diff options
Diffstat (limited to 'pkg/report/testdata/linux')
| -rw-r--r-- | pkg/report/testdata/linux/report/12 | 1 | ||||
| -rw-r--r-- | pkg/report/testdata/linux/report/130 | 123 | ||||
| -rw-r--r-- | pkg/report/testdata/linux/report/35 | 3 | ||||
| -rw-r--r-- | pkg/report/testdata/linux/report/4 | 2 |
4 files changed, 129 insertions, 0 deletions
diff --git a/pkg/report/testdata/linux/report/12 b/pkg/report/testdata/linux/report/12 index 3c45eaae4..9d2399bb4 100644 --- a/pkg/report/testdata/linux/report/12 +++ b/pkg/report/testdata/linux/report/12 @@ -1,4 +1,5 @@ TITLE: general protection fault in drm_legacy_newctx +START: [ 1021.364461] general protection fault: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN CORRUPTED: Y [ 1021.362826] kasan: CONFIG_KASAN_INLINE enabled diff --git a/pkg/report/testdata/linux/report/130 b/pkg/report/testdata/linux/report/130 new file mode 100644 index 000000000..32e066a9c --- /dev/null +++ b/pkg/report/testdata/linux/report/130 @@ -0,0 +1,123 @@ +TITLE: KASAN: use-after-free Read in aead_recvmsg +START: [ 53.730124] BUG: KASAN: use-after-free in aead_recvmsg+0x1758/0x1bc0 + +2017/11/27 07:13:57 executing program 2: +mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) +pipe(&(0x7f0000860000-0x8)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}) +vmsplice(r1, &(0x7f0000ee7000-0x70)=[{&(0x7f00006b9000-0xcc)="2069fde890af3c8d3b6f7cc9b10207e66d9b649333016bb8e60d1898a65497520f52d08ef979093a9d7ff6c8f15c7d33bd887ceed473c03ddf53f1abfb394f56ba9a58663c4625b2fd20e42c3634dea7cbaa13af1c486edca29b0f20cd0f6f9e58863da6a4813592a092994e34f99c8bb8a57ec4c9cbb12dff54ea53142ba42b6e72", 0x82}, {&(0x7f00004ff000)="8c15a76ee72d8b37743d0a520e40aa435bd35800be1bcb2193947ea2cd5131644958b1c874", 0x25}], 0x2, 0x0) +r2 = socket$inet(0x2, 0xfffffffffffffffd, 0x4007) +setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000892000)=0x3, 0x4) +mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) +ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000000)=@req={0x28, &(0x7f000033c000-0x28)={@generic="7e2ce949379d7b45abd44fd13199f4c7", @ifru_settings={0x0, 0x0, @fr=&(0x7f0000631000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}}) +r3 = socket(0x14, 0x802, 0xffff) +ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000edd000)={@common="6c6f0000000000000000000000000000", @ifru_ivalue=0x0}) +getsockopt$inet_int(r3, 0x0, 0x37, &(0x7f00005e9000-0x4)=0x0, &(0x7f00009d9000-0x4)=0x4) +write(r3, &(0x7f0000c07000-0x20)="1f0000005400056d0002020000000003073f00000000000000000000110000d5", 0x20) +syslog(0x1, 0x0, 0x0) +ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000f20000-0x8)={0x2, 0x5e2}) +setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00006ec000)="8907040000", 0x5) +sendto$inet(r2, &(0x7f00002e6000)="51918cf29f669c7deb5294775dad77984cac8d8ec96b07bf44f6e534a50979dff39532ce5629eb5a8ce530f4a2aa939b2d024f3afcf558cb118297f99eeebb999643463acfca3ac63911e0d9502b916c4585c5d8d0a155f0b497d1a1aa2fe94c7b7897ff72ee", 0x66, 0x8800, &(0x7f0000654000-0x10)={0x2, 0x2, @rand_addr=0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) +splice(r0, 0x0, r2, 0x0, 0x8dc6, 0x2) +socketpair(0xb, 0x5, 0x0, &(0x7f000065f000)={0x0, 0x0}) +[ 53.722692] ================================================================== +[ 53.730124] BUG: KASAN: use-after-free in aead_recvmsg+0x1758/0x1bc0 +[ 53.736605] Read of size 4 at addr ffff8801c1afdb5c by task syz-executor5/3568 +[ 53.743949] +[ 53.745574] CPU: 1 PID: 3568 Comm: syz-executor5 Not tainted 4.14.0-next-20171127+ #52 +[ 53.753624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 +[ 53.762966] Call Trace: +[ 53.765717] dump_stack+0x194/0x257 +[ 53.765733] ? arch_local_irq_restore+0x53/0x53 +[ 53.765747] ? show_regs_print_info+0x65/0x65 +[ 53.765765] ? af_alg_make_sg+0x510/0x510 +[ 53.765775] ? aead_recvmsg+0x1758/0x1bc0 +[ 53.765791] print_address_description+0x73/0x250 +[ 53.765801] ? aead_recvmsg+0x1758/0x1bc0 +[ 53.765813] kasan_report+0x25b/0x340 +[ 53.765831] __asan_report_load4_noabort+0x14/0x20 +[ 53.765839] aead_recvmsg+0x1758/0x1bc0 +[ 53.765886] ? aead_release+0x50/0x50 +[ 53.765906] ? selinux_socket_recvmsg+0x36/0x40 +[ 53.765917] ? security_socket_recvmsg+0x91/0xc0 +[ 53.765931] ? aead_release+0x50/0x50 +[ 53.765942] sock_recvmsg+0xc9/0x110 +[ 53.765950] ? __sock_recv_wifi_status+0x210/0x210 +[ 53.765965] ___sys_recvmsg+0x29b/0x630 +[ 53.765990] ? ___sys_sendmsg+0x8a0/0x8a0 +[ 53.765999] ? lock_downgrade+0x980/0x980 +[ 53.766055] ? _raw_spin_unlock_irq+0x27/0x70 +[ 53.766069] ? trace_hardirqs_on_caller+0x421/0x5c0 +[ 53.766080] ? trace_hardirqs_on+0xd/0x10 +[ 53.766089] ? _raw_spin_unlock_irq+0x27/0x70 +[ 53.766100] ? task_work_run+0x1f4/0x270 +[ 53.766126] ? __fdget+0x18/0x20 +[ 53.766146] __sys_recvmsg+0xe2/0x210 +[ 53.766153] ? __sys_recvmsg+0xe2/0x210 +[ 53.766166] ? SyS_sendmmsg+0x60/0x60 +[ 53.766191] ? SyS_futex+0x269/0x390 +[ 53.766225] ? trace_hardirqs_on_caller+0x421/0x5c0 +[ 53.766246] SyS_recvmsg+0x2d/0x50 +[ 53.766260] entry_SYSCALL_64_fastpath+0x1f/0x96 +[ 53.766267] RIP: 0033:0x452879 +[ 53.766272] RSP: 002b:00007fab1b978be8 EFLAGS: 00000212 ORIG_RAX: 000000000000002f +[ 53.766280] RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 +[ 53.766285] RDX: 0000000000002021 RSI: 0000000020b2dfc8 RDI: 0000000000000014 +[ 53.766290] RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 +[ 53.766294] R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006ed250 +[ 53.766299] R13: 00000000ffffffff R14: 00007fab1b9796d4 R15: 0000000000000000 +[ 53.766335] +[ 53.766339] Allocated by task 3568: +[ 53.766347] save_stack+0x43/0xd0 +[ 53.766352] kasan_kmalloc+0xad/0xe0 +[ 53.766360] __kmalloc+0x162/0x760 +[ 53.766367] crypto_create_tfm+0x82/0x2e0 +[ 53.766373] crypto_alloc_tfm+0x10e/0x2f0 +[ 53.766379] crypto_alloc_skcipher+0x2c/0x40 +[ 53.766388] crypto_get_default_null_skcipher+0x5f/0x80 +[ 53.766394] aead_bind+0x89/0x140 +[ 53.766400] alg_bind+0x1ab/0x440 +[ 53.766406] SYSC_bind+0x1b4/0x3f0 +[ 53.766412] SyS_bind+0x24/0x30 +[ 53.766418] entry_SYSCALL_64_fastpath+0x1f/0x96 +[ 53.766421] +[ 53.766424] Freed by task 3568: +[ 53.766430] save_stack+0x43/0xd0 +[ 53.766436] kasan_slab_free+0x71/0xc0 +[ 53.766442] kfree+0xca/0x250 +[ 53.766450] kzfree+0x28/0x30 +[ 53.766456] crypto_destroy_tfm+0x140/0x2e0 +[ 53.766464] crypto_put_default_null_skcipher+0x35/0x60 +[ 53.766470] aead_sock_destruct+0x13c/0x220 +[ 53.766477] __sk_destruct+0xfd/0x910 +[ 53.766483] sk_destruct+0x47/0x80 +[ 53.766489] __sk_free+0x57/0x230 +[ 53.766495] sk_free+0x2a/0x40 +[ 53.766501] af_alg_release+0x5d/0x70 +[ 53.766506] sock_release+0x8d/0x1e0 +[ 53.766512] sock_close+0x16/0x20 +[ 53.766520] __fput+0x333/0x7f0 +[ 53.766526] ____fput+0x15/0x20 +[ 53.766532] task_work_run+0x199/0x270 +[ 53.766543] exit_to_usermode_loop+0x296/0x310 +[ 53.766550] syscall_return_slowpath+0x490/0x550 +[ 53.766557] entry_SYSCALL_64_fastpath+0x94/0x96 +[ 53.766559] +[ 53.766564] The buggy address belongs to the object at ffff8801c1afdb40 +[ 53.766564] which belongs to the cache kmalloc-128 of size 128 +[ 53.766570] The buggy address is located 28 bytes inside of +[ 53.766570] 128-byte region [ffff8801c1afdb40, ffff8801c1afdbc0) +[ 53.766573] The buggy address belongs to the page: +[ 53.766579] page:ffffea000706bf40 count:1 mapcount:0 mapping:ffff8801c1afd000 index:0x0 +[ 53.766587] flags: 0x2fffc0000000100(slab) +[ 53.766602] raw: 02fffc0000000100 ffff8801c1afd000 0000000000000000 0000000100000015 +[ 53.766611] raw: ffffea000707f1e0 ffffea00070fef20 ffff8801db000640 0000000000000000 +[ 53.766614] page dumped because: kasan: bad access detected +[ 53.766616] +[ 53.766619] Memory state around the buggy address: +[ 53.766625] ffff8801c1afda00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc +[ 53.766631] ffff8801c1afda80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 +[ 53.766637] >ffff8801c1afdb00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb +[ 53.766640] ^ +[ 53.766646] ffff8801c1afdb80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc +[ 53.766652] ffff8801c1afdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 +[ 53.766655] ================================================================== diff --git a/pkg/report/testdata/linux/report/35 b/pkg/report/testdata/linux/report/35 index 4cda44458..0b2b6bc4d 100644 --- a/pkg/report/testdata/linux/report/35 +++ b/pkg/report/testdata/linux/report/35 @@ -1,7 +1,10 @@ TITLE: suspicious RCU usage at ./include/linux/kvm_host.h:LINE +START: [ 37.540478] [ INFO: suspicious RCU usage. ] CORRUPTED: Y [ 37.540474] =============================== +2016/11/12 06:52:29 executing program 1: +r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 37.540478] [ INFO: suspicious RCU usage. ] [ 37.540495] 4.9.0-rc4+ #47 Not tainted 2016/11/12 06:52:29 executing program 1: diff --git a/pkg/report/testdata/linux/report/4 b/pkg/report/testdata/linux/report/4 index 9ce526ae2..1c6784049 100644 --- a/pkg/report/testdata/linux/report/4 +++ b/pkg/report/testdata/linux/report/4 @@ -1,6 +1,8 @@ # Test that we don't strip the report after "Kernel panic - not syncing" line # because we have too few lines before it. TITLE: WARNING in kvm_arch_vcpu_ioctl_run +START: [ 55.967976] WARNING: CPU: 1 PID: 8377 at arch/x86/kvm/x86.c:7209 kvm_arch_vcpu_ioctl_run+0x1f7/0x5a00 +END: [ 56.041277] Kernel panic - not syncing: panic_on_warn set ... 2017/06/30 10:13:30 executing program 1: mmap(&(0x7f0000000000/0xd000)=nil, (0xd000), 0x2000001, 0x4012, 0xffffffffffffffff, 0x0) |
