aboutsummaryrefslogtreecommitdiffstats
path: root/pkg/report/testdata/linux
diff options
context:
space:
mode:
authorDmitry Vyukov <dvyukov@google.com>2021-01-13 08:42:40 +0100
committerDmitry Vyukov <dvyukov@google.com>2021-01-13 11:27:45 +0100
commita945f0a3953e1d7e6cbd177e11a3a84476a53286 (patch)
tree6d60fc2da46312bd10c4fe4b78d52feb519d06eb /pkg/report/testdata/linux
parent0cdd618504c154c4bb8758ef5a34bbe1bf9f62e4 (diff)
pkg/report: add more mte report samples
Diffstat (limited to 'pkg/report/testdata/linux')
-rw-r--r--pkg/report/testdata/linux/report/56953
-rw-r--r--pkg/report/testdata/linux/report/57097
-rw-r--r--pkg/report/testdata/linux/report/571120
-rw-r--r--pkg/report/testdata/linux/report/57294
-rw-r--r--pkg/report/testdata/linux/report/573122
5 files changed, 486 insertions, 0 deletions
diff --git a/pkg/report/testdata/linux/report/569 b/pkg/report/testdata/linux/report/569
new file mode 100644
index 000000000..0c695a88f
--- /dev/null
+++ b/pkg/report/testdata/linux/report/569
@@ -0,0 +1,53 @@
+TITLE: KASAN: invalid-access Read in enqueue_timer
+
+[ 1039.654796][ C0] ==================================================================
+[ 1039.655950][ C0] BUG: KASAN: invalid-access in enqueue_timer+0x18/0xc0
+[ 1039.658389][ C0] Read at addr 07ff00002327cda0 by task kworker/0:0/5
+[ 1039.659862][ C0] Pointer tag: [07], memory tag: [ff]
+[ 1039.661155][ C0]
+[ 1039.661936][ C0] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.11.0-rc3 #36
+[ 1039.663186][ C0] Hardware name: linux,dummy-virt (DT)
+[ 1039.664468][ C0] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker
+[ 1039.665932][ C0] Call trace:
+[ 1039.666550][ C0] dump_backtrace+0x0/0x1a4
+[ 1039.667401][ C0] show_stack+0x1c/0x70
+[ 1039.668253][ C0] dump_stack+0xd0/0x12c
+[ 1039.669087][ C0] print_address_description+0x70/0x29c
+[ 1039.670037][ C0] kasan_report+0x104/0x200
+[ 1039.670900][ C0] __do_kernel_fault+0x17c/0x1c0
+[ 1039.671785][ C0] do_tag_check_fault+0x6c/0x80
+[ 1039.672644][ C0] do_mem_abort+0x44/0xb4
+[ 1039.673529][ C0] el1_abort+0x40/0x6c
+[ 1039.674345][ C0] el1_sync_handler+0xb0/0xcc
+[ 1039.675169][ C0] el1_sync+0x70/0x100
+[ 1039.675933][ C0] enqueue_timer+0x18/0xc0
+[ 1039.676761][ C0] mod_timer+0x18/0x24
+[ 1039.677571][ C0] wg_timers_any_authenticated_packet_traversal+0x68/0x8c
+[ 1039.678639][ C0] wg_packet_rx_poll+0x340/0x6b0
+[ 1039.679498][ C0] net_rx_action+0x180/0x490
+[ 1039.680388][ C0] _stext+0x12c/0x2b4
+[ 1039.681205][ C0] do_softirq+0x98/0xa4
+[ 1039.682006][ C0] __local_bh_enable_ip+0xa8/0xbc
+[ 1039.682913][ C0] _raw_spin_unlock_bh+0x3c/0x64
+[ 1039.683851][ C0] wg_packet_decrypt_worker+0xfc/0x1c4
+[ 1039.684865][ C0] process_one_work+0x1d8/0x360
+[ 1039.685738][ C0] worker_thread+0x74/0x440
+[ 1039.686557][ C0] kthread+0x178/0x180
+[ 1039.687345][ C0] ret_from_fork+0x10/0x30
+[ 1039.688322][ C0]
+[ 1039.688946][ C0] The buggy address belongs to the page:
+[ 1039.690015][ C0] page:00000000ecc16909 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x63278
+[ 1039.691507][ C0] head:00000000ecc16909 order:3 compound_mapcount:0 compound_pincount:0
+[ 1039.692784][ C0] flags: 0x1ffffc000010000(head)
+[ 1039.694169][ C0] raw: 01ffffc000010000 dead000000000100 dead000000000122 0000000000000000
+[ 1039.695467][ C0] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
+[ 1039.696662][ C0] page dumped because: kasan: bad access detected
+[ 1039.697642][ C0]
+[ 1039.698174][ C0] Memory state around the buggy address:
+[ 1039.699291][ C0] ffff00002327cb00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
+[ 1039.700514][ C0] ffff00002327cc00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
+[ 1039.701658][ C0] >ffff00002327cd00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
+[ 1039.702775][ C0] ^
+[ 1039.703920][ C0] ffff00002327ce00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
+[ 1039.705131][ C0] ffff00002327cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
+[ 1039.706190][ C0] ==================================================================
diff --git a/pkg/report/testdata/linux/report/570 b/pkg/report/testdata/linux/report/570
new file mode 100644
index 000000000..90e1108d3
--- /dev/null
+++ b/pkg/report/testdata/linux/report/570
@@ -0,0 +1,97 @@
+TITLE: KASAN: invalid-access Read in bond_ipsec_del_sa
+
+[ 678.660041][ T2885] ==================================================================
+[ 678.660727][ T2885] BUG: KASAN: invalid-access in bond_ipsec_del_sa+0x4/0x70
+[ 678.662451][ T2885] Read at addr 02ff000027080260 by task kworker/u4:6/2885
+[ 678.663084][ T2885] Pointer tag: [02], memory tag: [fe]
+[ 678.663746][ T2885]
+[ 678.664691][ T2885] CPU: 0 PID: 2885 Comm: kworker/u4:6 Not tainted 5.11.0-rc3 #36
+[ 678.665767][ T2885] Hardware name: linux,dummy-virt (DT)
+[ 678.666527][ T2885] Workqueue: netns cleanup_net
+[ 678.667743][ T2885] Call trace:
+[ 678.668104][ T2885] dump_backtrace+0x0/0x1a4
+[ 678.668577][ T2885] show_stack+0x1c/0x70
+[ 678.669023][ T2885] dump_stack+0xd0/0x12c
+[ 678.669491][ T2885] print_address_description+0x70/0x29c
+[ 678.670014][ T2885] kasan_report+0x104/0x200
+[ 678.670467][ T2885] __do_kernel_fault+0x17c/0x1c0
+[ 678.670960][ T2885] do_tag_check_fault+0x6c/0x80
+[ 678.671446][ T2885] do_mem_abort+0x44/0xb4
+[ 678.671937][ T2885] el1_abort+0x40/0x6c
+[ 678.672392][ T2885] el1_sync_handler+0xb0/0xcc
+[ 678.672894][ T2885] el1_sync+0x70/0x100
+[ 678.673336][ T2885] bond_ipsec_del_sa+0x4/0x70
+[ 678.673896][ T2885] __bond_release_one+0x1e8/0x4e0
+[ 678.674412][ T2885] bond_netdev_event+0x284/0x340
+[ 678.674893][ T2885] raw_notifier_call_chain+0x58/0x80
+[ 678.675395][ T2885] call_netdevice_notifiers_info+0x58/0xa4
+[ 678.675938][ T2885] rollback_registered_many+0x348/0x6e0
+[ 678.676440][ T2885] unregister_netdevice_many.part.0+0x18/0xe0
+[ 678.676964][ T2885] default_device_exit_batch+0x164/0x1a0
+[ 678.677507][ T2885] ops_exit_list+0x64/0x80
+[ 678.678003][ T2885] cleanup_net+0x23c/0x3b4
+[ 678.678491][ T2885] process_one_work+0x1d8/0x360
+[ 678.679022][ T2885] worker_thread+0x74/0x440
+[ 678.679659][ T2885] kthread+0x178/0x180
+[ 678.680111][ T2885] ret_from_fork+0x10/0x30
+[ 678.680701][ T2885]
+[ 678.681082][ T2885] Allocated by task 5231:
+[ 678.681582][ T2885] stack_trace_save+0x50/0x80
+[ 678.682060][ T2885] kasan_save_stack+0x2c/0x60
+[ 678.682547][ T2885] ____kasan_kmalloc+0xe8/0x160
+[ 678.683036][ T2885] __kasan_slab_alloc+0x20/0x30
+[ 678.683539][ T2885] kmem_cache_alloc+0x1a8/0x304
+[ 678.684126][ T2885] xfrm_state_alloc+0x28/0xc4
+[ 678.684594][ T2885] xfrm_add_sa+0x25c/0xb90
+[ 678.685063][ T2885] xfrm_user_rcv_msg+0x118/0x1f4
+[ 678.685546][ T2885] netlink_rcv_skb+0x58/0x120
+[ 678.686018][ T2885] xfrm_netlink_rcv+0x40/0x60
+[ 678.686524][ T2885] netlink_unicast+0x25c/0x320
+[ 678.687003][ T2885] netlink_sendmsg+0x1d4/0x3e4
+[ 678.687501][ T2885] sock_sendmsg+0x58/0x6c
+[ 678.687987][ T2885] ____sys_sendmsg+0x288/0x2d0
+[ 678.688500][ T2885] ___sys_sendmsg+0x80/0xd0
+[ 678.688995][ T2885] __sys_sendmsg+0x68/0xc4
+[ 678.689468][ T2885] __arm64_sys_sendmsg+0x28/0x3c
+[ 678.689969][ T2885] el0_svc_common.constprop.0+0x74/0x190
+[ 678.690485][ T2885] do_el0_svc+0x78/0x90
+[ 678.690931][ T2885] el0_svc+0x14/0x20
+[ 678.691362][ T2885] el0_sync_handler+0x1a8/0x1b0
+[ 678.691846][ T2885] el0_sync+0x190/0x1c0
+[ 678.692318][ T2885]
+[ 678.692653][ T2885] Freed by task 5068:
+[ 678.693031][ T2885] stack_trace_save+0x50/0x80
+[ 678.693492][ T2885] kasan_save_stack+0x2c/0x60
+[ 678.694113][ T2885] kasan_set_track+0x2c/0x40
+[ 678.694597][ T2885] kasan_set_free_info+0x24/0x30
+[ 678.695085][ T2885] ____kasan_slab_free.constprop.0+0x184/0x1c0
+[ 678.695632][ T2885] __kasan_slab_free+0x14/0x20
+[ 678.696123][ T2885] slab_free_freelist_hook+0x9c/0x190
+[ 678.696647][ T2885] kmem_cache_free+0xa0/0x460
+[ 678.697104][ T2885] ___xfrm_state_destroy+0x150/0x1b0
+[ 678.697593][ T2885] xfrm_state_gc_task+0x78/0xb0
+[ 678.698100][ T2885] process_one_work+0x1d8/0x360
+[ 678.698617][ T2885] worker_thread+0x74/0x440
+[ 678.699090][ T2885] kthread+0x178/0x180
+[ 678.699544][ T2885] ret_from_fork+0x10/0x30
+[ 678.700042][ T2885]
+[ 678.700336][ T2885] The buggy address belongs to the object at ffff000027080000
+[ 678.700336][ T2885] which belongs to the cache xfrm_state of size 720
+[ 678.701581][ T2885] The buggy address is located 608 bytes inside of
+[ 678.701581][ T2885] 720-byte region [ffff000027080000, ffff0000270802d0)
+[ 678.702529][ T2885] The buggy address belongs to the page:
+[ 678.703316][ T2885] page:00000000f608b534 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x67080
+[ 678.704655][ T2885] head:00000000f608b534 order:2 compound_mapcount:0 compound_pincount:0
+[ 678.705630][ T2885] flags: 0x1ffffc000010200(slab|head)
+[ 678.706599][ T2885] raw: 01ffffc000010200 dead000000000100 dead000000000122 fdff000004923e00
+[ 678.707662][ T2885] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
+[ 678.708650][ T2885] page dumped because: kasan: bad access detected
+[ 678.709440][ T2885]
+[ 678.709831][ T2885] Memory state around the buggy address:
+[ 678.710669][ T2885] ffff000027080000: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
+[ 678.711660][ T2885] ffff000027080100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
+[ 678.712596][ T2885] >ffff000027080200: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
+[ 678.713177][ T2885] ^
+[ 678.713737][ T2885] ffff000027080300: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
+[ 678.714423][ T2885] ffff000027080400: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
+[ 678.715035][ T2885] ==================================================================
diff --git a/pkg/report/testdata/linux/report/571 b/pkg/report/testdata/linux/report/571
new file mode 100644
index 000000000..a2dd05f80
--- /dev/null
+++ b/pkg/report/testdata/linux/report/571
@@ -0,0 +1,120 @@
+TITLE: KASAN: invalid-access Read in __run_timers
+
+[ 931.917437][ C0] ==================================================================
+[ 931.918594][ C0] BUG: KASAN: invalid-access in __run_timers.part.0+0xc0/0x224
+[ 931.920471][ C0] Read at addr 03ff00002b8b2da0 by task syz-executor.1/5829
+[ 931.921704][ C0] Pointer tag: [03], memory tag: [f5]
+[ 931.922867][ C0]
+[ 931.923821][ C0] CPU: 0 PID: 5829 Comm: syz-executor.1 Not tainted 5.11.0-rc3 #36
+[ 931.925048][ C0] Hardware name: linux,dummy-virt (DT)
+[ 931.926129][ C0] Call trace:
+[ 931.926804][ C0] dump_backtrace+0x0/0x1a4
+[ 931.927655][ C0] show_stack+0x1c/0x70
+[ 931.928442][ C0] dump_stack+0xd0/0x12c
+[ 931.929236][ C0] print_address_description+0x70/0x29c
+[ 931.930143][ C0] kasan_report+0x104/0x200
+[ 931.930964][ C0] __do_kernel_fault+0x17c/0x1c0
+[ 931.931823][ C0] do_tag_check_fault+0x6c/0x80
+[ 931.932661][ C0] do_mem_abort+0x44/0xb4
+[ 931.933436][ C0] el1_abort+0x40/0x6c
+[ 931.934216][ C0] el1_sync_handler+0xb0/0xcc
+[ 931.935048][ C0] el1_sync+0x70/0x100
+[ 931.935815][ C0] __run_timers.part.0+0xc0/0x224
+[ 931.936736][ C0] run_timer_softirq+0x40/0x7c
+[ 931.937564][ C0] _stext+0x12c/0x2b4
+[ 931.938369][ C0] irq_exit+0xe0/0x100
+[ 931.939151][ C0] __handle_domain_irq+0x84/0xe0
+[ 931.940007][ C0] gic_handle_irq+0x54/0xdc
+[ 931.940821][ C0] el1_irq+0xb4/0x180
+[ 931.941584][ C0] _raw_spin_unlock_irqrestore+0x10/0x50
+[ 931.942494][ C0] wake_up_q+0x68/0xd0
+[ 931.943269][ C0] __mutex_unlock_slowpath.constprop.0+0xf0/0x180
+[ 931.944231][ C0] mutex_unlock+0x40/0x60
+[ 931.945027][ C0] __rtnl_unlock+0x2c/0x5c
+[ 931.945836][ C0] netdev_run_todo+0x64/0x384
+[ 931.946742][ C0] rtnetlink_rcv_msg+0x124/0x33c
+[ 931.947600][ C0] netlink_rcv_skb+0x58/0x120
+[ 931.948434][ C0] rtnetlink_rcv+0x1c/0x2c
+[ 931.949236][ C0] netlink_unicast+0x25c/0x320
+[ 931.950070][ C0] netlink_sendmsg+0x1d4/0x3e4
+[ 931.950905][ C0] sock_sendmsg+0x58/0x6c
+[ 931.951709][ C0] __sys_sendto+0xd0/0x13c
+[ 931.952508][ C0] __arm64_sys_sendto+0x2c/0x40
+[ 931.953346][ C0] el0_svc_common.constprop.0+0x74/0x190
+[ 931.954258][ C0] do_el0_svc+0x78/0x90
+[ 931.955037][ C0] el0_svc+0x14/0x20
+[ 931.955798][ C0] el0_sync_handler+0x1a8/0x1b0
+[ 931.956708][ C0] el0_sync+0x190/0x1c0
+[ 931.957651][ C0]
+[ 931.958256][ C0] Allocated by task 5829:
+[ 931.959107][ C0] stack_trace_save+0x50/0x80
+[ 931.959965][ C0] kasan_save_stack+0x2c/0x60
+[ 931.960765][ C0] ____kasan_kmalloc+0xe8/0x160
+[ 931.961592][ C0] __kasan_kmalloc+0x18/0x24
+[ 931.962400][ C0] __kmalloc+0x20c/0x37c
+[ 931.963179][ C0] batadv_hash_new+0x90/0x114
+[ 931.963990][ C0] batadv_originator_init+0x3c/0xbc
+[ 931.964845][ C0] batadv_mesh_init+0xac/0x140
+[ 931.965662][ C0] batadv_softif_init_late+0x108/0x180
+[ 931.966592][ C0] register_netdevice+0xdc/0x544
+[ 931.967439][ C0] batadv_softif_newlink+0x3c/0x54
+[ 931.968288][ C0] __rtnl_newlink+0x5ec/0x820
+[ 931.969122][ C0] rtnl_newlink+0x74/0xa4
+[ 931.969903][ C0] rtnetlink_rcv_msg+0x11c/0x33c
+[ 931.970736][ C0] netlink_rcv_skb+0x58/0x120
+[ 931.971560][ C0] rtnetlink_rcv+0x1c/0x2c
+[ 931.972346][ C0] netlink_unicast+0x25c/0x320
+[ 931.973159][ C0] netlink_sendmsg+0x1d4/0x3e4
+[ 931.973963][ C0] sock_sendmsg+0x58/0x6c
+[ 931.974741][ C0] __sys_sendto+0xd0/0x13c
+[ 931.975531][ C0] __arm64_sys_sendto+0x2c/0x40
+[ 931.976378][ C0] el0_svc_common.constprop.0+0x74/0x190
+[ 931.977290][ C0] do_el0_svc+0x78/0x90
+[ 931.978060][ C0] el0_svc+0x14/0x20
+[ 931.978803][ C0] el0_sync_handler+0x1a8/0x1b0
+[ 931.979639][ C0] el0_sync+0x190/0x1c0
+[ 931.980479][ C0]
+[ 931.981036][ C0] Freed by task 5074:
+[ 931.981726][ C0] stack_trace_save+0x50/0x80
+[ 931.982545][ C0] kasan_save_stack+0x2c/0x60
+[ 931.983370][ C0] kasan_set_track+0x2c/0x40
+[ 931.984180][ C0] kasan_set_free_info+0x24/0x30
+[ 931.985020][ C0] ____kasan_slab_free.constprop.0+0x184/0x1c0
+[ 931.985969][ C0] __kasan_slab_free+0x14/0x20
+[ 931.986879][ C0] slab_free_freelist_hook+0x9c/0x190
+[ 931.987757][ C0] kfree+0x328/0x4a0
+[ 931.988534][ C0] kvfree+0x40/0x50
+[ 931.989308][ C0] netdev_freemem+0x1c/0x30
+[ 931.990136][ C0] netdev_release+0x34/0x4c
+[ 931.990942][ C0] device_release+0x38/0x94
+[ 931.991751][ C0] kobject_put+0x74/0x11c
+[ 931.992538][ C0] netdev_run_todo+0x2dc/0x384
+[ 931.993361][ C0] rtnl_unlock+0x14/0x20
+[ 931.994140][ C0] default_device_exit_batch+0x168/0x1a0
+[ 931.995075][ C0] ops_exit_list+0x64/0x80
+[ 931.995888][ C0] cleanup_net+0x23c/0x3b4
+[ 931.996815][ C0] process_one_work+0x1d8/0x360
+[ 931.997680][ C0] worker_thread+0x74/0x440
+[ 931.998496][ C0] kthread+0x178/0x180
+[ 931.999290][ C0] ret_from_fork+0x10/0x30
+[ 932.000142][ C0]
+[ 932.000652][ C0] The buggy address belongs to the object at ffff00002b8b2000
+[ 932.000652][ C0] which belongs to the cache kmalloc-4k of size 4096
+[ 932.002288][ C0] The buggy address is located 3488 bytes inside of
+[ 932.002288][ C0] 4096-byte region [ffff00002b8b2000, ffff00002b8b3000)
+[ 932.003975][ C0] The buggy address belongs to the page:
+[ 932.004959][ C0] page:00000000561704e0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x6b8b0
+[ 932.006499][ C0] head:00000000561704e0 order:3 compound_mapcount:0 compound_pincount:0
+[ 932.007721][ C0] flags: 0x1ffffc000010200(slab|head)
+[ 932.009061][ C0] raw: 01ffffc000010200 0000000000000000 0000000100000001 f0ff000004001900
+[ 932.010354][ C0] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000
+[ 932.011573][ C0] page dumped because: kasan: bad access detected
+[ 932.012582][ C0]
+[ 932.013124][ C0] Memory state around the buggy address:
+[ 932.014206][ C0] ffff00002b8b2b00: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
+[ 932.015432][ C0] ffff00002b8b2c00: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
+[ 932.016671][ C0] >ffff00002b8b2d00: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
+[ 932.017771][ C0] ^
+[ 932.018857][ C0] ffff00002b8b2e00: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
+[ 932.020044][ C0] ffff00002b8b2f00: f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5 f5
+[ 932.021191][ C0] ==================================================================
diff --git a/pkg/report/testdata/linux/report/572 b/pkg/report/testdata/linux/report/572
new file mode 100644
index 000000000..32e3181d8
--- /dev/null
+++ b/pkg/report/testdata/linux/report/572
@@ -0,0 +1,94 @@
+TITLE: KASAN: invalid-access Read in l2cap_sock_teardown_cb
+
+[ 5825.407853][ T9802] ==================================================================
+[ 5825.409134][ T9802] BUG: KASAN: invalid-access in _raw_spin_lock_bh+0x2c/0x70
+[ 5825.411015][ T9802] Read at addr 07ff000030708888 by task kworker/0:3/9802
+[ 5825.412333][ T9802] Pointer tag: [07], memory tag: [f4]
+[ 5825.413708][ T9802]
+[ 5825.414551][ T9802] CPU: 0 PID: 9802 Comm: kworker/0:3 Not tainted 5.11.0-rc3 #36
+[ 5825.415818][ T9802] Hardware name: linux,dummy-virt (DT)
+[ 5825.417106][ T9802] Workqueue: events l2cap_chan_timeout
+[ 5825.418918][ T9802] Call trace:
+[ 5825.419576][ T9802] dump_backtrace+0x0/0x1a4
+[ 5825.420449][ T9802] show_stack+0x1c/0x70
+[ 5825.421202][ T9802] dump_stack+0xd0/0x12c
+[ 5825.422024][ T9802] print_address_description+0x70/0x29c
+[ 5825.422923][ T9802] kasan_report+0x104/0x200
+[ 5825.423762][ T9802] __do_kernel_fault+0x17c/0x1c0
+[ 5825.424690][ T9802] do_tag_check_fault+0x6c/0x80
+[ 5825.425561][ T9802] do_mem_abort+0x44/0xb4
+[ 5825.426471][ T9802] el1_abort+0x40/0x6c
+[ 5825.427300][ T9802] el1_sync_handler+0xb0/0xcc
+[ 5825.428208][ T9802] el1_sync+0x70/0x100
+[ 5825.429039][ T9802] _raw_spin_lock_bh+0x2c/0x70
+[ 5825.429915][ T9802] l2cap_sock_teardown_cb+0x34/0x160
+[ 5825.430801][ T9802] l2cap_chan_del+0x48/0x3d0
+[ 5825.431701][ T9802] l2cap_chan_close+0x58/0x274
+[ 5825.432594][ T9802] l2cap_chan_timeout+0x64/0x17c
+[ 5825.433484][ T9802] process_one_work+0x1d8/0x360
+[ 5825.434361][ T9802] worker_thread+0x74/0x440
+[ 5825.435232][ T9802] kthread+0x178/0x180
+[ 5825.436135][ T9802] ret_from_fork+0x10/0x30
+[ 5825.437144][ T9802]
+[ 5825.437788][ T9802] Allocated by task 4482:
+[ 5825.438645][ T9802] stack_trace_save+0x50/0x80
+[ 5825.439672][ T9802] kasan_save_stack+0x2c/0x60
+[ 5825.440533][ T9802] ____kasan_kmalloc+0xe8/0x160
+[ 5825.441362][ T9802] __kasan_slab_alloc+0x20/0x30
+[ 5825.442191][ T9802] __kmalloc_node_track_caller+0x164/0x330
+[ 5825.443082][ T9802] __kmalloc_reserve.constprop.0+0x68/0x110
+[ 5825.444030][ T9802] __alloc_skb+0x88/0x1b0
+[ 5825.444876][ T9802] new_skb+0x20/0x60
+[ 5825.445661][ T9802] aoecmd_cfg+0xd8/0x220
+[ 5825.446529][ T9802] discover_timer+0x30/0x40
+[ 5825.447352][ T9802] call_timer_fn.constprop.0+0x24/0x80
+[ 5825.448264][ T9802] __run_timers.part.0+0x1f0/0x224
+[ 5825.449152][ T9802] run_timer_softirq+0x40/0x7c
+[ 5825.449999][ T9802] _stext+0x12c/0x2b4
+[ 5825.450830][ T9802]
+[ 5825.451387][ T9802] Freed by task 19062:
+[ 5825.452095][ T9802] stack_trace_save+0x50/0x80
+[ 5825.452931][ T9802] kasan_save_stack+0x2c/0x60
+[ 5825.453764][ T9802] kasan_set_track+0x2c/0x40
+[ 5825.454577][ T9802] kasan_set_free_info+0x24/0x30
+[ 5825.455407][ T9802] ____kasan_slab_free.constprop.0+0x184/0x1c0
+[ 5825.456569][ T9802] __kasan_slab_free+0x14/0x20
+[ 5825.457436][ T9802] slab_free_freelist_hook+0x9c/0x190
+[ 5825.458358][ T9802] kfree+0x328/0x4a0
+[ 5825.459130][ T9802] kvfree+0x40/0x50
+[ 5825.459915][ T9802] xt_free_table_info+0x74/0x84
+[ 5825.460810][ T9802] __do_replace+0x238/0x320
+[ 5825.461744][ T9802] do_arpt_set_ctl+0x4e4/0x76c
+[ 5825.462565][ T9802] nf_setsockopt+0x6c/0x9c
+[ 5825.463412][ T9802] ip_setsockopt+0x134/0x1334
+[ 5825.464274][ T9802] tcp_setsockopt+0x3c/0xc40
+[ 5825.465141][ T9802] sock_common_setsockopt+0x20/0x30
+[ 5825.466043][ T9802] __sys_setsockopt+0xa4/0x1a4
+[ 5825.466951][ T9802] __arm64_sys_setsockopt+0x2c/0x3c
+[ 5825.467866][ T9802] el0_svc_common.constprop.0+0x74/0x190
+[ 5825.468878][ T9802] do_el0_svc+0x78/0x90
+[ 5825.469704][ T9802] el0_svc+0x14/0x20
+[ 5825.470495][ T9802] el0_sync_handler+0x1a8/0x1b0
+[ 5825.471336][ T9802] el0_sync+0x190/0x1c0
+[ 5825.472165][ T9802]
+[ 5825.472761][ T9802] The buggy address belongs to the object at ffff000030708800
+[ 5825.472761][ T9802] which belongs to the cache kmalloc-1k of size 1024
+[ 5825.474559][ T9802] The buggy address is located 136 bytes inside of
+[ 5825.474559][ T9802] 1024-byte region [ffff000030708800, ffff000030708c00)
+[ 5825.476395][ T9802] The buggy address belongs to the page:
+[ 5825.477433][ T9802] page:00000000aaed4763 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x70708
+[ 5825.478974][ T9802] head:00000000aaed4763 order:2 compound_mapcount:0 compound_pincount:0
+[ 5825.480208][ T9802] flags: 0x1ffffc000010200(slab|head)
+[ 5825.481642][ T9802] raw: 01ffffc000010200 dead000000000100 dead000000000122 fcff000004001b00
+[ 5825.482925][ T9802] raw: 0000000000000000 0000000000080008 00000001ffffffff f2ff00002a7fed01
+[ 5825.484096][ T9802] page dumped because: kasan: bad access detected
+[ 5825.485061][ T9802] pages's memcg:f2ff00002a7fed01
+[ 5825.485862][ T9802]
+[ 5825.486457][ T9802] Memory state around the buggy address:
+[ 5825.487531][ T9802] ffff000030708600: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
+[ 5825.488745][ T9802] ffff000030708700: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
+[ 5825.489861][ T9802] >ffff000030708800: f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4
+[ 5825.490870][ T9802] ^
+[ 5825.491844][ T9802] ffff000030708900: f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4
+[ 5825.492978][ T9802] ffff000030708a00: f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4 f4
+[ 5825.494124][ T9802] ==================================================================
diff --git a/pkg/report/testdata/linux/report/573 b/pkg/report/testdata/linux/report/573
new file mode 100644
index 000000000..39c25c5d8
--- /dev/null
+++ b/pkg/report/testdata/linux/report/573
@@ -0,0 +1,122 @@
+TITLE: KASAN: invalid-access Read in firmware_fallback_sysfs
+
+[ 4452.860624][T17139] ==================================================================
+[ 4452.861782][T17139] BUG: KASAN: invalid-access in __list_add_valid+0x14/0x90
+[ 4452.863752][T17139] Read at addr 0aff0000332b5c90 by task syz-executor.0/17139
+[ 4452.865189][T17139] Pointer tag: [0a], memory tag: [f3]
+[ 4452.866400][T17139]
+[ 4452.867400][T17139] CPU: 1 PID: 17139 Comm: syz-executor.0 Not tainted 5.11.0-rc3 #36
+[ 4452.868689][T17139] Hardware name: linux,dummy-virt (DT)
+[ 4452.869805][T17139] Call trace:
+[ 4452.870468][T17139] dump_backtrace+0x0/0x1a4
+[ 4452.871419][T17139] show_stack+0x1c/0x70
+[ 4452.872343][T17139] dump_stack+0xd0/0x12c
+[ 4452.873190][T17139] print_address_description+0x70/0x29c
+[ 4452.874175][T17139] kasan_report+0x104/0x200
+[ 4452.875059][T17139] __do_kernel_fault+0x17c/0x1c0
+[ 4452.875905][T17139] do_tag_check_fault+0x6c/0x80
+[ 4452.876789][T17139] do_mem_abort+0x44/0xb4
+[ 4452.877702][T17139] el1_abort+0x40/0x6c
+[ 4452.878542][T17139] el1_sync_handler+0xb0/0xcc
+[ 4452.879382][T17139] el1_sync+0x70/0x100
+[ 4452.880172][T17139] __list_add_valid+0x14/0x90
+[ 4452.881033][T17139] firmware_fallback_sysfs+0x1a8/0x460
+[ 4452.882107][T17139] _request_firmware+0x4cc/0x6d4
+[ 4452.882970][T17139] request_firmware+0x4c/0x70
+[ 4452.883832][T17139] reg_reload_regdb+0x44/0xec
+[ 4452.884736][T17139] nl80211_reload_regdb+0x14/0x20
+[ 4452.885643][T17139] genl_family_rcv_msg_doit+0xc8/0x150
+[ 4452.886582][T17139] genl_rcv_msg+0xe4/0x1d0
+[ 4452.887392][T17139] netlink_rcv_skb+0x58/0x120
+[ 4452.888255][T17139] genl_rcv+0x3c/0x5c
+[ 4452.888989][T17139] netlink_unicast+0x25c/0x320
+[ 4452.889836][T17139] netlink_sendmsg+0x1d4/0x3e4
+[ 4452.890666][T17139] sock_sendmsg+0x58/0x6c
+[ 4452.891484][T17139] ____sys_sendmsg+0x288/0x2d0
+[ 4452.892389][T17139] ___sys_sendmsg+0x80/0xd0
+[ 4452.893240][T17139] __sys_sendmsg+0x68/0xc4
+[ 4452.894089][T17139] __arm64_sys_sendmsg+0x28/0x3c
+[ 4452.894971][T17139] el0_svc_common.constprop.0+0x74/0x190
+[ 4452.895915][T17139] do_el0_svc+0x78/0x90
+[ 4452.896686][T17139] el0_svc+0x14/0x20
+[ 4452.897530][T17139] el0_sync_handler+0x1a8/0x1b0
+[ 4452.898403][T17139] el0_sync+0x190/0x1c0
+[ 4452.899343][T17139]
+[ 4452.899961][T17139] Allocated by task 8480:
+[ 4452.900802][T17139] stack_trace_save+0x50/0x80
+[ 4452.901896][T17139] kasan_save_stack+0x2c/0x60
+[ 4452.902787][T17139] ____kasan_kmalloc+0xe8/0x160
+[ 4452.903686][T17139] __kasan_kmalloc+0x18/0x24
+[ 4452.904507][T17139] __kmalloc+0x20c/0x37c
+[ 4452.905257][T17139] __register_sysctl_table+0x414/0x830
+[ 4452.906302][T17139] register_net_sysctl+0x18/0x24
+[ 4452.907217][T17139] neigh_sysctl_register+0x108/0x1bc
+[ 4452.908157][T17139] devinet_sysctl_register+0x50/0xc0
+[ 4452.909026][T17139] inetdev_init+0xf8/0x250
+[ 4452.909933][T17139] inetdev_event+0x524/0x7e0
+[ 4452.910817][T17139] raw_notifier_call_chain+0x58/0x80
+[ 4452.911732][T17139] call_netdevice_notifiers_info+0x58/0xa4
+[ 4452.912707][T17139] register_netdevice+0x440/0x544
+[ 4452.913812][T17139] veth_newlink+0x1c0/0x384
+[ 4452.914888][T17139] __rtnl_newlink+0x5ec/0x820
+[ 4452.915839][T17139] rtnl_newlink+0x74/0xa4
+[ 4452.916657][T17139] rtnetlink_rcv_msg+0x11c/0x33c
+[ 4452.917562][T17139] netlink_rcv_skb+0x58/0x120
+[ 4452.918358][T17139] rtnetlink_rcv+0x1c/0x2c
+[ 4452.919194][T17139] netlink_unicast+0x25c/0x320
+[ 4452.920136][T17139] netlink_sendmsg+0x1d4/0x3e4
+[ 4452.920937][T17139] sock_sendmsg+0x58/0x6c
+[ 4452.921792][T17139] ____sys_sendmsg+0x288/0x2d0
+[ 4452.922640][T17139] ___sys_sendmsg+0x80/0xd0
+[ 4452.923495][T17139] __sys_sendmsg+0x68/0xc4
+[ 4452.924279][T17139] __arm64_sys_sendmsg+0x28/0x3c
+[ 4452.925148][T17139] el0_svc_common.constprop.0+0x74/0x190
+[ 4452.926095][T17139] do_el0_svc+0x78/0x90
+[ 4452.926944][T17139] el0_svc+0x14/0x20
+[ 4452.927775][T17139] el0_sync_handler+0x1a8/0x1b0
+[ 4452.928639][T17139] el0_sync+0x190/0x1c0
+[ 4452.929519][T17139]
+[ 4452.930185][T17139] Freed by task 7615:
+[ 4452.930910][T17139] stack_trace_save+0x50/0x80
+[ 4452.931825][T17139] kasan_save_stack+0x2c/0x60
+[ 4452.932775][T17139] kasan_set_track+0x2c/0x40
+[ 4452.933682][T17139] kasan_set_free_info+0x24/0x30
+[ 4452.934606][T17139] ____kasan_slab_free.constprop.0+0x184/0x1c0
+[ 4452.935665][T17139] __kasan_slab_free+0x14/0x20
+[ 4452.936562][T17139] slab_free_freelist_hook+0x9c/0x190
+[ 4452.937477][T17139] kfree+0x328/0x4a0
+[ 4452.938226][T17139] smk_fetch+0xc8/0x100
+[ 4452.938997][T17139] smack_d_instantiate+0x184/0x3a4
+[ 4452.939922][T17139] security_d_instantiate+0x44/0x6c
+[ 4452.940866][T17139] d_instantiate+0x34/0x70
+[ 4452.941765][T17139] shmem_mknod+0xc8/0x100
+[ 4452.942597][T17139] shmem_create+0x1c/0x30
+[ 4452.943384][T17139] path_openat+0xbe4/0xe50
+[ 4452.944150][T17139] do_filp_open+0x78/0x130
+[ 4452.945003][T17139] do_sys_openat2+0xb4/0x160
+[ 4452.945860][T17139] __arm64_sys_openat+0x68/0xb0
+[ 4452.946723][T17139] el0_svc_common.constprop.0+0x74/0x190
+[ 4452.947652][T17139] do_el0_svc+0x78/0x90
+[ 4452.948461][T17139] el0_svc+0x14/0x20
+[ 4452.949203][T17139] el0_sync_handler+0x1a8/0x1b0
+[ 4452.950148][T17139] el0_sync+0x190/0x1c0
+[ 4452.950997][T17139]
+[ 4452.951589][T17139] The buggy address belongs to the object at ffff0000332b5c00
+[ 4452.951589][T17139] which belongs to the cache kmalloc-256 of size 256
+[ 4452.953245][T17139] The buggy address is located 144 bytes inside of
+[ 4452.953245][T17139] 256-byte region [ffff0000332b5c00, ffff0000332b5d00)
+[ 4452.955025][T17139] The buggy address belongs to the page:
+[ 4452.956097][T17139] page:00000000d1cd0b9c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x732b5
+[ 4452.957644][T17139] flags: 0x1ffffc000000200(slab)
+[ 4452.959046][T17139] raw: 01ffffc000000200 fffffc0000ce1000 0000000300000003 f5ff000004001d00
+[ 4452.960450][T17139] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000
+[ 4452.961801][T17139] page dumped because: kasan: bad access detected
+[ 4452.962813][T17139]
+[ 4452.963346][T17139] Memory state around the buggy address:
+[ 4452.964556][T17139] ffff0000332b5a00: f0 f0 f0 f0 f0 f0 f0 f0 f0 f0 fe fe fe fe fe fe
+[ 4452.965740][T17139] ffff0000332b5b00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
+[ 4452.966922][T17139] >ffff0000332b5c00: f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3
+[ 4452.967989][T17139] ^
+[ 4452.969107][T17139] ffff0000332b5d00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
+[ 4452.970315][T17139] ffff0000332b5e00: f6 f6 f6 f6 f6 f6 f6 f6 f6 f6 fe fe fe fe fe fe
+[ 4452.971436][T17139] ==================================================================