diff options
| author | Dmitry Vyukov <dvyukov@google.com> | 2021-12-04 12:13:08 +0100 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2021-12-06 10:37:24 +0100 |
| commit | 579a875477d8f31f2d49aeb00628628a8ce5f340 (patch) | |
| tree | 4579c2632a0d693b2e300c69daba2351dfc38a08 /pkg/report/testdata/linux | |
| parent | 7b14e14df007095c58e6be2811d5e4a2ac31f875 (diff) | |
pkg/report: skip __read_once_word_nocheck frames
These are not the root cause of bugs and should be skipped.
Diffstat (limited to 'pkg/report/testdata/linux')
| -rw-r--r-- | pkg/report/testdata/linux/report/631 | 48 |
1 files changed, 48 insertions, 0 deletions
diff --git a/pkg/report/testdata/linux/report/631 b/pkg/report/testdata/linux/report/631 new file mode 100644 index 000000000..fbef69797 --- /dev/null +++ b/pkg/report/testdata/linux/report/631 @@ -0,0 +1,48 @@ +TITLE: BUG: unable to handle kernel paging request in __unwind_start +ALT: bad-access in __unwind_start + +[ 335.953960][T15844] BUG: unable to handle page fault for address: ffffc9001652fa68 +[ 335.961732][T15844] #PF: supervisor read access in kernel mode +[ 335.967715][T15844] #PF: error_code(0x0000) - not-present page +[ 335.973702][T15844] PGD 10c00067 P4D 10c00067 PUD 10ded067 PMD 6ba82067 PTE 0 +[ 335.981028][T15844] Oops: 0000 [#1] PREEMPT SMP KASAN +[ 335.986413][T15844] CPU: 1 PID: 15844 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0 +[ 335.994841][T15844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 +[ 336.004903][T15844] RIP: 0010:__read_once_word_nocheck+0x0/0x10 +[ 336.011032][T15844] Code: 19 89 00 e9 97 fb ff ff 4c 89 f6 48 c7 c7 00 97 7f 8b e8 23 e7 be 02 e9 60 fb ff ff e8 49 19 89 00 e9 cf fb ff ff cc cc cc cc <48> 8b 07 c3 66 66 2e 0f 1f 84 00 00 00 00 00 90 41 57 89 d0 41 56 +[ 336.030663][T15844] RSP: 0018:ffffc9000bcf79c0 EFLAGS: 00010046 +[ 336.036744][T15844] RAX: dffffc0000000000 RBX: ffffc9001652fa40 RCX: 0000000000000000 +[ 336.044727][T15844] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffc9001652fa68 +[ 336.052711][T15844] RBP: ffffc9001652fa40 R08: 0000000000000001 R09: ffffc9000bcf7a40 +[ 336.060697][T15844] R10: fffff5200179ef53 R11: 0000000000000000 R12: ffffc9001652fa78 +[ 336.068680][T15844] R13: ffffc9000bcf7a68 R14: ffffc9000bcf7a78 R15: ffffc9000bcf7a40 +[ 336.076662][T15844] FS: 00007f30bea57700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 +[ 336.085611][T15844] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 +[ 336.092207][T15844] CR2: ffffc9001652fa68 CR3: 00000001513af000 CR4: 00000000003506e0 +[ 336.100189][T15844] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 +[ 336.108168][T15844] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 +[ 336.116150][T15844] Call Trace: +[ 336.119433][T15844] <TASK> +[ 336.122372][T15844] __unwind_start+0x3e2/0x800 +[ 336.127065][T15844] __get_wchan+0xb0/0x150 +[ 336.141515][T15844] get_wchan+0xa0/0xc0 +[ 336.145663][T15844] proc_pid_wchan+0xe4/0x140 +[ 336.164689][T15844] proc_single_show+0x116/0x1e0 +[ 336.169612][T15844] seq_read_iter+0x4f6/0x1240 +[ 336.174322][T15844] seq_read+0x3e0/0x5b0 +[ 336.205063][T15844] vfs_read+0x1b5/0x600 +[ 336.209315][T15844] ksys_read+0x12d/0x250 +[ 336.223915][T15844] do_syscall_64+0x35/0xb0 +[ 336.228354][T15844] entry_SYSCALL_64_after_hwframe+0x44/0xae +[ 336.234261][T15844] RIP: 0033:0x7f30c14e1ae9 +[ 336.238679][T15844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 +[ 336.258308][T15844] RSP: 002b:00007f30bea57188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 +[ 336.266736][T15844] RAX: ffffffffffffffda RBX: 00007f30c15f4f60 RCX: 00007f30c14e1ae9 +[ 336.274719][T15844] RDX: 0000000000001000 RSI: 00000000200001c0 RDI: 0000000000000003 +[ 336.282696][T15844] RBP: 00007f30c153bf6d R08: 0000000000000000 R09: 0000000000000000 +[ 336.290674][T15844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 +[ 336.298652][T15844] R13: 00007ffd3699039f R14: 00007f30bea57300 R15: 0000000000022000 +[ 336.306642][T15844] </TASK> +[ 336.309676][T15844] Modules linked in: +[ 336.313569][T15844] CR2: ffffc9001652fa68 +[ 336.317724][T15844] ---[ end trace 6d9f7f3ae3399bda ]--- |
