 89 e0 5b 5d 41 5c c3 e8 b9 98 3f 00 <0f> 0b e8 b2 98 3f 00 48 c7 c0 10 10 88 89 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc90001ab7c40 EFLAGS: 00010216 RAX: 0000000000040000 RBX: 0077077000770770 RCX: ffffc90012249000 RDX: 000000000000dc88 RSI: ffffffff81339ab7 RDI: 0000000000000006 RBP: 0077077080770770 R08: ffff888097a10400 R09: fffffbfff185cf57 R10: ffffffff8c2e7ab7 R11: fffffbfff185cf56 R12: 00777ef000770770 R13: ffffc90001ab7c98 R14: 0000000000000000 R15: 0000000000000286 FS: 0000000000000000(0000) GS:ffff8880ae700000(0063) knlGS:00000000f5d2eb40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000032c28000 CR3: 000000009781f000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400