On Mon, Oct 10, 2016 at 8:05 PM, CAI Qian <caiq...@redhat.com> wrote:
> It usually report failures when enabled KASAN (inline) and 
> CONFIG_KPROBES_SANITY_TEST on today's
> mainline HEAD. Occasionally, kernel panic with trace at the bottom.

Hi CAI,

This is a KASAN false positive. 0xf1-0xf4 shadow values are stack
poisoning. KASAN instrumentation poisons stack redzones on function
entry and unpoisons them on function exit. Kprobes memcpy chunks of
stack with redzones, and memcpy produces these reports.

Mailed a fix (you are in CC): "kprobes: avoid false KASAN reports
during stack copy"

Thanks for the report!

> [   52.973247] Kprobe smoke test: started
> [   53.078585] 
> ==================================================================
> [   53.086666] BUG: KASAN: stack-out-of-bounds in 
> setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8
> [   53.097060] Read of size 64 by task swapper/0/1
> [   53.102125] page:ffffea00214967c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   53.111073] flags: 0x2fffff80000000()
> [   53.115163] page dumped because: kasan: bad access detected
> [   53.121392] CPU: 87 PID: 1 Comm: swapper/0 Not tainted 4.8.0+ #3
> [   53.128103] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   53.139468]  ffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 
> ffff88085259fba8
> [   53.147779]  ffff88085259f960 ffffffff816322e3 ffff88085259f9a0 
> 0000000000000046
> [   53.156090]  00000000019e2c79 0000000000000092 0000000000000246 
> ffff88085259f920
> [   53.164415] Call Trace:
> [   53.167161]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   53.172906]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   53.179624]  [<ffffffff81ae70a3>] ? __this_cpu_preempt_check+0x13/0x20
> [   53.186916]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   53.192854]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   53.199763]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   53.206573]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   53.211937]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   53.218656]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   53.224787]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   53.230917]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   53.237919]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   53.244060]  [<ffffffff813bce30>] ? 
> stop_machine_from_inactive_cpu+0x250/0x250
> [   53.252141]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   53.259240]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   53.264804]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   53.270938]  [<ffffffff813bce35>] kprobe_target+0x5/0x20
> [   53.276875]  [<ffffffff813bd300>] init_test_probes+0x1e0/0x5d0
> [   53.283395]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   53.289525]  [<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
> [   53.296245]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   53.302676]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   53.308807]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   53.315811]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   53.322330]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   53.328559]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   53.335362]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   53.342454]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   53.349458]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   53.355783]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   53.362883]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   53.369016]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   53.377284]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   53.384188]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   53.390514]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   53.397411]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   53.404317]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   53.411227]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   53.417262]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   53.423196]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   53.429229]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   53.435260] Memory state around the buggy address:
> [   53.440616]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   53.448675]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   53.456741] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   53.464808]                                      ^
> [   53.470159]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   53.478226]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   53.486291] 
> ==================================================================
> [   53.494355] Disabling lock debugging due to kernel taint
> [   53.500374] 
> ==================================================================
> [   53.508449] BUG: KASAN: stack-out-of-bounds in 
> longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8
> [   53.519134] Write of size 64 by task swapper/0/1
> [   53.524294] page:ffffea00214967c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   53.533245] flags: 0x2fffff80000000()
> [   53.537333] page dumped because: kasan: bad access detected
> [   53.543560] CPU: 87 PID: 1 Comm: swapper/0 Tainted: G    B           
> 4.8.0+ #3
> [   53.551627] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   53.562987]  ffff880e5eecfd98 ffffffff81a6a6e1 ffff880e5eecfe30 
> ffff88085259fba8
> [   53.571291]  ffff880e5eecfe20 ffffffff816322e3 0000000000000000 
> 0000000000000000
> [   53.579588]  0000000000000000 0000000000000092 0000000000000000 
> 0000000000000000
> [   53.587899] Call Trace:
> [   53.590635]  <#DB>  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   53.597084]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   53.603797]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   53.609733]  [<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
> [   53.616932]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   53.623732]  [<ffffffff816314c7>] memcpy+0x37/0x50
> [   53.629085]  [<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
> [   53.636087]  [<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
> [   53.642312]  [<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
> [   53.648538]  [<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
> [   53.655349]  [<ffffffff81094d1e>] do_int3+0xbe/0x230
> [   53.660899]  [<ffffffff826fa544>] int3+0x44/0x80
> [   53.666063]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   53.672187]  <EOE>  [<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
> [   53.679599]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   53.686023]  [<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
> [   53.692348]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   53.699350]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   53.705876]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   53.712109]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   53.718917]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   53.726017]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   53.733019]  [<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
> [   53.739538]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   53.746639]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   53.752771]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   53.761027]  [<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
> [   53.768127]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   53.774452]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   53.781357]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   53.788261]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   53.795167]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   53.800902] tsc: Refined TSC clocksource calibration: 2194.917 MHz
> [   53.801000] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 
> 0x1fa37107ca2, max_idle_ns: 440795258165 ns
> [   53.819265]  [<ffffffff826e0073>] ? kernel_init+0x13/0x120
> [   53.825394]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   53.831426]  [<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
> [   53.837650] Memory state around the buggy address:
> [   53.843003]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   53.851069]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   53.859137] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   53.867204]                                      ^
> [   53.872555]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   53.880622]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   53.888686] 
> ==================================================================
> [   53.945608] 
> ==================================================================
> [   53.953691] BUG: KASAN: stack-out-of-bounds in 
> setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8
> [   53.964084] Read of size 64 by task swapper/0/1
> [   53.969148] page:ffffea00214967c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   53.978095] flags: 0x2fffff80000000()
> [   53.982183] page dumped because: kasan: bad access detected
> [   53.988412] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           
> 4.8.0+ #3
> [   53.996480] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   54.007841]  ffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 
> ffff88085259fba8
> [   54.016157]  ffff88085259f960 ffffffff816322e3 ffff880e531dbea0 
> 0000000041b58ab3
> [   54.024477]  ffff88085259f9b0 0000000000000092 0000000000000000 
> 0000000000000000
> [   54.032791] Call Trace:
> [   54.035535]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   54.041280]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   54.047984]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   54.053920]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   54.060826]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   54.067636]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   54.072991]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   54.079703]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   54.085832]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   54.091961]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   54.098963]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   54.105094]  [<ffffffff813bce30>] ? 
> stop_machine_from_inactive_cpu+0x250/0x250
> [   54.113166]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   54.120265]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   54.125816]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   54.131946]  [<ffffffff813bce35>] kprobe_target+0x5/0x20
> [   54.137884]  [<ffffffff813bd371>] init_test_probes+0x251/0x5d0
> [   54.144400]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   54.150530]  [<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
> [   54.157244]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   54.163670]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   54.169799]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.176800]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   54.183321]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   54.189541]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   54.196349]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   54.203450]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.210453]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   54.216776]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   54.223877]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   54.230008]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   54.238273]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   54.245178]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   54.251502]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   54.258409]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   54.265314]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   54.272221]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   54.278253]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   54.284196]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   54.290235]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   54.296265] Memory state around the buggy address:
> [   54.301617]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   54.309682]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   54.317748] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   54.325816]                                      ^
> [   54.331172]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   54.339238]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   54.347306] 
> ==================================================================
> [   54.355428] 
> ==================================================================
> [   54.363501] BUG: KASAN: stack-out-of-bounds in 
> longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8
> [   54.374183] Write of size 64 by task swapper/0/1
> [   54.379341] page:ffffea00214967c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   54.388293] flags: 0x2fffff80000000()
> [   54.392383] page dumped because: kasan: bad access detected
> [   54.398610] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           
> 4.8.0+ #3
> [   54.406677] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   54.418037]  ffff880e5e40fd98 ffffffff81a6a6e1 ffff880e5e40fe30 
> ffff88085259fba8
> [   54.426343]  ffff880e5e40fe20 ffffffff816322e3 0000000000000000 
> 0000000000000000
> [   54.434640]  0000000000000000 0000000000000092 0000000000000000 
> 0000000000000000
> [   54.442959] Call Trace:
> [   54.445692]  <#DB>  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   54.452136]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   54.458848]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   54.464785]  [<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
> [   54.471981]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   54.478790]  [<ffffffff816314c7>] memcpy+0x37/0x50
> [   54.484142]  [<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
> [   54.491145]  [<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
> [   54.497370]  [<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
> [   54.503597]  [<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
> [   54.510408]  [<ffffffff81094d1e>] do_int3+0xbe/0x230
> [   54.515947]  [<ffffffff826fa544>] int3+0x44/0x80
> [   54.521110]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   54.527237]  <EOE>  [<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
> [   54.534647]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   54.541068]  [<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
> [   54.547393]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.554395]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   54.560914]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   54.567142]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   54.573950]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   54.581052]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.588055]  [<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
> [   54.594571]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   54.601672]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   54.607804]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   54.616069]  [<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
> [   54.623169]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   54.629495]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   54.636400]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   54.643306]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   54.650211]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   54.656242]  [<ffffffff826e0073>] ? kernel_init+0x13/0x120
> [   54.662370]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   54.668402]  [<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
> [   54.674628] Memory state around the buggy address:
> [   54.679980]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   54.688048]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   54.696114] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   54.704182]                                      ^
> [   54.709537]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   54.717602]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   54.725665] 
> ==================================================================
> [   54.733823] 
> ==================================================================
> [   54.741895] BUG: KASAN: stack-out-of-bounds in 
> setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8
> [   54.752288] Read of size 64 by task swapper/0/1
> [   54.757354] page:ffffea00214967c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   54.766309] flags: 0x2fffff80000000()
> [   54.770398] page dumped because: kasan: bad access detected
> [   54.776623] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           
> 4.8.0+ #3
> [   54.784688] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   54.796049]  ffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 
> ffff88085259fba8
> [   54.804358]  ffff88085259f960 ffffffff816322e3 ffff880e53348080 
> ffff880e5e4171e0
> [   54.812687]  ffff880e53348080 0000000000000092 0000000cbe62c0e0 
> 0000000000000000
> [   54.821003] Call Trace:
> [   54.823749]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   54.829499]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   54.836219]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   54.842162]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   54.849076]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   54.855891]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   54.861251]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   54.867971]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   54.874205]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   54.880439]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   54.887449]  [<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
> [   54.893696]  [<ffffffff813bce80>] ? kp_pre_handler+0x30/0x30
> [   54.900034]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   54.907139]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   54.912699]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   54.918956]  [<ffffffff813bce85>] kprobe_target2+0x5/0x20
> [   54.924994]  [<ffffffff813bd395>] init_test_probes+0x275/0x5d0
> [   54.931517]  [<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
> [   54.937752]  [<ffffffff813bd395>] ? init_test_probes+0x275/0x5d0
> [   54.944471]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   54.950901]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   54.957037]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.964045]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   54.970570]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   54.976803]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   54.983618]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   54.990724]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.997732]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   55.004062]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   55.011169]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   55.017307]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   55.025579]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   55.032491]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   55.038824]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   55.045738]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   55.052650]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   55.059563]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   55.065602]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   55.071544]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   55.077582]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   55.083620] Memory state around the buggy address:
> [   55.088977]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   55.097048]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   55.105113] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   55.113183]                                      ^
> [   55.118540]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   55.126610]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   55.134677] 
> ==================================================================
> [   55.142905] clocksource: Switched to clocksource tsc
> [   55.143010] 
> ==================================================================
> [   55.143018] BUG: KASAN: stack-out-of-bounds in 
> longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8
> [   55.143021] Write of size 64 by task swapper/0/1
> [   55.143027] page:ffffea00214967c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   55.143029] flags: 0x2fffff80000000()
> [   55.143031] page dumped because: kasan: bad access detected
> [   55.143036] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           
> 4.8.0+ #3
> [   55.143039] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   55.143048]  ffff880e5e40fd98 ffffffff81a6a6e1 ffff880e5e40fe30 
> ffff88085259fba8
> [   55.143055]  ffff880e5e40fe20 ffffffff816322e3 0000000000000010 
> 0000000000000000
> [   55.143063]  ffffed010a4b3f76 0000000000000092 f2f2f2f400000000 
> f3f3f3f4f4f400f2
> [   55.143064] Call Trace:
> [   55.143075]  <#DB>  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   55.143081]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   55.143087]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   55.143093]  [<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
> [   55.143101]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   55.143108]  [<ffffffff816314c7>] memcpy+0x37/0x50
> [   55.143113]  [<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
> [   55.143118]  [<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
> [   55.143123]  [<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
> [   55.143129]  [<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
> [   55.143136]  [<ffffffff81094d1e>] do_int3+0xbe/0x230
> [   55.143143]  [<ffffffff826fa544>] int3+0x44/0x80
> [   55.143153]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   55.143162]  <EOE>  [<ffffffff813bd395>] ? init_test_probes+0x275/0x5d0
> [   55.143169]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   55.143177]  [<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
> [   55.143184]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   55.143190]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   55.143197]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   55.143204]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   55.143210]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   55.143218]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   55.143224]  [<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
> [   55.143230]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   55.143236]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   55.143244]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   55.143252]  [<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
> [   55.143258]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   55.143265]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   55.143272]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   55.143278]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   55.143285]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   55.143291]  [<ffffffff826e0073>] ? kernel_init+0x13/0x120
> [   55.143297]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   55.143302]  [<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
> [   55.143307] Memory state around the buggy address:
> [   55.143310]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   55.143314]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   55.143318] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   55.143320]                                      ^
> [   55.143323]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   55.143327]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   55.143329] 
> ==================================================================
> [   55.620180] Kprobe smoke test: passed successfully
>
> ==== KERNEL PANIC RUN ====
> [   34.484681] Kprobe smoke test: started
> [   34.544890] 
> ==================================================================
> [   34.552958] BUG: KASAN: stack-out-of-bounds in 
> setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8
> [   34.563346] Read of size 64 by task swapper/0/1
> [   34.568402] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   34.577346] flags: 0x2fffff80000000()
> [   34.581431] page dumped because: kasan: bad access detected
> [   34.587653] CPU: 79 PID: 1 Comm: swapper/0 Not tainted 4.8.0+ #3
> [   34.594347] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   34.605705]  ffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 
> ffff880852387ba8
> [   34.614001]  ffff880852387960 ffffffff816322e3 ffff8808523879a0 
> 0000000000000046
> [   34.622297]  0000000001c4a4cb 0000000000000092 0000000000000246 
> ffff880852387920
> [   34.630593] Call Trace:
> [   34.633327]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   34.639061]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   34.645769]  [<ffffffff81ae70a3>] ? __this_cpu_preempt_check+0x13/0x20
> [   34.653055]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   34.658983]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   34.665884]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   34.672685]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   34.678031]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   34.684734]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   34.690855]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   34.696977]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   34.703971]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   34.710093]  [<ffffffff813bce30>] ? 
> stop_machine_from_inactive_cpu+0x250/0x250
> [   34.718158]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   34.725251]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   34.730792]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   34.736914]  [<ffffffff813bce35>] kprobe_target+0x5/0x20
> [   34.742840]  [<ffffffff813bd300>] init_test_probes+0x1e0/0x5d0
> [   34.749349]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   34.755470]  [<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
> [   34.762175]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   34.768591]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   34.774713]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   34.781710]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   34.788219]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   34.794438]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   34.801239]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   34.808330]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   34.815324]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   34.821642]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   34.828734]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   34.834855]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   34.843112]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   34.850008]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   34.856327]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   34.863224]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   34.870121]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   34.877021]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   34.883046]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   34.888973]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   34.894997]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   34.901022] Memory state around the buggy address:
> [   34.906368]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   34.914428]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   34.922489] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   34.930551]                                      ^
> [   34.935897]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   34.943958]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   34.952019] 
> ==================================================================
> [   34.960079] Disabling lock debugging due to kernel taint
> [   34.966029] 
> ==================================================================
> [   34.974090] BUG: KASAN: stack-out-of-bounds in 
> longjmp_break_handler+0x1df/0x2a0 at addr ffff880852387ba8
> [   34.984768] Write of size 64 by task swapper/0/1
> [   34.989921] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   34.998863] flags: 0x2fffff80000000()
> [   35.002948] page dumped because: kasan: bad access detected
> [   35.009167] CPU: 79 PID: 1 Comm: swapper/0 Tainted: G    B           
> 4.8.0+ #3
> [   35.017225] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   35.028581]  ffff880e5eccfd98 ffffffff81a6a6e1 ffff880e5eccfe30 
> ffff880852387ba8
> [   35.036877]  ffff880e5eccfe20 ffffffff816322e3 0000000000000000 
> 0000000000000000
> [   35.045172]  0000000000000000 0000000000000092 0000000000000000 
> 0000000000000000
> [   35.053467] Call Trace:
> [   35.056194]  <#DB>  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   35.062621]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   35.069324]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   35.075252]  [<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
> [   35.082441]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   35.089241]  [<ffffffff816314c7>] memcpy+0x37/0x50
> [   35.094588]  [<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
> [   35.101582]  [<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
> [   35.107801]  [<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
> [   35.114018]  [<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
> [   35.120820]  [<ffffffff81094d1e>] do_int3+0xbe/0x230
> [   35.126363]  [<ffffffff826fa544>] int3+0x44/0x80
> [   35.131518]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   35.137630]  <EOE>  [<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
> [   35.145026]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   35.151440]  [<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
> [   35.157755]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   35.164748]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   35.171257]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   35.177477]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   35.184279]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   35.191371]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   35.198366]  [<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
> [   35.204876]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   35.211966]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   35.218089]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   35.226346]  [<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
> [   35.233436]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   35.239751]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   35.246648]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   35.253544]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   35.260442]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   35.266466]  [<ffffffff826e0073>] ? kernel_init+0x13/0x120
> [   35.272588]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   35.278613]  [<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
> [   35.284831] Memory state around the buggy address:
> [   35.290178]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   35.298236]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   35.306296] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   35.314355]                                      ^
> [   35.319699]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   35.327761]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   35.335820] 
> ==================================================================
> [   35.352411] tsc: Refined TSC clocksource calibration: 2194.917 MHz
> [   35.359361] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 
> 0x1fa37107ca2, max_idle_ns: 440795258165 ns
> [   35.384275] 
> ==================================================================
> [   35.392341] BUG: KASAN: stack-out-of-bounds in 
> setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8
> [   35.402719] Read of size 64 by task swapper/0/1
> [   35.407774] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   35.416720] flags: 0x2fffff80000000()
> [   35.420804] page dumped because: kasan: bad access detected
> [   35.427024] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G    B           
> 4.8.0+ #3
> [   35.435084] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   35.446440]  ffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 
> ffff880852387ba8
> [   35.454737]  ffff880852387960 ffffffff816322e3 ffff8808594fd9c0 
> 0000000041b58ab3
> [   35.463033]  ffff8808523879b0 0000000000000092 0000000000000000 
> 0000000000000000
> [   35.471330] Call Trace:
> [   35.474061]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   35.479796]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   35.486500]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   35.492428]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   35.499325]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   35.506127]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   35.511472]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   35.518176]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   35.524297]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   35.530419]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   35.537414]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   35.543536]  [<ffffffff813bce30>] ? 
> stop_machine_from_inactive_cpu+0x250/0x250
> [   35.551598]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   35.558689]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   35.564229]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   35.570350]  [<ffffffff813bce35>] kprobe_target+0x5/0x20
> [   35.576280]  [<ffffffff813bd371>] init_test_probes+0x251/0x5d0
> [   35.582790]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   35.588912]  [<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
> [   35.595617]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   35.602031]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   35.608152]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   35.615145]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   35.621656]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   35.627875]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   35.634676]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   35.641766]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   35.648762]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   35.655077]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   35.662170]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   35.668293]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   35.676549]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   35.683445]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   35.689763]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   35.696662]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   35.703559]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   35.710456]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   35.716482]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   35.722410]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   35.728436]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   35.734460] Memory state around the buggy address:
> [   35.739806]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   35.747865]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   35.755926] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   35.763985]                                      ^
> [   35.769329]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   35.777389]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   35.785448] 
> ==================================================================
> [   35.793532] 
> ==================================================================
> [   35.801597] BUG: KASAN: stack-out-of-bounds in 
> longjmp_break_handler+0x1df/0x2a0 at addr ffff880852387ba8
> [   35.812275] Write of size 64 by task swapper/0/1
> [   35.817426] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   35.826369] flags: 0x2fffff80000000()
> [   35.830453] page dumped because: kasan: bad access detected
> [   35.836671] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G    B           
> 4.8.0+ #3
> [   35.844732] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   35.856089]  ffff880e5ed0fd98 ffffffff81a6a6e1 ffff880e5ed0fe30 
> ffff880852387ba8
> [   35.864385]  ffff880e5ed0fe20 ffffffff816322e3 0000000000000000 
> 0000000000000000
> [   35.872681]  0000000000000000 0000000000000092 0000000000000000 
> 0000000000000000
> [   35.880977] Call Trace:
> [   35.883704]  <#DB>  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   35.890130]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   35.896835]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   35.902763]  [<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
> [   35.909950]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   35.916751]  [<ffffffff816314c7>] memcpy+0x37/0x50
> [   35.922097]  [<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
> [   35.929093]  [<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
> [   35.935312]  [<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
> [   35.941530]  [<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
> [   35.948332]  [<ffffffff81094d1e>] do_int3+0xbe/0x230
> [   35.953873]  [<ffffffff826fa544>] int3+0x44/0x80
> [   35.959026]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   35.965147]  <EOE>  [<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
> [   35.972541]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   35.978954]  [<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
> [   35.985269]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   35.992261]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   35.998770]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   36.004988]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   36.011788]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   36.018879]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   36.025873]  [<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
> [   36.032382]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   36.039476]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   36.045597]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   36.053854]  [<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
> [   36.060946]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   36.067261]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   36.074158]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   36.081053]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   36.087950]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   36.093974]  [<ffffffff826e0073>] ? kernel_init+0x13/0x120
> [   36.100095]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   36.106120]  [<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
> [   36.112339] Memory state around the buggy address:
> [   36.117683]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   36.125742]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   36.133802] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   36.141862]                                      ^
> [   36.147205]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   36.155264]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   36.163325] 
> ==================================================================
> [   36.171419] 
> ==================================================================
> [   36.179482] BUG: KASAN: stack-out-of-bounds in 
> setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8
> [   36.189869] Read of size 64 by task swapper/0/1
> [   36.194924] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          
> (null) index:0x0
> [   36.203867] flags: 0x2fffff80000000()
> [   36.207951] page dumped because: kasan: bad access detected
> [   36.214170] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G    B           
> 4.8.0+ #3
> [   36.222230] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   36.233585]  ffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 
> ffff880852387ba8
> [   36.241883]  ffff880852387960 ffffffff816322e3 ffff880e535d0080 
> ffff880e5ed171e0
> [   36.250179]  ffff880e535d0080 0000000000000092 000000086bfbbff3 
> 0000000000000000
> [   36.258475] Call Trace:
> [   36.261205]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   36.266938]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   36.273641]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   36.279570]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   36.286468]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   36.293268]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   36.298615]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   36.305319]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   36.311538]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   36.317756]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   36.324749]  [<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
> [   36.330967]  [<ffffffff813bce80>] ? kp_pre_handler+0x30/0x30
> [   36.337284]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   36.344376]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   36.349918]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   36.356131]  [<ffffffff813bce85>] kprobe_target2+0x5/0x20
> [   36.362157]  [<ffffffff813bd395>] init_test_probes+0x275/0x5d0
> [   36.368666]  [<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
> [   36.374884]  [<ffffffff813bd395>] ? init_test_probes+0x275/0x5d0
> [   36.381591]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   36.388006]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   36.394122]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   36.401120]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   36.407632]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   36.413854]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   36.420658]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   36.427753]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   36.434751]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   36.441068]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   36.448163]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   36.454287]  [<ffffffff811d5bc2>] ? 
> __usermodehelper_set_disable_depth+0x42/0x50
> [   36.462544]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   36.469444]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   36.475764]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   36.482665]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   36.489564]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   36.496464]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   36.502493]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   36.508422]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   36.514450]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   36.520476] Memory state around the buggy address:
> [   36.525825]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   36.533878]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00
> [   36.541941] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 
> f3 f3
> [   36.549993]                                      ^
> [   36.555341]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 
> f4 f4
> [   36.563394]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 
> 00 00
> [   36.571455] 
> ==================================================================
> [   36.579599] int3: 0000 [#1] PREEMPT SMP KASAN
> [   36.579606] clocksource: Switched to clocksource tsc
> [   36.590000] Modules linked in:
> [   36.593420] CPU: 36 PID: 1 Comm: swapper/0 Tainted: G    B           
> 4.8.0+ #3
> [   36.601480] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS 
> GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   36.612837] task: ffff880e535d0000 task.stack: ffff880852380000
> [   36.619444] RIP: 0010:[<ffffffff8111bfe5>]  [<ffffffff8111bfe5>] 
> jprobe_return_end+0x0/0x1b
> [   36.628778] RSP: 0000:0000000000000000  EFLAGS: 00000046
> [   36.634704] RAX: dffffc0000000000 RBX: ffff880852387b80 RCX: 
> 1ffffffff05acca0
> [   36.642667] RDX: 1ffff101cbcf2d1b RSI: ffffffff829cb560 RDI: 
> ffff880e5e7968d8
> [   36.650629] RBP: ffff880852387b90 R08: 1ffff1010a470eaf R09: 
> 0000000000000000
> [   36.658593] R10: 0000000000000008 R11: ffffed01cbda2d38 R12: 
> 0000000000000024
> [   36.666555] R13: 1ffff1010a470f76 R14: 0000000000000001 R15: 
> ffffffff82e8a950
> [   36.674519] FS:  0000000000000000(0000) GS:ffff880e5e780000(0000) 
> knlGS:0000000000000000
> [   36.683548] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [   36.689961] CR2: 0000000000000000 CR3: 0000000002e0a000 CR4: 
> 00000000003406e0
> [   36.697924] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
> 0000000000000000
> [   36.705888] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 
> 0000000000000400
> [   36.713851] Stack:
> [   36.716091]
> [   36.717750] Call Trace:
> [   36.720476] Code: 4a 03 1c e5 e0 63 d6 82 48 b8 00 00 00 00 00 fc ff df 48 
> 8d 7b 18 48 89 fa 48 c1 ea 03 80 3c 02 00 75 15 48 8b 5b 18 48 87 dc cc <90> 
> 5b 41 5c 5d c3 e8 70 64 51 00 eb c8 e8 69 64 51 00 eb e4 0f
> [   36.742285] RIP  [<ffffffff8111bfe5>] jprobe_return_end+0x0/0x1b
> [   36.749000]  RSP <0000000000000000>
> [   36.752942] ---[ end trace 65b1716ff1e2d4ca ]---
> [   36.758094] Kernel panic - not syncing: Fatal exception
> [   36.763975] Kernel Offset: disabled
> [   36.767894] ---[ end Kernel panic - not syncing: Fatal exception

Reply via email to