KASAN (inline) + CONFIG_KPROBES_SANITY_TEST failures and kernel panic

From: CAI Qian
Date: Mon Oct 10 2016 - 14:05:21 EST


It usually report failures when enabled KASAN (inline) and CONFIG_KPROBES_SANITY_TEST on today's
mainline HEAD. Occasionally, kernel panic with trace at the bottom.

[ Â 52.973247] Kprobe smoke test: started
[ Â 53.078585] ==================================================================
[ Â 53.086666] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8
[ Â 53.097060] Read of size 64 by task swapper/0/1
[ Â 53.102125] page:ffffea00214967c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 53.111073] flags: 0x2fffff80000000()
[ Â 53.115163] page dumped because: kasan: bad access detected
[ Â 53.121392] CPU: 87 PID: 1 Comm: swapper/0 Not tainted 4.8.0+ #3
[ Â 53.128103] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 53.139468] Âffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 ffff88085259fba8
[ Â 53.147779] Âffff88085259f960 ffffffff816322e3 ffff88085259f9a0 0000000000000046
[ Â 53.156090] Â00000000019e2c79 0000000000000092 0000000000000246 ffff88085259f920
[ Â 53.164415] Call Trace:
[ Â 53.167161] Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 53.172906] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 53.179624] Â[<ffffffff81ae70a3>] ? __this_cpu_preempt_check+0x13/0x20
[ Â 53.186916] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 53.192854] Â[<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
[ Â 53.199763] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 53.206573] Â[<ffffffff816314b3>] memcpy+0x23/0x50
[ Â 53.211937] Â[<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
[ Â 53.218656] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 53.224787] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 53.230917] Â[<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
[ Â 53.237919] Â[<ffffffff813bce35>] ? kprobe_target+0x5/0x20
[ Â 53.244060] Â[<ffffffff813bce30>] ? stop_machine_from_inactive_cpu+0x250/0x250
[ Â 53.252141] Â[<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
[ Â 53.259240] Â[<ffffffffa00000d5>] 0xffffffffa00000d5
[ Â 53.264804] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 53.270938] Â[<ffffffff813bce35>] kprobe_target+0x5/0x20
[ Â 53.276875] Â[<ffffffff813bd300>] init_test_probes+0x1e0/0x5d0
[ Â 53.283395] Â[<ffffffff813bce35>] ? kprobe_target+0x5/0x20
[ Â 53.289525] Â[<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
[ Â 53.296245] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 53.302676] Â[<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
[ Â 53.308807] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 53.315811] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 53.322330] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 53.328559] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 53.335362] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 53.342454] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 53.349458] Â[<ffffffff81002299>] do_one_initcall+0xa9/0x240
[ Â 53.355783] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 53.362883] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 53.369016] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 53.377284] Â[<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
[ Â 53.384188] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 53.390514] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 53.397411] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 53.404317] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 53.411227] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 53.417262] Â[<ffffffff826e0073>] kernel_init+0x13/0x120
[ Â 53.423196] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 53.429229] Â[<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
[ Â 53.435260] Memory state around the buggy address:
[ Â 53.440616] Âffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 53.448675] Âffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 53.456741] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 53.464808] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 53.470159] Âffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 53.478226] Âffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 53.486291] ==================================================================
[ Â 53.494355] Disabling lock debugging due to kernel taint
[ Â 53.500374] ==================================================================
[ Â 53.508449] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8
[ Â 53.519134] Write of size 64 by task swapper/0/1
[ Â 53.524294] page:ffffea00214967c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 53.533245] flags: 0x2fffff80000000()
[ Â 53.537333] page dumped because: kasan: bad access detected
[ Â 53.543560] CPU: 87 PID: 1 Comm: swapper/0 Tainted: G Â ÂB Â Â Â Â Â 4.8.0+ #3
[ Â 53.551627] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 53.562987] Âffff880e5eecfd98 ffffffff81a6a6e1 ffff880e5eecfe30 ffff88085259fba8
[ Â 53.571291] Âffff880e5eecfe20 ffffffff816322e3 0000000000000000 0000000000000000
[ Â 53.579588] Â0000000000000000 0000000000000092 0000000000000000 0000000000000000
[ Â 53.587899] Call Trace:
[ Â 53.590635] Â<#DB> Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 53.597084] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 53.603797] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 53.609733] Â[<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
[ Â 53.616932] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 53.623732] Â[<ffffffff816314c7>] memcpy+0x37/0x50
[ Â 53.629085] Â[<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
[ Â 53.636087] Â[<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
[ Â 53.642312] Â[<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
[ Â 53.648538] Â[<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
[ Â 53.655349] Â[<ffffffff81094d1e>] do_int3+0xbe/0x230
[ Â 53.660899] Â[<ffffffff826fa544>] int3+0x44/0x80
[ Â 53.666063] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 53.672187] Â<EOE> Â[<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
[ Â 53.679599] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 53.686023] Â[<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
[ Â 53.692348] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 53.699350] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 53.705876] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 53.712109] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 53.718917] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 53.726017] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 53.733019] Â[<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
[ Â 53.739538] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 53.746639] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 53.752771] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 53.761027] Â[<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
[ Â 53.768127] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 53.774452] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 53.781357] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 53.788261] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 53.795167] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 53.800902] tsc: Refined TSC clocksource calibration: 2194.917 MHz
[ Â 53.801000] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x1fa37107ca2, max_idle_ns: 440795258165 ns
[ Â 53.819265] Â[<ffffffff826e0073>] ? kernel_init+0x13/0x120
[ Â 53.825394] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 53.831426] Â[<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
[ Â 53.837650] Memory state around the buggy address:
[ Â 53.843003] Âffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 53.851069] Âffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 53.859137] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 53.867204] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 53.872555] Âffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 53.880622] Âffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 53.888686] ==================================================================
[ Â 53.945608] ==================================================================
[ Â 53.953691] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8
[ Â 53.964084] Read of size 64 by task swapper/0/1
[ Â 53.969148] page:ffffea00214967c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 53.978095] flags: 0x2fffff80000000()
[ Â 53.982183] page dumped because: kasan: bad access detected
[ Â 53.988412] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G Â ÂB Â Â Â Â Â 4.8.0+ #3
[ Â 53.996480] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 54.007841] Âffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 ffff88085259fba8
[ Â 54.016157] Âffff88085259f960 ffffffff816322e3 ffff880e531dbea0 0000000041b58ab3
[ Â 54.024477] Âffff88085259f9b0 0000000000000092 0000000000000000 0000000000000000
[ Â 54.032791] Call Trace:
[ Â 54.035535] Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 54.041280] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 54.047984] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 54.053920] Â[<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
[ Â 54.060826] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 54.067636] Â[<ffffffff816314b3>] memcpy+0x23/0x50
[ Â 54.072991] Â[<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
[ Â 54.079703] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 54.085832] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 54.091961] Â[<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
[ Â 54.098963] Â[<ffffffff813bce35>] ? kprobe_target+0x5/0x20
[ Â 54.105094] Â[<ffffffff813bce30>] ? stop_machine_from_inactive_cpu+0x250/0x250
[ Â 54.113166] Â[<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
[ Â 54.120265] Â[<ffffffffa00000d5>] 0xffffffffa00000d5
[ Â 54.125816] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 54.131946] Â[<ffffffff813bce35>] kprobe_target+0x5/0x20
[ Â 54.137884] Â[<ffffffff813bd371>] init_test_probes+0x251/0x5d0
[ Â 54.144400] Â[<ffffffff813bce35>] ? kprobe_target+0x5/0x20
[ Â 54.150530] Â[<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
[ Â 54.157244] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 54.163670] Â[<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
[ Â 54.169799] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 54.176800] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 54.183321] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 54.189541] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 54.196349] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 54.203450] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 54.210453] Â[<ffffffff81002299>] do_one_initcall+0xa9/0x240
[ Â 54.216776] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 54.223877] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 54.230008] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 54.238273] Â[<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
[ Â 54.245178] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 54.251502] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 54.258409] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 54.265314] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 54.272221] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 54.278253] Â[<ffffffff826e0073>] kernel_init+0x13/0x120
[ Â 54.284196] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 54.290235] Â[<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
[ Â 54.296265] Memory state around the buggy address:
[ Â 54.301617] Âffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 54.309682] Âffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 54.317748] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 54.325816] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 54.331172] Âffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 54.339238] Âffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 54.347306] ==================================================================
[ Â 54.355428] ==================================================================
[ Â 54.363501] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8
[ Â 54.374183] Write of size 64 by task swapper/0/1
[ Â 54.379341] page:ffffea00214967c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 54.388293] flags: 0x2fffff80000000()
[ Â 54.392383] page dumped because: kasan: bad access detected
[ Â 54.398610] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G Â ÂB Â Â Â Â Â 4.8.0+ #3
[ Â 54.406677] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 54.418037] Âffff880e5e40fd98 ffffffff81a6a6e1 ffff880e5e40fe30 ffff88085259fba8
[ Â 54.426343] Âffff880e5e40fe20 ffffffff816322e3 0000000000000000 0000000000000000
[ Â 54.434640] Â0000000000000000 0000000000000092 0000000000000000 0000000000000000
[ Â 54.442959] Call Trace:
[ Â 54.445692] Â<#DB> Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 54.452136] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 54.458848] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 54.464785] Â[<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
[ Â 54.471981] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 54.478790] Â[<ffffffff816314c7>] memcpy+0x37/0x50
[ Â 54.484142] Â[<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
[ Â 54.491145] Â[<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
[ Â 54.497370] Â[<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
[ Â 54.503597] Â[<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
[ Â 54.510408] Â[<ffffffff81094d1e>] do_int3+0xbe/0x230
[ Â 54.515947] Â[<ffffffff826fa544>] int3+0x44/0x80
[ Â 54.521110] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 54.527237] Â<EOE> Â[<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
[ Â 54.534647] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 54.541068] Â[<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
[ Â 54.547393] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 54.554395] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 54.560914] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 54.567142] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 54.573950] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 54.581052] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 54.588055] Â[<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
[ Â 54.594571] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 54.601672] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 54.607804] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 54.616069] Â[<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
[ Â 54.623169] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 54.629495] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 54.636400] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 54.643306] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 54.650211] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 54.656242] Â[<ffffffff826e0073>] ? kernel_init+0x13/0x120
[ Â 54.662370] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 54.668402] Â[<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
[ Â 54.674628] Memory state around the buggy address:
[ Â 54.679980] Âffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 54.688048] Âffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 54.696114] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 54.704182] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 54.709537] Âffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 54.717602] Âffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 54.725665] ==================================================================
[ Â 54.733823] ==================================================================
[ Â 54.741895] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8
[ Â 54.752288] Read of size 64 by task swapper/0/1
[ Â 54.757354] page:ffffea00214967c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 54.766309] flags: 0x2fffff80000000()
[ Â 54.770398] page dumped because: kasan: bad access detected
[ Â 54.776623] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G Â ÂB Â Â Â Â Â 4.8.0+ #3
[ Â 54.784688] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 54.796049] Âffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 ffff88085259fba8
[ Â 54.804358] Âffff88085259f960 ffffffff816322e3 ffff880e53348080 ffff880e5e4171e0
[ Â 54.812687] Âffff880e53348080 0000000000000092 0000000cbe62c0e0 0000000000000000
[ Â 54.821003] Call Trace:
[ Â 54.823749] Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 54.829499] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 54.836219] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 54.842162] Â[<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
[ Â 54.849076] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 54.855891] Â[<ffffffff816314b3>] memcpy+0x23/0x50
[ Â 54.861251] Â[<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
[ Â 54.867971] Â[<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
[ Â 54.874205] Â[<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
[ Â 54.880439] Â[<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
[ Â 54.887449] Â[<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
[ Â 54.893696] Â[<ffffffff813bce80>] ? kp_pre_handler+0x30/0x30
[ Â 54.900034] Â[<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
[ Â 54.907139] Â[<ffffffffa00000d5>] 0xffffffffa00000d5
[ Â 54.912699] Â[<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
[ Â 54.918956] Â[<ffffffff813bce85>] kprobe_target2+0x5/0x20
[ Â 54.924994] Â[<ffffffff813bd395>] init_test_probes+0x275/0x5d0
[ Â 54.931517] Â[<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
[ Â 54.937752] Â[<ffffffff813bd395>] ? init_test_probes+0x275/0x5d0
[ Â 54.944471] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 54.950901] Â[<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
[ Â 54.957037] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 54.964045] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 54.970570] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 54.976803] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 54.983618] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 54.990724] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 54.997732] Â[<ffffffff81002299>] do_one_initcall+0xa9/0x240
[ Â 55.004062] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 55.011169] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 55.017307] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 55.025579] Â[<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
[ Â 55.032491] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 55.038824] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 55.045738] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 55.052650] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 55.059563] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 55.065602] Â[<ffffffff826e0073>] kernel_init+0x13/0x120
[ Â 55.071544] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 55.077582] Â[<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
[ Â 55.083620] Memory state around the buggy address:
[ Â 55.088977] Âffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 55.097048] Âffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 55.105113] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 55.113183] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 55.118540] Âffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 55.126610] Âffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 55.134677] ==================================================================
[ Â 55.142905] clocksource: Switched to clocksource tsc
[ Â 55.143010] ==================================================================
[ Â 55.143018] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8
[ Â 55.143021] Write of size 64 by task swapper/0/1
[ Â 55.143027] page:ffffea00214967c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 55.143029] flags: 0x2fffff80000000()
[ Â 55.143031] page dumped because: kasan: bad access detected
[ Â 55.143036] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G Â ÂB Â Â Â Â Â 4.8.0+ #3
[ Â 55.143039] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 55.143048] Âffff880e5e40fd98 ffffffff81a6a6e1 ffff880e5e40fe30 ffff88085259fba8
[ Â 55.143055] Âffff880e5e40fe20 ffffffff816322e3 0000000000000010 0000000000000000
[ Â 55.143063] Âffffed010a4b3f76 0000000000000092 f2f2f2f400000000 f3f3f3f4f4f400f2
[ Â 55.143064] Call Trace:
[ Â 55.143075] Â<#DB> Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 55.143081] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 55.143087] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 55.143093] Â[<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
[ Â 55.143101] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 55.143108] Â[<ffffffff816314c7>] memcpy+0x37/0x50
[ Â 55.143113] Â[<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
[ Â 55.143118] Â[<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
[ Â 55.143123] Â[<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
[ Â 55.143129] Â[<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
[ Â 55.143136] Â[<ffffffff81094d1e>] do_int3+0xbe/0x230
[ Â 55.143143] Â[<ffffffff826fa544>] int3+0x44/0x80
[ Â 55.143153] Â[<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
[ Â 55.143162] Â<EOE> Â[<ffffffff813bd395>] ? init_test_probes+0x275/0x5d0
[ Â 55.143169] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 55.143177] Â[<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
[ Â 55.143184] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 55.143190] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 55.143197] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 55.143204] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 55.143210] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 55.143218] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 55.143224] Â[<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
[ Â 55.143230] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 55.143236] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 55.143244] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 55.143252] Â[<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
[ Â 55.143258] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 55.143265] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 55.143272] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 55.143278] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 55.143285] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 55.143291] Â[<ffffffff826e0073>] ? kernel_init+0x13/0x120
[ Â 55.143297] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 55.143302] Â[<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
[ Â 55.143307] Memory state around the buggy address:
[ Â 55.143310] Âffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 55.143314] Âffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 55.143318] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 55.143320] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 55.143323] Âffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 55.143327] Âffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 55.143329] ==================================================================
[ Â 55.620180] Kprobe smoke test: passed successfully

==== KERNEL PANIC RUN ====
[ Â 34.484681] Kprobe smoke test: started
[ Â 34.544890] ==================================================================
[ Â 34.552958] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8
[ Â 34.563346] Read of size 64 by task swapper/0/1
[ Â 34.568402] page:ffffea002148e1c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 34.577346] flags: 0x2fffff80000000()
[ Â 34.581431] page dumped because: kasan: bad access detected
[ Â 34.587653] CPU: 79 PID: 1 Comm: swapper/0 Not tainted 4.8.0+ #3
[ Â 34.594347] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 34.605705] Âffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 ffff880852387ba8
[ Â 34.614001] Âffff880852387960 ffffffff816322e3 ffff8808523879a0 0000000000000046
[ Â 34.622297] Â0000000001c4a4cb 0000000000000092 0000000000000246 ffff880852387920
[ Â 34.630593] Call Trace:
[ Â 34.633327] Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 34.639061] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 34.645769] Â[<ffffffff81ae70a3>] ? __this_cpu_preempt_check+0x13/0x20
[ Â 34.653055] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 34.658983] Â[<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
[ Â 34.665884] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 34.672685] Â[<ffffffff816314b3>] memcpy+0x23/0x50
[ Â 34.678031] Â[<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
[ Â 34.684734] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 34.690855] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 34.696977] Â[<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
[ Â 34.703971] Â[<ffffffff813bce35>] ? kprobe_target+0x5/0x20
[ Â 34.710093] Â[<ffffffff813bce30>] ? stop_machine_from_inactive_cpu+0x250/0x250
[ Â 34.718158] Â[<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
[ Â 34.725251] Â[<ffffffffa00000d5>] 0xffffffffa00000d5
[ Â 34.730792] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 34.736914] Â[<ffffffff813bce35>] kprobe_target+0x5/0x20
[ Â 34.742840] Â[<ffffffff813bd300>] init_test_probes+0x1e0/0x5d0
[ Â 34.749349] Â[<ffffffff813bce35>] ? kprobe_target+0x5/0x20
[ Â 34.755470] Â[<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
[ Â 34.762175] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 34.768591] Â[<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
[ Â 34.774713] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 34.781710] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 34.788219] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 34.794438] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 34.801239] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 34.808330] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 34.815324] Â[<ffffffff81002299>] do_one_initcall+0xa9/0x240
[ Â 34.821642] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 34.828734] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 34.834855] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 34.843112] Â[<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
[ Â 34.850008] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 34.856327] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 34.863224] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 34.870121] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 34.877021] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 34.883046] Â[<ffffffff826e0073>] kernel_init+0x13/0x120
[ Â 34.888973] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 34.894997] Â[<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
[ Â 34.901022] Memory state around the buggy address:
[ Â 34.906368] Âffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 34.914428] Âffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 34.922489] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 34.930551] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 34.935897] Âffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 34.943958] Âffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 34.952019] ==================================================================
[ Â 34.960079] Disabling lock debugging due to kernel taint
[ Â 34.966029] ==================================================================
[ Â 34.974090] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff880852387ba8
[ Â 34.984768] Write of size 64 by task swapper/0/1
[ Â 34.989921] page:ffffea002148e1c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 34.998863] flags: 0x2fffff80000000()
[ Â 35.002948] page dumped because: kasan: bad access detected
[ Â 35.009167] CPU: 79 PID: 1 Comm: swapper/0 Tainted: G Â ÂB Â Â Â Â Â 4.8.0+ #3
[ Â 35.017225] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 35.028581] Âffff880e5eccfd98 ffffffff81a6a6e1 ffff880e5eccfe30 ffff880852387ba8
[ Â 35.036877] Âffff880e5eccfe20 ffffffff816322e3 0000000000000000 0000000000000000
[ Â 35.045172] Â0000000000000000 0000000000000092 0000000000000000 0000000000000000
[ Â 35.053467] Call Trace:
[ Â 35.056194] Â<#DB> Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 35.062621] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 35.069324] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 35.075252] Â[<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
[ Â 35.082441] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 35.089241] Â[<ffffffff816314c7>] memcpy+0x37/0x50
[ Â 35.094588] Â[<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
[ Â 35.101582] Â[<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
[ Â 35.107801] Â[<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
[ Â 35.114018] Â[<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
[ Â 35.120820] Â[<ffffffff81094d1e>] do_int3+0xbe/0x230
[ Â 35.126363] Â[<ffffffff826fa544>] int3+0x44/0x80
[ Â 35.131518] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 35.137630] Â<EOE> Â[<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
[ Â 35.145026] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 35.151440] Â[<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
[ Â 35.157755] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 35.164748] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 35.171257] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 35.177477] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 35.184279] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 35.191371] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 35.198366] Â[<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
[ Â 35.204876] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 35.211966] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 35.218089] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 35.226346] Â[<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
[ Â 35.233436] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 35.239751] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 35.246648] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 35.253544] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 35.260442] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 35.266466] Â[<ffffffff826e0073>] ? kernel_init+0x13/0x120
[ Â 35.272588] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 35.278613] Â[<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
[ Â 35.284831] Memory state around the buggy address:
[ Â 35.290178] Âffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 35.298236] Âffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 35.306296] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 35.314355] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 35.319699] Âffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 35.327761] Âffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 35.335820] ==================================================================
[ Â 35.352411] tsc: Refined TSC clocksource calibration: 2194.917 MHz
[ Â 35.359361] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x1fa37107ca2, max_idle_ns: 440795258165 ns
[ Â 35.384275] ==================================================================
[ Â 35.392341] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8
[ Â 35.402719] Read of size 64 by task swapper/0/1
[ Â 35.407774] page:ffffea002148e1c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 35.416720] flags: 0x2fffff80000000()
[ Â 35.420804] page dumped because: kasan: bad access detected
[ Â 35.427024] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G Â ÂB Â Â Â Â Â 4.8.0+ #3
[ Â 35.435084] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 35.446440] Âffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 ffff880852387ba8
[ Â 35.454737] Âffff880852387960 ffffffff816322e3 ffff8808594fd9c0 0000000041b58ab3
[ Â 35.463033] Âffff8808523879b0 0000000000000092 0000000000000000 0000000000000000
[ Â 35.471330] Call Trace:
[ Â 35.474061] Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 35.479796] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 35.486500] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 35.492428] Â[<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
[ Â 35.499325] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 35.506127] Â[<ffffffff816314b3>] memcpy+0x23/0x50
[ Â 35.511472] Â[<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
[ Â 35.518176] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 35.524297] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 35.530419] Â[<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
[ Â 35.537414] Â[<ffffffff813bce35>] ? kprobe_target+0x5/0x20
[ Â 35.543536] Â[<ffffffff813bce30>] ? stop_machine_from_inactive_cpu+0x250/0x250
[ Â 35.551598] Â[<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
[ Â 35.558689] Â[<ffffffffa00000d5>] 0xffffffffa00000d5
[ Â 35.564229] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 35.570350] Â[<ffffffff813bce35>] kprobe_target+0x5/0x20
[ Â 35.576280] Â[<ffffffff813bd371>] init_test_probes+0x251/0x5d0
[ Â 35.582790] Â[<ffffffff813bce35>] ? kprobe_target+0x5/0x20
[ Â 35.588912] Â[<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
[ Â 35.595617] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 35.602031] Â[<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
[ Â 35.608152] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 35.615145] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 35.621656] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 35.627875] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 35.634676] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 35.641766] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 35.648762] Â[<ffffffff81002299>] do_one_initcall+0xa9/0x240
[ Â 35.655077] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 35.662170] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 35.668293] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 35.676549] Â[<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
[ Â 35.683445] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 35.689763] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 35.696662] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 35.703559] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 35.710456] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 35.716482] Â[<ffffffff826e0073>] kernel_init+0x13/0x120
[ Â 35.722410] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 35.728436] Â[<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
[ Â 35.734460] Memory state around the buggy address:
[ Â 35.739806] Âffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 35.747865] Âffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 35.755926] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 35.763985] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 35.769329] Âffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 35.777389] Âffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 35.785448] ==================================================================
[ Â 35.793532] ==================================================================
[ Â 35.801597] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff880852387ba8
[ Â 35.812275] Write of size 64 by task swapper/0/1
[ Â 35.817426] page:ffffea002148e1c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 35.826369] flags: 0x2fffff80000000()
[ Â 35.830453] page dumped because: kasan: bad access detected
[ Â 35.836671] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G Â ÂB Â Â Â Â Â 4.8.0+ #3
[ Â 35.844732] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 35.856089] Âffff880e5ed0fd98 ffffffff81a6a6e1 ffff880e5ed0fe30 ffff880852387ba8
[ Â 35.864385] Âffff880e5ed0fe20 ffffffff816322e3 0000000000000000 0000000000000000
[ Â 35.872681] Â0000000000000000 0000000000000092 0000000000000000 0000000000000000
[ Â 35.880977] Call Trace:
[ Â 35.883704] Â<#DB> Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 35.890130] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 35.896835] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 35.902763] Â[<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
[ Â 35.909950] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 35.916751] Â[<ffffffff816314c7>] memcpy+0x37/0x50
[ Â 35.922097] Â[<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
[ Â 35.929093] Â[<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
[ Â 35.935312] Â[<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
[ Â 35.941530] Â[<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
[ Â 35.948332] Â[<ffffffff81094d1e>] do_int3+0xbe/0x230
[ Â 35.953873] Â[<ffffffff826fa544>] int3+0x44/0x80
[ Â 35.959026] Â[<ffffffff813bce31>] ? kprobe_target+0x1/0x20
[ Â 35.965147] Â<EOE> Â[<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
[ Â 35.972541] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 35.978954] Â[<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
[ Â 35.985269] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 35.992261] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 35.998770] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 36.004988] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 36.011788] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 36.018879] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 36.025873] Â[<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
[ Â 36.032382] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 36.039476] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 36.045597] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 36.053854] Â[<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
[ Â 36.060946] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 36.067261] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 36.074158] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 36.081053] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 36.087950] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 36.093974] Â[<ffffffff826e0073>] ? kernel_init+0x13/0x120
[ Â 36.100095] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 36.106120] Â[<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
[ Â 36.112339] Memory state around the buggy address:
[ Â 36.117683] Âffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 36.125742] Âffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 36.133802] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 36.141862] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 36.147205] Âffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 36.155264] Âffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 36.163325] ==================================================================
[ Â 36.171419] ==================================================================
[ Â 36.179482] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8
[ Â 36.189869] Read of size 64 by task swapper/0/1
[ Â 36.194924] page:ffffea002148e1c0 count:0 mapcount:0 mapping: Â Â Â Â Â(null) index:0x0
[ Â 36.203867] flags: 0x2fffff80000000()
[ Â 36.207951] page dumped because: kasan: bad access detected
[ Â 36.214170] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G Â ÂB Â Â Â Â Â 4.8.0+ #3
[ Â 36.222230] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 36.233585] Âffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 ffff880852387ba8
[ Â 36.241883] Âffff880852387960 ffffffff816322e3 ffff880e535d0080 ffff880e5ed171e0
[ Â 36.250179] Âffff880e535d0080 0000000000000092 000000086bfbbff3 0000000000000000
[ Â 36.258475] Call Trace:
[ Â 36.261205] Â[<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
[ Â 36.266938] Â[<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
[ Â 36.273641] Â[<ffffffff81632928>] kasan_report+0x58/0x60
[ Â 36.279570] Â[<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
[ Â 36.286468] Â[<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
[ Â 36.293268] Â[<ffffffff816314b3>] memcpy+0x23/0x50
[ Â 36.298615] Â[<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
[ Â 36.305319] Â[<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
[ Â 36.311538] Â[<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
[ Â 36.317756] Â[<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
[ Â 36.324749] Â[<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
[ Â 36.330967] Â[<ffffffff813bce80>] ? kp_pre_handler+0x30/0x30
[ Â 36.337284] Â[<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
[ Â 36.344376] Â[<ffffffffa00000d5>] 0xffffffffa00000d5
[ Â 36.349918] Â[<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
[ Â 36.356131] Â[<ffffffff813bce85>] kprobe_target2+0x5/0x20
[ Â 36.362157] Â[<ffffffff813bd395>] init_test_probes+0x275/0x5d0
[ Â 36.368666] Â[<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
[ Â 36.374884] Â[<ffffffff813bd395>] ? init_test_probes+0x275/0x5d0
[ Â 36.381591] Â[<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
[ Â 36.388006] Â[<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
[ Â 36.394122] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 36.401120] Â[<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
[ Â 36.407632] Â[<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
[ Â 36.413854] Â[<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
[ Â 36.420658] Â[<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
[ Â 36.427753] Â[<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
[ Â 36.434751] Â[<ffffffff81002299>] do_one_initcall+0xa9/0x240
[ Â 36.441068] Â[<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
[ Â 36.448163] Â[<ffffffff811f5a10>] ? parse_args+0x520/0x990
[ Â 36.454287] Â[<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
[ Â 36.462544] Â[<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
[ Â 36.469444] Â[<ffffffff834857df>] ? start_kernel+0x70d/0x70d
[ Â 36.475764] Â[<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
[ Â 36.482665] Â[<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
[ Â 36.489564] Â[<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
[ Â 36.496464] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 36.502493] Â[<ffffffff826e0073>] kernel_init+0x13/0x120
[ Â 36.508422] Â[<ffffffff826e0060>] ? rest_init+0x160/0x160
[ Â 36.514450] Â[<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
[ Â 36.520476] Memory state around the buggy address:
[ Â 36.525825] Âffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 36.533878] Âffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ Â 36.541941] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
[ Â 36.549993] Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â^
[ Â 36.555341] Âffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
[ Â 36.563394] Âffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[ Â 36.571455] ==================================================================
[ Â 36.579599] int3: 0000 [#1] PREEMPT SMP KASAN
[ Â 36.579606] clocksource: Switched to clocksource tsc
[ Â 36.590000] Modules linked in:
[ Â 36.593420] CPU: 36 PID: 1 Comm: swapper/0 Tainted: G Â ÂB Â Â Â Â Â 4.8.0+ #3
[ Â 36.601480] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
[ Â 36.612837] task: ffff880e535d0000 task.stack: ffff880852380000
[ Â 36.619444] RIP: 0010:[<ffffffff8111bfe5>] Â[<ffffffff8111bfe5>] jprobe_return_end+0x0/0x1b
[ Â 36.628778] RSP: 0000:0000000000000000 ÂEFLAGS: 00000046
[ Â 36.634704] RAX: dffffc0000000000 RBX: ffff880852387b80 RCX: 1ffffffff05acca0
[ Â 36.642667] RDX: 1ffff101cbcf2d1b RSI: ffffffff829cb560 RDI: ffff880e5e7968d8
[ Â 36.650629] RBP: ffff880852387b90 R08: 1ffff1010a470eaf R09: 0000000000000000
[ Â 36.658593] R10: 0000000000000008 R11: ffffed01cbda2d38 R12: 0000000000000024
[ Â 36.666555] R13: 1ffff1010a470f76 R14: 0000000000000001 R15: ffffffff82e8a950
[ Â 36.674519] FS: Â0000000000000000(0000) GS:ffff880e5e780000(0000) knlGS:0000000000000000
[ Â 36.683548] CS: Â0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ Â 36.689961] CR2: 0000000000000000 CR3: 0000000002e0a000 CR4: 00000000003406e0
[ Â 36.697924] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ Â 36.705888] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ Â 36.713851] Stack:
[ Â 36.716091]
[ Â 36.717750] Call Trace:
[ Â 36.720476] Code: 4a 03 1c e5 e0 63 d6 82 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 80 3c 02 00 75 15 48 8b 5b 18 48 87 dc cc <90> 5b 41 5c 5d c3 e8 70 64 51 00 eb c8 e8 69 64 51 00 eb e4 0f
[ Â 36.742285] RIP Â[<ffffffff8111bfe5>] jprobe_return_end+0x0/0x1b
[ Â 36.749000] ÂRSP <0000000000000000>
[ Â 36.752942] ---[ end trace 65b1716ff1e2d4ca ]---
[ Â 36.758094] Kernel panic - not syncing: Fatal exception
[ Â 36.763975] Kernel Offset: disabled
[ Â 36.767894] ---[ end Kernel panic - not syncing: Fatal exception