------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 16424 Comm: kworker/u4:17 Not tainted 5.16.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: krdsd rds_connect_worker RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 06 bf 42 00 48 85 db 75 0f e8 6c bc 42 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 5d bc 42 00 <0f> 0b e8 56 bc 42 00 48 c7 c0 10 50 8b 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc9000ea5fa08 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000000777770 RCX: 0000000000000000 RDX: ffff888024f81d00 RSI: ffffffff8134ee93 RDI: 0000000000000003 RBP: 0000000080777770 R08: 0000000080777770 R09: 00000000800c0006 R10: ffffffff8134ee0e R11: 0000000000000000 R12: 0000778000777770 R13: ffffc9000ea5fa68 R14: ffffea0000000000 R15: 0000000000777770 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe056bbb7b0 CR3: 0000000088b4d000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 00000000000003ff DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: virt_to_head_page include/linux/mm.h:861 [inline] qlink_to_cache mm/kasan/quarantine.c:120 [inline] qlist_free_all+0x76/0xc0 mm/kasan/quarantine.c:162 kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:272 __kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:259 [inline] slab_post_alloc_hook mm/slab.h:519 [inline] slab_alloc_node mm/slub.c:3234 [inline] slab_alloc mm/slub.c:3242 [inline] kmem_cache_alloc+0x142/0x3a0 mm/slub.c:3247 sock_alloc_inode+0x18/0x1c0 net/socket.c:303 alloc_inode+0x61/0x230 fs/inode.c:235 new_inode_pseudo+0x14/0xe0 fs/inode.c:944 sock_alloc+0x3c/0x260 net/socket.c:626 __sock_create+0xb9/0x790 net/socket.c:1428 rds_tcp_conn_path_connect+0x291/0x880 net/rds/tcp_connect.c:119 rds_connect_worker+0x1a5/0x2c0 net/rds/threads.c:176 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298 worker_thread+0x658/0x11f0 kernel/workqueue.c:2445 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Modules linked in: ---[ end trace 800b6d2fc76d0d67 ]--- RIP: 0010:__phys_addr+0xd3/0x140 arch/x86/mm/physaddr.c:28 Code: e3 44 89 e9 31 ff 48 d3 eb 48 89 de e8 06 bf 42 00 48 85 db 75 0f e8 6c bc 42 00 4c 89 e0 5b 5d 41 5c 41 5d c3 e8 5d bc 42 00 <0f> 0b e8 56 bc 42 00 48 c7 c0 10 50 8b 8b 48 ba 00 00 00 00 00 fc RSP: 0018:ffffc9000ea5fa08 EFLAGS: 00010293 RAX: 0000000000000000 RBX: 0000000000777770 RCX: 0000000000000000 RDX: ffff888024f81d00 RSI: ffffffff8134ee93 RDI: 0000000000000003 RBP: 0000000080777770 R08: 0000000080777770 R09: 00000000800c0006 R10: ffffffff8134ee0e R11: 0000000000000000 R12: 0000778000777770 R13: ffffc9000ea5fa68 R14: ffffea0000000000 R15: 0000000000777770 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 00000000188f5000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 00000000000003ff DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400