From owner-svn-src-user@freebsd.org Mon Dec 7 21:04:12 2020 Return-Path: Delivered-To: svn-src-user@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B5D254B6CE6 for ; Mon, 7 Dec 2020 21:04:12 +0000 (UTC) (envelope-from 3SpfOXwsJDLcmXZhXo.hXkbdjXfi.Zljpsk-poZ-rpbocobbYpa.lod@trix.bounces.google.com) Received: from mail-qt1-x848.google.com (mail-qt1-x848.google.com [IPv6:2607:f8b0:4864:20::848]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CqbQh27MQz3rR9 for ; Mon, 7 Dec 2020 21:04:12 +0000 (UTC) (envelope-from 3SpfOXwsJDLcmXZhXo.hXkbdjXfi.Zljpsk-poZ-rpbocobbYpa.lod@trix.bounces.google.com) Received: by mail-qt1-x848.google.com with SMTP id j1so11825942qtd.13 for ; Mon, 07 Dec 2020 13:04:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:reply-to:message-id:date:subject:from:to; bh=n6F1pOi9Dk9gDWFcHO5oFfICbrnYo1lZ9L87aYKgCzU=; b=HB6Dy1DJhVK4mPGhR0tBHqJMWtZUu3zVOnKiLbTFP4HXsqlE/IgIR1WE4qzohmX7oE CfHzQzsA3a+BtFB63HLhvxtXtB0pWfdBWlJs8dWYrjH+3Xly9sRT9kTA8gkpAR86TvHt iE0QtC3I9molEGn/48YTGZTdbXF9/LA62cX8qOBsPE+NjC4f/4Vh1diRyzBumnm/4z7E YbYLASLXFb0CThjf08JI33Rn3p/NRFW0qskIKali5dQP2cQug90qf283YpHFkOG2kYQk aAkvacBAUbLEl1rSdTp57qzgxwZXyugPI8EhODu4LSxKFrEI5vGtRRVDRinboBzMNDgU dOoA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:reply-to:message-id:date:subject :from:to; bh=n6F1pOi9Dk9gDWFcHO5oFfICbrnYo1lZ9L87aYKgCzU=; b=AwhH3j2nKzQkIDvjz1QuMSzQu6w/IRlepkiOjUEYJTDTsOZAkkumsCJJgxcV/WDcvK IGTfeGvLgDBEmIEcrJyNI18p76mB8TM6Xn9EZ8fH0Prm0X0ajHjqKCv3jz2uzFO7WBb9 673tkJ+ym48OGrGm6Nmw5zp2VuJaXCj1bGC7uPsQEF8JS03kaW3veg4/Y/0rmyHVtSUV nolhiOBRmhQfJQX2WEkIR3UVcpYl5z2kDc3y0ZsqZ8ckq0068A9XiGXysyeY8s+mqnml iO7VgEyMswWuM9Dbic5+s6W6Gmi3+aebI0iarGPzILmyiMZCevaCo+Zz3W8Qv+3GQKQb eldQ== X-Gm-Message-State: AOAM530y/WTYITtGz+QSUxmvtkweD8aX4FPL71Zb4dwsCg+fZHqHIi5d bSRsjYHvkM94aBdZ9KWHQQBK+wO3RvHbdrVTMLoD MIME-Version: 1.0 X-Received: by 2002:a05:6214:4e2:: with SMTP id cl2mt6784770qvb.27.1607374666198; Mon, 07 Dec 2020 12:57:46 -0800 (PST) Reply-To: packar.kane@gmail.com X-No-Auto-Attachment: 1 Message-ID: <0000000000000014c905b5e6143d@google.com> Date: Mon, 07 Dec 2020 21:04:11 +0000 Subject: You get my email From: packar.kane@gmail.com To: svn-src-user@freebsd.org X-Rspamd-Queue-Id: 4CqbQh27MQz3rR9 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=HB6Dy1DJ; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of 3SpfOXwsJDLcmXZhXo.hXkbdjXfi.Zljpsk-poZ-rpbocobbYpa.lod@trix.bounces.google.com designates 2607:f8b0:4864:20::848 as permitted sender) smtp.mailfrom=3SpfOXwsJDLcmXZhXo.hXkbdjXfi.Zljpsk-poZ-rpbocobbYpa.lod@trix.bounces.google.com X-Spamd-Result: default: False [-3.70 / 15.00]; HAS_REPLYTO(0.00)[packar.kane@gmail.com]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36:c]; FREEMAIL_FROM(0.00)[gmail.com]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-1.00)[-1.000]; FORGED_SENDER(0.30)[packarkane@gmail.com,3SpfOXwsJDLcmXZhXo.hXkbdjXfi.Zljpsk-poZ-rpbocobbYpa.lod@trix.bounces.google.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; RBL_DBL_DONT_QUERY_IPS(0.00)[2607:f8b0:4864:20::848:from]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; FROM_NEQ_ENVFROM(0.00)[packarkane@gmail.com,3SpfOXwsJDLcmXZhXo.hXkbdjXfi.Zljpsk-poZ-rpbocobbYpa.lod@trix.bounces.google.com]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; REPLYTO_EQ_FROM(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; FREEMAIL_REPLYTO(0.00)[gmail.com]; PREVIOUSLY_DELIVERED(0.00)[svn-src-user@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; SPAMHAUS_ZRD(0.00)[2607:f8b0:4864:20::848:from:127.0.2.255]; FROM_NO_DN(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::848:from]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[svn-src-user] Content-Type: text/plain; charset="UTF-8"; format=flowed; delsp=yes X-Content-Filtered-By: Mailman/MimeDel 2.1.34 X-BeenThere: svn-src-user@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "SVN commit messages for the experimental " user" src tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Dec 2020 21:04:12 -0000 I've invited you to fill out the following form: Untitled form To fill it out, visit: https://docs.google.com/forms/d/e/1FAIpQLSfnEHD2_CNTJYIVH7sDpLJ-xXgrkXb-MenDNrMni0actgeXhQ/viewform?vc=0&c=0&w=1&flr=0&usp=mail_form_link Hello, I contacted you because I want to invest in your country,if you confirm your interest that you can handle the fund in a good investment. reply on this email only: reem.alhashimi@kakao.com Regards, Ms. Reem Al-hashimi Google Forms: Create and analyze surveys. From owner-svn-src-user@freebsd.org Wed Dec 9 09:53:22 2020 Return-Path: Delivered-To: svn-src-user@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0D2C0475E75 for ; Wed, 9 Dec 2020 09:53:22 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CrXRj70HBz4gl4; Wed, 9 Dec 2020 09:53:21 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id D8B7824425; Wed, 9 Dec 2020 09:53:21 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0B99rLjG093530; Wed, 9 Dec 2020 09:53:21 GMT (envelope-from pho@FreeBSD.org) Received: (from pho@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0B99rLXU093529; Wed, 9 Dec 2020 09:53:21 GMT (envelope-from pho@FreeBSD.org) Message-Id: <202012090953.0B99rLXU093529@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pho set sender to pho@FreeBSD.org using -f From: Peter Holm Date: Wed, 9 Dec 2020 09:53:21 +0000 (UTC) To: src-committers@freebsd.org, svn-src-user@freebsd.org Subject: svn commit: r368484 - user/pho/stress2/misc X-SVN-Group: user X-SVN-Commit-Author: pho X-SVN-Commit-Paths: user/pho/stress2/misc X-SVN-Commit-Revision: 368484 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-user@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "SVN commit messages for the experimental " user" src tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Dec 2020 09:53:22 -0000 Author: pho Date: Wed Dec 9 09:53:21 2020 New Revision: 368484 URL: https://svnweb.freebsd.org/changeset/base/368484 Log: Added a syzkaller reproducer. Added: user/pho/stress2/misc/syzkaller30.sh (contents, props changed) Added: user/pho/stress2/misc/syzkaller30.sh ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ user/pho/stress2/misc/syzkaller30.sh Wed Dec 9 09:53:21 2020 (r368484) @@ -0,0 +1,69 @@ +#!/bin/sh + +# panic: sched_pickcpu: Failed to find a cpu. +# cpuid = 1 +# time = 1607419071 +# KDB: stack backtrace: +# db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe01bb640770 +# vpanic() at vpanic+0x181/frame 0xfffffe01bb6407c0 +# panic() at panic+0x43/frame 0xfffffe01bb640820 +# sched_pickcpu() at sched_pickcpu+0x4a2/frame 0xfffffe01bb6408d0 +# sched_add() at sched_add+0x5d/frame 0xfffffe01bb640900 +# setrunnable() at setrunnable+0x77/frame 0xfffffe01bb640930 +# wakeup_one() at wakeup_one+0x1d/frame 0xfffffe01bb640950 +# do_lock_umutex() at do_lock_umutex+0x64c/frame 0xfffffe01bb640a40 +# __umtx_op_wait_umutex() at __umtx_op_wait_umutex+0x49/frame 0xfffffe01bb640a80 +# sys__umtx_op() at sys__umtx_op+0x7a/frame 0xfffffe01bb640ac0 +# amd64_syscall() at amd64_syscall+0x147/frame 0xfffffe01bb640bf0 +# fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe01bb640bf0 +# --- syscall (454, FreeBSD ELF64, sys__umtx_op), rip = 0x800254a8c, rsp = 0x7fffdf3f7e88, rbp = 0x7fffdf3f7eb0 --- +# KDB: enter: panic +# [ thread pid 58597 tid 106100 ] +# Stopped at kdb_enter+0x37: movq $0,0x10a7766(%rip) +# db> x/s version +# version: FreeBSD 13.0-CURRENT #0 r368405: Mon Dec 7 10:33:35 CET 2020 +# pho@t2.osted.lan:/usr/src/sys/amd64/compile/PHO +# db> + +# $FreeBSD$ + +[ `uname -p` != "amd64" ] && exit 0 + +# Fixed by r368462 + +. ../default.cfg +cat > /tmp/syzkaller30.c < +#include +#include +#include +#include +#include +#include +#include +#include +#include + +int main(void) +{ + syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x1012ul, -1, 0ul); + + *(uint64_t*)0x200000c0 = 0; + syscall(SYS_cpuset_setaffinity, 2ul, 2ul, 0x100000000000000ul, 0x20ul, + 0x200000c0ul); + return 0; +} +EOF +mycc -o /tmp/syzkaller30 -Wall -Wextra -O0 /tmp/syzkaller30.c || + exit 1 + +(cd /tmp; timeout 3m ./syzkaller30) + +rm -rf /tmp/syzkaller30 syzkaller30.c /tmp/syzkaller.* +exit 0 From owner-svn-src-user@freebsd.org Thu Dec 10 05:44:36 2020 Return-Path: Delivered-To: svn-src-user@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DE8CE47577B for ; Thu, 10 Dec 2020 05:44:36 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Cs2tD60cHz3CQN; Thu, 10 Dec 2020 05:44:36 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id B666D1377B; Thu, 10 Dec 2020 05:44:36 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0BA5ia68045820; Thu, 10 Dec 2020 05:44:36 GMT (envelope-from pho@FreeBSD.org) Received: (from pho@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0BA5iaXg045816; Thu, 10 Dec 2020 05:44:36 GMT (envelope-from pho@FreeBSD.org) Message-Id: <202012100544.0BA5iaXg045816@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pho set sender to pho@FreeBSD.org using -f From: Peter Holm Date: Thu, 10 Dec 2020 05:44:36 +0000 (UTC) To: src-committers@freebsd.org, svn-src-user@freebsd.org Subject: svn commit: r368496 - user/pho/stress2/misc X-SVN-Group: user X-SVN-Commit-Author: pho X-SVN-Commit-Paths: user/pho/stress2/misc X-SVN-Commit-Revision: 368496 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-user@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "SVN commit messages for the experimental " user" src tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Dec 2020 05:44:36 -0000 Author: pho Date: Thu Dec 10 05:44:35 2020 New Revision: 368496 URL: https://svnweb.freebsd.org/changeset/base/368496 Log: Added more syzkaller reproducers. Added: user/pho/stress2/misc/syzkaller23.sh (contents, props changed) user/pho/stress2/misc/syzkaller24.sh (contents, props changed) user/pho/stress2/misc/syzkaller25.sh (contents, props changed) user/pho/stress2/misc/syzkaller28.sh (contents, props changed) Added: user/pho/stress2/misc/syzkaller23.sh ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ user/pho/stress2/misc/syzkaller23.sh Thu Dec 10 05:44:35 2020 (r368496) @@ -0,0 +1,402 @@ +#!/bin/sh + +# panic: Bad link elm 0xfffff80b62eb7500 prev->next != elm +# cpuid = 2 +# time = 1598546886 +# KDB: stack backtrace: +# db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe010154a6e0 +# vpanic() at vpanic+0x182/frame 0xfffffe010154a730 +# panic() at panic+0x43/frame 0xfffffe010154a790 +# unp_disconnect() at unp_disconnect+0x279/frame 0xfffffe010154a7c0 +# uipc_disconnect() at uipc_disconnect+0xfd/frame 0xfffffe010154a800 +# soclose() at soclose+0xa2/frame 0xfffffe010154a870 +# _fdrop() at _fdrop+0x1a/frame 0xfffffe010154a890 +# closef() at closef+0x1ea/frame 0xfffffe010154a920 +# fdescfree_fds() at fdescfree_fds+0x8c/frame 0xfffffe010154a980 +# fdescfree() at fdescfree+0x3cd/frame 0xfffffe010154aa50 +# exit1() at exit1+0x487/frame 0xfffffe010154aac0 +# sys_sys_exit() at sys_sys_exit+0xd/frame 0xfffffe010154aad0 +# amd64_syscall() at amd64_syscall+0x159/frame 0xfffffe010154abf0 +# fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe010154abf0 +# --- syscall (1, FreeBSD ELF64, sys_sys_exit), rip = 0x80045376a, rsp = 0x7fffffffe4c8, rbp = 0x7fffffffe4e0 --- + +# $FreeBSD$ + +[ `uname -p` != "amd64" ] && exit 0 + +# Obtained from markj (syzkaller). + +. ../default.cfg +cat > /tmp/syzkaller23.c < + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +static __thread int skip_segv; +static __thread jmp_buf segv_env; + +static void segv_handler(int sig, siginfo_t* info, void* ctx __unused) +{ + uintptr_t addr = (uintptr_t)info->si_addr; + const uintptr_t prog_start = 1 << 20; + const uintptr_t prog_end = 100 << 20; + int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0; + int valid = addr < prog_start || addr > prog_end; + if (sig == SIGBUS) { + valid = 1; + } + if (skip && valid) { + _longjmp(segv_env, 1); + } + exit(sig); +} + +static void install_segv_handler(void) +{ + struct sigaction sa; + memset(&sa, 0, sizeof(sa)); + sa.sa_sigaction = segv_handler; + sa.sa_flags = SA_NODEFER | SA_SIGINFO; + sigaction(SIGSEGV, &sa, NULL); + sigaction(SIGBUS, &sa, NULL); +} + +#define NONFAILING(...) \ + { \ + __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \ + if (_setjmp(segv_env) == 0) { \ + __VA_ARGS__; \ + } \ + __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \ + } + +static void kill_and_wait(int pid, int* status) +{ + kill(pid, SIGKILL); + while (waitpid(-1, status, 0) != pid) { + } +} + +static void sleep_ms(uint64_t ms) +{ + usleep(ms * 1000); +} + +static uint64_t current_time_ms(void) +{ + struct timespec ts; + if (clock_gettime(CLOCK_MONOTONIC, &ts)) + exit(1); + return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; +} + +static void use_temporary_dir(void) +{ + char tmpdir_template[] = "./syzkaller.XXXXXX"; + char* tmpdir = mkdtemp(tmpdir_template); + if (!tmpdir) + exit(1); + if (chmod(tmpdir, 0777)) + exit(1); + if (chdir(tmpdir)) + exit(1); +} + +static void remove_dir(const char* dir) +{ + DIR* dp = opendir(dir); + if (dp == NULL) + exit(1); + struct dirent* ep = 0; + while ((ep = readdir(dp))) { + if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0) + continue; + char filename[FILENAME_MAX]; + snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name); + struct stat st; + if (lstat(filename, &st)) + exit(1); + if (S_ISDIR(st.st_mode)) { + remove_dir(filename); + continue; + } + if (unlink(filename)) + exit(1); + } + closedir(dp); + if (rmdir(dir)) + exit(1); +} + +static void thread_start(void* (*fn)(void*), void* arg) +{ + pthread_t th; + pthread_attr_t attr; + pthread_attr_init(&attr); + pthread_attr_setstacksize(&attr, 128 << 10); + int i = 0; + for (; i < 100; i++) { + if (pthread_create(&th, &attr, fn, arg) == 0) { + pthread_attr_destroy(&attr); + return; + } + if (errno == EAGAIN) { + usleep(50); + continue; + } + break; + } + exit(1); +} + +typedef struct { + pthread_mutex_t mu; + pthread_cond_t cv; + int state; +} event_t; + +static void event_init(event_t* ev) +{ + if (pthread_mutex_init(&ev->mu, 0)) + exit(1); + if (pthread_cond_init(&ev->cv, 0)) + exit(1); + ev->state = 0; +} + +static void event_reset(event_t* ev) +{ + ev->state = 0; +} + +static void event_set(event_t* ev) +{ + pthread_mutex_lock(&ev->mu); + if (ev->state) + exit(1); + ev->state = 1; + pthread_mutex_unlock(&ev->mu); + pthread_cond_broadcast(&ev->cv); +} + +static void event_wait(event_t* ev) +{ + pthread_mutex_lock(&ev->mu); + while (!ev->state) + pthread_cond_wait(&ev->cv, &ev->mu); + pthread_mutex_unlock(&ev->mu); +} + +static int event_isset(event_t* ev) +{ + pthread_mutex_lock(&ev->mu); + int res = ev->state; + pthread_mutex_unlock(&ev->mu); + return res; +} + +static int event_timedwait(event_t* ev, uint64_t timeout) +{ + uint64_t start = current_time_ms(); + uint64_t now = start; + pthread_mutex_lock(&ev->mu); + for (;;) { + if (ev->state) + break; + uint64_t remain = timeout - (now - start); + struct timespec ts; + ts.tv_sec = remain / 1000; + ts.tv_nsec = (remain % 1000) * 1000 * 1000; + pthread_cond_timedwait(&ev->cv, &ev->mu, &ts); + now = current_time_ms(); + if (now - start > timeout) + break; + } + int res = ev->state; + pthread_mutex_unlock(&ev->mu); + return res; +} + +struct thread_t { + int created, call; + event_t ready, done; +}; + +static struct thread_t threads[16]; +static void execute_call(int call); +static int running; + +static void* thr(void* arg) +{ + struct thread_t* th = (struct thread_t*)arg; + for (;;) { + event_wait(&th->ready); + event_reset(&th->ready); + execute_call(th->call); + __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); + event_set(&th->done); + } + return 0; +} + +static void execute_one(void) +{ + int i, call, thread; + int collide = 0; +again: + for (call = 0; call < 5; call++) { + for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0])); + thread++) { + struct thread_t* th = &threads[thread]; + if (!th->created) { + th->created = 1; + event_init(&th->ready); + event_init(&th->done); + event_set(&th->done); + thread_start(thr, th); + } + if (!event_isset(&th->done)) + continue; + event_reset(&th->done); + th->call = call; + __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); + event_set(&th->ready); + if (collide && (call % 2) == 0) + break; + event_timedwait(&th->done, 45); + break; + } + } + for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++) + sleep_ms(1); + if (!collide) { + collide = 1; + goto again; + } +} + +static void execute_one(void); + +#define WAIT_FLAGS 0 + +static void loop(void) +{ + int iter = 0; + for (;; iter++) { + char cwdbuf[32]; + sprintf(cwdbuf, "./%d", iter); + if (mkdir(cwdbuf, 0777)) + exit(1); + int pid = fork(); + if (pid < 0) + exit(1); + if (pid == 0) { + if (chdir(cwdbuf)) + exit(1); + execute_one(); + exit(0); + } + int status = 0; + uint64_t start = current_time_ms(); + for (;;) { + if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) + break; + sleep_ms(1); + if (current_time_ms() - start < 5 * 1000) + continue; + kill_and_wait(pid, &status); + break; + } + remove_dir(cwdbuf); + } +} + +uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff}; + +void execute_call(int call) +{ + intptr_t res = 0; + switch (call) { + case 0: + NONFAILING(memcpy((void*)0x20000000, ".\000", 2)); + res = syscall(SYS_open, 0x20000000ul, 0ul, 0ul); + if (res != -1) + r[0] = res; + break; + case 1: + res = syscall(SYS_socketpair, 1ul, 2ul, 0, 0x20000100ul); + if (res != -1) + NONFAILING(r[1] = *(uint32_t*)0x20000100); + break; + case 2: + NONFAILING(memcpy( + (void*)0x20000180, + "\x0a\x01\x2e\x2f\x66\x69\x6c\x65\x30\x00\x46\xd3\xc5\xea\xb2\xf9\xd0" + "\x81\x73\xef\x4a\xd0\xe9\x00\x9b\x10\xb2\x6d\x40\xab\xf3\x06\x35\x55" + "\x92\x6b\xa7\x48\x51\xed\xf1\x47\x2a\x1c\x57\xda\x98\x4d\x23\x4f\x6d" + "\x63\x57\x71\x99\x01\x97\x42\xef\xe9\xd6\x91\x78\x55\x43\x7f\x80\x8b" + "\xf3\xfa\x29\xeb\x62\xeb\x2f\x4b\xb5\xcd\x3f\xd7\x4f\x78\x35\xfb\xd3" + "\x24\xe3\xc4\x10\x31\x53\xdd\xe7\x9a\x1c\x23\x36\x48\xe4\x7a\xf8\x3a" + "\x7e\xd0\x1f\x89\xf7\xb6\xee\xff\x69\x1d\xad\x02\x57\x01\xf2\x52\x93" + "\x3e\x6b\xda\x65\x2a\xc7\x6c\x27\xf9\x0a\xd4\x3b\x05\x00\x00\x00\x1b" + "\x1c\x89\xc9\x3b\x41\x9c\x7b\x4f\x31\xbb\x6a\x5c\x17\xed\x78\xf1\x64" + "\xc4\xa3\x17\x5c\x7a\x8c\x02\x75\x00\xaf\x61\xac\x90\x22\x86\x15\x67" + "\x90\x03\x17\x8c\x55\xf6\xb9\x3a\xf8\x6c\xab\xcb\xf1\x74\x09\xc0\xbc" + "\xf4\x5b\x76\x33\x8f\x9a\x76\xf3\x6e", + 196)); + syscall(SYS_bindat, r[0], r[1], 0x20000180ul, 0xaul); + break; + case 3: + NONFAILING(*(uint8_t*)0x20000040 = 0xa); + NONFAILING(*(uint8_t*)0x20000041 = 1); + NONFAILING(memcpy((void*)0x20000042, "./file0\000", 8)); + syscall(SYS_connectat, r[0], r[1], 0x20000040ul, 0xaul); + break; + case 4: + NONFAILING(*(uint8_t*)0x20000000 = 0xa); + NONFAILING(*(uint8_t*)0x20000001 = 1); + NONFAILING(memcpy((void*)0x20000002, "./file0\000", 8)); + syscall(SYS_connect, r[1], 0x20000000ul, 0xaul); + break; + } +} +int main(void) +{ + syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x1012ul, -1, 0ul); + install_segv_handler(); + use_temporary_dir(); + loop(); + return 0; +} +EOF +mycc -o /tmp/syzkaller23 -Wall -Wextra -O0 /tmp/syzkaller23.c -lpthread || + exit 1 + +for i in `jot 256`; do + (cd /tmp; timeout 3m ./syzkaller23) & +done +wait + +rm -rf /tmp/syzkaller23 syzkaller23.c /tmp/syzkaller.* +exit 0 Added: user/pho/stress2/misc/syzkaller24.sh ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ user/pho/stress2/misc/syzkaller24.sh Thu Dec 10 05:44:35 2020 (r368496) @@ -0,0 +1,134 @@ +#!/bin/sh + +# panic: sleepq_add: td 0xfffffe00dffd8800 to sleep on wchan 0xffffffff81d9bee8 with sleeping prohibited +# cpuid = 7 +# time = 1599685416 +# KDB: stack backtrace: +# db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe00e656d5e0 +# vpanic() at vpanic+0x182/frame 0xfffffe00e656d630 +# panic() at panic+0x43/frame 0xfffffe00e656d690 +# sleepq_add() at sleepq_add+0x359/frame 0xfffffe00e656d6e0 +# _sx_xlock_hard() at _sx_xlock_hard+0x405/frame 0xfffffe00e656d780 +# _sx_xlock() at _sx_xlock+0xba/frame 0xfffffe00e656d7c0 +# inp_setmoptions() at inp_setmoptions+0xd5c/frame 0xfffffe00e656d970 +# ip_ctloutput() at ip_ctloutput+0x103/frame 0xfffffe00e656d9c0 +# rip_ctloutput() at rip_ctloutput+0x158/frame 0xfffffe00e656d9f0 +# sosetopt() at sosetopt+0xed/frame 0xfffffe00e656da50 +# kern_setsockopt() at kern_setsockopt+0xa8/frame 0xfffffe00e656dab0 +# sys_setsockopt() at sys_setsockopt+0x24/frame 0xfffffe00e656dad0 +# amd64_syscall() at amd64_syscall+0x159/frame 0xfffffe00e656dbf0 +# fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe00e656dbf0 +# --- syscall (0, FreeBSD ELF64, nosys), rip = 0x80042819a, rsp = 0x7fffffffe958, rbp = 0x7fffffffe970 --- +# KDB: enter: panic +# [ thread pid 27447 tid 100183 ] +# Stopped at kdb_enter+0x37: movq $0,0x10b7246(%rip) +# db> x/s version +# version: FreeBSD 13.0-CURRENT #0 r365508: Wed Sep 9 21:36:20 CEST 2020 +# pho@mercat1.netperf.freebsd.org:/usr/src/sys/amd64/compile/PHO +# db> + +# $FreeBSD$ + +[ `uname -p` != "amd64" ] && exit 0 + + +. ../default.cfg +cat > /tmp/syzkaller24.c < + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +static void kill_and_wait(int pid, int* status) +{ + kill(pid, SIGKILL); + while (waitpid(-1, status, 0) != pid) { + } +} + +static void sleep_ms(uint64_t ms) +{ + usleep(ms * 1000); +} + +static uint64_t current_time_ms(void) +{ + struct timespec ts; + if (clock_gettime(CLOCK_MONOTONIC, &ts)) + exit(1); + return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; +} + +static void execute_one(void); + +#define WAIT_FLAGS 0 + +static void loop(void) +{ + int iter = 0; + for (;; iter++) { + int pid = fork(); + if (pid < 0) + exit(1); + if (pid == 0) { + execute_one(); + exit(0); + } + int status = 0; + uint64_t start = current_time_ms(); + for (;;) { + if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) + break; + sleep_ms(1); + if (current_time_ms() - start < 5 * 1000) + continue; + kill_and_wait(pid, &status); + break; + } + } +} + +uint64_t r[1] = {0xffffffffffffffff}; + +void execute_one(void) +{ + intptr_t res = 0; + res = syscall(SYS_socket, 2ul, 3ul, 1); + if (res != -1) + r[0] = res; + *(uint32_t*)0x20000180 = htobe32(0xe0000002); + *(uint32_t*)0x20000184 = htobe32(0x7f000001); + *(uint32_t*)0x20000188 = htobe32(0x7f000001); + syscall(SYS_setsockopt, r[0], 0, 0x46, 0x20000180ul, 0x4414ae3732a778ful); +} +int main(void) +{ + syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x1012ul, -1, 0ul); + loop(); + return 0; +} +EOF +mycc -o /tmp/syzkaller24 -Wall -Wextra -O0 /tmp/syzkaller24.c || + exit 1 + +(cd /tmp; timeout 3m ./syzkaller24) + +rm -rf /tmp/syzkaller24 syzkaller24.c /tmp/syzkaller.* +exit 0 Added: user/pho/stress2/misc/syzkaller25.sh ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ user/pho/stress2/misc/syzkaller25.sh Thu Dec 10 05:44:35 2020 (r368496) @@ -0,0 +1,478 @@ +#!/bin/sh + +# Fatal trap 9: general protection fault while in kernel mode +# cpuid = 5; apic id = 05 +# instruction pointer = 0x20:0xffffffff8237cbac +# stack pointer = 0x28:0xfffffe01026e4910 +# frame pointer = 0x28:0xfffffe01026e4980 +# code segment = base 0x0, limit 0xfffff, type 0x1b +# = DPL 0, pres 1, long 1, def32 0, gran 1 +# processor eflags = interrupt enabled, resume, IOPL = 0 +# current process = 45836 (syzkaller25) +# trap number = 9 +# panic: general protection fault +# cpuid = 5 +# time = 1601745366 +# KDB: stack backtrace: +# db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe01026e4620 +# vpanic() at vpanic+0x182/frame 0xfffffe01026e4670 +# panic() at panic+0x43/frame 0xfffffe01026e46d0 +# trap_fatal() at trap_fatal+0x387/frame 0xfffffe01026e4730 +# trap() at trap+0xa4/frame 0xfffffe01026e4840 +# calltrap() at calltrap+0x8/frame 0xfffffe01026e4840 +# --- trap 0x9, rip = 0xffffffff8237cbac, rsp = 0xfffffe01026e4910, rbp = 0xfffffe01026e4980 --- +# sctp_inpcb_bind() at sctp_inpcb_bind+0x3cc/frame 0xfffffe01026e4980 +# sctp_connect() at sctp_connect+0x14f/frame 0xfffffe01026e49e0 +# soconnectat() at soconnectat+0xd0/frame 0xfffffe01026e4a30 +# kern_connectat() at kern_connectat+0xe2/frame 0xfffffe01026e4a90 +# sys_connect() at sys_connect+0x75/frame 0xfffffe01026e4ad0 +# amd64_syscall() at amd64_syscall+0x14e/frame 0xfffffe01026e4bf0 +# fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe01026e4bf0 +# --- syscall (0, FreeBSD ELF64, nosys), rip = 0x8003b0a1a, rsp = 0x7fffdfffdbb8, rbp = 0x7fffdfffdf90 --- +# KDB: enter: panic +# [ thread pid 45836 tid 101772 ] +# Stopped at kdb_enter+0x37: movq $0,0x10ac846(%rip) +# db> x/s version +# version: FreeBSD 13.0-CURRENT #0 r366401: Sat Oct 3 19:00:37 CEST 2020 +# pho@t2.osted.lan:/usr/src/sys/amd64/compile/PHO +# db> + +# $FreeBSD$ + +[ `uname -p` != "amd64" ] && exit 0 + +. ../default.cfg +kldstat -v | grep -q sctp || kldload sctp.ko + +cat > /tmp/syzkaller25.c < + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +static unsigned long long procid; + +static __thread int skip_segv; +static __thread jmp_buf segv_env; + +static void segv_handler(int sig, siginfo_t* info, void* ctx __unused) +{ + uintptr_t addr = (uintptr_t)info->si_addr; + const uintptr_t prog_start = 1 << 20; + const uintptr_t prog_end = 100 << 20; + int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0; + int valid = addr < prog_start || addr > prog_end; + if (sig == SIGBUS) { + valid = 1; + } + if (skip && valid) { + _longjmp(segv_env, 1); + } + exit(sig); +} + +static void install_segv_handler(void) +{ + struct sigaction sa; + memset(&sa, 0, sizeof(sa)); + sa.sa_sigaction = segv_handler; + sa.sa_flags = SA_NODEFER | SA_SIGINFO; + sigaction(SIGSEGV, &sa, NULL); + sigaction(SIGBUS, &sa, NULL); +} + +#define NONFAILING(...) \ + ({ \ + int ok = 1; \ + __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \ + if (_setjmp(segv_env) == 0) { \ + __VA_ARGS__; \ + } else \ + ok = 0; \ + __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \ + ok; \ + }) + +static void kill_and_wait(int pid, int* status) +{ + kill(pid, SIGKILL); + while (waitpid(-1, status, 0) != pid) { + } +} + +static void sleep_ms(uint64_t ms) +{ + usleep(ms * 1000); +} + +static uint64_t current_time_ms(void) +{ + struct timespec ts; + if (clock_gettime(CLOCK_MONOTONIC, &ts)) + exit(1); + return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; +} + +static void use_temporary_dir(void) +{ + char tmpdir_template[] = "./syzkaller.XXXXXX"; + char* tmpdir = mkdtemp(tmpdir_template); + if (!tmpdir) + exit(1); + if (chmod(tmpdir, 0777)) + exit(1); + if (chdir(tmpdir)) + exit(1); +} + +static void __attribute__((noinline)) remove_dir(const char* dir) +{ + DIR* dp = opendir(dir); + if (dp == NULL) { + if (errno == EACCES) { + if (rmdir(dir)) + exit(1); + return; + } + exit(1); + } + struct dirent* ep = 0; + while ((ep = readdir(dp))) { + if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0) + continue; + char filename[FILENAME_MAX]; + snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name); + struct stat st; + if (lstat(filename, &st)) + exit(1); + if (S_ISDIR(st.st_mode)) { + remove_dir(filename); + continue; + } + if (unlink(filename)) + exit(1); + } + closedir(dp); + if (rmdir(dir)) + exit(1); +} + +static void thread_start(void* (*fn)(void*), void* arg) +{ + pthread_t th; + pthread_attr_t attr; + pthread_attr_init(&attr); + pthread_attr_setstacksize(&attr, 128 << 10); + int i = 0; + for (; i < 100; i++) { + if (pthread_create(&th, &attr, fn, arg) == 0) { + pthread_attr_destroy(&attr); + return; + } + if (errno == EAGAIN) { + usleep(50); + continue; + } + break; + } + exit(1); +} + +typedef struct { + pthread_mutex_t mu; + pthread_cond_t cv; + int state; +} event_t; + +static void event_init(event_t* ev) +{ + if (pthread_mutex_init(&ev->mu, 0)) + exit(1); + if (pthread_cond_init(&ev->cv, 0)) + exit(1); + ev->state = 0; +} + +static void event_reset(event_t* ev) +{ + ev->state = 0; +} + +static void event_set(event_t* ev) +{ + pthread_mutex_lock(&ev->mu); + if (ev->state) + exit(1); + ev->state = 1; + pthread_mutex_unlock(&ev->mu); + pthread_cond_broadcast(&ev->cv); +} + +static void event_wait(event_t* ev) +{ + pthread_mutex_lock(&ev->mu); + while (!ev->state) + pthread_cond_wait(&ev->cv, &ev->mu); + pthread_mutex_unlock(&ev->mu); +} + +static int event_isset(event_t* ev) +{ + pthread_mutex_lock(&ev->mu); + int res = ev->state; + pthread_mutex_unlock(&ev->mu); + return res; +} + +static int event_timedwait(event_t* ev, uint64_t timeout) +{ + uint64_t start = current_time_ms(); + uint64_t now = start; + pthread_mutex_lock(&ev->mu); + for (;;) { + if (ev->state) + break; + uint64_t remain = timeout - (now - start); + struct timespec ts; + ts.tv_sec = remain / 1000; + ts.tv_nsec = (remain % 1000) * 1000 * 1000; + pthread_cond_timedwait(&ev->cv, &ev->mu, &ts); + now = current_time_ms(); + if (now - start > timeout) + break; + } + int res = ev->state; + pthread_mutex_unlock(&ev->mu); + return res; +} + +static void sandbox_common() +{ + if (setsid() == -1) + exit(1); + struct rlimit rlim; + rlim.rlim_cur = rlim.rlim_max = 128 << 20; + setrlimit(RLIMIT_AS, &rlim); + rlim.rlim_cur = rlim.rlim_max = 8 << 20; + setrlimit(RLIMIT_MEMLOCK, &rlim); + rlim.rlim_cur = rlim.rlim_max = 1 << 20; + setrlimit(RLIMIT_FSIZE, &rlim); + rlim.rlim_cur = rlim.rlim_max = 1 << 20; + setrlimit(RLIMIT_STACK, &rlim); + rlim.rlim_cur = rlim.rlim_max = 0; + setrlimit(RLIMIT_CORE, &rlim); + rlim.rlim_cur = rlim.rlim_max = 256; + setrlimit(RLIMIT_NOFILE, &rlim); +} + +static void loop(); + +static int do_sandbox_none(void) +{ + sandbox_common(); + loop(); + return 0; +} + +struct thread_t { + int created, call; + event_t ready, done; +}; + +static struct thread_t threads[16]; +static void execute_call(int call); +static int running; + +static void* thr(void* arg) +{ + struct thread_t* th = (struct thread_t*)arg; + for (;;) { + event_wait(&th->ready); + event_reset(&th->ready); + execute_call(th->call); + __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED); + event_set(&th->done); + } + return 0; +} + +static void execute_one(void) +{ + int i, call, thread; + int collide = 0; +again: + for (call = 0; call < 4; call++) { + for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0])); + thread++) { + struct thread_t* th = &threads[thread]; + if (!th->created) { + th->created = 1; + event_init(&th->ready); + event_init(&th->done); + event_set(&th->done); + thread_start(thr, th); + } + if (!event_isset(&th->done)) + continue; + event_reset(&th->done); + th->call = call; + __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED); + event_set(&th->ready); + if (collide && (call % 2) == 0) + break; + event_timedwait(&th->done, 45); + break; + } + } + for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++) + sleep_ms(1); + if (!collide) { + collide = 1; + goto again; + } +} + +static void execute_one(void); + +#define WAIT_FLAGS 0 + +static void loop(void) +{ + int iter = 0; + for (;; iter++) { + char cwdbuf[32]; + sprintf(cwdbuf, "./%d", iter); + if (mkdir(cwdbuf, 0777)) + exit(1); + int pid = fork(); + if (pid < 0) + exit(1); + if (pid == 0) { + if (chdir(cwdbuf)) + exit(1); + execute_one(); + exit(0); + } + int status = 0; + uint64_t start = current_time_ms(); + for (;;) { + if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) + break; + sleep_ms(1); + if (current_time_ms() - start < 5 * 1000) + continue; + kill_and_wait(pid, &status); + break; + } + remove_dir(cwdbuf); + } +} + +uint64_t r[1] = {0xffffffffffffffff}; + +void execute_call(int call) +{ + intptr_t res = 0; + switch (call) { + case 0: + res = syscall(SYS_socket, 2ul, 5ul, 0x84); + if (res != -1) + r[0] = res; + break; + case 1: + NONFAILING(*(uint8_t*)0x20000300 = 0x10); + NONFAILING(*(uint8_t*)0x20000301 = 2); + NONFAILING(*(uint16_t*)0x20000302 = htobe16(0x4e23 + procid * 4)); + NONFAILING(*(uint32_t*)0x20000304 = htobe32(0)); + NONFAILING(*(uint8_t*)0x20000308 = 0); + NONFAILING(*(uint8_t*)0x20000309 = 0); + NONFAILING(*(uint8_t*)0x2000030a = 0); + NONFAILING(*(uint8_t*)0x2000030b = 0); + NONFAILING(*(uint8_t*)0x2000030c = 0); + NONFAILING(*(uint8_t*)0x2000030d = 0); + NONFAILING(*(uint8_t*)0x2000030e = 0); + NONFAILING(*(uint8_t*)0x2000030f = 0); + syscall(SYS_bind, r[0], 0x20000300ul, 0x10ul); + break; + case 2: + NONFAILING(*(uint8_t*)0x20000040 = 0x10); + NONFAILING(*(uint8_t*)0x20000041 = 2); + NONFAILING(*(uint16_t*)0x20000042 = htobe16(0x4e23 + procid * 4)); + NONFAILING(*(uint32_t*)0x20000044 = htobe32(0x7f000001)); + NONFAILING(*(uint8_t*)0x20000048 = 0); + NONFAILING(*(uint8_t*)0x20000049 = 0); + NONFAILING(*(uint8_t*)0x2000004a = 0); + NONFAILING(*(uint8_t*)0x2000004b = 0); + NONFAILING(*(uint8_t*)0x2000004c = 0); + NONFAILING(*(uint8_t*)0x2000004d = 0); + NONFAILING(*(uint8_t*)0x2000004e = 0); + NONFAILING(*(uint8_t*)0x2000004f = 0); + syscall(SYS_connect, r[0], 0x20000040ul, 0x10ul); + break; + case 3: + NONFAILING(*(uint8_t*)0x20000000 = 0x10); + NONFAILING(*(uint8_t*)0x20000001 = 2); + NONFAILING(*(uint16_t*)0x20000002 = htobe16(0x4e23 + procid * 4)); + NONFAILING(*(uint8_t*)0x20000004 = 0xac); + NONFAILING(*(uint8_t*)0x20000005 = 0x14); + NONFAILING(*(uint8_t*)0x20000006 = 0 + procid * 1); + NONFAILING(*(uint8_t*)0x20000007 = 0xaa); + NONFAILING(*(uint8_t*)0x20000008 = 0); + NONFAILING(*(uint8_t*)0x20000009 = 0); + NONFAILING(*(uint8_t*)0x2000000a = 0); + NONFAILING(*(uint8_t*)0x2000000b = 0); + NONFAILING(*(uint8_t*)0x2000000c = 0); + NONFAILING(*(uint8_t*)0x2000000d = 0); + NONFAILING(*(uint8_t*)0x2000000e = 0); + NONFAILING(*(uint8_t*)0x2000000f = 0); + syscall(SYS_connect, r[0], 0x20000000ul, 0x10ul); + break; + } +} +int main(void) *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** From owner-svn-src-user@freebsd.org Thu Dec 10 05:45:47 2020 Return-Path: Delivered-To: svn-src-user@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 34245475C3B for ; Thu, 10 Dec 2020 05:45:47 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Cs2vb115Mz3ClS; Thu, 10 Dec 2020 05:45:47 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 1575C138CF; Thu, 10 Dec 2020 05:45:47 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0BA5jkMo045933; Thu, 10 Dec 2020 05:45:46 GMT (envelope-from pho@FreeBSD.org) Received: (from pho@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0BA5jkDV045932; Thu, 10 Dec 2020 05:45:46 GMT (envelope-from pho@FreeBSD.org) Message-Id: <202012100545.0BA5jkDV045932@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pho set sender to pho@FreeBSD.org using -f From: Peter Holm Date: Thu, 10 Dec 2020 05:45:46 +0000 (UTC) To: src-committers@freebsd.org, svn-src-user@freebsd.org Subject: svn commit: r368497 - user/pho/stress2/misc X-SVN-Group: user X-SVN-Commit-Author: pho X-SVN-Commit-Paths: user/pho/stress2/misc X-SVN-Commit-Revision: 368497 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-user@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "SVN commit messages for the experimental " user" src tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Dec 2020 05:45:47 -0000 Author: pho Date: Thu Dec 10 05:45:46 2020 New Revision: 368497 URL: https://svnweb.freebsd.org/changeset/base/368497 Log: Added two more syzkaller reproducers. Added: user/pho/stress2/misc/syzkaller10.sh (contents, props changed) Added: user/pho/stress2/misc/syzkaller10.sh ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ user/pho/stress2/misc/syzkaller10.sh Thu Dec 10 05:45:46 2020 (r368497) @@ -0,0 +1,95 @@ +#!/bin/sh + +# panic: sbsndptr_noadv: sb_mb is NULL +# cpuid = 0 +# time = 1586867804 +# KDB: stack backtrace: +# db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe0025a68360 +# vpanic() at vpanic+0x1c7/frame 0xfffffe0025a683c0 +# panic() at panic+0x43/frame 0xfffffe0025a68420 +# sbsndptr_noadv() at sbsndptr_noadv+0xae/frame 0xfffffe0025a68460 +# rack_output() at rack_output+0x51f5/frame 0xfffffe0025a68700 +# tcp_usr_send() at tcp_usr_send+0x5c7/frame 0xfffffe0025a687e0 +# sosend_generic() at sosend_generic+0x8fd/frame 0xfffffe0025a688e0 +# sosend() at sosend+0xc6/frame 0xfffffe0025a68950 +# kern_sendit() at kern_sendit+0x33d/frame 0xfffffe0025a68a00 +# sendit() at sendit+0x224/frame 0xfffffe0025a68a60 +# sys_sendto() at sys_sendto+0x5c/frame 0xfffffe0025a68ac0 +# amd64_syscall() at amd64_syscall+0x262/frame 0xfffffe0025a68bf0 + +# $FreeBSD$ + +[ `uname -p` = "i386" ] && exit 0 + +. ../default.cfg +cat > /tmp/syzkaller10.c < +#include +#include +#include +#include +#include +#include +#include +#include +#include + +uint64_t r[1] = {0xffffffffffffffff}; + +int main(void) +{ + syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 3ul, 0x1012ul, -1, 0ul); + intptr_t res = 0; + res = syscall(SYS_socket, 2ul, 1ul, 0); + if (res != -1) + r[0] = res; + memcpy((void*)0x20000080, + "rack\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000" + "\000\000\000\000\000\000\000\000\000\000\000\000", + 32); + *(uint32_t*)0x200000a0 = 0; + syscall(SYS_setsockopt, r[0], 6, 0x2000, 0x20000080ul, 0x24ul); + *(uint8_t*)0x20000000 = 0x2c; + *(uint8_t*)0x20000001 = 2; + *(uint16_t*)0x20000002 = htobe16(0x4e21); + *(uint32_t*)0x20000004 = htobe32(-1); + *(uint8_t*)0x20000008 = 0; + *(uint8_t*)0x20000009 = 0; + *(uint8_t*)0x2000000a = 0; + *(uint8_t*)0x2000000b = 0; + *(uint8_t*)0x2000000c = 0; + *(uint8_t*)0x2000000d = 0; + *(uint8_t*)0x2000000e = 0; + *(uint8_t*)0x2000000f = 0; + syscall(SYS_sendto, r[0], 0ul, 0ul, 0ul, 0x20000000ul, 0x10ul); + *(uint8_t*)0x20000040 = 0x10; + *(uint8_t*)0x20000041 = 2; + *(uint16_t*)0x20000042 = htobe16(0x4e21); + *(uint32_t*)0x20000044 = htobe32(0); + *(uint8_t*)0x20000048 = 0; + *(uint8_t*)0x20000049 = 0; + *(uint8_t*)0x2000004a = 0; + *(uint8_t*)0x2000004b = 0; + *(uint8_t*)0x2000004c = 0; + *(uint8_t*)0x2000004d = 0; + *(uint8_t*)0x2000004e = 0; + *(uint8_t*)0x2000004f = 0; + syscall(SYS_sendto, r[0], 0ul, 0ul, 0x60005ul, 0x20000040ul, 0x10ul); + return 0; +} +EOF +mycc -o /tmp/syzkaller10 -Wall -Wextra -O2 /tmp/syzkaller10.c -lpthread || + exit 1 + +(cd /tmp; ./syzkaller10) & +sleep 60 +pkill -9 syzkaller10 +wait + +rm -f /tmp/syzkaller10 /tmp/syzkaller10.c /tmp/syzkaller10.core +exit 0 From owner-svn-src-user@freebsd.org Thu Dec 10 05:47:59 2020 Return-Path: Delivered-To: svn-src-user@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0422F475AEE for ; Thu, 10 Dec 2020 05:47:59 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Cs2y66n9sz3CRh; Thu, 10 Dec 2020 05:47:58 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id DC14313C2A; Thu, 10 Dec 2020 05:47:58 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0BA5lwj0046076; Thu, 10 Dec 2020 05:47:58 GMT (envelope-from pho@FreeBSD.org) Received: (from pho@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0BA5lwfG046075; Thu, 10 Dec 2020 05:47:58 GMT (envelope-from pho@FreeBSD.org) Message-Id: <202012100547.0BA5lwfG046075@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pho set sender to pho@FreeBSD.org using -f From: Peter Holm Date: Thu, 10 Dec 2020 05:47:58 +0000 (UTC) To: src-committers@freebsd.org, svn-src-user@freebsd.org Subject: svn commit: r368498 - user/pho/stress2/misc X-SVN-Group: user X-SVN-Commit-Author: pho X-SVN-Commit-Paths: user/pho/stress2/misc X-SVN-Commit-Revision: 368498 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-user@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "SVN commit messages for the experimental " user" src tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Dec 2020 05:47:59 -0000 Author: pho Date: Thu Dec 10 05:47:58 2020 New Revision: 368498 URL: https://svnweb.freebsd.org/changeset/base/368498 Log: Updated the exclude list. Improved script argument validation. Modified: user/pho/stress2/misc/all.sh Modified: user/pho/stress2/misc/all.sh ============================================================================== --- user/pho/stress2/misc/all.sh Thu Dec 10 05:45:46 2020 (r368497) +++ user/pho/stress2/misc/all.sh Thu Dec 10 05:47:58 2020 (r368498) @@ -32,7 +32,6 @@ # Start of list Known problems Seen -# altbufferflushes.sh snapshots + disk full == know problem 20130617 # backingstore.sh # g_vfs_done():md6a[WRITE(offset=...)]error = 28 20111220 # backingstore2.sh @@ -40,6 +39,7 @@ # backingstore3.sh # g_vfs_done():md6a[WRITE(offset=...)]error = 28 20111230 # collapse.sh panic: freeing mapped page 0xfffffe0028ed1d50 20200106 +# crossmp7.sh WiP 20200821 # dd.sh CAM stuck in vmwait 20200116 # devfs4.sh WiP 20181031 # force2.sh WiP 20200303 @@ -47,9 +47,11 @@ # force4.sh Known issue 20200303 # force5.sh WiP 20200303 # fsync.sh panic: Journal overflow 20190208 +# fsync2.sh WiP 20200901 # fuse.sh Memory corruption seen in log file kostik734.txt 20141114 # fuse2.sh Deadlock seen 20121129 # fuse3.sh Deadlock seen 20141120 +# getrandom.sh Known DoS issue 20201107 # getrandom2.sh Known DoS issue 20200302 # gjournal.sh panic: Journal overflow 20190626 # gjournal2.sh panic: Journal overflow 20180125 @@ -72,6 +74,10 @@ # memguard2.sh Waiting for fix commit # memguard3.sh Waiting for fix commit # mlockall2.sh Unrecoverable OOM killing seen 20190203 +# multicast2.sh WiP 20200921 +# nfs15lockd.sh WiP 20200805 +# nfs15lockd2.sh WiP 20200805 +# nfs15lockd3.sh WiP 20200805 # newfs4.sh watchdog fired. newbuf 20190225 # nfs10.sh Double fault 20151013 # nfs13.sh mount_nfs hangs in mntref 20191007 @@ -79,22 +85,19 @@ # oom2.sh Hang in pfault 20180324 # overcommit2.sh # CAM stuck in vmwait seen 20200112 -# pfl3.sh panic: handle_written_inodeblock: live inodedep 20190211 # pageout.sh panic: handle_written_filepage: not started 20190218 # quota10.sh people.freebsd.org/~pho/stress/log/quota10-2.txt 20200525 # quota2.sh panic: dqflush: stray dquot 20120221 # quota3.sh panic: softdep_deallocate_dependencies: unrecovered ... 20111222 -# quota6.sh panic: softdep_deallocate_dependencies: unrecovered ... 20130206 # quota7.sh panic: dqflush: stray dquot 20120221 # rename14.sh mark136.txt 20200525 +# sctp.sh panic: Queues are not empty when handling ... i386 20201104 # sctp2.sh panic: soclose: SS_NOFDREF on enter 20200307 # sctp3.sh WiP 20190809 # sendfile25.sh WiP 20200611 # signal.sh Timing issues. Needs fixing 20171116 -# snap4.sh panic: snapacct_ufs2: bad block 20181014 -# snap6.sh panic: softdep_deallocate_dependencies: unrecovered ... 20130630 -# snap8.sh panic: softdep_deallocate_dependencies: unrecovered ... 20120630 # snap9.sh panic: handle_written_filepage: not started 20170722 +# snap11.sh panic: handle_written_filepage: not started 20200928 # suj34.sh Various hangs and panics (SUJ + NULLFS issue) 20131210 # swap4.sh WiP 20171208 # swapoff2.sh swap_pager_force_pagein: read from swap failed 20171223 @@ -105,13 +108,15 @@ # syzkaller16.sh WiP 20200620 # syzkaller17.sh WiP 20200630 # syzkaller19.sh WiP 20200712 -# syzkaller21.sh WiP 20200804 +# syzkaller24.sh WiP 20200916 +# syzkaller25.sh WiP 20201116 +# syzkaller28.sh WiP 20201120 +# truss3.sh WiP 20200915 # ucom.sh Stuck in tail -F 20180129 -# umountf7.sh panic: handle_written_inodeblock: live inodedep ... 20190219 -# umountf9.sh panic: handle_written_inodeblock: live inodedep ... 20170221 # unionfs.sh insmntque: non-locked vp: xx is not exclusive locked... 20130909 # unionfs2.sh insmntque: mp-safe fs and non-locked vp is not ... 20111219 # unionfs3.sh insmntque: mp-safe fs and non-locked vp is not ... 20111216 +# zfs9.sh WiP 20200921 # zfs11.sh Deadlock WiP 20200513 # Test not to run for other reasons: @@ -311,6 +316,7 @@ while true; do n2=`echo $lst | wc -w | sed 's/ //g'` for i in $lst; do i=`basename $i` + [ ! -f ./$i ] && { echo "No such file ./$i"; continue; } n1=$((n1 + 1)) echo $i > $alllast ./cleanup.sh || exit 1 @@ -318,7 +324,7 @@ while true; do echo "$ts all: $i" printf "$ts all ($n1/$n2): $i\n" >> $alllog printf "$ts all ($n1/$n2): $i\r\n" > $console - logger "Starting test all: $i" + logger "Starting stress2 test all.sh: $i" [ $all_debug ] && pre_debug [ -f $i ] || loops=1 # break sync; sleep .5; sync; sleep .5 From owner-svn-src-user@freebsd.org Thu Dec 10 05:50:45 2020 Return-Path: Delivered-To: svn-src-user@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EF572475A6F for ; Thu, 10 Dec 2020 05:50:45 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Cs31K6RD2z3D33; Thu, 10 Dec 2020 05:50:45 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id CFB5D13C96; Thu, 10 Dec 2020 05:50:45 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0BA5ojhc046292; Thu, 10 Dec 2020 05:50:45 GMT (envelope-from pho@FreeBSD.org) Received: (from pho@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0BA5oj0W046291; Thu, 10 Dec 2020 05:50:45 GMT (envelope-from pho@FreeBSD.org) Message-Id: <202012100550.0BA5oj0W046291@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pho set sender to pho@FreeBSD.org using -f From: Peter Holm Date: Thu, 10 Dec 2020 05:50:45 +0000 (UTC) To: src-committers@freebsd.org, svn-src-user@freebsd.org Subject: svn commit: r368499 - user/pho/stress2/misc X-SVN-Group: user X-SVN-Commit-Author: pho X-SVN-Commit-Paths: user/pho/stress2/misc X-SVN-Commit-Revision: 368499 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-user@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "SVN commit messages for the experimental " user" src tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Dec 2020 05:50:46 -0000 Author: pho Date: Thu Dec 10 05:50:45 2020 New Revision: 368499 URL: https://svnweb.freebsd.org/changeset/base/368499 Log: Limit overall runtime by giving all threads a chance to start before load is created. Modified: user/pho/stress2/misc/syzkaller27.sh Modified: user/pho/stress2/misc/syzkaller27.sh ============================================================================== --- user/pho/stress2/misc/syzkaller27.sh Thu Dec 10 05:47:58 2020 (r368498) +++ user/pho/stress2/misc/syzkaller27.sh Thu Dec 10 05:50:45 2020 (r368499) @@ -133,6 +133,7 @@ void execute_one(void) } int main(void) { + sleep(2); /* pho */ syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x1012ul, -1, 0ul); loop(); return 0;