aboutsummaryrefslogtreecommitdiffstats
path: root/pkg/report/testdata/linux/guilty/10
diff options
context:
space:
mode:
authorDmitry Vyukov <dvyukov@google.com>2017-12-12 11:58:52 +0100
committerDmitry Vyukov <dvyukov@google.com>2017-12-12 11:59:13 +0100
commit9d0132a2fb379f6464ea0c08c98e77d361eb564d (patch)
tree3f13f6db2a231d84a01286f36a524a7f67da1de0 /pkg/report/testdata/linux/guilty/10
parent1556ebc4cc58b700a076d20ea645dae8c081f1bb (diff)
pkg/report: move guilty file test data to testdir/
linux_test.go is total mess and very hard to work with. Turns out we had 2 tests that do exactly the same (verify Report), but nobody ever noticed. Move all test data to testdir/. One file per crash.
Diffstat (limited to 'pkg/report/testdata/linux/guilty/10')
-rw-r--r--pkg/report/testdata/linux/guilty/1036
1 files changed, 36 insertions, 0 deletions
diff --git a/pkg/report/testdata/linux/guilty/10 b/pkg/report/testdata/linux/guilty/10
new file mode 100644
index 000000000..dce9d7db8
--- /dev/null
+++ b/pkg/report/testdata/linux/guilty/10
@@ -0,0 +1,36 @@
+FILE: fs/nsfs.c
+
+==================================================================
+BUG: KASAN: use-after-free in __read_once_size include/linux/compiler.h:254 [inline] at addr ffff88004f0f1938
+BUG: KASAN: use-after-free in atomic_read arch/x86/include/asm/atomic.h:26 [inline] at addr ffff88004f0f1938
+BUG: KASAN: use-after-free in virt_spin_lock arch/x86/include/asm/qspinlock.h:62 [inline] at addr ffff88004f0f1938
+BUG: KASAN: use-after-free in queued_spin_lock_slowpath+0xb0a/0xfd0 kernel/locking/qspinlock.c:421 at addr ffff88004f0f1938
+Read of size 4 by task syz-executor0/28813
+CPU: 1 PID: 28813 Comm: syz-executor0 Not tainted 4.11.0-rc7+ #251
+Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011
+Call Trace:
+ __dump_stack lib/dump_stack.c:16 [inline]
+ dump_stack+0x292/0x398 lib/dump_stack.c:52
+ kasan_object_err+0x1c/0x70 mm/kasan/report.c:164
+ print_address_description mm/kasan/report.c:202 [inline]
+ kasan_report_error mm/kasan/report.c:291 [inline]
+ kasan_report+0x252/0x510 mm/kasan/report.c:347
+ __asan_report_load4_noabort+0x14/0x20 mm/kasan/report.c:367
+ __read_once_size include/linux/compiler.h:254 [inline]
+ atomic_read arch/x86/include/asm/atomic.h:26 [inline]
+ virt_spin_lock arch/x86/include/asm/qspinlock.h:62 [inline]
+ queued_spin_lock_slowpath+0xb0a/0xfd0 kernel/locking/qspinlock.c:421
+ queued_spin_lock include/asm-generic/qspinlock.h:103 [inline]
+ do_raw_spin_lock+0x151/0x1e0 kernel/locking/spinlock_debug.c:113
+ __raw_spin_lock include/linux/spinlock_api_smp.h:143 [inline]
+ _raw_spin_lock+0x32/0x40 kernel/locking/spinlock.c:151
+ spin_lock include/linux/spinlock.h:299 [inline]
+ lockref_get_not_dead+0x19/0x80 lib/lockref.c:179
+ __ns_get_path+0x197/0x860 fs/nsfs.c:66
+ open_related_ns+0xda/0x200 fs/nsfs.c:143
+ sock_ioctl+0x39d/0x440 net/socket.c:1001
+ vfs_ioctl fs/ioctl.c:45 [inline]
+ do_vfs_ioctl+0x1bf/0x1780 fs/ioctl.c:685
+ SYSC_ioctl fs/ioctl.c:700 [inline]
+ SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691
+ entry_SYSCALL_64_fastpath+0x1f/0xc2