------------[ cut here ]------------
kernel BUG at arch/x86/mm/physaddr.c:27!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 17143 Comm: syz-executor.5 Not tainted 4.19.161-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:27
Code: 46 fa 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 60 82 38 00 48 85 db 75 0d e8 c6 80 38 00 4c 89 e0 5b 5d 41 5c c3 e8 b9 80 38 00 <0f> 0b e8 b2 80 38 00 48 c7 c0 10 30 e7 89 48 ba 00 00 00 00 00 fc
RSP: 0018:ffff888098c0fbb8 EFLAGS: 00010293
RAX: ffff888055260580 RBX: ffff000000000000 RCX: ffffffff812c4ed8
RDX: 0000000000000000 RSI: ffffffff812c4f37 RDI: 0000000000000006
RBP: ffff000080000000 R08: 0000000000000000 R09: ffff000080000000
R10: 0000000000000006 R11: 0000000000000000 R12: ffff778000000000
R13: ffff888098c0fc10 R14: 0000000000000000 R15: 0000000000000286
FS:  0000000001fd8940(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000001fe1a98 CR3: 0000000024c04000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 virt_to_head_page include/linux/mm.h:665 [inline]
 qlink_to_cache mm/kasan/quarantine.c:127 [inline]
 qlist_free_all+0xbb/0x140 mm/kasan/quarantine.c:163
 quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259
 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538
 slab_post_alloc_hook mm/slab.h:445 [inline]
 slab_alloc mm/slab.c:3397 [inline]
 kmem_cache_alloc+0x110/0x370 mm/slab.c:3557
 getname_flags+0xce/0x590 fs/namei.c:140
 getname fs/namei.c:211 [inline]
 __do_sys_unlink fs/namei.c:4112 [inline]
 __se_sys_unlink fs/namei.c:4110 [inline]
 __x64_sys_unlink+0x31/0x50 fs/namei.c:4110
 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45dbc7
Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffef9d89858 EFLAGS: 00000246 ORIG_RAX: 0000000000000057
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045dbc7
RDX: 00007ffef9d89870 RSI: 00007ffef9d89870 RDI: 00007ffef9d89900
RBP: 00000000000001f0 R08: 0000000000000000 R09: 000000000000000c
R10: 0000000000000006 R11: 0000000000000246 R12: 00007ffef9d8a990
R13: 0000000001fd9a60 R14: 0000000000000000 R15: 00007ffef9d8a990
Modules linked in:
---[ end trace 99ba4be46995d811 ]---
RIP: 0010:__phys_addr+0xa7/0x110 arch/x86/mm/physaddr.c:27
Code: 46 fa 09 4c 89 e3 31 ff 48 d3 eb 48 89 de e8 60 82 38 00 48 85 db 75 0d e8 c6 80 38 00 4c 89 e0 5b 5d 41 5c c3 e8 b9 80 38 00 <0f> 0b e8 b2 80 38 00 48 c7 c0 10 30 e7 89 48 ba 00 00 00 00 00 fc
RSP: 0018:ffff888098c0fbb8 EFLAGS: 00010293
RAX: ffff888055260580 RBX: ffff000000000000 RCX: ffffffff812c4ed8
RDX: 0000000000000000 RSI: ffffffff812c4f37 RDI: 0000000000000006
RBP: ffff000080000000 R08: 0000000000000000 R09: ffff000080000000
R10: 0000000000000006 R11: 0000000000000000 R12: ffff778000000000
R13: ffff888098c0fc10 R14: 0000000000000000 R15: 0000000000000286
FS:  0000000001fd8940(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000024c04000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400