aboutsummaryrefslogtreecommitdiffstats
path: root/pkg/report/testdata
diff options
context:
space:
mode:
authorDmitry Vyukov <dvyukov@google.com>2017-12-12 12:20:41 +0100
committerDmitry Vyukov <dvyukov@google.com>2017-12-12 12:20:41 +0100
commit7130893383f4e09240efbec6a4f31ba0c47337c8 (patch)
tree13c4ab9a2db89497f1a0675bc0987ffe773b04ca /pkg/report/testdata
parent9d0132a2fb379f6464ea0c08c98e77d361eb564d (diff)
pkg/report: merge TestLinuxParseLog into TestParse
That was the last test that used inline input data. Merge it into TestParse. Test Output for all crashes in TestParse. Support multiple oopes in crash Add more test cases for start/end line.
Diffstat (limited to 'pkg/report/testdata')
-rw-r--r--pkg/report/testdata/linux/report/121
-rw-r--r--pkg/report/testdata/linux/report/130123
-rw-r--r--pkg/report/testdata/linux/report/353
-rw-r--r--pkg/report/testdata/linux/report/42
4 files changed, 129 insertions, 0 deletions
diff --git a/pkg/report/testdata/linux/report/12 b/pkg/report/testdata/linux/report/12
index 3c45eaae4..9d2399bb4 100644
--- a/pkg/report/testdata/linux/report/12
+++ b/pkg/report/testdata/linux/report/12
@@ -1,4 +1,5 @@
TITLE: general protection fault in drm_legacy_newctx
+START: [ 1021.364461] general protection fault: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN
CORRUPTED: Y
[ 1021.362826] kasan: CONFIG_KASAN_INLINE enabled
diff --git a/pkg/report/testdata/linux/report/130 b/pkg/report/testdata/linux/report/130
new file mode 100644
index 000000000..32e066a9c
--- /dev/null
+++ b/pkg/report/testdata/linux/report/130
@@ -0,0 +1,123 @@
+TITLE: KASAN: use-after-free Read in aead_recvmsg
+START: [ 53.730124] BUG: KASAN: use-after-free in aead_recvmsg+0x1758/0x1bc0
+
+2017/11/27 07:13:57 executing program 2:
+mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
+pipe(&(0x7f0000860000-0x8)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
+vmsplice(r1, &(0x7f0000ee7000-0x70)=[{&(0x7f00006b9000-0xcc)="2069fde890af3c8d3b6f7cc9b10207e66d9b649333016bb8e60d1898a65497520f52d08ef979093a9d7ff6c8f15c7d33bd887ceed473c03ddf53f1abfb394f56ba9a58663c4625b2fd20e42c3634dea7cbaa13af1c486edca29b0f20cd0f6f9e58863da6a4813592a092994e34f99c8bb8a57ec4c9cbb12dff54ea53142ba42b6e72", 0x82}, {&(0x7f00004ff000)="8c15a76ee72d8b37743d0a520e40aa435bd35800be1bcb2193947ea2cd5131644958b1c874", 0x25}], 0x2, 0x0)
+r2 = socket$inet(0x2, 0xfffffffffffffffd, 0x4007)
+setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000892000)=0x3, 0x4)
+mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
+ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000000)=@req={0x28, &(0x7f000033c000-0x28)={@generic="7e2ce949379d7b45abd44fd13199f4c7", @ifru_settings={0x0, 0x0, @fr=&(0x7f0000631000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}})
+r3 = socket(0x14, 0x802, 0xffff)
+ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000edd000)={@common="6c6f0000000000000000000000000000", @ifru_ivalue=0x0})
+getsockopt$inet_int(r3, 0x0, 0x37, &(0x7f00005e9000-0x4)=0x0, &(0x7f00009d9000-0x4)=0x4)
+write(r3, &(0x7f0000c07000-0x20)="1f0000005400056d0002020000000003073f00000000000000000000110000d5", 0x20)
+syslog(0x1, 0x0, 0x0)
+ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000f20000-0x8)={0x2, 0x5e2})
+setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00006ec000)="8907040000", 0x5)
+sendto$inet(r2, &(0x7f00002e6000)="51918cf29f669c7deb5294775dad77984cac8d8ec96b07bf44f6e534a50979dff39532ce5629eb5a8ce530f4a2aa939b2d024f3afcf558cb118297f99eeebb999643463acfca3ac63911e0d9502b916c4585c5d8d0a155f0b497d1a1aa2fe94c7b7897ff72ee", 0x66, 0x8800, &(0x7f0000654000-0x10)={0x2, 0x2, @rand_addr=0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10)
+splice(r0, 0x0, r2, 0x0, 0x8dc6, 0x2)
+socketpair(0xb, 0x5, 0x0, &(0x7f000065f000)={0x0, 0x0})
+[ 53.722692] ==================================================================
+[ 53.730124] BUG: KASAN: use-after-free in aead_recvmsg+0x1758/0x1bc0
+[ 53.736605] Read of size 4 at addr ffff8801c1afdb5c by task syz-executor5/3568
+[ 53.743949]
+[ 53.745574] CPU: 1 PID: 3568 Comm: syz-executor5 Not tainted 4.14.0-next-20171127+ #52
+[ 53.753624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
+[ 53.762966] Call Trace:
+[ 53.765717] dump_stack+0x194/0x257
+[ 53.765733] ? arch_local_irq_restore+0x53/0x53
+[ 53.765747] ? show_regs_print_info+0x65/0x65
+[ 53.765765] ? af_alg_make_sg+0x510/0x510
+[ 53.765775] ? aead_recvmsg+0x1758/0x1bc0
+[ 53.765791] print_address_description+0x73/0x250
+[ 53.765801] ? aead_recvmsg+0x1758/0x1bc0
+[ 53.765813] kasan_report+0x25b/0x340
+[ 53.765831] __asan_report_load4_noabort+0x14/0x20
+[ 53.765839] aead_recvmsg+0x1758/0x1bc0
+[ 53.765886] ? aead_release+0x50/0x50
+[ 53.765906] ? selinux_socket_recvmsg+0x36/0x40
+[ 53.765917] ? security_socket_recvmsg+0x91/0xc0
+[ 53.765931] ? aead_release+0x50/0x50
+[ 53.765942] sock_recvmsg+0xc9/0x110
+[ 53.765950] ? __sock_recv_wifi_status+0x210/0x210
+[ 53.765965] ___sys_recvmsg+0x29b/0x630
+[ 53.765990] ? ___sys_sendmsg+0x8a0/0x8a0
+[ 53.765999] ? lock_downgrade+0x980/0x980
+[ 53.766055] ? _raw_spin_unlock_irq+0x27/0x70
+[ 53.766069] ? trace_hardirqs_on_caller+0x421/0x5c0
+[ 53.766080] ? trace_hardirqs_on+0xd/0x10
+[ 53.766089] ? _raw_spin_unlock_irq+0x27/0x70
+[ 53.766100] ? task_work_run+0x1f4/0x270
+[ 53.766126] ? __fdget+0x18/0x20
+[ 53.766146] __sys_recvmsg+0xe2/0x210
+[ 53.766153] ? __sys_recvmsg+0xe2/0x210
+[ 53.766166] ? SyS_sendmmsg+0x60/0x60
+[ 53.766191] ? SyS_futex+0x269/0x390
+[ 53.766225] ? trace_hardirqs_on_caller+0x421/0x5c0
+[ 53.766246] SyS_recvmsg+0x2d/0x50
+[ 53.766260] entry_SYSCALL_64_fastpath+0x1f/0x96
+[ 53.766267] RIP: 0033:0x452879
+[ 53.766272] RSP: 002b:00007fab1b978be8 EFLAGS: 00000212 ORIG_RAX: 000000000000002f
+[ 53.766280] RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879
+[ 53.766285] RDX: 0000000000002021 RSI: 0000000020b2dfc8 RDI: 0000000000000014
+[ 53.766290] RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000
+[ 53.766294] R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006ed250
+[ 53.766299] R13: 00000000ffffffff R14: 00007fab1b9796d4 R15: 0000000000000000
+[ 53.766335]
+[ 53.766339] Allocated by task 3568:
+[ 53.766347] save_stack+0x43/0xd0
+[ 53.766352] kasan_kmalloc+0xad/0xe0
+[ 53.766360] __kmalloc+0x162/0x760
+[ 53.766367] crypto_create_tfm+0x82/0x2e0
+[ 53.766373] crypto_alloc_tfm+0x10e/0x2f0
+[ 53.766379] crypto_alloc_skcipher+0x2c/0x40
+[ 53.766388] crypto_get_default_null_skcipher+0x5f/0x80
+[ 53.766394] aead_bind+0x89/0x140
+[ 53.766400] alg_bind+0x1ab/0x440
+[ 53.766406] SYSC_bind+0x1b4/0x3f0
+[ 53.766412] SyS_bind+0x24/0x30
+[ 53.766418] entry_SYSCALL_64_fastpath+0x1f/0x96
+[ 53.766421]
+[ 53.766424] Freed by task 3568:
+[ 53.766430] save_stack+0x43/0xd0
+[ 53.766436] kasan_slab_free+0x71/0xc0
+[ 53.766442] kfree+0xca/0x250
+[ 53.766450] kzfree+0x28/0x30
+[ 53.766456] crypto_destroy_tfm+0x140/0x2e0
+[ 53.766464] crypto_put_default_null_skcipher+0x35/0x60
+[ 53.766470] aead_sock_destruct+0x13c/0x220
+[ 53.766477] __sk_destruct+0xfd/0x910
+[ 53.766483] sk_destruct+0x47/0x80
+[ 53.766489] __sk_free+0x57/0x230
+[ 53.766495] sk_free+0x2a/0x40
+[ 53.766501] af_alg_release+0x5d/0x70
+[ 53.766506] sock_release+0x8d/0x1e0
+[ 53.766512] sock_close+0x16/0x20
+[ 53.766520] __fput+0x333/0x7f0
+[ 53.766526] ____fput+0x15/0x20
+[ 53.766532] task_work_run+0x199/0x270
+[ 53.766543] exit_to_usermode_loop+0x296/0x310
+[ 53.766550] syscall_return_slowpath+0x490/0x550
+[ 53.766557] entry_SYSCALL_64_fastpath+0x94/0x96
+[ 53.766559]
+[ 53.766564] The buggy address belongs to the object at ffff8801c1afdb40
+[ 53.766564] which belongs to the cache kmalloc-128 of size 128
+[ 53.766570] The buggy address is located 28 bytes inside of
+[ 53.766570] 128-byte region [ffff8801c1afdb40, ffff8801c1afdbc0)
+[ 53.766573] The buggy address belongs to the page:
+[ 53.766579] page:ffffea000706bf40 count:1 mapcount:0 mapping:ffff8801c1afd000 index:0x0
+[ 53.766587] flags: 0x2fffc0000000100(slab)
+[ 53.766602] raw: 02fffc0000000100 ffff8801c1afd000 0000000000000000 0000000100000015
+[ 53.766611] raw: ffffea000707f1e0 ffffea00070fef20 ffff8801db000640 0000000000000000
+[ 53.766614] page dumped because: kasan: bad access detected
+[ 53.766616]
+[ 53.766619] Memory state around the buggy address:
+[ 53.766625] ffff8801c1afda00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
+[ 53.766631] ffff8801c1afda80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+[ 53.766637] >ffff8801c1afdb00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
+[ 53.766640] ^
+[ 53.766646] ffff8801c1afdb80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
+[ 53.766652] ffff8801c1afdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+[ 53.766655] ==================================================================
diff --git a/pkg/report/testdata/linux/report/35 b/pkg/report/testdata/linux/report/35
index 4cda44458..0b2b6bc4d 100644
--- a/pkg/report/testdata/linux/report/35
+++ b/pkg/report/testdata/linux/report/35
@@ -1,7 +1,10 @@
TITLE: suspicious RCU usage at ./include/linux/kvm_host.h:LINE
+START: [ 37.540478] [ INFO: suspicious RCU usage. ]
CORRUPTED: Y
[ 37.540474] ===============================
+2016/11/12 06:52:29 executing program 1:
+r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
[ 37.540478] [ INFO: suspicious RCU usage. ]
[ 37.540495] 4.9.0-rc4+ #47 Not tainted
2016/11/12 06:52:29 executing program 1:
diff --git a/pkg/report/testdata/linux/report/4 b/pkg/report/testdata/linux/report/4
index 9ce526ae2..1c6784049 100644
--- a/pkg/report/testdata/linux/report/4
+++ b/pkg/report/testdata/linux/report/4
@@ -1,6 +1,8 @@
# Test that we don't strip the report after "Kernel panic - not syncing" line
# because we have too few lines before it.
TITLE: WARNING in kvm_arch_vcpu_ioctl_run
+START: [ 55.967976] WARNING: CPU: 1 PID: 8377 at arch/x86/kvm/x86.c:7209 kvm_arch_vcpu_ioctl_run+0x1f7/0x5a00
+END: [ 56.041277] Kernel panic - not syncing: panic_on_warn set ...
2017/06/30 10:13:30 executing program 1:
mmap(&(0x7f0000000000/0xd000)=nil, (0xd000), 0x2000001, 0x4012, 0xffffffffffffffff, 0x0)