From c9af7e5fda6a40ea71bae7a5a3fb04f2427fe822 Mon Sep 17 00:00:00 2001 From: Dmitry Vyukov Date: Tue, 6 Mar 2018 10:00:04 +0100 Subject: pkg/report: improve KASAN report parsing The problem is with "BUG: KASAN: (.*)" match which matches just anything however much it is corrupted. Mark this match as corrupted. --- pkg/report/testdata/linux/report/15 | 2 +- pkg/report/testdata/linux/report/213 | 179 +++++++++++++++++++++++++++++++++++ pkg/report/testdata/linux/report/214 | 99 +++++++++++++++++++ pkg/report/testdata/linux/report/5 | 2 +- 4 files changed, 280 insertions(+), 2 deletions(-) create mode 100644 pkg/report/testdata/linux/report/213 create mode 100644 pkg/report/testdata/linux/report/214 (limited to 'pkg/report/testdata/linux') diff --git a/pkg/report/testdata/linux/report/15 b/pkg/report/testdata/linux/report/15 index 39fd4f8c3..01f7726eb 100644 --- a/pkg/report/testdata/linux/report/15 +++ b/pkg/report/testdata/linux/report/15 @@ -1,4 +1,4 @@ -TITLE: KASAN: slab-out-of-bounds Read in memcpy +TITLE: KASAN: slab-out-of-bounds in memcpy at addr ADDR CORRUPTED: Y [ 1722.511384] ================================================================== diff --git a/pkg/report/testdata/linux/report/213 b/pkg/report/testdata/linux/report/213 new file mode 100644 index 000000000..850eb6190 --- /dev/null +++ b/pkg/report/testdata/linux/report/213 @@ -0,0 +1,179 @@ +TITLE: KASAN: slab-out-of-bounds in rds_cong_queue_updates +CORRUPTED: Y + +[ 357.015823] ================================================================== +[ 357.023478] BUG: KASAN: slab-out-of-bounds in rds_cong_queue_updates+0x4d3/0x4f0 +[ 357.030259] WARNING: CPU: 0 PID: 6694 at net/bridge/netfilter/ebtables.c:2063 compat_copy_entries+0xd92/0x1150 +[ 357.031000] Read of size 4 at addr ffff8801b3c58144 by task syz-executor4/6684 +[ 357.031012] +[ 357.031022] CPU: 1 PID: 6684 Comm: syz-executor4 Not tainted 4.16.0-rc4+ #252 +[ 357.041272] Kernel panic - not syncing: panic_on_warn set ... +[ 357.041272] +[ 357.048606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 +[ 357.074113] Call Trace: +[ 357.076685] dump_stack+0x194/0x24d +[ 357.080302] ? arch_local_irq_restore+0x53/0x53 +[ 357.084955] ? show_regs_print_info+0x18/0x18 +[ 357.089440] ? lock_release+0xa40/0xa40 +[ 357.093397] ? delayed_work_timer_fn+0x90/0x90 +[ 357.097966] ? rds_cong_queue_updates+0x4d3/0x4f0 +[ 357.102792] print_address_description+0x73/0x250 +[ 357.107621] ? rds_cong_queue_updates+0x4d3/0x4f0 +[ 357.112447] kasan_report+0x23c/0x360 +[ 357.116238] __asan_report_load4_noabort+0x14/0x20 +[ 357.121149] rds_cong_queue_updates+0x4d3/0x4f0 +[ 357.125807] ? rds_cong_get_maps+0x140/0x140 +[ 357.130217] rds_recv_rcvbuf_delta.part.2+0x289/0x320 +[ 357.135399] rds_recv_incoming+0xeb4/0x11d0 +[ 357.139716] ? rds_recv_rcvbuf_delta.part.2+0x320/0x320 +[ 357.145076] ? find_held_lock+0x35/0x1d0 +[ 357.149122] ? refcount_inc_not_zero+0xfe/0x180 +[ 357.153779] ? rds_send_xmit+0x114e/0x26b0 +[ 357.157995] ? rds_inc_init+0x85/0x390 +[ 357.161873] ? refcount_inc+0x1e/0x50 +[ 357.165656] ? rds_message_addref+0xc7/0x110 +[ 357.170045] ? rds_info_getsockopt+0x770/0x770 +[ 357.174613] ? do_raw_spin_trylock+0x190/0x190 +[ 357.179177] ? rds_message_addref+0xc7/0x110 +[ 357.183570] ? _raw_spin_unlock_irqrestore+0x31/0xc0 +[ 357.188659] rds_loop_xmit+0x149/0x320 +[ 357.192530] ? rds_loop_inc_free+0x20/0x20 +[ 357.196754] rds_send_xmit+0xbcd/0x26b0 +[ 357.200746] ? rds_send_ping+0x110/0x110 +[ 357.204796] ? trace_hardirqs_off+0x10/0x10 +[ 357.209113] ? trace_hardirqs_off+0x10/0x10 +[ 357.213422] ? rds_conn_drop+0xb0/0xb0 +[ 357.217299] ? find_held_lock+0x35/0x1d0 +[ 357.221358] ? rds_send_queue_rm+0x58c/0x5fa +[ 357.225748] ? lock_downgrade+0x980/0x980 +[ 357.229884] ? lock_release+0xa40/0xa40 +[ 357.233851] ? do_raw_spin_trylock+0x190/0x190 +[ 357.238414] ? do_raw_spin_trylock+0x190/0x190 +[ 357.242984] ? _raw_spin_unlock_irqrestore+0x31/0xc0 +[ 357.248076] ? trace_hardirqs_on_caller+0x421/0x5c0 +[ 357.253080] ? trace_hardirqs_on+0xd/0x10 +[ 357.257219] ? rds_send_queue_rm+0x591/0x5fa +[ 357.261630] ? rds_send_mprds_hash+0x31e/0x31e +[ 357.266198] ? rds_cong_remove_socket+0x4f0/0x4f0 +[ 357.271048] rds_sendmsg+0x1fcb/0x2390 +[ 357.274917] ? avc_has_perm+0x43e/0x680 +[ 357.278905] ? rds_send_drop_to+0x19d0/0x19d0 +[ 357.283383] ? iterate_fd+0x3f0/0x3f0 +[ 357.287171] ? lock_downgrade+0x980/0x980 +[ 357.291309] ? find_held_lock+0x35/0x1d0 +[ 357.295368] ? sock_has_perm+0x2a4/0x420 +[ 357.299418] ? selinux_secmark_relabel_packet+0xc0/0xc0 +[ 357.304761] ? lock_release+0x9e2/0xa40 +[ 357.308725] ? __check_object_size+0x8b/0x530 +[ 357.313202] ? __release_sock+0x360/0x360 +[ 357.317331] ? lock_sock_nested+0x91/0x110 +[ 357.321559] ? __might_sleep+0x95/0x190 +[ 357.325525] ? selinux_socket_sendmsg+0x36/0x40 +[ 357.330181] ? security_socket_sendmsg+0x89/0xb0 +[ 357.334919] ? rds_send_drop_to+0x19d0/0x19d0 +[ 357.339400] sock_sendmsg+0xca/0x110 +[ 357.343100] SYSC_sendto+0x361/0x5c0 +[ 357.346803] ? SYSC_connect+0x4a0/0x4a0 +[ 357.350775] ? security_socket_bind+0x89/0xb0 +[ 357.355263] ? SYSC_bind+0x290/0x410 +[ 357.358981] ? kmem_cache_free+0x258/0x2a0 +[ 357.363213] ? compat_SyS_futex+0x288/0x380 +[ 357.367529] ? compat_SyS_get_robust_list+0x300/0x300 +[ 357.372704] ? filp_open+0x70/0x70 +[ 357.376244] SyS_sendto+0x40/0x50 +[ 357.379681] ? SyS_getpeername+0x30/0x30 +[ 357.383732] do_fast_syscall_32+0x3ec/0xf9f +[ 357.388049] ? do_int80_syscall_32+0x9c0/0x9c0 +[ 357.392622] ? _raw_spin_unlock_irq+0x27/0x70 +[ 357.397101] ? finish_task_switch+0x1c1/0x7e0 +[ 357.401589] ? syscall_return_slowpath+0x2ac/0x550 +[ 357.406508] ? prepare_exit_to_usermode+0x350/0x350 +[ 357.411510] ? sysret32_from_system_call+0x5/0x3c +[ 357.416343] ? trace_hardirqs_off_thunk+0x1a/0x1c +[ 357.421182] entry_SYSENTER_compat+0x70/0x7f +[ 357.425573] RIP: 0023:0xf7fbcc99 +[ 357.428918] RSP: 002b:00000000f77b809c EFLAGS: 00000286 ORIG_RAX: 0000000000000171 +[ 357.436618] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000020f7db7f +[ 357.443872] RDX: 0000000000000481 RSI: 0000000000000000 RDI: 000000002069affb +[ 357.451124] RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000 +[ 357.458376] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 +[ 357.465624] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 +[ 357.472904] +[ 357.472915] CPU: 0 PID: 6694 Comm: syz-executor1 Not tainted 4.16.0-rc4+ #252 +[ 357.474511] Allocated by task 4277: +[ 357.481764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 +[ 357.485368] save_stack+0x43/0xd0 +[ 357.494689] Call Trace: +[ 357.498117] kasan_kmalloc+0xad/0xe0 +[ 357.500676] dump_stack+0x194/0x24d +[ 357.504361] kasan_slab_alloc+0x12/0x20 +[ 357.504371] kmem_cache_alloc+0x12e/0x760 +[ 357.507973] ? arch_local_irq_restore+0x53/0x53 +[ 357.511912] getname_flags+0xcb/0x580 +[ 357.511919] getname+0x19/0x20 +[ 357.516048] ? vsnprintf+0x1ed/0x1900 +[ 357.520677] do_sys_open+0x2e7/0x6d0 +[ 357.520685] compat_SyS_open+0x2a/0x40 +[ 357.524467] panic+0x1e4/0x41c +[ 357.527619] do_fast_syscall_32+0x3ec/0xf9f +[ 357.527628] entry_SYSENTER_compat+0x70/0x7f +[ 357.531400] ? refcount_error_report+0x214/0x214 +[ 357.535079] +[ 357.538941] ? show_regs_print_info+0x18/0x18 +[ 357.538967] ? __warn+0x1c1/0x200 +[ 357.542114] Freed by task 4277: +[ 357.546420] ? compat_copy_entries+0xd92/0x1150 +[ 357.550789] save_stack+0x43/0xd0 +[ 357.555513] __warn+0x1dc/0x200 +[ 357.557115] __kasan_slab_free+0x11a/0x170 +[ 357.561580] ? compat_copy_entries+0xd92/0x1150 +[ 357.564999] kasan_slab_free+0xe/0x10 +[ 357.565007] kmem_cache_free+0x83/0x2a0 +[ 357.568261] report_bug+0x211/0x2d0 +[ 357.572892] putname+0xee/0x130 +[ 357.572899] do_sys_open+0x31b/0x6d0 +[ 357.576337] fixup_bug.part.11+0x37/0x80 +[ 357.579572] compat_SyS_open+0x2a/0x40 +[ 357.579584] do_fast_syscall_32+0x3ec/0xf9f +[ 357.583787] do_error_trap+0x2d7/0x3e0 +[ 357.588422] entry_SYSENTER_compat+0x70/0x7f +[ 357.588426] +[ 357.592204] ? wait_for_completion+0x770/0x770 +[ 357.596148] The buggy address belongs to the object at ffff8801b3c58580 +[ 357.596148] which belongs to the cache names_cache of size 4096 +[ 357.599753] ? math_error+0x400/0x400 +[ 357.602995] The buggy address is located 1084 bytes to the left of +[ 357.602995] 4096-byte region [ffff8801b3c58580, ffff8801b3c59580) +[ 357.602999] The buggy address belongs to the page: +[ 357.606689] ? module_unload_free+0x5b0/0x5b0 +[ 357.610717] page:ffffea0006cf1600 count:1 mapcount:0 mapping:ffff8801b3c58580 index:0x0 +[ 357.614578] ? perf_trace_lock+0x900/0x900 +[ 357.618866] compound_mapcount: 0 +[ 357.622734] ? __alloc_pages_nodemask+0xabe/0xdd0 +[ 357.627109] flags: 0x2fffc0000008100(slab|head) +[ 357.628721] ? trace_hardirqs_off_thunk+0x1a/0x1c +[ 357.633266] raw: 02fffc0000008100 ffff8801b3c58580 0000000000000000 0000000100000001 +[ 357.645991] do_invalid_op+0x1b/0x20 +[ 357.649754] raw: ffffea0006e9eaa0 ffffea0006e97ba0 ffff8801da5d6600 0000000000000000 +[ 357.662209] invalid_op+0x1b/0x40 +[ 357.667105] page dumped because: kasan: bad access detected +[ 357.671575] RIP: 0010:compat_copy_entries+0xd92/0x1150 +[ 357.679683] +[ 357.683886] RSP: 0018:ffff8801d35777e8 EFLAGS: 00010216 +[ 357.687317] Memory state around the buggy address: +[ 357.692128] RAX: 0000000000010000 RBX: 0000000000000000 RCX: ffffffff851ad5c2 +[ 357.692135] RDX: 00000000000004b2 RSI: ffffc90001419000 RDI: 0000000000000000 +[ 357.696774] ffff8801b3c58000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc +[ 357.701586] RBP: ffff8801d3577968 R08: 000000000000004c R09: 0000000000000000 +[ 357.709435] ffff8801b3c58080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc +[ 357.713116] R10: ffffffff88613380 R11: 0000000000000001 R12: 0000000000000004 +[ 357.713122] R13: dffffc0000000000 R14: ffff8801d35779c8 R15: 0000000000000004 +[ 357.720972] >ffff8801b3c58100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc +[ 357.724418] ? compat_copy_entries+0xd92/0x1150 +[ 357.730084] ^ +[ 357.735343] ? compat_copy_entries+0xd92/0x1150 +[ 357.736930] ffff8801b3c58180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc +[ 357.742269] ? __might_fault+0x110/0x1d0 +[ 357.747163] ffff8801b3c58200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc +[ 357.754436] ? compat_table_info+0x590/0x590 +[ 357.761647] ================================================================== diff --git a/pkg/report/testdata/linux/report/214 b/pkg/report/testdata/linux/report/214 new file mode 100644 index 000000000..e1ba16525 --- /dev/null +++ b/pkg/report/testdata/linux/report/214 @@ -0,0 +1,99 @@ +TITLE: KASAN: wild-memory-access in sg_read +CORRUPTED: Y + +[ 56.874510] ================================================================== +[ 56.881919] BUG: KASAN: wild-memory-access in sg_read+0x1296/0x1440 +[ 56.886161] kasan: CONFIG_KASAN_INLINE enabled +[ 56.886164] kasan: GPF could be caused by NULL-ptr deref or user memory access +[ 56.886173] general protection fault: 0000 [#1] PREEMPT SMP KASAN +[ 56.886178] Dumping ftrace buffer: +[ 56.886182] (ftrace buffer empty) +[ 56.886186] Modules linked in: +[ 56.886194] CPU: 1 PID: 11774 Comm: syz-executor7 Not tainted 4.9.72-gcb7518e #10 +[ 56.886198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 +[ 56.886203] task: ffff8801c45f9800 task.stack: ffff8801c5770000 +[ 56.886222] RIP: 0010:[] [] __free_pages+0x21/0x80 +[ 56.886226] RSP: 0018:ffff8801c5777940 EFLAGS: 00010a07 +[ 56.886230] RAX: dffffc0000000000 RBX: dead4ead00000000 RCX: ffffffff82664f9b +[ 56.886234] RDX: 1bd5a9d5a0000003 RSI: 0000000000000001 RDI: dead4ead0000001c +[ 56.886238] RBP: ffff8801c5777950 R08: 0000000000000001 R09: 0000000000000001 +[ 56.886241] R10: 0000000000000000 R11: ffff8801c45f9800 R12: 0000000000000004 +[ 56.886245] R13: 0000000000000020 R14: ffff8801cc62c200 R15: dffffc0000000000 +[ 56.886251] FS: 0000000000000000(0000) GS:ffff8801db300000(0063) knlGS:00000000f6ff7b40 +[ 56.886255] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 +[ 56.886259] CR2: 0000000020bb7000 CR3: 00000001c9cec000 CR4: 00000000001406e0 +[ 56.886267] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 +[ 56.886272] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 +[ 56.886273] Stack: +[ 56.886285] 0000000000000001 ffff8801cc62c358 ffff8801c57779b0 ffffffff82664fc1 +[ 56.886299] ffff8801cc62c370 ffffed00398c586b ffffed00398c586e ffff8801cc62c368 +[ 56.886308] dead4ead00000000 ffff8801cc62c340 0000000000000000 0000000000000000 +[ 56.886310] Call Trace: +[ 56.886319] [] sg_remove_scat.isra.19+0x1c1/0x2d0 +[ 56.886330] [] sg_finish_rem_req+0x2b5/0x340 +[ 56.886340] [] sg_new_read.isra.20+0x356/0x3e0 +[ 56.886347] [] ? sg_get_rq_mark+0x145/0x190 +[ 56.886357] [] sg_read+0x8bd/0x1440 +[ 56.886366] [] ? sg_proc_seq_show_debug+0xd10/0xd10 +[ 56.886378] [] ? fsnotify+0xf30/0xf30 +[ 56.886387] [] ? avc_policy_seqno+0x9/0x20 +[ 56.886396] [] do_loop_readv_writev.part.17+0x141/0x1e0 +[ 56.886403] [] ? security_file_permission+0x89/0x1e0 +[ 56.886410] [] ? sg_proc_seq_show_debug+0xd10/0xd10 +[ 56.886417] [] ? sg_proc_seq_show_debug+0xd10/0xd10 +[ 56.886424] [] compat_do_readv_writev+0x522/0x760 +[ 56.886431] [] ? do_pwritev+0x1a0/0x1a0 +[ 56.886439] [] ? exit_robust_list+0x230/0x230 +[ 56.886448] [] ? check_preemption_disabled+0x3b/0x200 +[ 56.886455] [] ? __fget+0x201/0x3a0 +[ 56.886461] [] ? __fget+0x228/0x3a0 +[ 56.886467] [] ? __fget+0x47/0x3a0 +[ 56.886474] [] compat_readv+0xe3/0x150 +[ 56.886482] [] do_compat_readv+0xf4/0x1d0 +[ 56.886489] [] ? compat_readv+0x150/0x150 +[ 56.886496] [] ? SyS_read+0x1b0/0x1b0 +[ 56.886504] [] compat_SyS_readv+0x26/0x30 +[ 56.886511] [] ? SyS_pwritev2+0x80/0x80 +[ 56.886518] [] do_fast_syscall_32+0x2f7/0x890 +[ 56.886525] [] ? trace_hardirqs_off_thunk+0x1a/0x1c +[ 56.886534] [] entry_SYSENTER_compat+0x51/0x60 +[ 56.886639] Code: e9 27 fc ff ff 0f 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 e5 53 48 89 fb 48 83 c7 1c 48 89 fa 48 83 ec 08 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 3d +[ 56.886647] RIP [] __free_pages+0x21/0x80 +[ 56.886649] RSP +[ 56.886657] ---[ end trace 8afff88f0ca340d1 ]--- +[ 56.886660] Kernel panic - not syncing: Fatal exception +[ 57.259120] Read of size 4060 at addr ffe70874503c9000 by task syz-executor6/11770 +[ 57.266791] +[ 57.268394] CPU: 0 PID: 11770 Comm: syz-executor6 Tainted: G D 4.9.72-gcb7518e #10 +[ 57.277195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 +[ 57.286519] ffff8801c3dd7ad8 ffffffff81d922b9 ffe70874503c9000 0000000000000fdc +[ 57.294479] 0000000000000000 ffff8801c202c540 ffff8801c9c14340 ffff8801c3dd7b20 +[ 57.302441] ffffffff8153bebe ffffffff82667a16 0000000000000286 112de43e2a9805f9 +[ 57.310407] Call Trace: +[ 57.312966] [] dump_stack+0xc1/0x128 +[ 57.318304] [] kasan_report+0x15e/0x360 +[ 57.323898] [] ? sg_read+0x1296/0x1440 +[ 57.329403] [] check_memory_region+0x137/0x190 +[ 57.335604] [] kasan_check_read+0x11/0x20 +[ 57.341368] [] sg_read+0x1296/0x1440 +[ 57.346702] [] ? sg_proc_seq_show_debug+0xd10/0xd10 +[ 57.353337] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 +[ 57.360327] [] ? sg_proc_seq_show_debug+0xd10/0xd10 +[ 57.366963] [] __vfs_read+0x103/0x670 +[ 57.372381] [] ? default_llseek+0x290/0x290 +[ 57.378323] [] ? fsnotify+0x86/0xf30 +[ 57.383655] [] ? fsnotify+0xf30/0xf30 +[ 57.389076] [] ? avc_policy_seqno+0x9/0x20 +[ 57.394932] [] ? selinux_file_permission+0x82/0x460 +[ 57.401568] [] ? security_file_permission+0x89/0x1e0 +[ 57.408290] [] ? rw_verify_area+0xe5/0x2b0 +[ 57.414143] [] vfs_read+0x11e/0x380 +[ 57.419389] [] SyS_read+0xd9/0x1b0 +[ 57.424548] [] ? vfs_copy_file_range+0x740/0x740 +[ 57.430921] [] ? compat_SyS_ioctl+0x8c/0x2050 +[ 57.437038] [] ? do_fast_syscall_32+0xcf/0x890 +[ 57.443239] [] ? vfs_copy_file_range+0x740/0x740 +[ 57.449610] [] do_fast_syscall_32+0x2f7/0x890 +[ 57.455725] [] ? trace_hardirqs_off_thunk+0x1a/0x1c +[ 57.462365] [] entry_SYSENTER_compat+0x51/0x60 +[ 57.468563] ================================================================== diff --git a/pkg/report/testdata/linux/report/5 b/pkg/report/testdata/linux/report/5 index 2c2507be1..368511f04 100644 --- a/pkg/report/testdata/linux/report/5 +++ b/pkg/report/testdata/linux/report/5 @@ -1,5 +1,5 @@ # Test that we strip the report after "Kernel panic - not syncing" line. -TITLE: KASAN: double-free or invalid-free in selinux_tun_dev_free_security +TITLE: KASAN: invalid-free in selinux_tun_dev_free_security clock_gettime(0x0, &(0x7f0000475000-0x10)={0x0, 0x0}) write$sndseq(0xffffffffffffffff, &(0x7f0000929000-0x150)=[{0x3197a6bf, 0x0, 0x4, 0x100, @tick=0x6, {0x7, 0x6c}, {0x2, 0x9}, @connect={{0x1ff, 0x1}, {0x3ff, 0x118c}}}, {0x100000000, 0x2, 0xfffffffffffffffa, 0x2, @tick=0x5d0, {0xf556, 0x7}, {0x3, 0x1000}, @quote={{0x5, 0xfffffffffffffff7}, 0x401, &(0x7f000084a000)={0x10000, 0x9d, 0x8, 0x4, @tick=0x336f, {0x5, 0x1d}, {0x8, 0x7}, @time=@time={0x0, 0x989680}}}}, {0x200, 0x0, 0x99a, 0x6, @tick=0x1, {0x1, 0x158}, {0x200, 0x5}, @connect={{0x8, 0x4}, {0xf2, 0x100000000}}}, {0x40, 0xfffffffffffffffa, 0x100000000, 0x5, @time={r2, r3+10000000}, {0x7, 0x5}, {0x3, 0x0}, @raw32={[0x2, 0x225, 0x1]}}, {0x75f, 0x8, 0x80, 0x80, @tick=0x6, {0x9, 0x9}, {0x1, 0x6}, @queue={0x7, {0x7, 0x6}}}, {0x80, 0x6, 0x3f, 0x80000001, @time={0x0, 0x0}, {0x3f, 0x9}, {0x96, 0xfffffffffffff800}, @raw8={"e5660e9238e6f58b35448e94"}}, {0x6, 0x6f8, 0x3, 0x6, @time={0x77359400, 0x0}, {0x100000001, 0x0}, {0xe870, 0x7}, @connect={{0x4, 0x80}, {0x7ff, 0xfffffffffffffffa}}}], 0x150) -- cgit mrf-deployment