git: 5b42ac2914b5 - main - stress2: Added two syzkaller reproducers
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 21 Sep 2022 05:42:35 UTC
The branch main has been updated by pho: URL: https://cgit.FreeBSD.org/src/commit/?id=5b42ac2914b5585808699c187293059b0a76313e commit 5b42ac2914b5585808699c187293059b0a76313e Author: Peter Holm <pho@FreeBSD.org> AuthorDate: 2022-09-21 05:40:47 +0000 Commit: Peter Holm <pho@FreeBSD.org> CommitDate: 2022-09-21 05:40:47 +0000 stress2: Added two syzkaller reproducers --- tools/test/stress2/misc/syzkaller61.sh | 319 +++++++++++++++++++++++++++++++++ tools/test/stress2/misc/syzkaller62.sh | 83 +++++++++ 2 files changed, 402 insertions(+) diff --git a/tools/test/stress2/misc/syzkaller61.sh b/tools/test/stress2/misc/syzkaller61.sh new file mode 100755 index 000000000000..e150843dc380 --- /dev/null +++ b/tools/test/stress2/misc/syzkaller61.sh @@ -0,0 +1,319 @@ +#!/bin/sh + +# Seen: +# [root@mercat1 /usr/src/tools/test/stress2/misc]# pgrep syzkaller61 | xargs procstat -k +# PID TID COMM TDNAME KSTACK +# 13332 106396 syzkaller61 - mi_switch thread_suspend_check ast_suspend ast_handler ast doreti_ast +# 13332 560662 syzkaller61 - mi_switch sleepq_switch sleepq_catch_signals sleepq_wait_sig _sleep umtxq_sleep do_wait __umtx_op_wait_uint_private sys__umtx_op amd64_syscall fast_syscall_common +# 13332 560776 syzkaller61 - mi_switch thread_suspend_switch thread_single fork1 sys_rfork amd64_syscall fast_syscall_common +# 13662 356440 syzkaller61 - mi_switch thread_suspend_check ast_suspend ast_handler ast doreti_ast +# 13662 561098 syzkaller61 - mi_switch sleepq_switch sleepq_catch_signals sleepq_wait_sig _sleep umtxq_sleep do_wait __umtx_op_wait_uint_private sys__umtx_op amd64_syscall fast_syscall_common +# 13662 561160 syzkaller61 - mi_switch thread_suspend_switch thread_single fork1 sys_rfork amd64_syscall fast_syscall_common +# [root@mercat1 /usr/src/tools/test/stress2/misc]# + +[ `uname -p` != "amd64" ] && exit 0 + +. ../default.cfg +cat > /tmp/syzkaller61.c <<EOF +// https://syzkaller.appspot.com/bug?id=00d8ca63243899ffb67b15ec93aee4ffa2f06637 +// autogenerated by syzkaller (https://github.com/google/syzkaller) +// Reported-by: syzbot+647212368c3f32c6f13f@syzkaller.appspotmail.com + +#define _GNU_SOURCE + +#include <sys/types.h> + +#include <errno.h> +#include <pthread.h> +#include <pwd.h> +#include <setjmp.h> +#include <signal.h> +#include <stdarg.h> +#include <stdbool.h> +#include <stdint.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <sys/endian.h> +#include <sys/syscall.h> +#include <sys/wait.h> +#include <time.h> +#include <unistd.h> + +static __thread int clone_ongoing; +static __thread int skip_segv; +static __thread jmp_buf segv_env; + +static void segv_handler(int sig, siginfo_t* info, void* ctx __unused) +{ + if (__atomic_load_n(&clone_ongoing, __ATOMIC_RELAXED) != 0) { + exit(sig); + } + uintptr_t addr = (uintptr_t)info->si_addr; + const uintptr_t prog_start = 1 << 20; + const uintptr_t prog_end = 100 << 20; + int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0; + int valid = addr < prog_start || addr > prog_end; + if (sig == SIGBUS) + valid = 1; + if (skip && valid) { + _longjmp(segv_env, 1); + } + exit(sig); +} + +static void install_segv_handler(void) +{ + struct sigaction sa; + memset(&sa, 0, sizeof(sa)); + sa.sa_sigaction = segv_handler; + sa.sa_flags = SA_NODEFER | SA_SIGINFO; + sigaction(SIGSEGV, &sa, NULL); + sigaction(SIGBUS, &sa, NULL); +} + +#define NONFAILING(...) \ + ({ \ + int ok = 1; \ + __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \ + if (_setjmp(segv_env) == 0) { \ + __VA_ARGS__; \ + } else \ + ok = 0; \ + __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \ + ok; \ + }) + +static void kill_and_wait(int pid, int* status) +{ + kill(pid, SIGKILL); + while (waitpid(-1, status, 0) != pid) { + } +} + +static void sleep_ms(uint64_t ms) +{ + usleep(ms * 1000); +} + +static uint64_t current_time_ms(void) +{ + struct timespec ts; + if (clock_gettime(CLOCK_MONOTONIC, &ts)) + exit(1); + return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; +} + +static void thread_start(void* (*fn)(void*), void* arg) +{ + pthread_t th; + pthread_attr_t attr; + pthread_attr_init(&attr); + pthread_attr_setstacksize(&attr, 128 << 10); + int i = 0; + for (; i < 100; i++) { + if (pthread_create(&th, &attr, fn, arg) == 0) { + pthread_attr_destroy(&attr); + return; + } + if (errno == EAGAIN) { + usleep(50); + continue; + } + break; + } + exit(1); +} + +typedef struct { + pthread_mutex_t mu; + pthread_cond_t cv; + int state; +} event_t; + +static void event_init(event_t* ev) +{ + if (pthread_mutex_init(&ev->mu, 0)) + exit(1); + if (pthread_cond_init(&ev->cv, 0)) + exit(1); + ev->state = 0; +} + +static void event_reset(event_t* ev) +{ + ev->state = 0; +} + +static void event_set(event_t* ev) +{ + pthread_mutex_lock(&ev->mu); + if (ev->state) + exit(1); + ev->state = 1; + pthread_mutex_unlock(&ev->mu); + pthread_cond_broadcast(&ev->cv); +} + +static void event_wait(event_t* ev) +{ + pthread_mutex_lock(&ev->mu); + while (!ev->state) + pthread_cond_wait(&ev->cv, &ev->mu); + pthread_mutex_unlock(&ev->mu); +} + +static int event_isset(event_t* ev) +{ + pthread_mutex_lock(&ev->mu); + int res = ev->state; + pthread_mutex_unlock(&ev->mu); + return res; +} + +static int event_timedwait(event_t* ev, uint64_t timeout) +{ + uint64_t start = current_time_ms(); + uint64_t now = start; + pthread_mutex_lock(&ev->mu); + for (;;) { + if (ev->state) + break; + uint64_t remain = timeout - (now - start); + struct timespec ts; + ts.tv_sec = remain / 1000; + ts.tv_nsec = (remain % 1000) * 1000 * 1000; + pthread_cond_timedwait(&ev->cv, &ev->mu, &ts); + now = current_time_ms(); + if (now - start > timeout) + break; + } + int res = ev->state; + pthread_mutex_unlock(&ev->mu); + return res; +} + +struct thread_t { + int created, call; + event_t ready, done; +}; + +static struct thread_t threads[16]; +static void execute_call(int call); +static int running; + +static void* thr(void* arg) +{ + struct thread_t* th = (struct thread_t*)arg; + for (;;) { + event_wait(&th->ready); + event_reset(&th->ready); + execute_call(th->call); + __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); + event_set(&th->done); + } + return 0; +} + +static void execute_one(void) +{ + int i, call, thread; + for (call = 0; call < 2; call++) { + for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0])); + thread++) { + struct thread_t* th = &threads[thread]; + if (!th->created) { + th->created = 1; + event_init(&th->ready); + event_init(&th->done); + event_set(&th->done); + thread_start(thr, th); + } + if (!event_isset(&th->done)) + continue; + event_reset(&th->done); + th->call = call; + __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); + event_set(&th->ready); + event_timedwait(&th->done, 50); + break; + } + } + for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++) + sleep_ms(1); +} + +static void execute_one(void); + +#define WAIT_FLAGS 0 + +static void loop(void) +{ + int iter = 0; + for (;; iter++) { + int pid = fork(); + if (pid < 0) + exit(1); + if (pid == 0) { + execute_one(); + exit(0); + } + int status = 0; + uint64_t start = current_time_ms(); + for (;;) { + if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) + break; + sleep_ms(1); + if (current_time_ms() - start < 5000) + continue; + kill_and_wait(pid, &status); + break; + } + } +} + +void execute_call(int call) +{ + switch (call) { + case 0: + NONFAILING(*(uint32_t*)0x20001f00 = 0x16); + NONFAILING(*(uint32_t*)0x20001f04 = 0); + NONFAILING(*(uint32_t*)0x20001f08 = 0); + NONFAILING(*(uint32_t*)0x20001f0c = 0); + NONFAILING(*(uint32_t*)0x20001f10 = 0); + NONFAILING(memset((void*)0x20001f14, 0, 60)); + syscall(SYS_procctl, 0ul, 0, 6ul, 0x20001f00ul); + break; + case 1: + syscall(SYS_rfork, 0x85000ul); + break; + } +} +int main(void) +{ + syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x1012ul, -1, 0ul); + install_segv_handler(); + loop(); + return 0; +} +EOF +mycc -o /tmp/syzkaller61 -Wall -Wextra -O0 /tmp/syzkaller61.c -lpthread || + exit 1 + +(cd ../testcases/swap; ./swap -t 3m -i 10 -l 100 > /dev/null 2>&1) & +for i in `jot 300`; do + (cd /tmp; timeout -k 3s 2s ./syzkaller61) & + pids="$pids $!" +done +sleep 5 +pkill -9 syzkaller61 swap; sleep 1 +pgrep -q syzkaller61 && { pgrep syzkaller61 | xargs ps -lHp; exit 1; } +for pid in $pids; do + wait $pid +done +while pkill swap; do :; done +wait + +rm -rf /tmp/syzkaller61 /tmp/syzkaller61.c /tmp/syzkaller61.core \ + /tmp/syzkaller.?????? +exit 0 diff --git a/tools/test/stress2/misc/syzkaller62.sh b/tools/test/stress2/misc/syzkaller62.sh new file mode 100755 index 000000000000..aa2d33ebaf9e --- /dev/null +++ b/tools/test/stress2/misc/syzkaller62.sh @@ -0,0 +1,83 @@ +#!/bin/sh + +# panic: Assertion sb->sb_hiwat >= sb->uxdg_cc failed at ../../../kern/uipc_usrreq.c:1099 +# cpuid = 9 +# time = 1660909804 +# KDB: stack backtrace: +# db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe01401e7970 +# vpanic() at vpanic+0x151/frame 0xfffffe01401e79c0 +# panic() at panic+0x43/frame 0xfffffe01401e7a20 +# uipc_dgram_sbspace() at uipc_dgram_sbspace+0x51/frame 0xfffffe01401e7a30 +# uipc_sosend_dgram() at uipc_sosend_dgram+0x690/frame 0xfffffe01401e7ac0 +# sosend() at sosend+0x49/frame 0xfffffe01401e7af0 +# soo_write() at soo_write+0x43/frame 0xfffffe01401e7b20 +# filemon_close_log() at filemon_close_log+0xd5/frame 0xfffffe01401e7b90 +# filemon_dtr() at filemon_dtr+0x31/frame 0xfffffe01401e7bb0 +# devfs_destroy_cdevpriv() at devfs_destroy_cdevpriv+0xab/frame 0xfffffe01401e7bd0 +# devfs_close_f() at devfs_close_f+0x64/frame 0xfffffe01401e7c00 +# _fdrop() at _fdrop+0x1b/frame 0xfffffe01401e7c20 +# closef() at closef+0x1db/frame 0xfffffe01401e7cb0 +# fdescfree() at fdescfree+0x433/frame 0xfffffe01401e7d80 +# exit1() at exit1+0x4df/frame 0xfffffe01401e7df0 +# sys_exit() at sys_exit+0xd/frame 0xfffffe01401e7e00 +# amd64_syscall() at amd64_syscall+0x145/frame 0xfffffe01401e7f30 +# fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe01401e7f30 +# --- syscall (1, FreeBSD ELF64, sys_exit), rip = 0x82301d16a, rsp = 0x8209bf628, rbp = 0x8209bf640 --- +# KDB: enter: panic +# [ thread pid 2876 tid 100222 ] +# Stopped at x32: movq $0,0x12a1323(%rip) +# db> x/s version +# version: FreeBSD 14.0-CURRENT #0 main-n257506-eed634d113d-dirty: Thu Aug 18 13:56:53 CEST 2022 +# pho@mercat1.netperf.freebsd.org:/usr/src/sys/amd64/compile/PHO\012 +# db> + +. ../default.cfg +cat > /tmp/syzkaller62.c <<EOF +// https://syzkaller.appspot.com/bug?id=582310beb894769fc836748eec49b8d2f905e5ef +// autogenerated by syzkaller (https://github.com/google/syzkaller) +// Reported-by: syzbot+6e8be1ec8d77578a3df4@syzkaller.appspotmail.com + +#define _GNU_SOURCE + +#include <pwd.h> +#include <stdarg.h> +#include <stdbool.h> +#include <stdint.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <sys/endian.h> +#include <sys/syscall.h> +#include <unistd.h> + +uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff}; + +int main(void) +{ + syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x1012ul, -1, 0ul); + intptr_t res = 0; + memcpy((void*)0x20000040, "/dev/filemon\000", 13); + res = syscall(SYS_openat, 0xffffffffffffff9cul, 0x20000040ul, 0ul, 0ul); + if (res != -1) + r[0] = res; + res = syscall(SYS_socketpair, 1ul, 2ul, 0, 0x20000080ul); + if (res != -1) + r[1] = *(uint32_t*)0x20000084; + *(uint32_t*)0x200000c0 = r[1]; + syscall(SYS_ioctl, r[0], 0xc0045301ul, 0x200000c0ul); + *(uint32_t*)0x20000040 = 3; + syscall(SYS_setsockopt, r[1], 0xffff, 0x1001, 0x20000040ul, 4ul); + return 0; +} +EOF +mycc -o /tmp/syzkaller62 -Wall -Wextra -O0 /tmp/syzkaller62.c || exit 1 + +kldstat | grep -q filemon || { kldload filemon.ko && loaded=1; } + +(cd /tmp; timeout -k 3s 2s ./syzkaller62) + +rm -rf /tmp/syzkaller62 /tmp/syzkaller62.c /tmp/syzkaller62.core \ + /tmp/syzkaller.?????? +# Unload causes: Fatal trap 12: page fault while in kernel mode +#[ $loaded ] && kldunload -f filemon.ko +exit 0