------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 24604 Comm: syz-executor.0 Not tainted 5.9.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:28 Code: 99 7d 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 90 90 3f 00 48 85 db 75 0d e8 e6 93 3f 00 4c 89 e0 5b 5d 41 5c c3 e8 d9 93 3f 00 <0f> 0b e8 d2 93 3f 00 48 c7 c0 10 50 a9 89 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc90002ea79f0 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 7070707000077000 RCX: ffffffff8134b948 RDX: ffff88805ca2a4c0 RSI: ffffffff8134b9a7 RDI: 0000000000000006 RBP: 7070707080077000 R08: 0000000000000001 R09: ffffffff8c5f5a6f R10: 7070707080077000 R11: 0000000000000001 R12: 7070e7f000077000 R13: ffffc90002ea7a58 R14: 0000000000000200 R15: dffffc0000000000 FS: 00000000019a0940(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000016a3b73 CR3: 000000020b674000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:848 [inline] qlink_to_cache mm/kasan/quarantine.c:128 [inline] qlist_free_all+0xd9/0x170 mm/kasan/quarantine.c:165 quarantine_reduce+0x17e/0x200 mm/kasan/quarantine.c:261 __kasan_kmalloc.constprop.0+0x9e/0xd0 mm/kasan/common.c:442 slab_post_alloc_hook mm/slab.h:518 [inline] slab_alloc mm/slab.c:3312 [inline] __do_kmalloc mm/slab.c:3653 [inline] __kmalloc+0x178/0x310 mm/slab.c:3664 kmalloc include/linux/slab.h:559 [inline] kzalloc include/linux/slab.h:666 [inline] tomoyo_encode2.part.0+0xe9/0x3a0 security/tomoyo/realpath.c:45 tomoyo_encode2 security/tomoyo/realpath.c:31 [inline] tomoyo_encode+0x28/0x50 security/tomoyo/realpath.c:80 tomoyo_path_perm+0x35f/0x3f0 security/tomoyo/file.c:831 tomoyo_path_symlink+0x94/0xe0 security/tomoyo/tomoyo.c:200 security_path_symlink+0xdf/0x150 security/security.c:1109 do_symlinkat+0x123/0x2c0 fs/namei.c:3984 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45d2e7 Code: 0f 1f 00 b8 5c 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fffda2ec418 EFLAGS: 00000206 ORIG_RAX: 0000000000000058 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045d2e7 RDX: 00007fffda2ec4b3 RSI: 00000000004c30cd RDI: 00007fffda2ec4a0 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000013 R10: 0000000000000075 R11: 0000000000000206 R12: 0000000000000001 R13: 00007fffda2ec450 R14: 0000000000000000 R15: 00007fffda2ec460 Modules linked in: ---[ end trace c328151725468cc3 ]--- RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:28 Code: 99 7d 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 90 90 3f 00 48 85 db 75 0d e8 e6 93 3f 00 4c 89 e0 5b 5d 41 5c c3 e8 d9 93 3f 00 <0f> 0b e8 d2 93 3f 00 48 c7 c0 10 50 a9 89 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc90002ea79f0 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 7070707000077000 RCX: ffffffff8134b948 RDX: ffff88805ca2a4c0 RSI: ffffffff8134b9a7 RDI: 0000000000000006 RBP: 7070707080077000 R08: 0000000000000001 R09: ffffffff8c5f5a6f R10: 7070707080077000 R11: 0000000000000001 R12: 7070e7f000077000 R13: ffffc90002ea7a58 R14: 0000000000000200 R15: dffffc0000000000 FS: 00000000019a0940(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000016a3b73 CR3: 000000020b674000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400