Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 13 May 2020 06:47:54 +0000 (UTC)
From:      Peter Holm <pho@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-user@freebsd.org
Subject:   svn commit: r361005 - user/pho/stress2/misc
Message-ID:  <202005130647.04D6lsFu082048@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: pho
Date: Wed May 13 06:47:54 2020
New Revision: 361005
URL: https://svnweb.freebsd.org/changeset/base/361005

Log:
  Added two syzkaller reproducers.

Added:
  user/pho/stress2/misc/syzkaller8.sh   (contents, props changed)
  user/pho/stress2/misc/syzkaller9.sh   (contents, props changed)

Added: user/pho/stress2/misc/syzkaller8.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ user/pho/stress2/misc/syzkaller8.sh	Wed May 13 06:47:54 2020	(r361005)
@@ -0,0 +1,113 @@
+#!/bin/sh
+
+# panic: prot 0x3 is not subset of max_prot 0x5
+# cpuid = 0
+# time = 1586745417
+# KDB: stack backtrace:
+# db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe0015fe8650
+# vpanic() at vpanic+0x1c7/frame 0xfffffe0015fe86b0
+# panic() at panic+0x43/frame 0xfffffe0015fe8710
+# vm_map_insert() at vm_map_insert+0xa11/frame 0xfffffe0015fe87d0
+# vm_map_fixed() at vm_map_fixed+0x19c/frame 0xfffffe0015fe8850
+# vm_mmap_object() at vm_mmap_object+0x3be/frame 0xfffffe0015fe88e0
+# shm_mmap() at shm_mmap+0x2e3/frame 0xfffffe0015fe8980
+# kern_mmap_req() at kern_mmap_req+0xa72/frame 0xfffffe0015fe8a70
+# sys_mmap() at sys_mmap+0x53/frame 0xfffffe0015fe8ac0
+# amd64_syscall() at amd64_syscall+0x236/frame 0xfffffe0015fe8bf0
+
+# $FreeBSD$
+
+# Reproduced on r359818
+# Fixed by r359892
+
+[ `uname -p` = "i386" ] && exit 0
+
+. ../default.cfg
+cat > /tmp/syzkaller8.c <<EOF
+// http://syzkaller.backtrace.io:8080/report?id=ba93405590ed607e9b2d65025a44ff60dc6c4bcc
+// autogenerated by syzkaller (https://github.com/google/syzkaller)
+
+#define _GNU_SOURCE
+
+#include <pwd.h>
+#include <setjmp.h>
+#include <signal.h>
+#include <stdarg.h>
+#include <stdbool.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/endian.h>
+#include <sys/syscall.h>
+#include <unistd.h>
+
+static __thread int skip_segv;
+static __thread jmp_buf segv_env;
+
+static void segv_handler(int sig, siginfo_t* info, void* ctx __unused)
+{
+  uintptr_t addr = (uintptr_t)info->si_addr;
+  const uintptr_t prog_start = 1 << 20;
+  const uintptr_t prog_end = 100 << 20;
+  if (__atomic_load_n(&skip_segv, __ATOMIC_RELAXED) &&
+      (addr < prog_start || addr > prog_end)) {
+    _longjmp(segv_env, 1);
+  }
+  exit(sig);
+}
+
+static void install_segv_handler(void)
+{
+  struct sigaction sa;
+  memset(&sa, 0, sizeof(sa));
+  sa.sa_sigaction = segv_handler;
+  sa.sa_flags = SA_NODEFER | SA_SIGINFO;
+  sigaction(SIGSEGV, &sa, NULL);
+  sigaction(SIGBUS, &sa, NULL);
+}
+
+#define NONFAILING(...)                                                        \
+  {                                                                            \
+    __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST);                       \
+    if (_setjmp(segv_env) == 0) {                                              \
+      __VA_ARGS__;                                                             \
+    }                                                                          \
+    __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST);                       \
+  }
+
+uint64_t r[3] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff};
+
+int main(void)
+{
+  syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 3ul, 0x1012ul, -1, 0ul);
+  install_segv_handler();
+  intptr_t res = 0;
+  syscall(SYS___getcwd, 0x20000000ul, 0xc7ul);
+  res = syscall(SYS_socket, 0x1cul, 3ul, 0x3a);
+  if (res != -1)
+    r[0] = res;
+  res = syscall(SYS_fcntl, r[0], 1ul, -1);
+  if (res != -1)
+    r[1] = res;
+  syscall(SYS_close, r[1]);
+  syscall(SYS_mprotect, 0x20000000ul, 0x4000ul, 1ul);
+  NONFAILING(memcpy((void*)0x20000000, "./file1\000", 8));
+  syscall(SYS_freebsd12_shm_open, 0x20000000ul, 0x200ul, 0ul);
+  res = syscall(SYS_freebsd10_pipe, 0x20000080ul);
+  if (res != -1)
+    NONFAILING(r[2] = *(uint32_t*)0x20000084);
+  syscall(SYS_mmap, 0x20d43000ul, 0x200000ul, 3ul, 0x12ul, r[2], 0ul);
+  return 0;
+}
+EOF
+mycc -o /tmp/syzkaller8 -Wall -Wextra -O2 /tmp/syzkaller8.c -lpthread ||
+    exit 1
+
+(cd /tmp; ./syzkaller8) &
+sleep 60
+pkill -9 syzkaller8
+wait
+
+rm -f /tmp/syzkaller8 /tmp/syzkaller8.c /tmp/syzkaller8.core /tmp/file0
+exit 0

Added: user/pho/stress2/misc/syzkaller9.sh
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ user/pho/stress2/misc/syzkaller9.sh	Wed May 13 06:47:54 2020	(r361005)
@@ -0,0 +1,104 @@
+#!/bin/sh
+
+# Fatal trap 12: page fault while in kernel mode
+# cpuid = 0; apic id = 00
+# fault virtual address	= 0x18
+# fault code		= supervisor read data, page not present
+# instruction pointer	= 0x20:0xffffffff80ffe995
+# stack pointer	        = 0x28:0xfffffe0015e1d6f0
+# frame pointer	        = 0x28:0xfffffe0015e1d720
+# code segment		= base 0x0, limit 0xfffff, type 0x1b
+# 			= DPL 0, pres 1, long 1, def32 0, gran 1
+# processor eflags	= interrupt enabled, resume, IOPL = 0
+# current process		= 744 (syz-executor7538254)
+# trap number		= 12
+# panic: page fault
+# cpuid = 0
+# time = 1575776142
+# KDB: stack backtrace:
+# db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe0015e1d2f0
+# vpanic() at vpanic+0x1c7/frame 0xfffffe0015e1d360
+# panic() at panic+0x43/frame 0xfffffe0015e1d3c0
+# trap_fatal() at trap_fatal+0x4cc/frame 0xfffffe0015e1d440
+# trap_pfault() at trap_pfault+0xdc/frame 0xfffffe0015e1d4e0
+# trap() at trap+0x441/frame 0xfffffe0015e1d620
+# calltrap() at calltrap+0x8/frame 0xfffffe0015e1d620
+# --- trap 0xc, rip = 0xffffffff80ffe995, rsp = 0xfffffe0015e1d6f0, rbp = 0xfffffe0015e1d720 ---
+# __mtx_assert() at __mtx_assert+0x85/frame 0xfffffe0015e1d720
+# uipc_send() at uipc_send+0xeec/frame 0xfffffe0015e1d810
+# sosend_generic() at sosend_generic+0x707/frame 0xfffffe0015e1d8d0
+# sosend() at sosend+0xc6/frame 0xfffffe0015e1d940
+# kern_sendit() at kern_sendit+0x32d/frame 0xfffffe0015e1d9f0
+# sendit() at sendit+0x226/frame 0xfffffe0015e1da50
+# sys_sendmsg() at sys_sendmsg+0x8b/frame 0xfffffe0015e1dab0
+# amd64_syscall() at amd64_syscall+0x46d/frame 0xfffffe0015e1dbf0
+# fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe0015e1dbf0
+# --- syscall (0, FreeBSD ELF64, nosys), rip = 0x41c3ea, rsp = 0x7fffffffeb98, rbp = 0x7fffffffebf0 ---
+
+# $FreeBSD$
+
+# Reproduced on r359818
+# Fixed by r359893
+
+[ `uname -p` = "i386" ] && exit 0
+
+. ../default.cfg
+cat > /tmp/syzkaller9.c <<EOF
+// http://syzkaller.backtrace.io:8080/report?id=03a08d05681c3e7f38ab6ab3f0d025105c3dcea3
+// autogenerated by syzkaller (https://github.com/google/syzkaller)
+
+#define _GNU_SOURCE
+
+#include <pwd.h>
+#include <stdarg.h>
+#include <stdbool.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/endian.h>
+#include <sys/syscall.h>
+#include <unistd.h>
+
+uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff};
+
+int main(void)
+{
+  syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 3ul, 0x1012ul, -1, 0ul);
+  intptr_t res = 0;
+  res = syscall(SYS_socket, 1ul, 5ul, 0ul);
+  if (res != -1)
+    r[0] = res;
+  memcpy((void*)0x20000000, "\x1d\x01\x2e\x2f\x66\x69\x6c\x65\x30\x00", 10);
+  syscall(SYS_bind, r[0], 0x20000000ul, 0xaul);
+  syscall(SYS_listen, r[0], 0);
+  res = syscall(SYS_socket, 1ul, 5ul, 0ul);
+  if (res != -1)
+    r[1] = res;
+  *(uint64_t*)0x20002640 = 0x20000000;
+  *(uint8_t*)0x20000000 = 0xa;
+  *(uint8_t*)0x20000001 = 1;
+  memcpy((void*)0x20000002, "./file0\000", 8);
+  *(uint32_t*)0x20002648 = 0xa;
+  *(uint64_t*)0x20002650 = 0;
+  *(uint64_t*)0x20002658 = 0;
+  *(uint64_t*)0x20002660 = 0x20002580;
+  memcpy((void*)0x20002580,
+         "\x10\x00\x00\x00\xff\xff\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00",
+         16);
+  *(uint64_t*)0x20002668 = 0x10;
+  *(uint32_t*)0x20002670 = 0;
+  syscall(SYS_sendmsg, r[1], 0x20002640ul, 0ul);
+  return 0;
+}
+EOF
+mycc -o /tmp/syzkaller9 -Wall -Wextra -O2 /tmp/syzkaller9.c -lpthread ||
+    exit 1
+
+(cd /tmp; ./syzkaller9) &
+sleep 60
+pkill -9 syzkaller9
+wait
+
+rm -f /tmp/syzkaller9 /tmp/syzkaller9.c /tmp/syzkaller9.core /tmp/file0
+exit 0



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202005130647.04D6lsFu082048>