------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 4257 Comm: systemd-udevd Not tainted 5.7.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0x107/0x120 arch/x86/mm/physaddr.c:28 Code: eb ab 48 c7 c1 05 a3 6b 89 80 e1 07 38 c1 0f 8c 75 ff ff ff 48 c7 c7 05 a3 6b 89 e8 13 a9 7d 00 e9 64 ff ff ff e8 d9 c5 3f 00 <0f> 0b e8 d2 c5 3f 00 0f 0b e8 cb c5 3f 00 0f 0b 66 0f 1f 84 00 00 RSP: 0018:ffffc90000f77850 EFLAGS: 00010293 RAX: ffffffff81339bb7 RBX: ffff880080000000 RCX: ffff88809f416040 RDX: 0000000000000000 RSI: ffff880080000000 RDI: ffffff8000000000 RBP: ffff880000000000 R08: ffffffff81339af1 R09: ffffed10154a87c1 R10: ffffed10154a87c1 R11: 0000000000000000 R12: ffff888049591a40 R13: 0000000000000020 R14: ffffff8000000000 R15: ffffea0000000000 FS: 00007f3d37e268c0(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000563643e52d28 CR3: 000000009e851000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:833 [inline] qlink_to_cache mm/kasan/quarantine.c:128 [inline] qlist_free_all mm/kasan/quarantine.c:164 [inline] quarantine_reduce+0x130/0x1c0 mm/kasan/quarantine.c:260 __kasan_kmalloc+0x43/0x160 mm/kasan/common.c:476 slab_post_alloc_hook mm/slab.h:586 [inline] slab_alloc mm/slab.c:3320 [inline] __do_kmalloc mm/slab.c:3654 [inline] __kmalloc+0x228/0x330 mm/slab.c:3665 kmalloc include/linux/slab.h:560 [inline] kzalloc include/linux/slab.h:669 [inline] tomoyo_encode2+0x25a/0x560 security/tomoyo/realpath.c:44 tomoyo_encode security/tomoyo/realpath.c:79 [inline] tomoyo_realpath_from_path+0x5d6/0x630 security/tomoyo/realpath.c:286 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x17d/0x740 security/tomoyo/file.c:822 security_inode_getattr+0xc0/0x140 security/security.c:1273 vfs_getattr+0x27/0x6e0 fs/stat.c:117 vfs_statx fs/stat.c:201 [inline] vfs_lstat include/linux/fs.h:3284 [inline] __do_sys_newlstat fs/stat.c:364 [inline] __se_sys_newlstat+0x85/0x140 fs/stat.c:358 do_syscall_64+0xf3/0x1b0 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xb3 RIP: 0033:0x7f3d36c99335 Code: 69 db 2b 00 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 83 ff 01 48 89 f0 77 30 48 89 c7 48 89 d6 b8 06 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 03 f3 c3 90 48 8b 15 31 db 2b 00 f7 d8 64 89 RSP: 002b:00007ffd5f71b1f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000006 RAX: ffffffffffffffda RBX: 0000563643de93d0 RCX: 00007f3d36c99335 RDX: 00007ffd5f71b230 RSI: 00007ffd5f71b230 RDI: 0000563643de83d0 RBP: 00007ffd5f71b2f0 R08: 00007f3d36f58178 R09: 0000000000001010 R10: 0000000000000020 R11: 0000000000000246 R12: 0000563643de83d0 R13: 0000563643de83d8 R14: 0000563643e25ef5 R15: 0000563643e25ef8 Modules linked in: ---[ end trace 43520aa6a59d3d59 ]--- RIP: 0010:__phys_addr+0x107/0x120 arch/x86/mm/physaddr.c:28 Code: eb ab 48 c7 c1 05 a3 6b 89 80 e1 07 38 c1 0f 8c 75 ff ff ff 48 c7 c7 05 a3 6b 89 e8 13 a9 7d 00 e9 64 ff ff ff e8 d9 c5 3f 00 <0f> 0b e8 d2 c5 3f 00 0f 0b e8 cb c5 3f 00 0f 0b 66 0f 1f 84 00 00 RSP: 0018:ffffc90000f77850 EFLAGS: 00010293 RAX: ffffffff81339bb7 RBX: ffff880080000000 RCX: ffff88809f416040 RDX: 0000000000000000 RSI: ffff880080000000 RDI: ffffff8000000000 RBP: ffff880000000000 R08: ffffffff81339af1 R09: ffffed10154a87c1 R10: ffffed10154a87c1 R11: 0000000000000000 R12: ffff888049591a40 R13: 0000000000000020 R14: ffffff8000000000 R15: ffffea0000000000 FS: 00007f3d37e268c0(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000563643e52d28 CR3: 000000009e851000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400