kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 21367 Comm: cryptomgr_test Not tainted 5.0.0-rc2+ #12 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:crypto_remove_spawns+0x7ac/0x1340 crypto/algapi.c:194 Code: 49 8d 7c 24 10 48 89 f8 48 c1 e8 03 80 3c 18 00 0f 85 f2 06 00 00 49 c7 44 24 10 00 00 00 00 4d 8d 66 10 4c 89 e0 48 c1 e8 03 <80> 3c 18 00 0f 85 ef 06 00 00 49 83 7e 10 00 74 0a e8 ce 95 24 fe RSP: 0018:ffff8880a469fb88 EFLAGS: 00010202 RAX: 0000000000000002 RBX: dffffc0000000000 RCX: 1ffff110148d3f86 RDX: 0000000000000000 RSI: ffffffff835d68e2 RDI: ffff88808a5ac6b8 RBP: ffff8880a469fdf8 R08: ffff8880a8e68500 R09: ffffed10148d3fa8 R10: ffffed10148d3fa7 R11: 0000000000000003 R12: 0000000000000010 R13: ffffed10148d3f8e R14: 0000000000000000 R15: ffff8880a469fdd0 FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000625208 CR3: 000000006e598000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: crypto_alg_tested+0x52d/0x790 crypto/algapi.c:339 cryptomgr_test+0x18/0x30 crypto/algboss.c:226 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 Modules linked in: ---[ end trace 689df41fffd7c3b5 ]--- RIP: 0010:crypto_remove_spawns+0x7ac/0x1340 crypto/algapi.c:194 Code: 49 8d 7c 24 10 48 89 f8 48 c1 e8 03 80 3c 18 00 0f 85 f2 06 00 00 49 c7 44 24 10 00 00 00 00 4d 8d 66 10 4c 89 e0 48 c1 e8 03 <80> 3c 18 00 0f 85 ef 06 00 00 49 83 7e 10 00 74 0a e8 ce 95 24 fe RSP: 0018:ffff8880a469fb88 EFLAGS: 00010202 kobject: 'loop4' (000000002d418ff3): kobject_uevent_env RAX: 0000000000000002 RBX: dffffc0000000000 RCX: 1ffff110148d3f86 kobject: 'loop4' (000000002d418ff3): fill_kobj_path: path = '/devices/virtual/block/loop4' RDX: 0000000000000000 RSI: ffffffff835d68e2 RDI: ffff88808a5ac6b8 RBP: ffff8880a469fdf8 R08: ffff8880a8e68500 R09: ffffed10148d3fa8 R10: ffffed10148d3fa7 R11: 0000000000000003 R12: 0000000000000010 R13: ffffed10148d3f8e R14: 0000000000000000 R15: ffff8880a469fdd0 kobject: 'loop2' (0000000067771e67): kobject_uevent_env FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f0e51488330 CR3: 00000000a8eec000 CR4: 00000000001406f0 kobject: 'loop2' (0000000067771e67): fill_kobj_path: path = '/devices/virtual/block/loop2' DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400