diff options
| author | Dmitry Vyukov <dvyukov@google.com> | 2022-07-04 09:51:54 +0200 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2022-07-04 13:57:16 +0200 |
| commit | bff65f44b47bd73f56c3d6a5c3899de5f5775136 (patch) | |
| tree | 3e3e0a465ca88542f6883281933db8d73daf6a55 /pkg/report/testdata/linux | |
| parent | 1434eec0b84075b7246560cfa89f20cdb3d8077f (diff) | |
pkg/report: parse new double/invalid-free reports
Patch "kasan: separate double free case from invalid free"
https://lore.kernel.org/all/20220615062219.22618-1-Kuan-Ying.Lee@mediatek.com/
changes format of KASAN reports.
Currently the new reports are parsed as corrupted.
Update parsing.
Diffstat (limited to 'pkg/report/testdata/linux')
| -rw-r--r-- | pkg/report/testdata/linux/report/652 | 77 | ||||
| -rw-r--r-- | pkg/report/testdata/linux/report/653 | 77 |
2 files changed, 154 insertions, 0 deletions
diff --git a/pkg/report/testdata/linux/report/652 b/pkg/report/testdata/linux/report/652 new file mode 100644 index 000000000..de28553b3 --- /dev/null +++ b/pkg/report/testdata/linux/report/652 @@ -0,0 +1,77 @@ +TITLE: KASAN: invalid-free in xt_free_table_info +ALT: invalid-free in xt_free_table_info + +[ 368.542732] ================================================================== +[ 368.550228] BUG: KASAN: double-free in kvfree+0x36/0x60 +[ 368.556946] +[ 368.558547] CPU: 1 PID: 4260 Comm: syz-executor4 Not tainted 4.16.0-rc4+ #254 +[ 368.565787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 +[ 368.575111] Call Trace: +[ 368.577669] dump_stack+0x194/0x24d +[ 368.597583] print_address_description+0x73/0x250 +[ 368.608891] kasan_report_invalid_free+0x55/0x80 +[ 368.613620] __kasan_slab_free+0x145/0x170 +[ 368.621077] kasan_slab_free+0xe/0x10 +[ 368.624851] kfree+0xd9/0x260 +[ 368.627930] kvfree+0x36/0x60 +[ 368.631009] xt_free_table_info+0xaf/0x170 +[ 368.635228] __do_replace+0x810/0xa70 +[ 368.651731] do_ip6t_set_ctl+0x40f/0x5f0 +[ 368.669692] nf_setsockopt+0x67/0xc0 +[ 368.673380] ipv6_setsockopt+0x10b/0x130 +[ 368.677416] tcp_setsockopt+0x82/0xd0 +[ 368.681194] sock_common_setsockopt+0x95/0xd0 +[ 368.685664] SyS_setsockopt+0x189/0x360 +[ 368.708916] do_syscall_64+0x281/0x940 +[ 368.735910] entry_SYSCALL_64_after_hwframe+0x42/0xb7 +[ 368.741079] RIP: 0033:0x45697a +[ 368.744246] RSP: 002b:0000000000a3e3b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 +[ 368.751927] RAX: ffffffffffffffda RBX: 0000000000a3e3e0 RCX: 000000000045697a +[ 368.759168] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000013 +[ 368.766407] RBP: 00000000006fd900 R08: 00000000000003b8 R09: 0000000000004000 +[ 368.773647] R10: 00000000006fb6e0 R11: 0000000000000206 R12: 0000000000000000 +[ 368.780886] R13: 0000000000000013 R14: 0000000000000029 R15: 00000000006fb740 +[ 368.788140] +[ 368.789739] Allocated by task 7667: +[ 368.793338] save_stack+0x43/0xd0 +[ 368.796763] kasan_kmalloc+0xad/0xe0 +[ 368.800448] __kmalloc_track_caller+0x15e/0x760 +[ 368.805090] kmemdup+0x24/0x50 +[ 368.808255] selinux_cred_prepare+0x43/0xa0 +[ 368.812547] security_prepare_creds+0x7d/0xb0 +[ 368.817015] prepare_creds+0x2b1/0x360 +[ 368.820883] SyS_access+0x8f/0x6a0 +[ 368.824399] do_syscall_64+0x281/0x940 +[ 368.828256] entry_SYSCALL_64_after_hwframe+0x42/0xb7 +[ 368.833413] +[ 368.835015] Freed by task 7667: +[ 368.838269] save_stack+0x43/0xd0 +[ 368.841698] __kasan_slab_free+0x11a/0x170 +[ 368.845913] kasan_slab_free+0xe/0x10 +[ 368.849682] kfree+0xd9/0x260 +[ 368.852757] selinux_cred_free+0x48/0x70 +[ 368.856789] security_cred_free+0x48/0x80 +[ 368.860906] put_cred_rcu+0x106/0x400 +[ 368.864678] rcu_process_callbacks+0xd6c/0x17f0 +[ 368.869315] __do_softirq+0x2d7/0xb85 +[ 368.873084] +[ 368.874686] The buggy address belongs to the object at ffff8801c95e2880 +[ 368.874686] which belongs to the cache kmalloc-32 of size 32 +[ 368.887135] The buggy address is located 0 bytes inside of +[ 368.887135] 32-byte region [ffff8801c95e2880, ffff8801c95e28a0) +[ 368.898715] The buggy address belongs to the page: +[ 368.903616] page:ffffea0007257880 count:1 mapcount:0 mapping:ffff8801c95e2000 index:0xffff8801c95e2fc1 +[ 368.913035] flags: 0x2fffc0000000100(slab) +[ 368.917246] raw: 02fffc0000000100 ffff8801c95e2000 ffff8801c95e2fc1 000000010000000f +[ 368.925100] raw: ffffea0006eae820 ffffea0006bb8b20 ffff8801dac001c0 0000000000000000 +[ 368.932954] page dumped because: kasan: bad access detected +[ 368.938630] +[ 368.940228] Memory state around the buggy address: +[ 368.945126] ffff8801c95e2780: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc +[ 368.952455] ffff8801c95e2800: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc +[ 368.959793] >ffff8801c95e2880: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc +[ 368.967127] ^ +[ 368.970461] ffff8801c95e2900: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc +[ 368.977790] ffff8801c95e2980: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc +[ 368.985119] ================================================================== + diff --git a/pkg/report/testdata/linux/report/653 b/pkg/report/testdata/linux/report/653 new file mode 100644 index 000000000..6161f4b22 --- /dev/null +++ b/pkg/report/testdata/linux/report/653 @@ -0,0 +1,77 @@ +TITLE: KASAN: invalid-free in xt_free_table_info +ALT: invalid-free in xt_free_table_info + +[ 368.542732] ================================================================== +[ 368.550228] BUG: KASAN: invalid-free in kvfree+0x36/0x60 +[ 368.556946] +[ 368.558547] CPU: 1 PID: 4260 Comm: syz-executor4 Not tainted 4.16.0-rc4+ #254 +[ 368.565787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 +[ 368.575111] Call Trace: +[ 368.577669] dump_stack+0x194/0x24d +[ 368.597583] print_address_description+0x73/0x250 +[ 368.608891] kasan_report_invalid_free+0x55/0x80 +[ 368.613620] __kasan_slab_free+0x145/0x170 +[ 368.621077] kasan_slab_free+0xe/0x10 +[ 368.624851] kfree+0xd9/0x260 +[ 368.627930] kvfree+0x36/0x60 +[ 368.631009] xt_free_table_info+0xaf/0x170 +[ 368.635228] __do_replace+0x810/0xa70 +[ 368.651731] do_ip6t_set_ctl+0x40f/0x5f0 +[ 368.669692] nf_setsockopt+0x67/0xc0 +[ 368.673380] ipv6_setsockopt+0x10b/0x130 +[ 368.677416] tcp_setsockopt+0x82/0xd0 +[ 368.681194] sock_common_setsockopt+0x95/0xd0 +[ 368.685664] SyS_setsockopt+0x189/0x360 +[ 368.708916] do_syscall_64+0x281/0x940 +[ 368.735910] entry_SYSCALL_64_after_hwframe+0x42/0xb7 +[ 368.741079] RIP: 0033:0x45697a +[ 368.744246] RSP: 002b:0000000000a3e3b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 +[ 368.751927] RAX: ffffffffffffffda RBX: 0000000000a3e3e0 RCX: 000000000045697a +[ 368.759168] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000013 +[ 368.766407] RBP: 00000000006fd900 R08: 00000000000003b8 R09: 0000000000004000 +[ 368.773647] R10: 00000000006fb6e0 R11: 0000000000000206 R12: 0000000000000000 +[ 368.780886] R13: 0000000000000013 R14: 0000000000000029 R15: 00000000006fb740 +[ 368.788140] +[ 368.789739] Allocated by task 7667: +[ 368.793338] save_stack+0x43/0xd0 +[ 368.796763] kasan_kmalloc+0xad/0xe0 +[ 368.800448] __kmalloc_track_caller+0x15e/0x760 +[ 368.805090] kmemdup+0x24/0x50 +[ 368.808255] selinux_cred_prepare+0x43/0xa0 +[ 368.812547] security_prepare_creds+0x7d/0xb0 +[ 368.817015] prepare_creds+0x2b1/0x360 +[ 368.820883] SyS_access+0x8f/0x6a0 +[ 368.824399] do_syscall_64+0x281/0x940 +[ 368.828256] entry_SYSCALL_64_after_hwframe+0x42/0xb7 +[ 368.833413] +[ 368.835015] Freed by task 7667: +[ 368.838269] save_stack+0x43/0xd0 +[ 368.841698] __kasan_slab_free+0x11a/0x170 +[ 368.845913] kasan_slab_free+0xe/0x10 +[ 368.849682] kfree+0xd9/0x260 +[ 368.852757] selinux_cred_free+0x48/0x70 +[ 368.856789] security_cred_free+0x48/0x80 +[ 368.860906] put_cred_rcu+0x106/0x400 +[ 368.864678] rcu_process_callbacks+0xd6c/0x17f0 +[ 368.869315] __do_softirq+0x2d7/0xb85 +[ 368.873084] +[ 368.874686] The buggy address belongs to the object at ffff8801c95e2880 +[ 368.874686] which belongs to the cache kmalloc-32 of size 32 +[ 368.887135] The buggy address is located 0 bytes inside of +[ 368.887135] 32-byte region [ffff8801c95e2880, ffff8801c95e28a0) +[ 368.898715] The buggy address belongs to the page: +[ 368.903616] page:ffffea0007257880 count:1 mapcount:0 mapping:ffff8801c95e2000 index:0xffff8801c95e2fc1 +[ 368.913035] flags: 0x2fffc0000000100(slab) +[ 368.917246] raw: 02fffc0000000100 ffff8801c95e2000 ffff8801c95e2fc1 000000010000000f +[ 368.925100] raw: ffffea0006eae820 ffffea0006bb8b20 ffff8801dac001c0 0000000000000000 +[ 368.932954] page dumped because: kasan: bad access detected +[ 368.938630] +[ 368.940228] Memory state around the buggy address: +[ 368.945126] ffff8801c95e2780: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc +[ 368.952455] ffff8801c95e2800: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc +[ 368.959793] >ffff8801c95e2880: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc +[ 368.967127] ^ +[ 368.970461] ffff8801c95e2900: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc +[ 368.977790] ffff8801c95e2980: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc +[ 368.985119] ================================================================== + |
