------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 3909 Comm: systemd-udevd Not tainted 5.9.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0x107/0x120 arch/x86/mm/physaddr.c:28 Code: eb ab 48 c7 c1 e5 f9 8e 89 80 e1 07 38 c1 0f 8c 75 ff ff ff 48 c7 c7 e5 f9 8e 89 e8 23 03 80 00 e9 64 ff ff ff e8 09 29 40 00 <0f> 0b e8 02 29 40 00 0f 0b e8 fb 28 40 00 0f 0b 66 0f 1f 84 00 00 RSP: 0018:ffffc900053a7ac0 EFLAGS: 00010293 RAX: ffffffff8134cf17 RBX: ecfc007cb0dcecfc RCX: ffff8880a1da82c0 RDX: 0000000000000000 RSI: ecfc007cb0dcecfc RDI: ecfc77fc30dcecfc RBP: ecfc007c30dcecfc R08: ffffffff8134ce51 R09: fffffbfff12a62f1 R10: fffffbfff12a62f1 R11: 0000000000000000 R12: ffff88801453c1c0 R13: 0000000000001000 R14: ecfc77fc30dcecfc R15: ffffea0000000000 FS: 00007f31829988c0(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2ee23000 CR3: 00000000a1c05000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:846 [inline] qlink_to_cache mm/kasan/quarantine.c:128 [inline] qlist_free_all mm/kasan/quarantine.c:165 [inline] quarantine_reduce+0x130/0x1c0 mm/kasan/quarantine.c:261 __kasan_kmalloc+0x32/0x130 mm/kasan/common.c:442 slab_post_alloc_hook+0x3e/0x290 mm/slab.h:518 slab_alloc mm/slab.c:3312 [inline] kmem_cache_alloc+0x1d2/0x2d0 mm/slab.c:3482 getname_flags+0xb8/0x610 fs/namei.c:138 do_sys_openat2+0x40c/0x830 fs/open.c:1162 do_sys_open fs/open.c:1184 [inline] __do_sys_open fs/open.c:1192 [inline] __se_sys_open fs/open.c:1188 [inline] __x64_sys_open+0x1af/0x1e0 fs/open.c:1188 do_syscall_64+0x31/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f31817e39b1 Code: f7 d8 bf ff ff ff ff 64 89 02 eb cb 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 80 3f 00 74 1b be 00 08 09 00 b8 02 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 1f 89 c7 e9 00 ff ff ff 48 8b 05 b1 54 2e 00 RSP: 002b:00007fff68f740e8 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 000055f9767b9c20 RCX: 00007f31817e39b1 RDX: 00000000000000ff RSI: 0000000000090800 RDI: 000055f97657e310 RBP: 00007f3182998710 R08: 000055f976552a40 R09: 0000000000001010 R10: 0000000000000020 R11: 0000000000000202 R12: 0000000000000000 R13: 000055f97657e310 R14: 00000000000000ff R15: 000055f97657e310 Modules linked in: ---[ end trace edddaa042cd1a23f ]--- RIP: 0010:__phys_addr+0x107/0x120 arch/x86/mm/physaddr.c:28 Code: eb ab 48 c7 c1 e5 f9 8e 89 80 e1 07 38 c1 0f 8c 75 ff ff ff 48 c7 c7 e5 f9 8e 89 e8 23 03 80 00 e9 64 ff ff ff e8 09 29 40 00 <0f> 0b e8 02 29 40 00 0f 0b e8 fb 28 40 00 0f 0b 66 0f 1f 84 00 00 RSP: 0018:ffffc900053a7ac0 EFLAGS: 00010293 RAX: ffffffff8134cf17 RBX: ecfc007cb0dcecfc RCX: ffff8880a1da82c0 RDX: 0000000000000000 RSI: ecfc007cb0dcecfc RDI: ecfc77fc30dcecfc RBP: ecfc007c30dcecfc R08: ffffffff8134ce51 R09: fffffbfff12a62f1 R10: fffffbfff12a62f1 R11: 0000000000000000 R12: ffff88801453c1c0 R13: 0000000000001000 R14: ecfc77fc30dcecfc R15: ffffea0000000000 FS: 00007f31829988c0(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2ee23000 CR3: 00000000a1c05000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400