1 /*
2  * Copyright (C) 2012 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "kernel_collector_test.h"
18 
19 #include <unistd.h>
20 
21 #include <base/files/file_util.h>
22 #include <base/files/scoped_temp_dir.h>
23 #include <base/strings/string_util.h>
24 #include <base/strings/stringprintf.h>
25 #include <brillo/syslog_logging.h>
26 #include <gtest/gtest.h>
27 
28 using base::FilePath;
29 using base::StringPrintf;
30 using brillo::FindLog;
31 using brillo::GetLog;
32 
33 namespace {
34 
35 int s_crashes = 0;
36 bool s_metrics = false;
37 
CountCrash()38 void CountCrash() {
39   ++s_crashes;
40 }
41 
IsMetrics()42 bool IsMetrics() {
43   return s_metrics;
44 }
45 
46 }  // namespace
47 
48 class KernelCollectorTest : public ::testing::Test {
49  protected:
WriteStringToFile(const FilePath & file_path,const char * data)50   void WriteStringToFile(const FilePath &file_path,
51                          const char *data) {
52     ASSERT_EQ(strlen(data), base::WriteFile(file_path, data, strlen(data)));
53   }
54 
55   void SetUpSuccessfulCollect();
56   void ComputeKernelStackSignatureCommon();
57 
kcrash_file() const58   const FilePath &kcrash_file() const { return test_kcrash_; }
test_crash_directory() const59   const FilePath &test_crash_directory() const { return test_crash_directory_; }
60 
61   KernelCollectorMock collector_;
62 
63  private:
SetUp()64   void SetUp() override {
65     s_crashes = 0;
66     s_metrics = true;
67 
68     EXPECT_CALL(collector_, SetUpDBus()).WillRepeatedly(testing::Return());
69 
70     collector_.Initialize(CountCrash, IsMetrics);
71     ASSERT_TRUE(scoped_temp_dir_.CreateUniqueTempDir());
72     test_kcrash_ = scoped_temp_dir_.path().Append("kcrash");
73     ASSERT_TRUE(base::CreateDirectory(test_kcrash_));
74     collector_.OverridePreservedDumpPath(test_kcrash_);
75 
76     test_kcrash_ = test_kcrash_.Append("dmesg-ramoops-0");
77     ASSERT_FALSE(base::PathExists(test_kcrash_));
78 
79     test_crash_directory_ = scoped_temp_dir_.path().Append("crash_directory");
80     ASSERT_TRUE(base::CreateDirectory(test_crash_directory_));
81     brillo::ClearLog();
82   }
83 
84   FilePath test_kcrash_;
85   FilePath test_crash_directory_;
86   base::ScopedTempDir scoped_temp_dir_;
87 };
88 
TEST_F(KernelCollectorTest,ComputeKernelStackSignatureBase)89 TEST_F(KernelCollectorTest, ComputeKernelStackSignatureBase) {
90   // Make sure the normal build architecture is detected
91   EXPECT_NE(KernelCollector::kArchUnknown, collector_.arch());
92 }
93 
TEST_F(KernelCollectorTest,LoadPreservedDump)94 TEST_F(KernelCollectorTest, LoadPreservedDump) {
95   ASSERT_FALSE(base::PathExists(kcrash_file()));
96   std::string dump;
97   dump.clear();
98 
99   WriteStringToFile(kcrash_file(),
100       "CrashRecordWithoutRamoopsHeader\n<6>[    0.078852]");
101   ASSERT_TRUE(collector_.LoadParameters());
102   ASSERT_TRUE(collector_.LoadPreservedDump(&dump));
103   ASSERT_EQ("CrashRecordWithoutRamoopsHeader\n<6>[    0.078852]", dump);
104 
105   WriteStringToFile(kcrash_file(), "====1.1\nsomething");
106   ASSERT_TRUE(collector_.LoadParameters());
107   ASSERT_TRUE(collector_.LoadPreservedDump(&dump));
108   ASSERT_EQ("something", dump);
109 
110   WriteStringToFile(kcrash_file(), "\x01\x02\xfe\xff random blob");
111   ASSERT_TRUE(collector_.LoadParameters());
112   ASSERT_FALSE(collector_.LoadPreservedDump(&dump));
113   ASSERT_EQ("", dump);
114 }
115 
TEST_F(KernelCollectorTest,EnableMissingKernel)116 TEST_F(KernelCollectorTest, EnableMissingKernel) {
117   ASSERT_FALSE(collector_.Enable());
118   ASSERT_FALSE(collector_.is_enabled());
119   ASSERT_TRUE(FindLog(
120       "Kernel does not support crash dumping"));
121   ASSERT_EQ(s_crashes, 0);
122 }
123 
TEST_F(KernelCollectorTest,EnableOK)124 TEST_F(KernelCollectorTest, EnableOK) {
125   WriteStringToFile(kcrash_file(), "");
126   EXPECT_CALL(collector_, DumpDirMounted()).WillOnce(::testing::Return(true));
127   ASSERT_TRUE(collector_.Enable());
128   ASSERT_TRUE(collector_.is_enabled());
129   ASSERT_TRUE(FindLog("Enabling kernel crash handling"));
130   ASSERT_EQ(s_crashes, 0);
131 }
132 
TEST_F(KernelCollectorTest,StripSensitiveDataBasic)133 TEST_F(KernelCollectorTest, StripSensitiveDataBasic) {
134   // Basic tests of StripSensitiveData...
135 
136   // Make sure we work OK with a string w/ no MAC addresses.
137   const std::string kCrashWithNoMacsOrig =
138       "<7>[111566.131728] PM: Entering mem sleep\n";
139   std::string crash_with_no_macs(kCrashWithNoMacsOrig);
140   collector_.StripSensitiveData(&crash_with_no_macs);
141   EXPECT_EQ(kCrashWithNoMacsOrig, crash_with_no_macs);
142 
143   // Make sure that we handle the case where there's nothing before/after the
144   // MAC address.
145   const std::string kJustAMacOrig =
146       "11:22:33:44:55:66";
147   const std::string kJustAMacStripped =
148       "00:00:00:00:00:01";
149   std::string just_a_mac(kJustAMacOrig);
150   collector_.StripSensitiveData(&just_a_mac);
151   EXPECT_EQ(kJustAMacStripped, just_a_mac);
152 
153   // Test MAC addresses crammed together to make sure it gets both of them.
154   //
155   // I'm not sure that the code does ideal on these two test cases (they don't
156   // look like two MAC addresses to me), but since we don't see them I think
157   // it's OK to behave as shown here.
158   const std::string kCrammedMacs1Orig =
159       "11:22:33:44:55:66:11:22:33:44:55:66";
160   const std::string kCrammedMacs1Stripped =
161       "00:00:00:00:00:01:00:00:00:00:00:01";
162   std::string crammed_macs_1(kCrammedMacs1Orig);
163   collector_.StripSensitiveData(&crammed_macs_1);
164   EXPECT_EQ(kCrammedMacs1Stripped, crammed_macs_1);
165 
166   const std::string kCrammedMacs2Orig =
167       "11:22:33:44:55:6611:22:33:44:55:66";
168   const std::string kCrammedMacs2Stripped =
169       "00:00:00:00:00:0100:00:00:00:00:01";
170   std::string crammed_macs_2(kCrammedMacs2Orig);
171   collector_.StripSensitiveData(&crammed_macs_2);
172   EXPECT_EQ(kCrammedMacs2Stripped, crammed_macs_2);
173 
174   // Test case-sensitiveness (we shouldn't be case-senstive).
175   const std::string kCapsMacOrig =
176       "AA:BB:CC:DD:EE:FF";
177   const std::string kCapsMacStripped =
178       "00:00:00:00:00:01";
179   std::string caps_mac(kCapsMacOrig);
180   collector_.StripSensitiveData(&caps_mac);
181   EXPECT_EQ(kCapsMacStripped, caps_mac);
182 
183   const std::string kLowerMacOrig =
184       "aa:bb:cc:dd:ee:ff";
185   const std::string kLowerMacStripped =
186       "00:00:00:00:00:01";
187   std::string lower_mac(kLowerMacOrig);
188   collector_.StripSensitiveData(&lower_mac);
189   EXPECT_EQ(kLowerMacStripped, lower_mac);
190 }
191 
TEST_F(KernelCollectorTest,StripSensitiveDataBulk)192 TEST_F(KernelCollectorTest, StripSensitiveDataBulk) {
193   // Test calling StripSensitiveData w/ lots of MAC addresses in the "log".
194 
195   // Test that stripping code handles more than 256 unique MAC addresses, since
196   // that overflows past the last byte...
197   // We'll write up some code that generates 258 unique MAC addresses.  Sorta
198   // cheating since the code is very similar to the current code in
199   // StripSensitiveData(), but would catch if someone changed that later.
200   std::string lotsa_macs_orig;
201   std::string lotsa_macs_stripped;
202   int i;
203   for (i = 0; i < 258; i++) {
204     lotsa_macs_orig += StringPrintf(" 11:11:11:11:%02X:%02x",
205                                   (i & 0xff00) >> 8, i & 0x00ff);
206     lotsa_macs_stripped += StringPrintf(" 00:00:00:00:%02X:%02x",
207                                      ((i+1) & 0xff00) >> 8, (i+1) & 0x00ff);
208   }
209   std::string lotsa_macs(lotsa_macs_orig);
210   collector_.StripSensitiveData(&lotsa_macs);
211   EXPECT_EQ(lotsa_macs_stripped, lotsa_macs);
212 }
213 
TEST_F(KernelCollectorTest,StripSensitiveDataSample)214 TEST_F(KernelCollectorTest, StripSensitiveDataSample) {
215   // Test calling StripSensitiveData w/ some actual lines from a real crash;
216   // included two MAC addresses (though replaced them with some bogusness).
217   const std::string kCrashWithMacsOrig =
218       "<6>[111567.195339] ata1.00: ACPI cmd ef/10:03:00:00:00:a0 (SET FEATURES)"
219         " filtered out\n"
220       "<7>[108539.540144] wlan0: authenticate with 11:22:33:44:55:66 (try 1)\n"
221       "<7>[108539.554973] wlan0: associate with 11:22:33:44:55:66 (try 1)\n"
222       "<6>[110136.587583] usb0: register 'QCUSBNet2k' at usb-0000:00:1d.7-2,"
223         " QCUSBNet Ethernet Device, 99:88:77:66:55:44\n"
224       "<7>[110964.314648] wlan0: deauthenticated from 11:22:33:44:55:66"
225         " (Reason: 6)\n"
226       "<7>[110964.325057] phy0: Removed STA 11:22:33:44:55:66\n"
227       "<7>[110964.325115] phy0: Destroyed STA 11:22:33:44:55:66\n"
228       "<6>[110969.219172] usb0: register 'QCUSBNet2k' at usb-0000:00:1d.7-2,"
229         " QCUSBNet Ethernet Device, 99:88:77:66:55:44\n"
230       "<7>[111566.131728] PM: Entering mem sleep\n";
231   const std::string kCrashWithMacsStripped =
232       "<6>[111567.195339] ata1.00: ACPI cmd ef/10:03:00:00:00:a0 (SET FEATURES)"
233         " filtered out\n"
234       "<7>[108539.540144] wlan0: authenticate with 00:00:00:00:00:01 (try 1)\n"
235       "<7>[108539.554973] wlan0: associate with 00:00:00:00:00:01 (try 1)\n"
236       "<6>[110136.587583] usb0: register 'QCUSBNet2k' at usb-0000:00:1d.7-2,"
237         " QCUSBNet Ethernet Device, 00:00:00:00:00:02\n"
238       "<7>[110964.314648] wlan0: deauthenticated from 00:00:00:00:00:01"
239         " (Reason: 6)\n"
240       "<7>[110964.325057] phy0: Removed STA 00:00:00:00:00:01\n"
241       "<7>[110964.325115] phy0: Destroyed STA 00:00:00:00:00:01\n"
242       "<6>[110969.219172] usb0: register 'QCUSBNet2k' at usb-0000:00:1d.7-2,"
243         " QCUSBNet Ethernet Device, 00:00:00:00:00:02\n"
244       "<7>[111566.131728] PM: Entering mem sleep\n";
245   std::string crash_with_macs(kCrashWithMacsOrig);
246   collector_.StripSensitiveData(&crash_with_macs);
247   EXPECT_EQ(kCrashWithMacsStripped, crash_with_macs);
248 }
249 
TEST_F(KernelCollectorTest,CollectPreservedFileMissing)250 TEST_F(KernelCollectorTest, CollectPreservedFileMissing) {
251   ASSERT_FALSE(collector_.Collect());
252   ASSERT_FALSE(FindLog("Stored kcrash to "));
253   ASSERT_EQ(0, s_crashes);
254 }
255 
SetUpSuccessfulCollect()256 void KernelCollectorTest::SetUpSuccessfulCollect() {
257   collector_.ForceCrashDirectory(test_crash_directory());
258   WriteStringToFile(kcrash_file(), "====1.1\nsomething");
259   ASSERT_EQ(0, s_crashes);
260 }
261 
TEST_F(KernelCollectorTest,CollectOptedOut)262 TEST_F(KernelCollectorTest, CollectOptedOut) {
263   SetUpSuccessfulCollect();
264   s_metrics = false;
265   ASSERT_TRUE(collector_.Collect());
266   ASSERT_TRUE(FindLog("(ignoring - no consent)"));
267   ASSERT_EQ(0, s_crashes);
268 }
269 
TEST_F(KernelCollectorTest,CollectOK)270 TEST_F(KernelCollectorTest, CollectOK) {
271   SetUpSuccessfulCollect();
272   ASSERT_TRUE(collector_.Collect());
273   ASSERT_EQ(1, s_crashes);
274   ASSERT_TRUE(FindLog("(handling)"));
275   static const char kNamePrefix[] = "Stored kcrash to ";
276   std::string log = brillo::GetLog();
277   size_t pos = log.find(kNamePrefix);
278   ASSERT_NE(std::string::npos, pos)
279       << "Did not find string \"" << kNamePrefix << "\" in log: {\n"
280       << log << "}";
281   pos += strlen(kNamePrefix);
282   std::string filename = log.substr(pos, std::string::npos);
283   // Take the name up until \n
284   size_t end_pos = filename.find_first_of("\n");
285   ASSERT_NE(std::string::npos, end_pos);
286   filename = filename.substr(0, end_pos);
287   ASSERT_EQ(0, filename.find(test_crash_directory().value()));
288   ASSERT_TRUE(base::PathExists(FilePath(filename)));
289   std::string contents;
290   ASSERT_TRUE(base::ReadFileToString(FilePath(filename), &contents));
291   ASSERT_EQ("something", contents);
292 }
293 
294 // Perform tests which are common across architectures
ComputeKernelStackSignatureCommon()295 void KernelCollectorTest::ComputeKernelStackSignatureCommon() {
296   std::string signature;
297 
298   const char kStackButNoPC[] =
299       "<4>[ 6066.829029]  [<790340af>] __do_softirq+0xa6/0x143\n";
300   EXPECT_TRUE(
301       collector_.ComputeKernelStackSignature(kStackButNoPC, &signature, false));
302   EXPECT_EQ("kernel--83615F0A", signature);
303 
304   const char kMissingEverything[] =
305       "<4>[ 6066.829029]  [<790340af>] ? __do_softirq+0xa6/0x143\n";
306   EXPECT_FALSE(
307       collector_.ComputeKernelStackSignature(kMissingEverything,
308                                              &signature,
309                                              false));
310 
311   // Long message.
312   const char kTruncatedMessage[] =
313       "<0>[   87.485611] Kernel panic - not syncing: 01234567890123456789"
314           "01234567890123456789X\n";
315   EXPECT_TRUE(
316       collector_.ComputeKernelStackSignature(kTruncatedMessage,
317                                              &signature,
318                                              false));
319   EXPECT_EQ("kernel-0123456789012345678901234567890123456789-00000000",
320             signature);
321 }
322 
TEST_F(KernelCollectorTest,ComputeKernelStackSignatureARM)323 TEST_F(KernelCollectorTest, ComputeKernelStackSignatureARM) {
324   const char kBugToPanic[] =
325       "<5>[  123.412524] Modules linked in:\n"
326       "<5>[  123.412534] CPU: 0    Tainted: G        W    "
327           "(2.6.37-01030-g51cee64 #153)\n"
328       "<5>[  123.412552] PC is at write_breakme+0xd0/0x1b4\n"
329       "<5>[  123.412560] LR is at write_breakme+0xc8/0x1b4\n"
330       "<5>[  123.412569] pc : [<c0058220>]    lr : [<c005821c>]    "
331           "psr: 60000013\n"
332       "<5>[  123.412574] sp : f4e0ded8  ip : c04d104c  fp : 000e45e0\n"
333       "<5>[  123.412581] r10: 400ff000  r9 : f4e0c000  r8 : 00000004\n"
334       "<5>[  123.412589] r7 : f4e0df80  r6 : f4820c80  r5 : 00000004  "
335           "r4 : f4e0dee8\n"
336       "<5>[  123.412598] r3 : 00000000  r2 : f4e0decc  r1 : c05f88a9  "
337           "r0 : 00000039\n"
338       "<5>[  123.412608] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA "
339           "ARM  Segment user\n"
340       "<5>[  123.412617] Control: 10c53c7d  Table: 34dcc04a  DAC: 00000015\n"
341       "<0>[  123.412626] Process bash (pid: 1014, stack limit = 0xf4e0c2f8)\n"
342       "<0>[  123.412634] Stack: (0xf4e0ded8 to 0xf4e0e000)\n"
343       "<0>[  123.412641] dec0:                                              "
344           "         f4e0dee8 c0183678\n"
345       "<0>[  123.412654] dee0: 00000000 00000000 00677562 0000081f c06a6a78 "
346           "400ff000 f4e0dfb0 00000000\n"
347       "<0>[  123.412666] df00: bec7ab44 000b1719 bec7ab0c c004f498 bec7a314 "
348           "c024acc8 00000001 c018359c\n"
349       "<0>[  123.412679] df20: f4e0df34 c04d10fc f5803c80 271beb39 000e45e0 "
350           "f5803c80 c018359c c017bfe0\n"
351       "<0>[  123.412691] df40: 00000004 f4820c80 400ff000 f4e0df80 00000004 "
352           "f4e0c000 00000000 c01383e4\n"
353       "<0>[  123.412703] df60: f4820c80 400ff000 f4820c80 400ff000 00000000 "
354           "00000000 00000004 c0138578\n"
355       "<0>[  123.412715] df80: 00000000 00000000 00000004 00000000 00000004 "
356           "402f95d0 00000004 00000004\n"
357       "<0>[  123.412727] dfa0: c0054984 c00547c0 00000004 402f95d0 00000001 "
358           "400ff000 00000004 00000000\n"
359       "<0>[  123.412739] dfc0: 00000004 402f95d0 00000004 00000004 400ff000 "
360           "000c194c bec7ab58 000e45e0\n"
361       "<0>[  123.412751] dfe0: 00000000 bec7aad8 40232520 40284e9c 60000010 "
362           "00000001 00000000 00000000\n"
363       "<5>[   39.496577] Backtrace:\n"
364       "<5>[  123.412782] [<c0058220>] (__bug+0x20/0x2c) from [<c0183678>] "
365           "(write_breakme+0xdc/0x1bc)\n"
366       "<5>[  123.412798] [<c0183678>] (write_breakme+0xdc/0x1bc) from "
367           "[<c017bfe0>] (proc_reg_write+0x88/0x9c)\n";
368   std::string signature;
369 
370   collector_.set_arch(KernelCollector::kArchArm);
371   EXPECT_TRUE(
372       collector_.ComputeKernelStackSignature(kBugToPanic, &signature, false));
373   EXPECT_EQ("kernel-write_breakme-97D3E92F", signature);
374 
375   ComputeKernelStackSignatureCommon();
376 }
377 
TEST_F(KernelCollectorTest,ComputeKernelStackSignatureMIPS)378 TEST_F(KernelCollectorTest, ComputeKernelStackSignatureMIPS) {
379   const char kBugToPanic[] =
380       "<5>[ 3378.472000] lkdtm: Performing direct entry BUG\n"
381       "<5>[ 3378.476000] Kernel bug detected[#1]:\n"
382       "<5>[ 3378.484000] CPU: 0 PID: 185 Comm: dash Not tainted 3.14.0 #1\n"
383       "<5>[ 3378.488000] task: 8fed5220 ti: 8ec4a000 task.ti: 8ec4a000\n"
384       "<5>[ 3378.496000] $ 0   : 00000000 804018b8 804010f0 7785b507\n"
385       "<5>[ 3378.500000] $ 4   : 8061ab64 81204478 81205b20 00000000\n"
386       "<5>[ 3378.508000] $ 8   : 80830000 20746365 72746e65 55422079\n"
387       "<5>[ 3378.512000] $12   : 8ec4be94 000000fc 00000000 00000048\n"
388       "<5>[ 3378.520000] $16   : 00000004 8ef54000 80710000 00000002\n"
389       "<5>[ 3378.528000] $20   : 7765b6d4 00000004 7fffffff 00000002\n"
390       "<5>[ 3378.532000] $24   : 00000001 803dc0dc                  \n"
391       "<5>[ 3378.540000] $28   : 8ec4a000 8ec4be20 7775438d 804018b8\n"
392       "<5>[ 3378.544000] Hi    : 00000000\n"
393       "<5>[ 3378.548000] Lo    : 49bf8080\n"
394       "<5>[ 3378.552000] epc   : 804010f0 lkdtm_do_action+0x68/0x3f8\n"
395       "<5>[ 3378.560000]     Not tainted\n"
396       "<5>[ 3378.564000] ra    : 804018b8 direct_entry+0x110/0x154\n"
397       "<5>[ 3378.568000] Status: 3100dc03 KERNEL EXL IE \n"
398       "<5>[ 3378.572000] Cause : 10800024\n"
399       "<5>[ 3378.576000] PrId  : 0001a120 (MIPS interAptiv (multi))\n"
400       "<5>[ 3378.580000] Modules linked in: uinput cfg80211 nf_conntrack_ipv6 "
401           "nf_defrag_ipv6 ip6table_filter ip6_tables pcnet32 mii fuse "
402           "ppp_async ppp_generic slhc tun\n"
403       "<5>[ 3378.600000] Process dash (pid: 185, threadinfo=8ec4a000, "
404           "task=8fed5220, tls=77632490)\n"
405       "<5>[ 3378.608000] Stack : 00000006 ffffff9c 00000000 00000000 00000000 "
406           "00000000 8083454a 00000022\n"
407       "<5>          7765baa1 00001fee 80710000 8ef54000 8ec4bf08 00000002 "
408           "7765b6d4 00000004\n"
409       "<5>          7fffffff 00000002 7775438d 805e5158 7fffffff 00000002 "
410           "00000000 7785b507\n"
411       "<5>          806a96bc 00000004 8ef54000 8ec4bf08 00000002 804018b8 "
412           "80710000 806a98bc\n"
413       "<5>          00000002 00000020 00000004 8d515600 77756450 00000004 "
414           "8ec4bf08 802377e4\n"
415       "<5>          ...\n"
416       "<5>[ 3378.652000] Call Trace:\n"
417       "<5>[ 3378.656000] [<804010f0>] lkdtm_do_action+0x68/0x3f8\n"
418       "<5>[ 3378.660000] [<804018b8>] direct_entry+0x110/0x154\n"
419       "<5>[ 3378.664000] [<802377e4>] vfs_write+0xe0/0x1bc\n"
420       "<5>[ 3378.672000] [<80237f90>] SyS_write+0x78/0xf8\n"
421       "<5>[ 3378.676000] [<80111888>] handle_sys+0x128/0x14c\n"
422       "<5>[ 3378.680000] \n"
423       "<5>[ 3378.684000] \n"
424       "<5>Code: 3c04806b  0c1793aa  248494f0 <000c000d> 3c04806b  248494fc  "
425           "0c04cc7f  2405017a  08100514 \n"
426       "<5>[ 3378.696000] ---[ end trace 75067432f24bbc93 ]---\n";
427   std::string signature;
428 
429   collector_.set_arch(KernelCollector::kArchMips);
430   EXPECT_TRUE(
431       collector_.ComputeKernelStackSignature(kBugToPanic, &signature, false));
432   EXPECT_EQ("kernel-lkdtm_do_action-5E600A6B", signature);
433 
434   ComputeKernelStackSignatureCommon();
435 }
436 
TEST_F(KernelCollectorTest,ComputeKernelStackSignatureX86)437 TEST_F(KernelCollectorTest, ComputeKernelStackSignatureX86) {
438   const char kBugToPanic[] =
439       "<4>[ 6066.829029]  [<79039d16>] ? run_timer_softirq+0x165/0x1e6\n"
440       "<4>[ 6066.829029]  [<790340af>] ignore_old_stack+0xa6/0x143\n"
441       "<0>[ 6066.829029] EIP: [<b82d7c15>] ieee80211_stop_tx_ba_session+"
442           "0xa3/0xb5 [mac80211] SS:ESP 0068:7951febc\n"
443       "<0>[ 6066.829029] CR2: 00000000323038a7\n"
444       "<4>[ 6066.845422] ---[ end trace 12b058bb46c43500 ]---\n"
445       "<0>[ 6066.845747] Kernel panic - not syncing: Fatal exception "
446           "in interrupt\n"
447       "<0>[ 6066.846902] Call Trace:\n"
448       "<4>[ 6066.846902]  [<7937a07b>] ? printk+0x14/0x19\n"
449       "<4>[ 6066.949779]  [<79379fc1>] panic+0x3e/0xe4\n"
450       "<4>[ 6066.949971]  [<7937c5c5>] oops_end+0x73/0x81\n"
451       "<4>[ 6066.950208]  [<7901b260>] no_context+0x10d/0x117\n";
452   std::string signature;
453 
454   collector_.set_arch(KernelCollector::kArchX86);
455   EXPECT_TRUE(
456       collector_.ComputeKernelStackSignature(kBugToPanic, &signature, false));
457   EXPECT_EQ("kernel-ieee80211_stop_tx_ba_session-DE253569", signature);
458 
459   const char kPCButNoStack[] =
460       "<0>[ 6066.829029] EIP: [<b82d7c15>] ieee80211_stop_tx_ba_session+";
461   EXPECT_TRUE(
462       collector_.ComputeKernelStackSignature(kPCButNoStack, &signature, false));
463   EXPECT_EQ("kernel-ieee80211_stop_tx_ba_session-00000000", signature);
464 
465   const char kBreakmeBug[] =
466       "<4>[  180.492137]  [<790970c6>] ? handle_mm_fault+0x67f/0x96d\n"
467       "<4>[  180.492137]  [<790dcdfe>] ? proc_reg_write+0x5f/0x73\n"
468       "<4>[  180.492137]  [<790e2224>] ? write_breakme+0x0/0x108\n"
469       "<4>[  180.492137]  [<790dcd9f>] ? proc_reg_write+0x0/0x73\n"
470       "<4>[  180.492137]  [<790ac0aa>] vfs_write+0x85/0xe4\n"
471       "<0>[  180.492137] Code: c6 44 05 b2 00 89 d8 e8 0c ef 09 00 85 c0 75 "
472       "0b c7 00 00 00 00 00 e9 8e 00 00 00 ba e6 75 4b 79 89 d8 e8 f1 ee 09 "
473       "00 85 c0 75 04 <0f> 0b eb fe ba 58 47 49 79 89 d8 e8 dd ee 09 00 85 "
474       "c0 75 0a 68\n"
475       "<0>[  180.492137] EIP: [<790e22a4>] write_breakme+0x80/0x108 SS:ESP "
476           "0068:aa3e9efc\n"
477       "<4>[  180.501800] ---[ end trace 2a6b72965e1b1523 ]---\n"
478       "<0>[  180.502026] Kernel panic - not syncing: Fatal exception\n"
479       "<4>[  180.502026] Call Trace:\n"
480       "<4>[  180.502806]  [<79379aba>] ? printk+0x14/0x1a\n"
481       "<4>[  180.503033]  [<79379a00>] panic+0x3e/0xe4\n"
482       "<4>[  180.503287]  [<7937c005>] oops_end+0x73/0x81\n"
483       "<4>[  180.503520]  [<790055dd>] die+0x58/0x5e\n"
484       "<4>[  180.503538]  [<7937b96c>] do_trap+0x8e/0xa7\n"
485       "<4>[  180.503555]  [<79003d70>] ? do_invalid_op+0x0/0x80\n";
486 
487   EXPECT_TRUE(
488       collector_.ComputeKernelStackSignature(kBreakmeBug, &signature, false));
489   EXPECT_EQ("kernel-write_breakme-122AB3CD", signature);
490 
491   const char kPCLineTooOld[] =
492       "<4>[  174.492137]  [<790970c6>] ignored_function+0x67f/0x96d\n"
493       "<4>[  175.492137]  [<790970c6>] ignored_function2+0x67f/0x96d\n"
494       "<0>[  174.492137] EIP: [<790e22a4>] write_breakme+0x80/0x108 SS:ESP "
495           "0068:aa3e9efc\n"
496       "<4>[  180.501800] ---[ end trace 2a6b72965e1b1523 ]---\n"
497       "<4>[  180.502026] Call Trace:\n"
498       "<0>[  180.502026] Kernel panic - not syncing: Fatal exception\n"
499       "<4>[  180.502806]  [<79379aba>] printk+0x14/0x1a\n";
500 
501   EXPECT_TRUE(
502       collector_.ComputeKernelStackSignature(kPCLineTooOld, &signature, false));
503   EXPECT_EQ("kernel-Fatal exception-ED4C84FE", signature);
504 
505   // Panic without EIP line.
506   const char kExamplePanicOnly[] =
507       "<0>[   87.485611] Kernel panic - not syncing: Testing panic\n"
508       "<4>[   87.485630] Pid: 2825, comm: bash Tainted: G         "
509           "C 2.6.32.23+drm33.10 #1\n"
510       "<4>[   87.485639] Call Trace:\n"
511       "<4>[   87.485660]  [<8133f71d>] ? printk+0x14/0x17\n"
512       "<4>[   87.485674]  [<8133f663>] panic+0x3e/0xe4\n"
513       "<4>[   87.485689]  [<810d062e>] write_breakme+0xaa/0x124\n";
514   EXPECT_TRUE(
515       collector_.ComputeKernelStackSignature(kExamplePanicOnly,
516                                              &signature,
517                                              false));
518   EXPECT_EQ("kernel-Testing panic-E0FC3552", signature);
519 
520   // Panic from hung task.
521   const char kHungTaskBreakMe[] =
522       "<3>[  720.459157] INFO: task bash:2287 blocked blah blah\n"
523       "<5>[  720.459282] Call Trace:\n"
524       "<5>[  720.459307]  [<810a457b>] ? __dentry_open+0x186/0x23e\n"
525       "<5>[  720.459323]  [<810b9c71>] ? mntput_no_expire+0x29/0xe2\n"
526       "<5>[  720.459336]  [<810b9d48>] ? mntput+0x1e/0x20\n"
527       "<5>[  720.459350]  [<810ad135>] ? path_put+0x1a/0x1d\n"
528       "<5>[  720.459366]  [<8137cacc>] schedule+0x4d/0x4f\n"
529       "<5>[  720.459379]  [<8137ccfb>] schedule_timeout+0x26/0xaf\n"
530       "<5>[  720.459394]  [<8102127e>] ? should_resched+0xd/0x27\n"
531       "<5>[  720.459409]  [<81174d1f>] ? _copy_from_user+0x3c/0x50\n"
532       "<5>[  720.459423]  [<8137cd9e>] "
533       "schedule_timeout_uninterruptible+0x1a/0x1c\n"
534       "<5>[  720.459438]  [<810dee63>] write_breakme+0xb3/0x178\n"
535       "<5>[  720.459453]  [<810dedb0>] ? meminfo_proc_show+0x2f2/0x2f2\n"
536       "<5>[  720.459467]  [<810d94ae>] proc_reg_write+0x6d/0x87\n"
537       "<5>[  720.459481]  [<810d9441>] ? proc_reg_poll+0x76/0x76\n"
538       "<5>[  720.459493]  [<810a5e9e>] vfs_write+0x79/0xa5\n"
539       "<5>[  720.459505]  [<810a6011>] sys_write+0x40/0x65\n"
540       "<5>[  720.459519]  [<8137e677>] sysenter_do_call+0x12/0x26\n"
541       "<0>[  720.459530] Kernel panic - not syncing: hung_task: blocked tasks\n"
542       "<5>[  720.459768] Pid: 31, comm: khungtaskd Tainted: "
543       "G         C  3.0.8 #1\n"
544       "<5>[  720.459998] Call Trace:\n"
545       "<5>[  720.460140]  [<81378a35>] panic+0x53/0x14a\n"
546       "<5>[  720.460312]  [<8105f875>] watchdog+0x15b/0x1a0\n"
547       "<5>[  720.460495]  [<8105f71a>] ? hung_task_panic+0x16/0x16\n"
548       "<5>[  720.460693]  [<81043af3>] kthread+0x67/0x6c\n"
549       "<5>[  720.460862]  [<81043a8c>] ? __init_kthread_worker+0x2d/0x2d\n"
550       "<5>[  720.461106]  [<8137eb9e>] kernel_thread_helper+0x6/0x10\n";
551 
552   EXPECT_TRUE(
553       collector_.ComputeKernelStackSignature(kHungTaskBreakMe,
554                                              &signature,
555                                              false));
556 
557   EXPECT_EQ("kernel-(HANG)-hung_task: blocked tasks-600B37EA", signature);
558 
559   // Panic with all question marks in the last stack trace.
560   const char kUncertainStackTrace[] =
561       "<0>[56279.689669] ------------[ cut here ]------------\n"
562       "<2>[56279.689677] kernel BUG at /build/x86-alex/tmp/portage/"
563       "sys-kernel/chromeos-kernel-0.0.1-r516/work/chromeos-kernel-0.0.1/"
564       "kernel/timer.c:844!\n"
565       "<0>[56279.689683] invalid opcode: 0000 [#1] SMP \n"
566       "<0>[56279.689688] last sysfs file: /sys/power/state\n"
567       "<5>[56279.689692] Modules linked in: nls_iso8859_1 nls_cp437 vfat fat "
568       "gobi usbnet tsl2583(C) industrialio(C) snd_hda_codec_realtek "
569       "snd_hda_intel i2c_dev snd_hda_codec snd_hwdep qcserial snd_pcm usb_wwan "
570       "i2c_i801 snd_timer nm10_gpio snd_page_alloc rtc_cmos fuse "
571       "nf_conntrack_ipv6 nf_defrag_ipv6 uvcvideo videodev ip6table_filter "
572       "ath9k ip6_tables ipv6 mac80211 ath9k_common ath9k_hw ath cfg80211 "
573       "xt_mark\n"
574       "<5>[56279.689731] \n"
575       "<5>[56279.689738] Pid: 24607, comm: powerd_suspend Tainted: G        "
576       "WC  2.6.38.3+ #1 SAMSUNG ELECTRONICS CO., LTD. Alex/G100          \n"
577       "<5>[56279.689748] EIP: 0060:[<8103e3ea>] EFLAGS: 00210286 CPU: 3\n"
578       "<5>[56279.689758] EIP is at add_timer+0xd/0x1b\n"
579       "<5>[56279.689762] EAX: f5e00684 EBX: f5e003c0 ECX: 00000002 EDX: "
580       "00200246\n"
581       "<5>[56279.689767] ESI: f5e003c0 EDI: d28bc03c EBP: d2be5e40 ESP: "
582       "d2be5e40\n"
583       "<5>[56279.689772]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068\n"
584       "<0>[56279.689778] Process powerd_suspend (pid: 24607, ti=d2be4000 "
585       "task=f5dc9b60 task.ti=d2be4000)\n"
586       "<0>[56279.689782] Stack:\n"
587       "<5>[56279.689785]  d2be5e4c f8dccced f4ac02c0 d2be5e70 f8ddc752 "
588       "f5e003c0 f4ac0458 f4ac092c\n"
589       "<5>[56279.689797]  f4ac043c f4ac02c0 f4ac0000 f4ac007c d2be5e7c "
590       "f8dd4a33 f4ac0164 d2be5e94\n"
591       "<5>[56279.689809]  f87e0304 f69ff0cc f4ac0164 f87e02a4 f4ac0164 "
592       "d2be5eb0 81248968 00000000\n"
593       "<0>[56279.689821] Call Trace:\n"
594       "<5>[56279.689840]  [<f8dccced>] ieee80211_sta_restart+0x25/0x8c "
595       "[mac80211]\n"
596       "<5>[56279.689854]  [<f8ddc752>] ieee80211_reconfig+0x2e9/0x339 "
597       "[mac80211]\n"
598       "<5>[56279.689869]  [<f8dd4a33>] ieee80211_aes_cmac+0x182d/0x184e "
599       "[mac80211]\n"
600       "<5>[56279.689883]  [<f87e0304>] cfg80211_get_dev_from_info+0x29b/0x2c0 "
601       "[cfg80211]\n"
602       "<5>[56279.689895]  [<f87e02a4>] ? "
603       "cfg80211_get_dev_from_info+0x23b/0x2c0 [cfg80211]\n"
604       "<5>[56279.689904]  [<81248968>] legacy_resume+0x25/0x5d\n"
605       "<5>[56279.689910]  [<812490ae>] device_resume+0xdd/0x110\n"
606       "<5>[56279.689917]  [<812491c2>] dpm_resume_end+0xe1/0x271\n"
607       "<5>[56279.689925]  [<81060481>] suspend_devices_and_enter+0x18b/0x1de\n"
608       "<5>[56279.689932]  [<810605ba>] enter_state+0xe6/0x132\n"
609       "<5>[56279.689939]  [<8105fd4b>] state_store+0x91/0x9d\n"
610       "<5>[56279.689945]  [<8105fcba>] ? state_store+0x0/0x9d\n"
611       "<5>[56279.689953]  [<81178fb1>] kobj_attr_store+0x16/0x22\n"
612       "<5>[56279.689961]  [<810eea5e>] sysfs_write_file+0xc1/0xec\n"
613       "<5>[56279.689969]  [<810af443>] vfs_write+0x8f/0x101\n"
614       "<5>[56279.689975]  [<810ee99d>] ? sysfs_write_file+0x0/0xec\n"
615       "<5>[56279.689982]  [<810af556>] sys_write+0x40/0x65\n"
616       "<5>[56279.689989]  [<81002d57>] sysenter_do_call+0x12/0x26\n"
617       "<0>[56279.689993] Code: c1 d3 e2 4a 89 55 f4 f7 d2 21 f2 6a 00 31 c9 89 "
618       "d8 e8 6e fd ff ff 5a 8d 65 f8 5b 5e 5d c3 55 89 e5 3e 8d 74 26 00 83 38 "
619       "00 74 04 <0f> 0b eb fe 8b 50 08 e8 6f ff ff ff 5d c3 55 89 e5 3e 8d 74 "
620       "26 \n"
621       "<0>[56279.690009] EIP: [<8103e3ea>] add_timer+0xd/0x1b SS:ESP "
622       "0068:d2be5e40\n"
623       "<4>[56279.690113] ---[ end trace b71141bb67c6032a ]---\n"
624       "<7>[56279.694069] wlan0: deauthenticated from 00:00:00:00:00:01 "
625       "(Reason: 6)\n"
626       "<0>[56279.703465] Kernel panic - not syncing: Fatal exception\n"
627       "<5>[56279.703471] Pid: 24607, comm: powerd_suspend Tainted: G      D "
628       "WC  2.6.38.3+ #1\n"
629       "<5>[56279.703475] Call Trace:\n"
630       "<5>[56279.703483]  [<8136648c>] ? panic+0x55/0x152\n"
631       "<5>[56279.703491]  [<810057fa>] ? oops_end+0x73/0x81\n"
632       "<5>[56279.703497]  [<81005a44>] ? die+0xed/0xf5\n"
633       "<5>[56279.703503]  [<810033cb>] ? do_trap+0x7a/0x80\n"
634       "<5>[56279.703509]  [<8100369b>] ? do_invalid_op+0x0/0x80\n"
635       "<5>[56279.703515]  [<81003711>] ? do_invalid_op+0x76/0x80\n"
636       "<5>[56279.703522]  [<8103e3ea>] ? add_timer+0xd/0x1b\n"
637       "<5>[56279.703529]  [<81025e23>] ? check_preempt_curr+0x2e/0x69\n"
638       "<5>[56279.703536]  [<8102ef28>] ? ttwu_post_activation+0x5a/0x11b\n"
639       "<5>[56279.703543]  [<8102fa8d>] ? try_to_wake_up+0x213/0x21d\n"
640       "<5>[56279.703550]  [<81368b7f>] ? error_code+0x67/0x6c\n"
641       "<5>[56279.703557]  [<8103e3ea>] ? add_timer+0xd/0x1b\n"
642       "<5>[56279.703577]  [<f8dccced>] ? ieee80211_sta_restart+0x25/0x8c "
643       "[mac80211]\n"
644       "<5>[56279.703591]  [<f8ddc752>] ? ieee80211_reconfig+0x2e9/0x339 "
645       "[mac80211]\n"
646       "<5>[56279.703605]  [<f8dd4a33>] ? ieee80211_aes_cmac+0x182d/0x184e "
647       "[mac80211]\n"
648       "<5>[56279.703618]  [<f87e0304>] ? "
649       "cfg80211_get_dev_from_info+0x29b/0x2c0 [cfg80211]\n"
650       "<5>[56279.703630]  [<f87e02a4>] ? "
651       "cfg80211_get_dev_from_info+0x23b/0x2c0 [cfg80211]\n"
652       "<5>[56279.703637]  [<81248968>] ? legacy_resume+0x25/0x5d\n"
653       "<5>[56279.703643]  [<812490ae>] ? device_resume+0xdd/0x110\n"
654       "<5>[56279.703649]  [<812491c2>] ? dpm_resume_end+0xe1/0x271\n"
655       "<5>[56279.703657]  [<81060481>] ? "
656       "suspend_devices_and_enter+0x18b/0x1de\n"
657       "<5>[56279.703663]  [<810605ba>] ? enter_state+0xe6/0x132\n"
658       "<5>[56279.703670]  [<8105fd4b>] ? state_store+0x91/0x9d\n"
659       "<5>[56279.703676]  [<8105fcba>] ? state_store+0x0/0x9d\n"
660       "<5>[56279.703683]  [<81178fb1>] ? kobj_attr_store+0x16/0x22\n"
661       "<5>[56279.703690]  [<810eea5e>] ? sysfs_write_file+0xc1/0xec\n"
662       "<5>[56279.703697]  [<810af443>] ? vfs_write+0x8f/0x101\n"
663       "<5>[56279.703703]  [<810ee99d>] ? sysfs_write_file+0x0/0xec\n"
664       "<5>[56279.703709]  [<810af556>] ? sys_write+0x40/0x65\n"
665       "<5>[56279.703716]  [<81002d57>] ? sysenter_do_call+0x12/0x26\n";
666 
667   EXPECT_TRUE(
668       collector_.ComputeKernelStackSignature(kUncertainStackTrace,
669                                              &signature,
670                                              false));
671   // The first trace contains only uncertain entries and its hash is 00000000,
672   // so, if we used that, the signature would be kernel-add_timer-00000000.
673   // Instead we use the second-to-last trace for the hash.
674   EXPECT_EQ("kernel-add_timer-B5178878", signature);
675 
676   ComputeKernelStackSignatureCommon();
677 }
678