Skip to content
This repository has been archived by the owner on Nov 1, 2023. It is now read-only.

Use insta crate for snapshot tests of stacktrace parsing #3027

Merged
merged 3 commits into from
Apr 18, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
90 changes: 90 additions & 0 deletions src/agent/Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

16 changes: 0 additions & 16 deletions src/agent/libclusterfuzz/data/parsed-traces/android_asan_uaf.json

This file was deleted.

Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
---
source: stacktrace-parser/src/lib.rs
expression: parsed
input_file: libclusterfuzz/data/stack-traces/address_in_state.txt
---
{
"text": "[0623/024556:ERROR:gl_surface_egl.cc(486)] eglInitialize D3D11 failed with error UNKNOWN, trying next display type\n[0623/024556:ERROR:gl_surface_egl.cc(486)] eglInitialize D3D9 failed with error UNKNOWN\n[0623/024557:ERROR:gl_surface_egl.cc(486)] eglInitialize D3D11 failed with error UNKNOWN, trying next display type\n[0623/024557:ERROR:gl_surface_egl.cc(486)] eglInitialize D3D9 failed with error UNKNOWN\n[0623/024557:ERROR:gl_surface_win.cc(170)] GLSurfaceEGL::InitializeOneOff failed.\n=================================================================\n==6512==ERROR: AddressSanitizer: access-violation on unknown address 0x00000000 (pc 0x10c2323d bp 0x0045c518 sp 0x0045c514 T0)\n #0 0x10c2323c in GetHandleVerifier+0x15a519c (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x1a9323c)\n #1 0x10c18f60 in GetHandleVerifier+0x159aec0 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x1a88f60)\n #2 0x10c1b301 in GetHandleVerifier+0x159d261 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x1a8b301)\n #3 0x12055649 in ovly_debug_event+0xf8af79 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x2ec5649)\n #4 0x1204f3ec in ovly_debug_event+0xf84d1c (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x2ebf3ec)\n #5 0x1204f112 in ovly_debug_event+0xf84a42 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x2ebf112)\n #6 0x11db641c in ovly_debug_event+0xcebd4c (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x2c2641c)\n #7 0x136db8d4 in ovly_debug_event+0x2611204 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x454b8d4)\n #8 0x13700464 in ovly_debug_event+0x2635d94 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x4570464)\n #9 0x136fb7dd in ovly_debug_event+0x263110d (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x456b7dd)\n #10 0x13700fce in ovly_debug_event+0x26368fe (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x4570fce)\n #11 0x13d35a97 in ovly_debug_event+0x2c6b3c7 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x4ba5a97)\n #12 0x13dc9bc7 in ovly_debug_event+0x2cff4f7 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x4c39bc7)\n #13 0x1b6199f1 in IsSandboxedProcess+0x3a2c811 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0xc4899f1)\n #14 0x16284d8f in ovly_debug_event+0x51ba6bf (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x70f4d8f)\n #15 0x16280836 in ovly_debug_event+0x51b6166 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x70f0836)\n #16 0x1627e4e7 in ovly_debug_event+0x51b3e17 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x70ee4e7)\n #17 0xf420e40 in ChromeMain+0x28fe40 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x290e40)\n #18 0x1b5d11ca in IsSandboxedProcess+0x39e3fea (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0xc4411ca)\n #19 0xf753b60 in GetHandleVerifier+0xd5ac0 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x5c3b60)\n #20 0x1b74cbd4 in IsSandboxedProcess+0x3b5f9f4 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0xc5bcbd4)\n #21 0x1b74b0da in IsSandboxedProcess+0x3b5defa (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0xc5bb0da)\n #22 0x1b74e3b0 in IsSandboxedProcess+0x3b611d0 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0xc5be3b0)\n #23 0xf753b60 in GetHandleVerifier+0xd5ac0 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x5c3b60)\n #24 0xf6776a9 in ChromeMain+0x4e66a9 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x4e76a9)\n #25 0xf678c20 in ChromeMain+0x4e7c20 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x4e8c20)\n #26 0xf756097 in GetHandleVerifier+0xd7ff7 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x5c6097)\n #27 0xf6764e6 in ChromeMain+0x4e54e6 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x4e64e6)\n #28 0xf75678f in GetHandleVerifier+0xd86ef (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x5c678f)\n #29 0xf675948 in ChromeMain+0x4e4948 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x4e5948)\n #30 0x16573897 in ovly_debug_event+0x54a91c7 (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x73e3897)\n #31 0xf57505f in ChromeMain+0x3e405f (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x3e505f)\n #32 0xf576e4c in ChromeMain+0x3e5e4c (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x3e6e4c)\n #33 0xf574c1b in ChromeMain+0x3e3c1b (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x3e4c1b)\n #34 0xf19113f in ChromeMain+0x13f (C:\\clusterfuzz\\bot\\builds\\chrome-test-builds_media_win32-release\\revisions\\asan-win32-release-335593\\chrome_child.dll+0x113f)\n #35 0x11d976c in MainDllLoader::Launch chrome/app/client_util.cc:252\n #36 0x11d310d in main chrome/app/chrome_exe_main_win.cc:157\n #37 0x1384f0a in __tmainCRTStartup f:\\dd\\vctools\\crt\\crtw32\\startup\\crt0.c:255\n #38 0x76a23379 in BaseThreadInitThunk+0x11 (C:\\Windows\\syswow64\\kernel32.dll+0x13379)\n #39 0x77a692b1 in RtlInitializeExceptionChain+0x62 (C:\\Windows\\SysWOW64\\ntdll.dll+0x392b1)\n #40 0x77a69284 in RtlInitializeExceptionChain+0x35 (C:\\Windows\\SysWOW64\\ntdll.dll+0x39284)",
"sanitizer": "AddressSanitizer",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
---
source: stacktrace-parser/src/lib.rs
expression: parsed
input_file: libclusterfuzz/data/stack-traces/android_asan_null_dereference_read.txt
---
{
"text": "==13931==ERROR: AddressSanitizer: SEGV on unknown address 0x00000011 (pc 0xb2011bf5 bp 0xaee0e750 sp 0xaebff7b0 T8)\n==13931==The signal is caused by a READ memory access.\n==13931==Hint: address points to the zero page.\n#0 0xb2011bf4 in _JavaVM::AttachCurrentThread(_JNIEnv**, void*) libnativehelper/include/nativehelper/jni.h:1060\n#1 0xb2011bf4 in javaAttachThread frameworks/base/core/jni/AndroidRuntime.cpp:1131\n#2 0xb2011bf4 in android::AndroidRuntime::javaThreadShell(void*) frameworks/base/core/jni/AndroidRuntime.cpp:1169\n#3 0xb1e188a9 in thread_data_t::trampoline(thread_data_t const*) system/core/libutils/Threads.cpp:99:16\n#4 0xb2370d0c in __asan::AsanThread::ThreadStart(unsigned long, __sanitizer::atomic_uintptr_t*)\n#5 0xb23550f9 in asan_thread_start(void*)\n#6 0xb1ec8404 in __pthread_start(void*) bionic/libc/bionic/pthread_create.cpp:198:18\n#7 0xb1e73610 in __start_thread bionic/libc/bionic/clone.cpp:41:16\n#8 0xb1e713c6 in __bionic_clone bionic/libc/arch-x86/bionic/__bionic_clone.S:54\nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: SEGV (/system/lib/libandroid_runtime.so+0x71bf4)\nThread T8 (Binder:13931_2) created by T7 (Binder:13931_1) here:\n#0 0xb2354f89 in pthread_create\n#1 0xb1e18714 in androidCreateRawThreadEtc system/core/libutils/Threads.cpp:160:18\n#2 0xb2011cfd in android::AndroidRuntime::javaCreateThreadEtc(int (*)(void*), void*, char const*, int, unsigned int, void**) frameworks/base/core/jni/AndroidRuntime.cpp:1207\n#3 0xb183b361 in android::ProcessState::spawnPooledThread(bool) frameworks/native/libs/binder/ProcessState.cpp:293:9\n#4 0xb1814fc9 in android::IPCThreadState::executeCommand(int) frameworks/native/libs/binder/IPCThreadState.cpp:1169:9\n#5 0xb1814a7e in android::IPCThreadState::getAndExecuteCommand() frameworks/native/libs/binder/IPCThreadState.cpp:445:18\n#6 0xb18152bf in android::IPCThreadState::joinThreadPool(bool) frameworks/native/libs/binder/IPCThreadState.cpp:513:18\n#7 0xb183c12e in android::PoolThread::threadLoop() frameworks/native/libs/binder/ProcessState.cpp:63:9\n#8 0xb1e190d9 in android::Thread::_threadLoop(void*) system/core/libutils/Threads.cpp:751:26\n#9 0xb2011c00 in android::AndroidRuntime::javaThreadShell(void*) frameworks/base/core/jni/AndroidRuntime.cpp:1173\nThread T7 (Binder:13931_1) created by T0 (Shutdown thread) here:\n#0 0xb2354f89 in pthread_create\n#1 0xb1e18714 in androidCreateRawThreadEtc system/core/libutils/Threads.cpp:160:18\n#2 0xb2011cfd in android::AndroidRuntime::javaCreateThreadEtc(int (*)(void*), void*, char const*, int, unsigned int, void**) frameworks/base/core/jni/AndroidRuntime.cpp:1207\n#3 0xb183b361 in android::ProcessState::spawnPooledThread(bool) frameworks/native/libs/binder/ProcessState.cpp:293:9\n#4 0xb183b253 in android::ProcessState::startThreadPool() frameworks/native/libs/binder/ProcessState.cpp:137:9\n#5 0xb5611f7f in android::AppRuntime::onStarted() frameworks/base/cmds/app_process/app_main.cpp:83:9\n",
"sanitizer": "AddressSanitizer",
Expand Down
Loading