Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752165AbcJJSFQ convert rfc822-to-8bit (ORCPT ); Mon, 10 Oct 2016 14:05:16 -0400 Received: from mx5-phx2.redhat.com ([209.132.183.37]:54799 "EHLO mx5-phx2.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751033AbcJJSFP (ORCPT ); Mon, 10 Oct 2016 14:05:15 -0400 Date: Mon, 10 Oct 2016 14:05:06 -0400 (EDT) From: CAI Qian To: Ananth N Mavinakayanahalli , Anil S Keshavamurthy , "David S. Miller" , Masami Hiramatsu , Andrey Ryabinin Cc: kasan-dev@googlegroups.com, linux-kernel Message-ID: <1787794161.94561.1476122706297.JavaMail.zimbra@redhat.com> In-Reply-To: <454892090.93329.1476122186502.JavaMail.zimbra@redhat.com> Subject: KASAN (inline) + CONFIG_KPROBES_SANITY_TEST failures and kernel panic MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT X-Originating-IP: [10.18.41.13] X-Mailer: Zimbra 8.0.6_GA_5922 (ZimbraWebClient - GC45 (Linux)/8.0.6_GA_5922) Thread-Topic: KASAN (inline) + CONFIG_KPROBES_SANITY_TEST failures and kernel panic Thread-Index: jOXfooLPEUs2uOCJnFbyoMVMO2/vEQ== Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 48533 Lines: 680 It usually report failures when enabled KASAN (inline) and CONFIG_KPROBES_SANITY_TEST on today's mainline HEAD. Occasionally, kernel panic with trace at the bottom. [   52.973247] Kprobe smoke test: started [   53.078585] ================================================================== [   53.086666] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8 [   53.097060] Read of size 64 by task swapper/0/1 [   53.102125] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   53.111073] flags: 0x2fffff80000000() [   53.115163] page dumped because: kasan: bad access detected [   53.121392] CPU: 87 PID: 1 Comm: swapper/0 Not tainted 4.8.0+ #3 [   53.128103] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   53.139468]  ffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 ffff88085259fba8 [   53.147779]  ffff88085259f960 ffffffff816322e3 ffff88085259f9a0 0000000000000046 [   53.156090]  00000000019e2c79 0000000000000092 0000000000000246 ffff88085259f920 [   53.164415] Call Trace: [   53.167161]  [] dump_stack+0x85/0xc4 [   53.172906]  [] kasan_report_error+0x4c3/0x4f0 [   53.179624]  [] ? __this_cpu_preempt_check+0x13/0x20 [   53.186916]  [] kasan_report+0x58/0x60 [   53.192854]  [] ? setjmp_pre_handler+0x17c/0x280 [   53.199763]  [] check_memory_region+0x13e/0x1a0 [   53.206573]  [] memcpy+0x23/0x50 [   53.211937]  [] setjmp_pre_handler+0x17c/0x280 [   53.218656]  [] ? kprobe_target+0x1/0x20 [   53.224787]  [] ? kprobe_target+0x1/0x20 [   53.230917]  [] kprobe_ftrace_handler+0x1cb/0x300 [   53.237919]  [] ? kprobe_target+0x5/0x20 [   53.244060]  [] ? stop_machine_from_inactive_cpu+0x250/0x250 [   53.252141]  [] ftrace_ops_assist_func+0x259/0x3b0 [   53.259240]  [] 0xffffffffa00000d5 [   53.264804]  [] ? kprobe_target+0x1/0x20 [   53.270938]  [] kprobe_target+0x5/0x20 [   53.276875]  [] init_test_probes+0x1e0/0x5d0 [   53.283395]  [] ? kprobe_target+0x5/0x20 [   53.289525]  [] ? init_test_probes+0x1e0/0x5d0 [   53.296245]  [] ? j_kprobe_target+0x40/0x40 [   53.302676]  [] init_kprobes+0x3f8/0x43d [   53.308807]  [] ? debugfs_kprobe_init+0x12f/0x12f [   53.315811]  [] ? debug_mutex_init+0x2d/0x60 [   53.322330]  [] ? __mutex_init+0xcf/0x100 [   53.328559]  [] ? audit_fsnotify_init+0x3a/0x3a [   53.335362]  [] ? fsnotify_alloc_group+0x185/0x250 [   53.342454]  [] ? debugfs_kprobe_init+0x12f/0x12f [   53.349458]  [] do_one_initcall+0xa9/0x240 [   53.355783]  [] ? initcall_blacklisted+0x180/0x180 [   53.362883]  [] ? parse_args+0x520/0x990 [   53.369016]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   53.377284]  [] kernel_init_freeable+0x540/0x610 [   53.384188]  [] ? start_kernel+0x70d/0x70d [   53.390514]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   53.397411]  [] ? finish_task_switch+0x189/0x6c0 [   53.404317]  [] ? finish_task_switch+0x15b/0x6c0 [   53.411227]  [] ? rest_init+0x160/0x160 [   53.417262]  [] kernel_init+0x13/0x120 [   53.423196]  [] ? rest_init+0x160/0x160 [   53.429229]  [] ret_from_fork+0x2a/0x40 [   53.435260] Memory state around the buggy address: [   53.440616]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   53.448675]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   53.456741] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   53.464808]                                      ^ [   53.470159]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   53.478226]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   53.486291] ================================================================== [   53.494355] Disabling lock debugging due to kernel taint [   53.500374] ================================================================== [   53.508449] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8 [   53.519134] Write of size 64 by task swapper/0/1 [   53.524294] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   53.533245] flags: 0x2fffff80000000() [   53.537333] page dumped because: kasan: bad access detected [   53.543560] CPU: 87 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3 [   53.551627] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   53.562987]  ffff880e5eecfd98 ffffffff81a6a6e1 ffff880e5eecfe30 ffff88085259fba8 [   53.571291]  ffff880e5eecfe20 ffffffff816322e3 0000000000000000 0000000000000000 [   53.579588]  0000000000000000 0000000000000092 0000000000000000 0000000000000000 [   53.587899] Call Trace: [   53.590635]  <#DB>  [] dump_stack+0x85/0xc4 [   53.597084]  [] kasan_report_error+0x4c3/0x4f0 [   53.603797]  [] kasan_report+0x58/0x60 [   53.609733]  [] ? longjmp_break_handler+0x1df/0x2a0 [   53.616932]  [] check_memory_region+0x13e/0x1a0 [   53.623732]  [] memcpy+0x37/0x50 [   53.629085]  [] longjmp_break_handler+0x1df/0x2a0 [   53.636087]  [] ? jprobe_return+0x64/0x65 [   53.642312]  [] ? jprobe_return+0x65/0x65 [   53.648538]  [] kprobe_int3_handler+0x347/0x440 [   53.655349]  [] do_int3+0xbe/0x230 [   53.660899]  [] int3+0x44/0x80 [   53.666063]  [] ? kprobe_target+0x1/0x20 [   53.672187]    [] ? init_test_probes+0x1e0/0x5d0 [   53.679599]  [] ? j_kprobe_target+0x40/0x40 [   53.686023]  [] ? init_kprobes+0x3f8/0x43d [   53.692348]  [] ? debugfs_kprobe_init+0x12f/0x12f [   53.699350]  [] ? debug_mutex_init+0x2d/0x60 [   53.705876]  [] ? __mutex_init+0xcf/0x100 [   53.712109]  [] ? audit_fsnotify_init+0x3a/0x3a [   53.718917]  [] ? fsnotify_alloc_group+0x185/0x250 [   53.726017]  [] ? debugfs_kprobe_init+0x12f/0x12f [   53.733019]  [] ? do_one_initcall+0xa9/0x240 [   53.739538]  [] ? initcall_blacklisted+0x180/0x180 [   53.746639]  [] ? parse_args+0x520/0x990 [   53.752771]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   53.761027]  [] ? kernel_init_freeable+0x540/0x610 [   53.768127]  [] ? start_kernel+0x70d/0x70d [   53.774452]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   53.781357]  [] ? finish_task_switch+0x189/0x6c0 [   53.788261]  [] ? finish_task_switch+0x15b/0x6c0 [   53.795167]  [] ? rest_init+0x160/0x160 [   53.800902] tsc: Refined TSC clocksource calibration: 2194.917 MHz [   53.801000] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x1fa37107ca2, max_idle_ns: 440795258165 ns [   53.819265]  [] ? kernel_init+0x13/0x120 [   53.825394]  [] ? rest_init+0x160/0x160 [   53.831426]  [] ? ret_from_fork+0x2a/0x40 [   53.837650] Memory state around the buggy address: [   53.843003]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   53.851069]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   53.859137] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   53.867204]                                      ^ [   53.872555]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   53.880622]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   53.888686] ================================================================== [   53.945608] ================================================================== [   53.953691] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8 [   53.964084] Read of size 64 by task swapper/0/1 [   53.969148] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   53.978095] flags: 0x2fffff80000000() [   53.982183] page dumped because: kasan: bad access detected [   53.988412] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3 [   53.996480] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   54.007841]  ffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 ffff88085259fba8 [   54.016157]  ffff88085259f960 ffffffff816322e3 ffff880e531dbea0 0000000041b58ab3 [   54.024477]  ffff88085259f9b0 0000000000000092 0000000000000000 0000000000000000 [   54.032791] Call Trace: [   54.035535]  [] dump_stack+0x85/0xc4 [   54.041280]  [] kasan_report_error+0x4c3/0x4f0 [   54.047984]  [] kasan_report+0x58/0x60 [   54.053920]  [] ? setjmp_pre_handler+0x17c/0x280 [   54.060826]  [] check_memory_region+0x13e/0x1a0 [   54.067636]  [] memcpy+0x23/0x50 [   54.072991]  [] setjmp_pre_handler+0x17c/0x280 [   54.079703]  [] ? kprobe_target+0x1/0x20 [   54.085832]  [] ? kprobe_target+0x1/0x20 [   54.091961]  [] kprobe_ftrace_handler+0x1cb/0x300 [   54.098963]  [] ? kprobe_target+0x5/0x20 [   54.105094]  [] ? stop_machine_from_inactive_cpu+0x250/0x250 [   54.113166]  [] ftrace_ops_assist_func+0x259/0x3b0 [   54.120265]  [] 0xffffffffa00000d5 [   54.125816]  [] ? kprobe_target+0x1/0x20 [   54.131946]  [] kprobe_target+0x5/0x20 [   54.137884]  [] init_test_probes+0x251/0x5d0 [   54.144400]  [] ? kprobe_target+0x5/0x20 [   54.150530]  [] ? init_test_probes+0x251/0x5d0 [   54.157244]  [] ? j_kprobe_target+0x40/0x40 [   54.163670]  [] init_kprobes+0x3f8/0x43d [   54.169799]  [] ? debugfs_kprobe_init+0x12f/0x12f [   54.176800]  [] ? debug_mutex_init+0x2d/0x60 [   54.183321]  [] ? __mutex_init+0xcf/0x100 [   54.189541]  [] ? audit_fsnotify_init+0x3a/0x3a [   54.196349]  [] ? fsnotify_alloc_group+0x185/0x250 [   54.203450]  [] ? debugfs_kprobe_init+0x12f/0x12f [   54.210453]  [] do_one_initcall+0xa9/0x240 [   54.216776]  [] ? initcall_blacklisted+0x180/0x180 [   54.223877]  [] ? parse_args+0x520/0x990 [   54.230008]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   54.238273]  [] kernel_init_freeable+0x540/0x610 [   54.245178]  [] ? start_kernel+0x70d/0x70d [   54.251502]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   54.258409]  [] ? finish_task_switch+0x189/0x6c0 [   54.265314]  [] ? finish_task_switch+0x15b/0x6c0 [   54.272221]  [] ? rest_init+0x160/0x160 [   54.278253]  [] kernel_init+0x13/0x120 [   54.284196]  [] ? rest_init+0x160/0x160 [   54.290235]  [] ret_from_fork+0x2a/0x40 [   54.296265] Memory state around the buggy address: [   54.301617]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   54.309682]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   54.317748] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   54.325816]                                      ^ [   54.331172]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   54.339238]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   54.347306] ================================================================== [   54.355428] ================================================================== [   54.363501] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8 [   54.374183] Write of size 64 by task swapper/0/1 [   54.379341] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   54.388293] flags: 0x2fffff80000000() [   54.392383] page dumped because: kasan: bad access detected [   54.398610] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3 [   54.406677] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   54.418037]  ffff880e5e40fd98 ffffffff81a6a6e1 ffff880e5e40fe30 ffff88085259fba8 [   54.426343]  ffff880e5e40fe20 ffffffff816322e3 0000000000000000 0000000000000000 [   54.434640]  0000000000000000 0000000000000092 0000000000000000 0000000000000000 [   54.442959] Call Trace: [   54.445692]  <#DB>  [] dump_stack+0x85/0xc4 [   54.452136]  [] kasan_report_error+0x4c3/0x4f0 [   54.458848]  [] kasan_report+0x58/0x60 [   54.464785]  [] ? longjmp_break_handler+0x1df/0x2a0 [   54.471981]  [] check_memory_region+0x13e/0x1a0 [   54.478790]  [] memcpy+0x37/0x50 [   54.484142]  [] longjmp_break_handler+0x1df/0x2a0 [   54.491145]  [] ? jprobe_return+0x64/0x65 [   54.497370]  [] ? jprobe_return+0x65/0x65 [   54.503597]  [] kprobe_int3_handler+0x347/0x440 [   54.510408]  [] do_int3+0xbe/0x230 [   54.515947]  [] int3+0x44/0x80 [   54.521110]  [] ? kprobe_target+0x1/0x20 [   54.527237]    [] ? init_test_probes+0x251/0x5d0 [   54.534647]  [] ? j_kprobe_target+0x40/0x40 [   54.541068]  [] ? init_kprobes+0x3f8/0x43d [   54.547393]  [] ? debugfs_kprobe_init+0x12f/0x12f [   54.554395]  [] ? debug_mutex_init+0x2d/0x60 [   54.560914]  [] ? __mutex_init+0xcf/0x100 [   54.567142]  [] ? audit_fsnotify_init+0x3a/0x3a [   54.573950]  [] ? fsnotify_alloc_group+0x185/0x250 [   54.581052]  [] ? debugfs_kprobe_init+0x12f/0x12f [   54.588055]  [] ? do_one_initcall+0xa9/0x240 [   54.594571]  [] ? initcall_blacklisted+0x180/0x180 [   54.601672]  [] ? parse_args+0x520/0x990 [   54.607804]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   54.616069]  [] ? kernel_init_freeable+0x540/0x610 [   54.623169]  [] ? start_kernel+0x70d/0x70d [   54.629495]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   54.636400]  [] ? finish_task_switch+0x189/0x6c0 [   54.643306]  [] ? finish_task_switch+0x15b/0x6c0 [   54.650211]  [] ? rest_init+0x160/0x160 [   54.656242]  [] ? kernel_init+0x13/0x120 [   54.662370]  [] ? rest_init+0x160/0x160 [   54.668402]  [] ? ret_from_fork+0x2a/0x40 [   54.674628] Memory state around the buggy address: [   54.679980]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   54.688048]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   54.696114] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   54.704182]                                      ^ [   54.709537]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   54.717602]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   54.725665] ================================================================== [   54.733823] ================================================================== [   54.741895] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff88085259fba8 [   54.752288] Read of size 64 by task swapper/0/1 [   54.757354] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   54.766309] flags: 0x2fffff80000000() [   54.770398] page dumped because: kasan: bad access detected [   54.776623] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3 [   54.784688] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   54.796049]  ffff88085259f8d8 ffffffff81a6a6e1 ffff88085259f970 ffff88085259fba8 [   54.804358]  ffff88085259f960 ffffffff816322e3 ffff880e53348080 ffff880e5e4171e0 [   54.812687]  ffff880e53348080 0000000000000092 0000000cbe62c0e0 0000000000000000 [   54.821003] Call Trace: [   54.823749]  [] dump_stack+0x85/0xc4 [   54.829499]  [] kasan_report_error+0x4c3/0x4f0 [   54.836219]  [] kasan_report+0x58/0x60 [   54.842162]  [] ? setjmp_pre_handler+0x17c/0x280 [   54.849076]  [] check_memory_region+0x13e/0x1a0 [   54.855891]  [] memcpy+0x23/0x50 [   54.861251]  [] setjmp_pre_handler+0x17c/0x280 [   54.867971]  [] ? kprobe_target2+0x1/0x20 [   54.874205]  [] ? kprobe_target2+0x1/0x20 [   54.880439]  [] kprobe_ftrace_handler+0x1cb/0x300 [   54.887449]  [] ? kprobe_target2+0x5/0x20 [   54.893696]  [] ? kp_pre_handler+0x30/0x30 [   54.900034]  [] ftrace_ops_assist_func+0x259/0x3b0 [   54.907139]  [] 0xffffffffa00000d5 [   54.912699]  [] ? kprobe_target2+0x1/0x20 [   54.918956]  [] kprobe_target2+0x5/0x20 [   54.924994]  [] init_test_probes+0x275/0x5d0 [   54.931517]  [] ? kprobe_target2+0x5/0x20 [   54.937752]  [] ? init_test_probes+0x275/0x5d0 [   54.944471]  [] ? j_kprobe_target+0x40/0x40 [   54.950901]  [] init_kprobes+0x3f8/0x43d [   54.957037]  [] ? debugfs_kprobe_init+0x12f/0x12f [   54.964045]  [] ? debug_mutex_init+0x2d/0x60 [   54.970570]  [] ? __mutex_init+0xcf/0x100 [   54.976803]  [] ? audit_fsnotify_init+0x3a/0x3a [   54.983618]  [] ? fsnotify_alloc_group+0x185/0x250 [   54.990724]  [] ? debugfs_kprobe_init+0x12f/0x12f [   54.997732]  [] do_one_initcall+0xa9/0x240 [   55.004062]  [] ? initcall_blacklisted+0x180/0x180 [   55.011169]  [] ? parse_args+0x520/0x990 [   55.017307]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   55.025579]  [] kernel_init_freeable+0x540/0x610 [   55.032491]  [] ? start_kernel+0x70d/0x70d [   55.038824]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   55.045738]  [] ? finish_task_switch+0x189/0x6c0 [   55.052650]  [] ? finish_task_switch+0x15b/0x6c0 [   55.059563]  [] ? rest_init+0x160/0x160 [   55.065602]  [] kernel_init+0x13/0x120 [   55.071544]  [] ? rest_init+0x160/0x160 [   55.077582]  [] ret_from_fork+0x2a/0x40 [   55.083620] Memory state around the buggy address: [   55.088977]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   55.097048]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   55.105113] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   55.113183]                                      ^ [   55.118540]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   55.126610]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   55.134677] ================================================================== [   55.142905] clocksource: Switched to clocksource tsc [   55.143010] ================================================================== [   55.143018] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff88085259fba8 [   55.143021] Write of size 64 by task swapper/0/1 [   55.143027] page:ffffea00214967c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   55.143029] flags: 0x2fffff80000000() [   55.143031] page dumped because: kasan: bad access detected [   55.143036] CPU: 22 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3 [   55.143039] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   55.143048]  ffff880e5e40fd98 ffffffff81a6a6e1 ffff880e5e40fe30 ffff88085259fba8 [   55.143055]  ffff880e5e40fe20 ffffffff816322e3 0000000000000010 0000000000000000 [   55.143063]  ffffed010a4b3f76 0000000000000092 f2f2f2f400000000 f3f3f3f4f4f400f2 [   55.143064] Call Trace: [   55.143075]  <#DB>  [] dump_stack+0x85/0xc4 [   55.143081]  [] kasan_report_error+0x4c3/0x4f0 [   55.143087]  [] kasan_report+0x58/0x60 [   55.143093]  [] ? longjmp_break_handler+0x1df/0x2a0 [   55.143101]  [] check_memory_region+0x13e/0x1a0 [   55.143108]  [] memcpy+0x37/0x50 [   55.143113]  [] longjmp_break_handler+0x1df/0x2a0 [   55.143118]  [] ? jprobe_return+0x64/0x65 [   55.143123]  [] ? jprobe_return+0x65/0x65 [   55.143129]  [] kprobe_int3_handler+0x347/0x440 [   55.143136]  [] do_int3+0xbe/0x230 [   55.143143]  [] int3+0x44/0x80 [   55.143153]  [] ? kprobe_target2+0x1/0x20 [   55.143162]    [] ? init_test_probes+0x275/0x5d0 [   55.143169]  [] ? j_kprobe_target+0x40/0x40 [   55.143177]  [] ? init_kprobes+0x3f8/0x43d [   55.143184]  [] ? debugfs_kprobe_init+0x12f/0x12f [   55.143190]  [] ? debug_mutex_init+0x2d/0x60 [   55.143197]  [] ? __mutex_init+0xcf/0x100 [   55.143204]  [] ? audit_fsnotify_init+0x3a/0x3a [   55.143210]  [] ? fsnotify_alloc_group+0x185/0x250 [   55.143218]  [] ? debugfs_kprobe_init+0x12f/0x12f [   55.143224]  [] ? do_one_initcall+0xa9/0x240 [   55.143230]  [] ? initcall_blacklisted+0x180/0x180 [   55.143236]  [] ? parse_args+0x520/0x990 [   55.143244]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   55.143252]  [] ? kernel_init_freeable+0x540/0x610 [   55.143258]  [] ? start_kernel+0x70d/0x70d [   55.143265]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   55.143272]  [] ? finish_task_switch+0x189/0x6c0 [   55.143278]  [] ? finish_task_switch+0x15b/0x6c0 [   55.143285]  [] ? rest_init+0x160/0x160 [   55.143291]  [] ? kernel_init+0x13/0x120 [   55.143297]  [] ? rest_init+0x160/0x160 [   55.143302]  [] ? ret_from_fork+0x2a/0x40 [   55.143307] Memory state around the buggy address: [   55.143310]  ffff88085259fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   55.143314]  ffff88085259fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   55.143318] >ffff88085259fb80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   55.143320]                                      ^ [   55.143323]  ffff88085259fc00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   55.143327]  ffff88085259fc80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   55.143329] ================================================================== [   55.620180] Kprobe smoke test: passed successfully ==== KERNEL PANIC RUN ==== [   34.484681] Kprobe smoke test: started [   34.544890] ================================================================== [   34.552958] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8 [   34.563346] Read of size 64 by task swapper/0/1 [   34.568402] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   34.577346] flags: 0x2fffff80000000() [   34.581431] page dumped because: kasan: bad access detected [   34.587653] CPU: 79 PID: 1 Comm: swapper/0 Not tainted 4.8.0+ #3 [   34.594347] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   34.605705]  ffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 ffff880852387ba8 [   34.614001]  ffff880852387960 ffffffff816322e3 ffff8808523879a0 0000000000000046 [   34.622297]  0000000001c4a4cb 0000000000000092 0000000000000246 ffff880852387920 [   34.630593] Call Trace: [   34.633327]  [] dump_stack+0x85/0xc4 [   34.639061]  [] kasan_report_error+0x4c3/0x4f0 [   34.645769]  [] ? __this_cpu_preempt_check+0x13/0x20 [   34.653055]  [] kasan_report+0x58/0x60 [   34.658983]  [] ? setjmp_pre_handler+0x17c/0x280 [   34.665884]  [] check_memory_region+0x13e/0x1a0 [   34.672685]  [] memcpy+0x23/0x50 [   34.678031]  [] setjmp_pre_handler+0x17c/0x280 [   34.684734]  [] ? kprobe_target+0x1/0x20 [   34.690855]  [] ? kprobe_target+0x1/0x20 [   34.696977]  [] kprobe_ftrace_handler+0x1cb/0x300 [   34.703971]  [] ? kprobe_target+0x5/0x20 [   34.710093]  [] ? stop_machine_from_inactive_cpu+0x250/0x250 [   34.718158]  [] ftrace_ops_assist_func+0x259/0x3b0 [   34.725251]  [] 0xffffffffa00000d5 [   34.730792]  [] ? kprobe_target+0x1/0x20 [   34.736914]  [] kprobe_target+0x5/0x20 [   34.742840]  [] init_test_probes+0x1e0/0x5d0 [   34.749349]  [] ? kprobe_target+0x5/0x20 [   34.755470]  [] ? init_test_probes+0x1e0/0x5d0 [   34.762175]  [] ? j_kprobe_target+0x40/0x40 [   34.768591]  [] init_kprobes+0x3f8/0x43d [   34.774713]  [] ? debugfs_kprobe_init+0x12f/0x12f [   34.781710]  [] ? debug_mutex_init+0x2d/0x60 [   34.788219]  [] ? __mutex_init+0xcf/0x100 [   34.794438]  [] ? audit_fsnotify_init+0x3a/0x3a [   34.801239]  [] ? fsnotify_alloc_group+0x185/0x250 [   34.808330]  [] ? debugfs_kprobe_init+0x12f/0x12f [   34.815324]  [] do_one_initcall+0xa9/0x240 [   34.821642]  [] ? initcall_blacklisted+0x180/0x180 [   34.828734]  [] ? parse_args+0x520/0x990 [   34.834855]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   34.843112]  [] kernel_init_freeable+0x540/0x610 [   34.850008]  [] ? start_kernel+0x70d/0x70d [   34.856327]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   34.863224]  [] ? finish_task_switch+0x189/0x6c0 [   34.870121]  [] ? finish_task_switch+0x15b/0x6c0 [   34.877021]  [] ? rest_init+0x160/0x160 [   34.883046]  [] kernel_init+0x13/0x120 [   34.888973]  [] ? rest_init+0x160/0x160 [   34.894997]  [] ret_from_fork+0x2a/0x40 [   34.901022] Memory state around the buggy address: [   34.906368]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   34.914428]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   34.922489] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   34.930551]                                      ^ [   34.935897]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   34.943958]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   34.952019] ================================================================== [   34.960079] Disabling lock debugging due to kernel taint [   34.966029] ================================================================== [   34.974090] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff880852387ba8 [   34.984768] Write of size 64 by task swapper/0/1 [   34.989921] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   34.998863] flags: 0x2fffff80000000() [   35.002948] page dumped because: kasan: bad access detected [   35.009167] CPU: 79 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3 [   35.017225] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   35.028581]  ffff880e5eccfd98 ffffffff81a6a6e1 ffff880e5eccfe30 ffff880852387ba8 [   35.036877]  ffff880e5eccfe20 ffffffff816322e3 0000000000000000 0000000000000000 [   35.045172]  0000000000000000 0000000000000092 0000000000000000 0000000000000000 [   35.053467] Call Trace: [   35.056194]  <#DB>  [] dump_stack+0x85/0xc4 [   35.062621]  [] kasan_report_error+0x4c3/0x4f0 [   35.069324]  [] kasan_report+0x58/0x60 [   35.075252]  [] ? longjmp_break_handler+0x1df/0x2a0 [   35.082441]  [] check_memory_region+0x13e/0x1a0 [   35.089241]  [] memcpy+0x37/0x50 [   35.094588]  [] longjmp_break_handler+0x1df/0x2a0 [   35.101582]  [] ? jprobe_return+0x64/0x65 [   35.107801]  [] ? jprobe_return+0x65/0x65 [   35.114018]  [] kprobe_int3_handler+0x347/0x440 [   35.120820]  [] do_int3+0xbe/0x230 [   35.126363]  [] int3+0x44/0x80 [   35.131518]  [] ? kprobe_target+0x1/0x20 [   35.137630]    [] ? init_test_probes+0x1e0/0x5d0 [   35.145026]  [] ? j_kprobe_target+0x40/0x40 [   35.151440]  [] ? init_kprobes+0x3f8/0x43d [   35.157755]  [] ? debugfs_kprobe_init+0x12f/0x12f [   35.164748]  [] ? debug_mutex_init+0x2d/0x60 [   35.171257]  [] ? __mutex_init+0xcf/0x100 [   35.177477]  [] ? audit_fsnotify_init+0x3a/0x3a [   35.184279]  [] ? fsnotify_alloc_group+0x185/0x250 [   35.191371]  [] ? debugfs_kprobe_init+0x12f/0x12f [   35.198366]  [] ? do_one_initcall+0xa9/0x240 [   35.204876]  [] ? initcall_blacklisted+0x180/0x180 [   35.211966]  [] ? parse_args+0x520/0x990 [   35.218089]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   35.226346]  [] ? kernel_init_freeable+0x540/0x610 [   35.233436]  [] ? start_kernel+0x70d/0x70d [   35.239751]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   35.246648]  [] ? finish_task_switch+0x189/0x6c0 [   35.253544]  [] ? finish_task_switch+0x15b/0x6c0 [   35.260442]  [] ? rest_init+0x160/0x160 [   35.266466]  [] ? kernel_init+0x13/0x120 [   35.272588]  [] ? rest_init+0x160/0x160 [   35.278613]  [] ? ret_from_fork+0x2a/0x40 [   35.284831] Memory state around the buggy address: [   35.290178]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   35.298236]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   35.306296] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   35.314355]                                      ^ [   35.319699]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   35.327761]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   35.335820] ================================================================== [   35.352411] tsc: Refined TSC clocksource calibration: 2194.917 MHz [   35.359361] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x1fa37107ca2, max_idle_ns: 440795258165 ns [   35.384275] ================================================================== [   35.392341] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8 [   35.402719] Read of size 64 by task swapper/0/1 [   35.407774] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   35.416720] flags: 0x2fffff80000000() [   35.420804] page dumped because: kasan: bad access detected [   35.427024] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3 [   35.435084] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   35.446440]  ffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 ffff880852387ba8 [   35.454737]  ffff880852387960 ffffffff816322e3 ffff8808594fd9c0 0000000041b58ab3 [   35.463033]  ffff8808523879b0 0000000000000092 0000000000000000 0000000000000000 [   35.471330] Call Trace: [   35.474061]  [] dump_stack+0x85/0xc4 [   35.479796]  [] kasan_report_error+0x4c3/0x4f0 [   35.486500]  [] kasan_report+0x58/0x60 [   35.492428]  [] ? setjmp_pre_handler+0x17c/0x280 [   35.499325]  [] check_memory_region+0x13e/0x1a0 [   35.506127]  [] memcpy+0x23/0x50 [   35.511472]  [] setjmp_pre_handler+0x17c/0x280 [   35.518176]  [] ? kprobe_target+0x1/0x20 [   35.524297]  [] ? kprobe_target+0x1/0x20 [   35.530419]  [] kprobe_ftrace_handler+0x1cb/0x300 [   35.537414]  [] ? kprobe_target+0x5/0x20 [   35.543536]  [] ? stop_machine_from_inactive_cpu+0x250/0x250 [   35.551598]  [] ftrace_ops_assist_func+0x259/0x3b0 [   35.558689]  [] 0xffffffffa00000d5 [   35.564229]  [] ? kprobe_target+0x1/0x20 [   35.570350]  [] kprobe_target+0x5/0x20 [   35.576280]  [] init_test_probes+0x251/0x5d0 [   35.582790]  [] ? kprobe_target+0x5/0x20 [   35.588912]  [] ? init_test_probes+0x251/0x5d0 [   35.595617]  [] ? j_kprobe_target+0x40/0x40 [   35.602031]  [] init_kprobes+0x3f8/0x43d [   35.608152]  [] ? debugfs_kprobe_init+0x12f/0x12f [   35.615145]  [] ? debug_mutex_init+0x2d/0x60 [   35.621656]  [] ? __mutex_init+0xcf/0x100 [   35.627875]  [] ? audit_fsnotify_init+0x3a/0x3a [   35.634676]  [] ? fsnotify_alloc_group+0x185/0x250 [   35.641766]  [] ? debugfs_kprobe_init+0x12f/0x12f [   35.648762]  [] do_one_initcall+0xa9/0x240 [   35.655077]  [] ? initcall_blacklisted+0x180/0x180 [   35.662170]  [] ? parse_args+0x520/0x990 [   35.668293]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   35.676549]  [] kernel_init_freeable+0x540/0x610 [   35.683445]  [] ? start_kernel+0x70d/0x70d [   35.689763]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   35.696662]  [] ? finish_task_switch+0x189/0x6c0 [   35.703559]  [] ? finish_task_switch+0x15b/0x6c0 [   35.710456]  [] ? rest_init+0x160/0x160 [   35.716482]  [] kernel_init+0x13/0x120 [   35.722410]  [] ? rest_init+0x160/0x160 [   35.728436]  [] ret_from_fork+0x2a/0x40 [   35.734460] Memory state around the buggy address: [   35.739806]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   35.747865]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   35.755926] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   35.763985]                                      ^ [   35.769329]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   35.777389]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   35.785448] ================================================================== [   35.793532] ================================================================== [   35.801597] BUG: KASAN: stack-out-of-bounds in longjmp_break_handler+0x1df/0x2a0 at addr ffff880852387ba8 [   35.812275] Write of size 64 by task swapper/0/1 [   35.817426] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   35.826369] flags: 0x2fffff80000000() [   35.830453] page dumped because: kasan: bad access detected [   35.836671] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3 [   35.844732] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   35.856089]  ffff880e5ed0fd98 ffffffff81a6a6e1 ffff880e5ed0fe30 ffff880852387ba8 [   35.864385]  ffff880e5ed0fe20 ffffffff816322e3 0000000000000000 0000000000000000 [   35.872681]  0000000000000000 0000000000000092 0000000000000000 0000000000000000 [   35.880977] Call Trace: [   35.883704]  <#DB>  [] dump_stack+0x85/0xc4 [   35.890130]  [] kasan_report_error+0x4c3/0x4f0 [   35.896835]  [] kasan_report+0x58/0x60 [   35.902763]  [] ? longjmp_break_handler+0x1df/0x2a0 [   35.909950]  [] check_memory_region+0x13e/0x1a0 [   35.916751]  [] memcpy+0x37/0x50 [   35.922097]  [] longjmp_break_handler+0x1df/0x2a0 [   35.929093]  [] ? jprobe_return+0x64/0x65 [   35.935312]  [] ? jprobe_return+0x65/0x65 [   35.941530]  [] kprobe_int3_handler+0x347/0x440 [   35.948332]  [] do_int3+0xbe/0x230 [   35.953873]  [] int3+0x44/0x80 [   35.959026]  [] ? kprobe_target+0x1/0x20 [   35.965147]    [] ? init_test_probes+0x251/0x5d0 [   35.972541]  [] ? j_kprobe_target+0x40/0x40 [   35.978954]  [] ? init_kprobes+0x3f8/0x43d [   35.985269]  [] ? debugfs_kprobe_init+0x12f/0x12f [   35.992261]  [] ? debug_mutex_init+0x2d/0x60 [   35.998770]  [] ? __mutex_init+0xcf/0x100 [   36.004988]  [] ? audit_fsnotify_init+0x3a/0x3a [   36.011788]  [] ? fsnotify_alloc_group+0x185/0x250 [   36.018879]  [] ? debugfs_kprobe_init+0x12f/0x12f [   36.025873]  [] ? do_one_initcall+0xa9/0x240 [   36.032382]  [] ? initcall_blacklisted+0x180/0x180 [   36.039476]  [] ? parse_args+0x520/0x990 [   36.045597]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   36.053854]  [] ? kernel_init_freeable+0x540/0x610 [   36.060946]  [] ? start_kernel+0x70d/0x70d [   36.067261]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   36.074158]  [] ? finish_task_switch+0x189/0x6c0 [   36.081053]  [] ? finish_task_switch+0x15b/0x6c0 [   36.087950]  [] ? rest_init+0x160/0x160 [   36.093974]  [] ? kernel_init+0x13/0x120 [   36.100095]  [] ? rest_init+0x160/0x160 [   36.106120]  [] ? ret_from_fork+0x2a/0x40 [   36.112339] Memory state around the buggy address: [   36.117683]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   36.125742]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   36.133802] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   36.141862]                                      ^ [   36.147205]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   36.155264]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   36.163325] ================================================================== [   36.171419] ================================================================== [   36.179482] BUG: KASAN: stack-out-of-bounds in setjmp_pre_handler+0x17c/0x280 at addr ffff880852387ba8 [   36.189869] Read of size 64 by task swapper/0/1 [   36.194924] page:ffffea002148e1c0 count:0 mapcount:0 mapping:          (null) index:0x0 [   36.203867] flags: 0x2fffff80000000() [   36.207951] page dumped because: kasan: bad access detected [   36.214170] CPU: 80 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3 [   36.222230] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   36.233585]  ffff8808523878d8 ffffffff81a6a6e1 ffff880852387970 ffff880852387ba8 [   36.241883]  ffff880852387960 ffffffff816322e3 ffff880e535d0080 ffff880e5ed171e0 [   36.250179]  ffff880e535d0080 0000000000000092 000000086bfbbff3 0000000000000000 [   36.258475] Call Trace: [   36.261205]  [] dump_stack+0x85/0xc4 [   36.266938]  [] kasan_report_error+0x4c3/0x4f0 [   36.273641]  [] kasan_report+0x58/0x60 [   36.279570]  [] ? setjmp_pre_handler+0x17c/0x280 [   36.286468]  [] check_memory_region+0x13e/0x1a0 [   36.293268]  [] memcpy+0x23/0x50 [   36.298615]  [] setjmp_pre_handler+0x17c/0x280 [   36.305319]  [] ? kprobe_target2+0x1/0x20 [   36.311538]  [] ? kprobe_target2+0x1/0x20 [   36.317756]  [] kprobe_ftrace_handler+0x1cb/0x300 [   36.324749]  [] ? kprobe_target2+0x5/0x20 [   36.330967]  [] ? kp_pre_handler+0x30/0x30 [   36.337284]  [] ftrace_ops_assist_func+0x259/0x3b0 [   36.344376]  [] 0xffffffffa00000d5 [   36.349918]  [] ? kprobe_target2+0x1/0x20 [   36.356131]  [] kprobe_target2+0x5/0x20 [   36.362157]  [] init_test_probes+0x275/0x5d0 [   36.368666]  [] ? kprobe_target2+0x5/0x20 [   36.374884]  [] ? init_test_probes+0x275/0x5d0 [   36.381591]  [] ? j_kprobe_target+0x40/0x40 [   36.388006]  [] init_kprobes+0x3f8/0x43d [   36.394122]  [] ? debugfs_kprobe_init+0x12f/0x12f [   36.401120]  [] ? debug_mutex_init+0x2d/0x60 [   36.407632]  [] ? __mutex_init+0xcf/0x100 [   36.413854]  [] ? audit_fsnotify_init+0x3a/0x3a [   36.420658]  [] ? fsnotify_alloc_group+0x185/0x250 [   36.427753]  [] ? debugfs_kprobe_init+0x12f/0x12f [   36.434751]  [] do_one_initcall+0xa9/0x240 [   36.441068]  [] ? initcall_blacklisted+0x180/0x180 [   36.448163]  [] ? parse_args+0x520/0x990 [   36.454287]  [] ? __usermodehelper_set_disable_depth+0x42/0x50 [   36.462544]  [] kernel_init_freeable+0x540/0x610 [   36.469444]  [] ? start_kernel+0x70d/0x70d [   36.475764]  [] ? _raw_spin_unlock_irq+0x3d/0x60 [   36.482665]  [] ? finish_task_switch+0x189/0x6c0 [   36.489564]  [] ? finish_task_switch+0x15b/0x6c0 [   36.496464]  [] ? rest_init+0x160/0x160 [   36.502493]  [] kernel_init+0x13/0x120 [   36.508422]  [] ? rest_init+0x160/0x160 [   36.514450]  [] ret_from_fork+0x2a/0x40 [   36.520476] Memory state around the buggy address: [   36.525825]  ffff880852387a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   36.533878]  ffff880852387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [   36.541941] >ffff880852387b80: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f4 f4 f3 f3 [   36.549993]                                      ^ [   36.555341]  ffff880852387c00: f3 f3 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f4 f4 [   36.563394]  ffff880852387c80: f4 f2 f2 f2 f2 00 f4 f4 f4 f3 f3 f3 f3 00 00 00 [   36.571455] ================================================================== [   36.579599] int3: 0000 [#1] PREEMPT SMP KASAN [   36.579606] clocksource: Switched to clocksource tsc [   36.590000] Modules linked in: [   36.593420] CPU: 36 PID: 1 Comm: swapper/0 Tainted: G    B           4.8.0+ #3 [   36.601480] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS GRRFSDP1.86B.0271.R00.1510301446 10/30/2015 [   36.612837] task: ffff880e535d0000 task.stack: ffff880852380000 [   36.619444] RIP: 0010:[]  [] jprobe_return_end+0x0/0x1b [   36.628778] RSP: 0000:0000000000000000  EFLAGS: 00000046 [   36.634704] RAX: dffffc0000000000 RBX: ffff880852387b80 RCX: 1ffffffff05acca0 [   36.642667] RDX: 1ffff101cbcf2d1b RSI: ffffffff829cb560 RDI: ffff880e5e7968d8 [   36.650629] RBP: ffff880852387b90 R08: 1ffff1010a470eaf R09: 0000000000000000 [   36.658593] R10: 0000000000000008 R11: ffffed01cbda2d38 R12: 0000000000000024 [   36.666555] R13: 1ffff1010a470f76 R14: 0000000000000001 R15: ffffffff82e8a950 [   36.674519] FS:  0000000000000000(0000) GS:ffff880e5e780000(0000) knlGS:0000000000000000 [   36.683548] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [   36.689961] CR2: 0000000000000000 CR3: 0000000002e0a000 CR4: 00000000003406e0 [   36.697924] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [   36.705888] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [   36.713851] Stack: [   36.716091] [   36.717750] Call Trace: [   36.720476] Code: 4a 03 1c e5 e0 63 d6 82 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 80 3c 02 00 75 15 48 8b 5b 18 48 87 dc cc <90> 5b 41 5c 5d c3 e8 70 64 51 00 eb c8 e8 69 64 51 00 eb e4 0f [   36.742285] RIP  [] jprobe_return_end+0x0/0x1b [   36.749000]  RSP <0000000000000000> [   36.752942] ---[ end trace 65b1716ff1e2d4ca ]--- [   36.758094] Kernel panic - not syncing: Fatal exception [   36.763975] Kernel Offset: disabled [   36.767894] ---[ end Kernel panic - not syncing: Fatal exception