kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 2508 Comm: kworker/0:2 Not tainted 4.19.0-rc5+ #122 kobject: 'loop0' (00000000ec0ef1fe): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events smc_tcp_listen_work RIP: 0010:debug_spin_lock_before kernel/locking/spinlock_debug.c:83 [inline] RIP: 0010:do_raw_spin_lock+0x27/0x200 kernel/locking/spinlock_debug.c:112 Code: 00 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 e5 41 56 41 55 41 54 53 48 89 fb 48 83 c7 04 48 89 fa 48 83 ec 08 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 7b kobject: 'loop0' (00000000ec0ef1fe): fill_kobj_path: path = '/devices/virtual/block/loop0' RSP: 0018:ffff8801cdc57168 EFLAGS: 00010047 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 RBP: ffff8801cdc57190 R08: 0000000000000001 R09: 0000000000000001 R10: ffffed003321f019 R11: 0000000000000000 R12: 0000000000000286 R13: ffff8801cdc57320 R14: ffff8801d8c3a6f8 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000707bb4 CR3: 00000001c575d000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:117 [inline] _raw_spin_lock_irqsave+0xa1/0xd0 kernel/locking/spinlock.c:152 finish_wait+0x119/0x430 kernel/sched/wait.c:366 kobject: 'loop2' (00000000cc78fdff): kobject_uevent_env inet_csk_wait_for_connect net/ipv4/inet_connection_sock.c:427 [inline] inet_csk_accept+0x6d0/0xe70 net/ipv4/inet_connection_sock.c:460 inet_accept+0x14b/0x9e0 net/ipv4/af_inet.c:734 kobject: 'loop2' (00000000cc78fdff): fill_kobj_path: path = '/devices/virtual/block/loop2' kernel_accept+0x136/0x310 net/socket.c:3247 smc_clcsock_accept net/smc/af_smc.c:834 [inline] smc_tcp_listen_work+0x218/0x11c0 net/smc/af_smc.c:1302 process_one_work+0xc90/0x1b90 kernel/workqueue.c:2153 kobject: 'loop5' (0000000098c8e125): kobject_uevent_env kobject: 'loop5' (0000000098c8e125): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (00000000c9e54485): kobject_uevent_env worker_thread+0x17f/0x1390 kernel/workqueue.c:2296 kobject: 'loop3' (00000000c9e54485): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (00000000ec0ef1fe): kobject_uevent_env kobject: 'loop0' (00000000ec0ef1fe): fill_kobj_path: path = '/devices/virtual/block/loop0' kthread+0x35a/0x420 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:413 Modules linked in: ---[ end trace 221880deb9e4187e ]--- RIP: 0010:debug_spin_lock_before kernel/locking/spinlock_debug.c:83 [inline] RIP: 0010:do_raw_spin_lock+0x27/0x200 kernel/locking/spinlock_debug.c:112 Code: 00 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 e5 41 56 41 55 41 54 53 48 89 fb 48 83 c7 04 48 89 fa 48 83 ec 08 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 7b RSP: 0018:ffff8801cdc57168 EFLAGS: 00010047 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 RBP: ffff8801cdc57190 R08: 0000000000000001 R09: 0000000000000001 R10: ffffed003321f019 R11: 0000000000000000 R12: 0000000000000286 R13: ffff8801cdc57320 R14: ffff8801d8c3a6f8 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000707bb4 CR3: 00000001c575d000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400