------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 4624 Comm: syz-executor.0 Not tainted 5.15.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 66 82 41 00 48 85 db 75 0f e8 fc 7c 41 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 ed 7c 41 00 <0f> 0b e8 e6 7c 41 00 48 c7 c0 10 50 6b 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc90007e1fc58 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000707070700 RCX: 0000000000000000 RDX: ffff8880500ad580 RSI: ffffffff81348ef3 RDI: 0000000000000003 RBP: 0000000787070700 R08: 0000000787070700 R09: 00000000800c000a R10: ffffffff81348e6e R11: 0000000000000000 R12: 0000778707070700 R13: ffffc90007e1fcb8 R14: ffffea0000000000 R15: 0000000707070700 FS: 0000555556840400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2dc28000 CR3: 000000014b08c000 CR4: 00000000001526f0 Call Trace: virt_to_head_page include/linux/mm.h:900 [inline] qlink_to_cache mm/kasan/quarantine.c:120 [inline] qlist_free_all+0x76/0xc0 mm/kasan/quarantine.c:162 kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:272 __kasan_slab_alloc+0x95/0xb0 mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook mm/slab.h:519 [inline] slab_alloc_node mm/slub.c:3206 [inline] slab_alloc mm/slub.c:3214 [inline] kmem_cache_alloc+0x209/0x390 mm/slub.c:3219 kmem_cache_zalloc include/linux/slab.h:711 [inline] taskstats_tgid_alloc kernel/taskstats.c:561 [inline] taskstats_exit+0x5c6/0xb50 kernel/taskstats.c:600 do_exit+0x604/0x2a30 kernel/exit.c:810 do_group_exit+0x125/0x310 kernel/exit.c:922 __do_sys_exit_group kernel/exit.c:933 [inline] __se_sys_exit_group kernel/exit.c:931 [inline] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:931 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f432f55e709 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f432fb96d58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f432f55e709 RDX: 00007f432f51151b RSI: ffffffffffffffbc RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000001b2dc2001c R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007f432fb96e40 Modules linked in: ---[ end trace 207e612e72aba79a ]--- RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 66 82 41 00 48 85 db 75 0f e8 fc 7c 41 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 ed 7c 41 00 <0f> 0b e8 e6 7c 41 00 48 c7 c0 10 50 6b 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc90007e1fc58 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000707070700 RCX: 0000000000000000 RDX: ffff8880500ad580 RSI: ffffffff81348ef3 RDI: 0000000000000003 RBP: 0000000787070700 R08: 0000000787070700 R09: 00000000800c000a R10: ffffffff81348e6e R11: 0000000000000000 R12: 0000778707070700 R13: ffffc90007e1fcb8 R14: ffffea0000000000 R15: 0000000707070700 FS: 0000555556840400(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2dc2e000 CR3: 000000014b08c000 CR4: 00000000001526e0