git: 2d4b1f4b8cf0 - main - stress2: Added a syzkaller reproducer. Enable all reaper tests
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 14 Jun 2022 05:00:06 UTC
The branch main has been updated by pho:
URL: https://cgit.FreeBSD.org/src/commit/?id=2d4b1f4b8cf0d3262d1d7b969711081c50134888
commit 2d4b1f4b8cf0d3262d1d7b969711081c50134888
Author: Peter Holm <pho@FreeBSD.org>
AuthorDate: 2022-06-14 04:59:32 +0000
Commit: Peter Holm <pho@FreeBSD.org>
CommitDate: 2022-06-14 04:59:32 +0000
stress2: Added a syzkaller reproducer. Enable all reaper tests
---
tools/test/stress2/misc/all.exclude | 7 -
tools/test/stress2/misc/syzkaller58.sh | 290 +++++++++++++++++++++++++++++++++
2 files changed, 290 insertions(+), 7 deletions(-)
diff --git a/tools/test/stress2/misc/all.exclude b/tools/test/stress2/misc/all.exclude
index 6cd636522c48..ac5576ed1308 100644
--- a/tools/test/stress2/misc/all.exclude
+++ b/tools/test/stress2/misc/all.exclude
@@ -44,11 +44,6 @@ oom2.sh Hang in pfault 20180324
overcommit2.sh CAM stuck in vmwait seen 20200112
pageout.sh panic: handle_written_filepage: not started 20190218
pmc8.sh panic: [pmc,2749] (ri21, rc1) waiting too long for pmc to ... 20210621
-reaper.sh Waiting for commit
-reaper2.sh Waiting for commit
-reaper3.sh Waiting for commit
-reaper4.sh Waiting for commit
-reaper5.sh Waiting for commit
rename14.sh https://people.freebsd.org/~pho/stress/log/log0279.txt 20220415
sctp2.sh panic: Queues are not empty when handling SHUTDOWN-COMPLETE 20210211
sctp3.sh panic: Queues are not empty when handling SHUTDOWN-COMPLETE 20210211
@@ -66,8 +61,6 @@ syzkaller25.sh WiP 20201116
syzkaller27.sh watchdogd fires 20220512
syzkaller28.sh WiP 20201120
syzkaller50.sh panic: Assertion done != job_total_nbytes failed at ... 20220405
-syzkaller52.sh Waiting for commit
-syzkaller53.sh Waiting for commit
syzkaller54.sh panic: td 0xfffffe014f7193a0 is not suspended 20220527
syzkaller55.sh panic: Counter goes negative 20220525
timeout.sh Waiting for commit
diff --git a/tools/test/stress2/misc/syzkaller58.sh b/tools/test/stress2/misc/syzkaller58.sh
new file mode 100755
index 000000000000..0083e13f1692
--- /dev/null
+++ b/tools/test/stress2/misc/syzkaller58.sh
@@ -0,0 +1,290 @@
+#!/bin/sh
+
+# panic: td 0xfffffe010e6ff000 is not suspended
+# cpuid = 2
+# time = 1654661460
+# KDB: stack backtrace:
+# db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe0143924c10
+# vpanic() at vpanic+0x17f/frame 0xfffffe0143924c60
+# panic() at panic+0x43/frame 0xfffffe0143924cc0
+# thread_single() at thread_single+0x736/frame 0xfffffe0143924d40
+# fork1() at fork1+0x1e1/frame 0xfffffe0143924da0
+# sys_rfork() at sys_rfork+0xa4/frame 0xfffffe0143924e00
+# amd64_syscall() at amd64_syscall+0x145/frame 0xfffffe0143924f30
+# fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe0143924f30
+# --- syscall (0, FreeBSD ELF64, nosys), rip = 0x821be4d1a, rsp = 0x8276b8f48, rbp = 0x8276b8f70 ---
+# KDB: enter: panic
+# [ thread pid 2860 tid 100362 ]
+# Stopped at kdb_enter+0x32: movq $0,0x1277d83(%rip)
+# db> x/s version
+# FreeBSD 14.0-CURRENT #0 reap-n255837-0bdda1ded8d: Thu May 26 22:38:04 CEST 2022
+# pho@mercat1.netperf.freebsd.org:/var/tmp/deviant3/sys/amd64/compile/PHO
+# db>
+
+# Submitted by: markj
+
+[ `uname -p` != "amd64" ] && exit 0
+
+. ../default.cfg
+cat > /tmp/syzkaller58.c <<EOF
+// autogenerated by syzkaller (https://github.com/google/syzkaller)
+
+#define _GNU_SOURCE
+
+#include <sys/types.h>
+
+#include <errno.h>
+#include <pthread.h>
+#include <pwd.h>
+#include <signal.h>
+#include <stdarg.h>
+#include <stdbool.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/endian.h>
+#include <sys/syscall.h>
+#include <sys/wait.h>
+#include <time.h>
+#include <unistd.h>
+
+static unsigned long long procid;
+
+static void kill_and_wait(int pid, int* status)
+{
+ kill(pid, SIGKILL);
+ while (waitpid(-1, status, 0) != pid) {
+ }
+}
+
+static void sleep_ms(uint64_t ms)
+{
+ usleep(ms * 1000);
+}
+
+static uint64_t current_time_ms(void)
+{
+ struct timespec ts;
+ if (clock_gettime(CLOCK_MONOTONIC, &ts))
+ exit(1);
+ return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
+}
+
+static void thread_start(void* (*fn)(void*), void* arg)
+{
+ pthread_t th;
+ pthread_attr_t attr;
+ pthread_attr_init(&attr);
+ pthread_attr_setstacksize(&attr, 128 << 10);
+ int i = 0;
+ for (; i < 100; i++) {
+ if (pthread_create(&th, &attr, fn, arg) == 0) {
+ pthread_attr_destroy(&attr);
+ return;
+ }
+ if (errno == EAGAIN) {
+ usleep(50);
+ continue;
+ }
+ break;
+ }
+ exit(1);
+}
+
+typedef struct {
+ pthread_mutex_t mu;
+ pthread_cond_t cv;
+ int state;
+} event_t;
+
+static void event_init(event_t* ev)
+{
+ if (pthread_mutex_init(&ev->mu, 0))
+ exit(1);
+ if (pthread_cond_init(&ev->cv, 0))
+ exit(1);
+ ev->state = 0;
+}
+
+static void event_reset(event_t* ev)
+{
+ ev->state = 0;
+}
+
+static void event_set(event_t* ev)
+{
+ pthread_mutex_lock(&ev->mu);
+ if (ev->state)
+ exit(1);
+ ev->state = 1;
+ pthread_mutex_unlock(&ev->mu);
+ pthread_cond_broadcast(&ev->cv);
+}
+
+static void event_wait(event_t* ev)
+{
+ pthread_mutex_lock(&ev->mu);
+ while (!ev->state)
+ pthread_cond_wait(&ev->cv, &ev->mu);
+ pthread_mutex_unlock(&ev->mu);
+}
+
+static int event_isset(event_t* ev)
+{
+ pthread_mutex_lock(&ev->mu);
+ int res = ev->state;
+ pthread_mutex_unlock(&ev->mu);
+ return res;
+}
+
+static int event_timedwait(event_t* ev, uint64_t timeout)
+{
+ uint64_t start = current_time_ms();
+ uint64_t now = start;
+ pthread_mutex_lock(&ev->mu);
+ for (;;) {
+ if (ev->state)
+ break;
+ uint64_t remain = timeout - (now - start);
+ struct timespec ts;
+ ts.tv_sec = remain / 1000;
+ ts.tv_nsec = (remain % 1000) * 1000 * 1000;
+ pthread_cond_timedwait(&ev->cv, &ev->mu, &ts);
+ now = current_time_ms();
+ if (now - start > timeout)
+ break;
+ }
+ int res = ev->state;
+ pthread_mutex_unlock(&ev->mu);
+ return res;
+}
+
+struct thread_t {
+ int created, call;
+ event_t ready, done;
+};
+
+static struct thread_t threads[16];
+static void execute_call(int call);
+static int running;
+
+static void* thr(void* arg)
+{
+ struct thread_t* th = (struct thread_t*)arg;
+ for (;;) {
+ event_wait(&th->ready);
+ event_reset(&th->ready);
+ execute_call(th->call);
+ __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED);
+ event_set(&th->done);
+ }
+ return 0;
+}
+
+static void execute_one(void)
+{
+ int i, call, thread;
+ for (call = 0; call < 5; call++) {
+ for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0]));
+ thread++) {
+ struct thread_t* th = &threads[thread];
+ if (!th->created) {
+ th->created = 1;
+ event_init(&th->ready);
+ event_init(&th->done);
+ event_set(&th->done);
+ thread_start(thr, th);
+ }
+ if (!event_isset(&th->done))
+ continue;
+ event_reset(&th->done);
+ th->call = call;
+ __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED);
+ event_set(&th->ready);
+ event_timedwait(&th->done, 50);
+ break;
+ }
+ }
+ for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++)
+ sleep_ms(1);
+}
+
+static void execute_one(void);
+
+#define WAIT_FLAGS 0
+
+static void loop(void)
+{
+ int iter = 0;
+ for (;; iter++) {
+ int pid = fork();
+ if (pid < 0)
+ exit(1);
+ if (pid == 0) {
+ execute_one();
+ exit(0);
+ }
+ int status = 0;
+ uint64_t start = current_time_ms();
+ for (;;) {
+ if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid)
+ break;
+ sleep_ms(1);
+ if (current_time_ms() - start < 5000)
+ continue;
+ kill_and_wait(pid, &status);
+ break;
+ }
+ }
+}
+
+void execute_call(int call)
+{
+ switch (call) {
+ case 0:
+ syscall(SYS_rfork, 0x93000ul);
+ break;
+ case 1:
+ syscall(SYS_kqueue);
+ break;
+ case 2:
+ *(uint32_t*)0x20000000 = 0x1d;
+ *(uint32_t*)0x20000004 = 0;
+ *(uint32_t*)0x20000008 = 0;
+ *(uint32_t*)0x2000000c = 0;
+ *(uint32_t*)0x20000010 = 0;
+ memset((void*)0x20000014, 0, 60);
+ syscall(SYS_procctl, 0ul, 0, 6ul, 0x20000000ul);
+ break;
+ case 3:
+ syscall(SYS_kevent, -1, 0ul, 0ul, 0ul, 0ul, 0ul);
+ break;
+ case 4:
+ syscall(SYS_truncate, 0ul, 4ul);
+ break;
+ }
+}
+int main(void)
+{
+ syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x1012ul, -1, 0ul);
+ for (procid = 0; procid < 2; procid++) {
+ if (fork() == 0) {
+ loop();
+ }
+ }
+ sleep(1000000);
+ return 0;
+}
+
+
+EOF
+mycc -o /tmp/syzkaller58 -Wall -Wextra -O0 /tmp/syzkaller58.c -lpthread \
+ || exit 1
+
+(cd /tmp; timeout 3m ./syzkaller58)
+
+rm -rf /tmp/syzkaller58 /tmp/syzkaller58.c /tmp/syzkaller58.core \
+ /tmp/syzkaller.??????
+[ $loaded ] && kldunload sctp.ko
+exit 0