lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CACT4Y+YiRG0Q=JgnSLaX1a2TQ75USMV2oEH6r9qr6hfC=RMndA@mail.gmail.com>
Date:   Tue, 11 Oct 2016 14:15:37 +0200
From:   Dmitry Vyukov <dvyukov@...gle.com>
To:     CAI Qian <caiqian@...hat.com>
Cc:     Ananth N Mavinakayanahalli <ananth@...ux.vnet.ibm.com>,
        Anil S Keshavamurthy <anil.s.keshavamurthy@...el.com>,
        "David S. Miller" <davem@...emloft.net>,
        Masami Hiramatsu <mhiramat@...nel.org>,
        Andrey Ryabinin <aryabinin@...tuozzo.com>,
        kasan-dev <kasan-dev@...glegroups.com>,
        linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: KASAN (inline) + CONFIG_KPROBES_SANITY_TEST failures and kernel panic

On Mon, Oct 10, 2016 at 8:05 PM, CAI Qian <caiqian@...hat.com> wrote:
> It usually report failures when enabled KASAN (inline) and CONFIG_KPROBES_SANITY_TEST on today's
> mainline HEAD. Occasionally, kernel panic with trace at the bottom.

Hi CAI,

This is a KASAN false positive. 0xf1-0xf4 shadow values are stack
poisoning. KASAN instrumentation poisons stack redzones on function
entry and unpoisons them on function exit. Kprobes memcpy chunks of
stack with redzones, and memcpy produces these reports.

Mailed a fix (you are in CC): "kprobes: avoid false KASAN reports
during stack copy"

Thanks for the report!

> [   52.973247] Kprobe smoke test: started
> [   53.078585] ==================================================================
> [   53.086666] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8
> [   53.097060] Read of size 64 by task swapper/0/1
> [   53.102125] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   53.111073] flags: 0x2fffff80000000()
> [   53.115163] page dumped because: kasan: bad access detected
> [   53.121392] CPU: 87 PID: 1 Comm: swapper/0 Not tainted 4.8.0+ #3
> [   53.128103] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   53.139468]  ffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 ffff88085259fba8
> [   53.147779]  ffff88085259f960 ffffffff816322e3 ffff88085259f9a0 0000000000000046
> [   53.156090]  00000000019e2c79 0000000000000092 0000000000000246 ffff88085259f920
> [   53.164415] Call Trace:
> [   53.167161]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   53.172906]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   53.179624]  [<ffffffff81ae70a3>] ? __this_cpu_preempt_check+0x13/0x20
> [   53.186916]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   53.192854]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   53.199763]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   53.206573]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   53.211937]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   53.218656]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   53.224787]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   53.230917]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   53.237919]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   53.244060]  [<ffffffff813bce30>] ? stop_machine_from_inactive_cpu+0x250/0x250
> [   53.252141]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   53.259240]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   53.264804]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   53.270938]  [<ffffffff813bce35>] kprobe_target+0x5/0x20
> [   53.276875]  [<ffffffff813bd300>] init_test_probes+0x1e0/0x5d0
> [   53.283395]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   53.289525]  [<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
> [   53.296245]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   53.302676]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   53.308807]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   53.315811]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   53.322330]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   53.328559]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   53.335362]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   53.342454]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   53.349458]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   53.355783]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   53.362883]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   53.369016]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   53.377284]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   53.384188]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   53.390514]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   53.397411]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   53.404317]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   53.411227]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   53.417262]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   53.423196]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   53.429229]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   53.435260] Memory state around the buggy address:
> [   53.440616]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   53.448675]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   53.456741] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   53.464808]                                      ^
> [   53.470159]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   53.478226]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   53.486291] ==================================================================
> [   53.494355] Disabling lock debugging due to kernel taint
> [   53.500374] ==================================================================
> [   53.508449] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8
> [   53.519134] Write of size 64 by task swapper/0/1
> [   53.524294] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   53.533245] flags: 0x2fffff80000000()
> [   53.537333] page dumped because: kasan: bad access detected
> [   53.543560] CPU: 87 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3
> [   53.551627] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   53.562987]  ffff880e5eecfd98 ffffffff81a6a6e1 ffff880e5eecfe30 ffff88085259fba8
> [   53.571291]  ffff880e5eecfe20 ffffffff816322e3 0000000000000000 0000000000000000
> [   53.579588]  0000000000000000 0000000000000092 0000000000000000 0000000000000000
> [   53.587899] Call Trace:
> [   53.590635]  <#DB>  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   53.597084]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   53.603797]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   53.609733]  [<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
> [   53.616932]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   53.623732]  [<ffffffff816314c7>] memcpy+0x37/0x50
> [   53.629085]  [<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
> [   53.636087]  [<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
> [   53.642312]  [<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
> [   53.648538]  [<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
> [   53.655349]  [<ffffffff81094d1e>] do_int3+0xbe/0x230
> [   53.660899]  [<ffffffff826fa544>] int3+0x44/0x80
> [   53.666063]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   53.672187]  <EOE>  [<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
> [   53.679599]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   53.686023]  [<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
> [   53.692348]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   53.699350]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   53.705876]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   53.712109]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   53.718917]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   53.726017]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   53.733019]  [<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
> [   53.739538]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   53.746639]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   53.752771]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   53.761027]  [<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
> [   53.768127]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   53.774452]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   53.781357]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   53.788261]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   53.795167]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   53.800902] tsc: Refined TSC clocksource calibration: 2194.917 MHz
> [   53.801000] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x1fa37107ca2, max_idle_ns: 440795258165 ns
> [   53.819265]  [<ffffffff826e0073>] ? kernel_init+0x13/0x120
> [   53.825394]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   53.831426]  [<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
> [   53.837650] Memory state around the buggy address:
> [   53.843003]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   53.851069]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   53.859137] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   53.867204]                                      ^
> [   53.872555]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   53.880622]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   53.888686] ==================================================================
> [   53.945608] ==================================================================
> [   53.953691] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8
> [   53.964084] Read of size 64 by task swapper/0/1
> [   53.969148] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   53.978095] flags: 0x2fffff80000000()
> [   53.982183] page dumped because: kasan: bad access detected
> [   53.988412] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3
> [   53.996480] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   54.007841]  ffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 ffff88085259fba8
> [   54.016157]  ffff88085259f960 ffffffff816322e3 ffff880e531dbea0 0000000041b58ab3
> [   54.024477]  ffff88085259f9b0 0000000000000092 0000000000000000 0000000000000000
> [   54.032791] Call Trace:
> [   54.035535]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   54.041280]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   54.047984]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   54.053920]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   54.060826]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   54.067636]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   54.072991]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   54.079703]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   54.085832]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   54.091961]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   54.098963]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   54.105094]  [<ffffffff813bce30>] ? stop_machine_from_inactive_cpu+0x250/0x250
> [   54.113166]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   54.120265]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   54.125816]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   54.131946]  [<ffffffff813bce35>] kprobe_target+0x5/0x20
> [   54.137884]  [<ffffffff813bd371>] init_test_probes+0x251/0x5d0
> [   54.144400]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   54.150530]  [<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
> [   54.157244]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   54.163670]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   54.169799]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.176800]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   54.183321]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   54.189541]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   54.196349]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   54.203450]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.210453]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   54.216776]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   54.223877]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   54.230008]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   54.238273]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   54.245178]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   54.251502]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   54.258409]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   54.265314]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   54.272221]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   54.278253]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   54.284196]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   54.290235]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   54.296265] Memory state around the buggy address:
> [   54.301617]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   54.309682]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   54.317748] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   54.325816]                                      ^
> [   54.331172]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   54.339238]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   54.347306] ==================================================================
> [   54.355428] ==================================================================
> [   54.363501] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8
> [   54.374183] Write of size 64 by task swapper/0/1
> [   54.379341] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   54.388293] flags: 0x2fffff80000000()
> [   54.392383] page dumped because: kasan: bad access detected
> [   54.398610] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3
> [   54.406677] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   54.418037]  ffff880e5e40fd98 ffffffff81a6a6e1 ffff880e5e40fe30 ffff88085259fba8
> [   54.426343]  ffff880e5e40fe20 ffffffff816322e3 0000000000000000 0000000000000000
> [   54.434640]  0000000000000000 0000000000000092 0000000000000000 0000000000000000
> [   54.442959] Call Trace:
> [   54.445692]  <#DB>  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   54.452136]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   54.458848]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   54.464785]  [<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
> [   54.471981]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   54.478790]  [<ffffffff816314c7>] memcpy+0x37/0x50
> [   54.484142]  [<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
> [   54.491145]  [<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
> [   54.497370]  [<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
> [   54.503597]  [<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
> [   54.510408]  [<ffffffff81094d1e>] do_int3+0xbe/0x230
> [   54.515947]  [<ffffffff826fa544>] int3+0x44/0x80
> [   54.521110]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   54.527237]  <EOE>  [<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
> [   54.534647]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   54.541068]  [<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
> [   54.547393]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.554395]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   54.560914]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   54.567142]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   54.573950]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   54.581052]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.588055]  [<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
> [   54.594571]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   54.601672]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   54.607804]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   54.616069]  [<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
> [   54.623169]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   54.629495]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   54.636400]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   54.643306]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   54.650211]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   54.656242]  [<ffffffff826e0073>] ? kernel_init+0x13/0x120
> [   54.662370]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   54.668402]  [<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
> [   54.674628] Memory state around the buggy address:
> [   54.679980]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   54.688048]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   54.696114] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   54.704182]                                      ^
> [   54.709537]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   54.717602]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   54.725665] ==================================================================
> [   54.733823] ==================================================================
> [   54.741895] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8
> [   54.752288] Read of size 64 by task swapper/0/1
> [   54.757354] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   54.766309] flags: 0x2fffff80000000()
> [   54.770398] page dumped because: kasan: bad access detected
> [   54.776623] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3
> [   54.784688] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   54.796049]  ffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 ffff88085259fba8
> [   54.804358]  ffff88085259f960 ffffffff816322e3 ffff880e53348080 ffff880e5e4171e0
> [   54.812687]  ffff880e53348080 0000000000000092 0000000cbe62c0e0 0000000000000000
> [   54.821003] Call Trace:
> [   54.823749]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   54.829499]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   54.836219]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   54.842162]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   54.849076]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   54.855891]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   54.861251]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   54.867971]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   54.874205]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   54.880439]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   54.887449]  [<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
> [   54.893696]  [<ffffffff813bce80>] ? kp_pre_handler+0x30/0x30
> [   54.900034]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   54.907139]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   54.912699]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   54.918956]  [<ffffffff813bce85>] kprobe_target2+0x5/0x20
> [   54.924994]  [<ffffffff813bd395>] init_test_probes+0x275/0x5d0
> [   54.931517]  [<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
> [   54.937752]  [<ffffffff813bd395>] ? init_test_probes+0x275/0x5d0
> [   54.944471]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   54.950901]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   54.957037]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.964045]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   54.970570]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   54.976803]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   54.983618]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   54.990724]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   54.997732]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   55.004062]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   55.011169]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   55.017307]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   55.025579]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   55.032491]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   55.038824]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   55.045738]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   55.052650]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   55.059563]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   55.065602]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   55.071544]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   55.077582]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   55.083620] Memory state around the buggy address:
> [   55.088977]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   55.097048]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   55.105113] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   55.113183]                                      ^
> [   55.118540]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   55.126610]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   55.134677] ==================================================================
> [   55.142905] clocksource: Switched to clocksource tsc
> [   55.143010] ==================================================================
> [   55.143018] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8
> [   55.143021] Write of size 64 by task swapper/0/1
> [   55.143027] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   55.143029] flags: 0x2fffff80000000()
> [   55.143031] page dumped because: kasan: bad access detected
> [   55.143036] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3
> [   55.143039] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   55.143048]  ffff880e5e40fd98 ffffffff81a6a6e1 ffff880e5e40fe30 ffff88085259fba8
> [   55.143055]  ffff880e5e40fe20 ffffffff816322e3 0000000000000010 0000000000000000
> [   55.143063]  ffffed010a4b3f76 0000000000000092 f2f2f2f400000000 f3f3f3f4f4f400f2
> [   55.143064] Call Trace:
> [   55.143075]  <#DB>  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   55.143081]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   55.143087]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   55.143093]  [<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
> [   55.143101]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   55.143108]  [<ffffffff816314c7>] memcpy+0x37/0x50
> [   55.143113]  [<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
> [   55.143118]  [<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
> [   55.143123]  [<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
> [   55.143129]  [<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
> [   55.143136]  [<ffffffff81094d1e>] do_int3+0xbe/0x230
> [   55.143143]  [<ffffffff826fa544>] int3+0x44/0x80
> [   55.143153]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   55.143162]  <EOE>  [<ffffffff813bd395>] ? init_test_probes+0x275/0x5d0
> [   55.143169]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   55.143177]  [<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
> [   55.143184]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   55.143190]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   55.143197]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   55.143204]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   55.143210]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   55.143218]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   55.143224]  [<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
> [   55.143230]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   55.143236]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   55.143244]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   55.143252]  [<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
> [   55.143258]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   55.143265]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   55.143272]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   55.143278]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   55.143285]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   55.143291]  [<ffffffff826e0073>] ? kernel_init+0x13/0x120
> [   55.143297]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   55.143302]  [<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
> [   55.143307] Memory state around the buggy address:
> [   55.143310]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   55.143314]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   55.143318] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   55.143320]                                      ^
> [   55.143323]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   55.143327]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   55.143329] ==================================================================
> [   55.620180] Kprobe smoke test: passed successfully
>
> ==== KERNEL PANIC RUN ====
> [   34.484681] Kprobe smoke test: started
> [   34.544890] ==================================================================
> [   34.552958] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8
> [   34.563346] Read of size 64 by task swapper/0/1
> [   34.568402] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   34.577346] flags: 0x2fffff80000000()
> [   34.581431] page dumped because: kasan: bad access detected
> [   34.587653] CPU: 79 PID: 1 Comm: swapper/0 Not tainted 4.8.0+ #3
> [   34.594347] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   34.605705]  ffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 ffff880852387ba8
> [   34.614001]  ffff880852387960 ffffffff816322e3 ffff8808523879a0 0000000000000046
> [   34.622297]  0000000001c4a4cb 0000000000000092 0000000000000246 ffff880852387920
> [   34.630593] Call Trace:
> [   34.633327]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   34.639061]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   34.645769]  [<ffffffff81ae70a3>] ? __this_cpu_preempt_check+0x13/0x20
> [   34.653055]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   34.658983]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   34.665884]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   34.672685]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   34.678031]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   34.684734]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   34.690855]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   34.696977]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   34.703971]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   34.710093]  [<ffffffff813bce30>] ? stop_machine_from_inactive_cpu+0x250/0x250
> [   34.718158]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   34.725251]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   34.730792]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   34.736914]  [<ffffffff813bce35>] kprobe_target+0x5/0x20
> [   34.742840]  [<ffffffff813bd300>] init_test_probes+0x1e0/0x5d0
> [   34.749349]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   34.755470]  [<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
> [   34.762175]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   34.768591]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   34.774713]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   34.781710]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   34.788219]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   34.794438]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   34.801239]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   34.808330]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   34.815324]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   34.821642]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   34.828734]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   34.834855]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   34.843112]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   34.850008]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   34.856327]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   34.863224]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   34.870121]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   34.877021]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   34.883046]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   34.888973]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   34.894997]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   34.901022] Memory state around the buggy address:
> [   34.906368]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   34.914428]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   34.922489] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   34.930551]                                      ^
> [   34.935897]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   34.943958]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   34.952019] ==================================================================
> [   34.960079] Disabling lock debugging due to kernel taint
> [   34.966029] ==================================================================
> [   34.974090] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff880852387ba8
> [   34.984768] Write of size 64 by task swapper/0/1
> [   34.989921] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   34.998863] flags: 0x2fffff80000000()
> [   35.002948] page dumped because: kasan: bad access detected
> [   35.009167] CPU: 79 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3
> [   35.017225] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   35.028581]  ffff880e5eccfd98 ffffffff81a6a6e1 ffff880e5eccfe30 ffff880852387ba8
> [   35.036877]  ffff880e5eccfe20 ffffffff816322e3 0000000000000000 0000000000000000
> [   35.045172]  0000000000000000 0000000000000092 0000000000000000 0000000000000000
> [   35.053467] Call Trace:
> [   35.056194]  <#DB>  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   35.062621]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   35.069324]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   35.075252]  [<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
> [   35.082441]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   35.089241]  [<ffffffff816314c7>] memcpy+0x37/0x50
> [   35.094588]  [<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
> [   35.101582]  [<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
> [   35.107801]  [<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
> [   35.114018]  [<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
> [   35.120820]  [<ffffffff81094d1e>] do_int3+0xbe/0x230
> [   35.126363]  [<ffffffff826fa544>] int3+0x44/0x80
> [   35.131518]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   35.137630]  <EOE>  [<ffffffff813bd300>] ? init_test_probes+0x1e0/0x5d0
> [   35.145026]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   35.151440]  [<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
> [   35.157755]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   35.164748]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   35.171257]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   35.177477]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   35.184279]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   35.191371]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   35.198366]  [<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
> [   35.204876]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   35.211966]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   35.218089]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   35.226346]  [<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
> [   35.233436]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   35.239751]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   35.246648]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   35.253544]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   35.260442]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   35.266466]  [<ffffffff826e0073>] ? kernel_init+0x13/0x120
> [   35.272588]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   35.278613]  [<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
> [   35.284831] Memory state around the buggy address:
> [   35.290178]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   35.298236]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   35.306296] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   35.314355]                                      ^
> [   35.319699]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   35.327761]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   35.335820] ==================================================================
> [   35.352411] tsc: Refined TSC clocksource calibration: 2194.917 MHz
> [   35.359361] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x1fa37107ca2, max_idle_ns: 440795258165 ns
> [   35.384275] ==================================================================
> [   35.392341] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8
> [   35.402719] Read of size 64 by task swapper/0/1
> [   35.407774] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   35.416720] flags: 0x2fffff80000000()
> [   35.420804] page dumped because: kasan: bad access detected
> [   35.427024] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3
> [   35.435084] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   35.446440]  ffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 ffff880852387ba8
> [   35.454737]  ffff880852387960 ffffffff816322e3 ffff8808594fd9c0 0000000041b58ab3
> [   35.463033]  ffff8808523879b0 0000000000000092 0000000000000000 0000000000000000
> [   35.471330] Call Trace:
> [   35.474061]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   35.479796]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   35.486500]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   35.492428]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   35.499325]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   35.506127]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   35.511472]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   35.518176]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   35.524297]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   35.530419]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   35.537414]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   35.543536]  [<ffffffff813bce30>] ? stop_machine_from_inactive_cpu+0x250/0x250
> [   35.551598]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   35.558689]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   35.564229]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   35.570350]  [<ffffffff813bce35>] kprobe_target+0x5/0x20
> [   35.576280]  [<ffffffff813bd371>] init_test_probes+0x251/0x5d0
> [   35.582790]  [<ffffffff813bce35>] ? kprobe_target+0x5/0x20
> [   35.588912]  [<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
> [   35.595617]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   35.602031]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   35.608152]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   35.615145]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   35.621656]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   35.627875]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   35.634676]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   35.641766]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   35.648762]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   35.655077]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   35.662170]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   35.668293]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   35.676549]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   35.683445]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   35.689763]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   35.696662]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   35.703559]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   35.710456]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   35.716482]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   35.722410]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   35.728436]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   35.734460] Memory state around the buggy address:
> [   35.739806]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   35.747865]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   35.755926] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   35.763985]                                      ^
> [   35.769329]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   35.777389]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   35.785448] ==================================================================
> [   35.793532] ==================================================================
> [   35.801597] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff880852387ba8
> [   35.812275] Write of size 64 by task swapper/0/1
> [   35.817426] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   35.826369] flags: 0x2fffff80000000()
> [   35.830453] page dumped because: kasan: bad access detected
> [   35.836671] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3
> [   35.844732] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   35.856089]  ffff880e5ed0fd98 ffffffff81a6a6e1 ffff880e5ed0fe30 ffff880852387ba8
> [   35.864385]  ffff880e5ed0fe20 ffffffff816322e3 0000000000000000 0000000000000000
> [   35.872681]  0000000000000000 0000000000000092 0000000000000000 0000000000000000
> [   35.880977] Call Trace:
> [   35.883704]  <#DB>  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   35.890130]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   35.896835]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   35.902763]  [<ffffffff8111c8ef>] ? longjmp_break_handler+0x1df/0x2a0
> [   35.909950]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   35.916751]  [<ffffffff816314c7>] memcpy+0x37/0x50
> [   35.922097]  [<ffffffff8111c8ef>] longjmp_break_handler+0x1df/0x2a0
> [   35.929093]  [<ffffffff8111bfe4>] ? jprobe_return+0x64/0x65
> [   35.935312]  [<ffffffff8111bfe5>] ? jprobe_return+0x65/0x65
> [   35.941530]  [<ffffffff8111e4c7>] kprobe_int3_handler+0x347/0x440
> [   35.948332]  [<ffffffff81094d1e>] do_int3+0xbe/0x230
> [   35.953873]  [<ffffffff826fa544>] int3+0x44/0x80
> [   35.959026]  [<ffffffff813bce31>] ? kprobe_target+0x1/0x20
> [   35.965147]  <EOE>  [<ffffffff813bd371>] ? init_test_probes+0x251/0x5d0
> [   35.972541]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   35.978954]  [<ffffffff834e555d>] ? init_kprobes+0x3f8/0x43d
> [   35.985269]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   35.992261]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   35.998770]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   36.004988]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   36.011788]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   36.018879]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   36.025873]  [<ffffffff81002299>] ? do_one_initcall+0xa9/0x240
> [   36.032382]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   36.039476]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   36.045597]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   36.053854]  [<ffffffff83485d1f>] ? kernel_init_freeable+0x540/0x610
> [   36.060946]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   36.067261]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   36.074158]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   36.081053]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   36.087950]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   36.093974]  [<ffffffff826e0073>] ? kernel_init+0x13/0x120
> [   36.100095]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   36.106120]  [<ffffffff826f93ba>] ? ret_from_fork+0x2a/0x40
> [   36.112339] Memory state around the buggy address:
> [   36.117683]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   36.125742]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   36.133802] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   36.141862]                                      ^
> [   36.147205]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   36.155264]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   36.163325] ==================================================================
> [   36.171419] ==================================================================
> [   36.179482] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8
> [   36.189869] Read of size 64 by task swapper/0/1
> [   36.194924] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          (null) index:0x0
> [   36.203867] flags: 0x2fffff80000000()
> [   36.207951] page dumped because: kasan: bad access detected
> [   36.214170] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3
> [   36.222230] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   36.233585]  ffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 ffff880852387ba8
> [   36.241883]  ffff880852387960 ffffffff816322e3 ffff880e535d0080 ffff880e5ed171e0
> [   36.250179]  ffff880e535d0080 0000000000000092 000000086bfbbff3 0000000000000000
> [   36.258475] Call Trace:
> [   36.261205]  [<ffffffff81a6a6e1>] dump_stack+0x85/0xc4
> [   36.266938]  [<ffffffff816322e3>] kasan_report_error+0x4c3/0x4f0
> [   36.273641]  [<ffffffff81632928>] kasan_report+0x58/0x60
> [   36.279570]  [<ffffffff8111c60c>] ? setjmp_pre_handler+0x17c/0x280
> [   36.286468]  [<ffffffff81630fee>] check_memory_region+0x13e/0x1a0
> [   36.293268]  [<ffffffff816314b3>] memcpy+0x23/0x50
> [   36.298615]  [<ffffffff8111c60c>] setjmp_pre_handler+0x17c/0x280
> [   36.305319]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   36.311538]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   36.317756]  [<ffffffff8111f12b>] kprobe_ftrace_handler+0x1cb/0x300
> [   36.324749]  [<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
> [   36.330967]  [<ffffffff813bce80>] ? kp_pre_handler+0x30/0x30
> [   36.337284]  [<ffffffff8141d999>] ftrace_ops_assist_func+0x259/0x3b0
> [   36.344376]  [<ffffffffa00000d5>] 0xffffffffa00000d5
> [   36.349918]  [<ffffffff813bce81>] ? kprobe_target2+0x1/0x20
> [   36.356131]  [<ffffffff813bce85>] kprobe_target2+0x5/0x20
> [   36.362157]  [<ffffffff813bd395>] init_test_probes+0x275/0x5d0
> [   36.368666]  [<ffffffff813bce85>] ? kprobe_target2+0x5/0x20
> [   36.374884]  [<ffffffff813bd395>] ? init_test_probes+0x275/0x5d0
> [   36.381591]  [<ffffffff813bd120>] ? j_kprobe_target+0x40/0x40
> [   36.388006]  [<ffffffff834e555d>] init_kprobes+0x3f8/0x43d
> [   36.394122]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   36.401120]  [<ffffffff8129874d>] ? debug_mutex_init+0x2d/0x60
> [   36.407632]  [<ffffffff8129652f>] ? __mutex_init+0xcf/0x100
> [   36.413854]  [<ffffffff834e4faf>] ? audit_fsnotify_init+0x3a/0x3a
> [   36.420658]  [<ffffffff8176e095>] ? fsnotify_alloc_group+0x185/0x250
> [   36.427753]  [<ffffffff834e5165>] ? debugfs_kprobe_init+0x12f/0x12f
> [   36.434751]  [<ffffffff81002299>] do_one_initcall+0xa9/0x240
> [   36.441068]  [<ffffffff810021f0>] ? initcall_blacklisted+0x180/0x180
> [   36.448163]  [<ffffffff811f5a10>] ? parse_args+0x520/0x990
> [   36.454287]  [<ffffffff811d5bc2>] ? __usermodehelper_set_disable_depth+0x42/0x50
> [   36.462544]  [<ffffffff83485d1f>] kernel_init_freeable+0x540/0x610
> [   36.469444]  [<ffffffff834857df>] ? start_kernel+0x70d/0x70d
> [   36.475764]  [<ffffffff826f88ad>] ? _raw_spin_unlock_irq+0x3d/0x60
> [   36.482665]  [<ffffffff8120eb19>] ? finish_task_switch+0x189/0x6c0
> [   36.489564]  [<ffffffff8120eaeb>] ? finish_task_switch+0x15b/0x6c0
> [   36.496464]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   36.502493]  [<ffffffff826e0073>] kernel_init+0x13/0x120
> [   36.508422]  [<ffffffff826e0060>] ? rest_init+0x160/0x160
> [   36.514450]  [<ffffffff826f93ba>] ret_from_fork+0x2a/0x40
> [   36.520476] Memory state around the buggy address:
> [   36.525825]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   36.533878]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [   36.541941] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3
> [   36.549993]                                      ^
> [   36.555341]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4
> [   36.563394]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
> [   36.571455] ==================================================================
> [   36.579599] int3: 0000 [#1] PREEMPT SMP KASAN
> [   36.579606] clocksource: Switched to clocksource tsc
> [   36.590000] Modules linked in:
> [   36.593420] CPU: 36 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3
> [   36.601480] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015
> [   36.612837] task: ffff880e535d0000 task.stack: ffff880852380000
> [   36.619444] RIP: 0010:[<ffffffff8111bfe5>]  [<ffffffff8111bfe5>] jprobe_return_end+0x0/0x1b
> [   36.628778] RSP: 0000:0000000000000000  EFLAGS: 00000046
> [   36.634704] RAX: dffffc0000000000 RBX: ffff880852387b80 RCX: 1ffffffff05acca0
> [   36.642667] RDX: 1ffff101cbcf2d1b RSI: ffffffff829cb560 RDI: ffff880e5e7968d8
> [   36.650629] RBP: ffff880852387b90 R08: 1ffff1010a470eaf R09: 0000000000000000
> [   36.658593] R10: 0000000000000008 R11: ffffed01cbda2d38 R12: 0000000000000024
> [   36.666555] R13: 1ffff1010a470f76 R14: 0000000000000001 R15: ffffffff82e8a950
> [   36.674519] FS:  0000000000000000(0000) GS:ffff880e5e780000(0000) knlGS:0000000000000000
> [   36.683548] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [   36.689961] CR2: 0000000000000000 CR3: 0000000002e0a000 CR4: 00000000003406e0
> [   36.697924] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [   36.705888] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> [   36.713851] Stack:
> [   36.716091]
> [   36.717750] Call Trace:
> [   36.720476] Code: 4a 03 1c e5 e0 63 d6 82 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 80 3c 02 00 75 15 48 8b 5b 18 48 87 dc cc <90> 5b 41 5c 5d c3 e8 70 64 51 00 eb c8 e8 69 64 51 00 eb e4 0f
> [   36.742285] RIP  [<ffffffff8111bfe5>] jprobe_return_end+0x0/0x1b
> [   36.749000]  RSP <0000000000000000>
> [   36.752942] ---[ end trace 65b1716ff1e2d4ca ]---
> [   36.758094] Kernel panic - not syncing: Fatal exception
> [   36.763975] Kernel Offset: disabled
> [   36.767894] ---[ end Kernel panic - not syncing: Fatal exception

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ