aboutsummaryrefslogtreecommitdiff
path: root/tools/test
diff options
context:
space:
mode:
Diffstat (limited to 'tools/test')
-rw-r--r--tools/test/stress2/misc/all.exclude8
-rwxr-xr-xtools/test/stress2/misc/killpg5.sh19
-rwxr-xr-xtools/test/stress2/misc/syzkaller59.sh9
-rwxr-xr-xtools/test/stress2/misc/syzkaller82.sh4
-rwxr-xr-xtools/test/stress2/misc/syzkaller84.sh1
-rwxr-xr-xtools/test/stress2/misc/syzkaller87.sh384
6 files changed, 414 insertions, 11 deletions
diff --git a/tools/test/stress2/misc/all.exclude b/tools/test/stress2/misc/all.exclude
index 0658bfdc0c1b..9851496f8839 100644
--- a/tools/test/stress2/misc/all.exclude
+++ b/tools/test/stress2/misc/all.exclude
@@ -66,19 +66,11 @@ systrace.sh WiP 20200227
systrace2.sh WiP 20200227
syzkaller16.sh zonelimit issue 20210722
syzkaller28.sh panic: About to free ctl:0x... so:0x... and its in 1 20201120
-syzkaller31.sh panic: Bad tailq NEXT(0xfffffe01a0899430->tqh_last) != NULL 20220420
syzkaller55.sh https://people.freebsd.org/~pho/stress/log/log0533.txt 20240702
syzkaller59.sh Page fault 20220625
-syzkaller65.sh panic: in_pcblookup_hash_locked: invalid local address 20230318
-syzkaller66.sh panic: in_pcbconnect: inp is already connected 20230621
-syzkaller67.sh panic: ASan: Invalid access, 8-byte read at ... 20230621
syzkaller80.sh panic 20250711
-syzkaller81.sh panic 20250711
syzkaller82.sh panic: m_apply, length > size of mbuf chain 20250724
-syzkaller84.sh panic: Assertion !(sb->sb_state & SBS_CANTRCVMORE) 20250810
syzkaller85.sh panic: Assertion uio->uio_resid < 0 failed 20250928
-syzkaller86.sh Fatal trap 12: page fault while in kernel mode 20251001
-write2.sh panic: sndbuf_acquire: count 255 > free 0 20251003
quota3.sh https://people.freebsd.org/~pho/stress/log/log0604.txt 20250728
quota6.sh https://people.freebsd.org/~pho/stress/log/log0456.txt 20240707
truss3.sh WiP 20200915
diff --git a/tools/test/stress2/misc/killpg5.sh b/tools/test/stress2/misc/killpg5.sh
new file mode 100755
index 000000000000..4b98d30487d4
--- /dev/null
+++ b/tools/test/stress2/misc/killpg5.sh
@@ -0,0 +1,19 @@
+#!/bin/sh
+
+# Test scenario from:
+# Bug 290843 - killpg deadlock against a stopped interrupted fork
+# By : Bryan Drewery <bdrewery@FreeBSD.org>
+
+# Seen:
+# 0 70877 3650 7 0 0 14856 3680 sigsusp I+ 0 0:00.00 sh -x ./killpg5.sh
+# 0 70881 70877 10 0 0 14856 3688 killpg r D+ 0 0:00.07 sh -c trap "kill -9 %1; exit" INT; foo() { unset cmd; cmd=$(/sbin/sysctl -n vm.loadavg|/u
+
+sh -c 'trap "kill -9 %1; exit" INT; foo() { unset cmd; cmd=$(/sbin/sysctl -n vm.loadavg|/usr/bin/awk "{print \$2,\$3,\$4}"); case "${cmd:+set}" in set) ;; *) exit 99 ;; esac }; runner() { while foo; do :; done }; launch() { local -; set -m; PS4="child+ " runner & }; set -x; while :; do launch; sleep 0.1; kill -STOP %1; kill -TERM %1; kill -CONT %1; ret=0; wait; if [ $ret -eq 99 ]; then exit 99; fi; done;' > /dev/null 2>&1 &
+sleep 60
+kill -9 $!
+sleep .2
+killpgpid=`ps -lUroot | grep -v grep | grep ' killpg ' | awk '{print $2}'`
+[ -n "$killpgpid" ] && { ps -lp$killpgpid; exit 1; } # The bug
+pgrep -f 'foo()' | xargs kill > /dev/null 2>&1 # Cleanup
+wait
+exit 0
diff --git a/tools/test/stress2/misc/syzkaller59.sh b/tools/test/stress2/misc/syzkaller59.sh
index 1644ce627934..24cfbfd23278 100755
--- a/tools/test/stress2/misc/syzkaller59.sh
+++ b/tools/test/stress2/misc/syzkaller59.sh
@@ -147,7 +147,14 @@ int main(void)
EOF
mycc -o /tmp/syzkaller59 -Wall -Wextra -O0 /tmp/syzkaller59.c || exit 1
-(cd /tmp; timeout 3m ./syzkaller59)
+(cd /tmp; ./syzkaller59) &
+start=`date +%s`
+while [ $((`date +%s` - start)) -lt 180 ]; do
+ sleep 10
+ kill -0 $! > /dev/null 2>&1 || break
+done
+while pkill syzkaller59; do sleep .1; done
+wait
rm -rf /tmp/syzkaller59 /tmp/syzkaller59.c /tmp/syzkaller59.core \
/tmp/syzkaller.??????
diff --git a/tools/test/stress2/misc/syzkaller82.sh b/tools/test/stress2/misc/syzkaller82.sh
index c810942eb060..557d52d269c0 100755
--- a/tools/test/stress2/misc/syzkaller82.sh
+++ b/tools/test/stress2/misc/syzkaller82.sh
@@ -114,9 +114,9 @@ work=/tmp/$prog.dir
rm -rf $work
mkdir $work
cd /tmp/$prog.dir
-kldstat | grep -q sctp || { kldload sctp.ko && loaded=1; }
+kldstat | grep -q sctp && loaded=0 || { kldload sctp.ko && loaded=1; }
timeout 3m /tmp/$prog > /dev/null 2>&1
rm -rf /tmp/$prog /tmp/$prog.c /tmp/$prog.core /tmp/$prog.?????? $work
-[ $loaded ] && kldunload sctp.ko
+[ $loaded -eq 1 ] && kldunload sctp.ko
exit 0
diff --git a/tools/test/stress2/misc/syzkaller84.sh b/tools/test/stress2/misc/syzkaller84.sh
index a7976be2eeb6..631dd6e2dd6f 100755
--- a/tools/test/stress2/misc/syzkaller84.sh
+++ b/tools/test/stress2/misc/syzkaller84.sh
@@ -398,5 +398,6 @@ kldstat | grep -q sctp || { kldload sctp.ko && loaded=1; }
timeout 3m /tmp/$prog > /dev/null 2>&1
rm -rf /tmp/$prog /tmp/$prog.c /tmp/$prog.core $work
+set +u
[ $loaded ] && kldunload sctp.ko
exit 0
diff --git a/tools/test/stress2/misc/syzkaller87.sh b/tools/test/stress2/misc/syzkaller87.sh
new file mode 100755
index 000000000000..5dc77c55c419
--- /dev/null
+++ b/tools/test/stress2/misc/syzkaller87.sh
@@ -0,0 +1,384 @@
+#!/bin/sh
+
+# panic: freevnode: cannot lock vp 0xfffffe01634e4de0 for pollinfo destroy
+# cpuid = 7
+# time = 1762875612
+# KDB: stack backtrace:
+# db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe00ffce8bd0
+# vpanic() at vpanic+0x136/frame 0xfffffe00ffce8d00
+# panic() at panic+0x43/frame 0xfffffe00ffce8d60
+# freevnode() at freevnode+0x536/frame 0xfffffe00ffce8dc0
+# vput_final() at vput_final+0x96/frame 0xfffffe00ffce8e10
+# inotify_reap() at inotify_reap+0x6e/frame 0xfffffe00ffce8e40
+# taskqueue_run_locked() at taskqueue_run_locked+0x1c2/frame 0xfffffe00ffce8ec0
+# taskqueue_thread_loop() at taskqueue_thread_loop+0xd3/frame 0xfffffe00ffce8ef0
+# fork_exit() at fork_exit+0x82/frame 0xfffffe00ffce8f30
+# fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe00ffce8f30
+# --- trap 0, rip = 0, rsp = 0, rbp = 0 ---
+# KDB: enter: panic
+# [ thread pid 0 tid 100045 ]
+# Stopped at $0,0x12129d2(%rip)
+# db> x/s version
+# version: FreeBSD 16.0-CURRENT #0 main-n281796-e1c6f4cb9bd2-dirty: Tue Nov 11 10:53:40 CET 2025
+# pho@mercat1.netperf.freebsd.org:/usr/src/sys/amd64/compile/PHO
+# db>
+
+[ `id -u ` -ne 0 ] && echo "Must be root!" && exit 1
+
+. ../default.cfg
+set -u
+prog=$(basename "$0" .sh)
+cat > /tmp/$prog.c <<EOF
+// https://syzkaller.appspot.com/bug?id=8a22955cd068cf454dd8062d24e826c72b1c4542
+// autogenerated by syzkaller (https://github.com/google/syzkaller)
+// syzbot+6676b3ff282d590b0fb3@syzkaller.appspotmail.com
+
+#define _GNU_SOURCE
+
+#include <sys/types.h>
+
+#include <dirent.h>
+#include <errno.h>
+#include <pwd.h>
+#include <setjmp.h>
+#include <signal.h>
+#include <stdarg.h>
+#include <stdbool.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/endian.h>
+#include <sys/stat.h>
+#include <sys/syscall.h>
+#include <sys/wait.h>
+#include <time.h>
+#include <unistd.h>
+
+#ifndef SYS___specialfd
+#define SYS___specialfd 577
+#endif
+#ifndef SYS_inotify_add_watch_at
+#define SYS_inotify_add_watch_at 593
+#endif
+
+static __thread int clone_ongoing;
+static __thread int skip_segv;
+static __thread jmp_buf segv_env;
+
+static void segv_handler(int sig, siginfo_t* info, void* ctx __unused)
+{
+ if (__atomic_load_n(&clone_ongoing, __ATOMIC_RELAXED) != 0) {
+ exit(sig);
+ }
+ uintptr_t addr = (uintptr_t)info->si_addr;
+ const uintptr_t prog_start = 1 << 20;
+ const uintptr_t prog_end = 100 << 20;
+ int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0;
+ int valid = addr < prog_start || addr > prog_end;
+ if (sig == SIGBUS)
+ valid = 1;
+ if (skip && valid) {
+ _longjmp(segv_env, 1);
+ }
+ exit(sig);
+}
+
+static void install_segv_handler(void)
+{
+ struct sigaction sa;
+ memset(&sa, 0, sizeof(sa));
+ sa.sa_sigaction = segv_handler;
+ sa.sa_flags = SA_NODEFER | SA_SIGINFO;
+ sigaction(SIGSEGV, &sa, NULL);
+ sigaction(SIGBUS, &sa, NULL);
+}
+
+#define NONFAILING(...) \
+ ({ \
+ int ok = 1; \
+ __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \
+ if (_setjmp(segv_env) == 0) { \
+ __VA_ARGS__; \
+ } else \
+ ok = 0; \
+ __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \
+ ok; \
+ })
+
+static void kill_and_wait(int pid, int* status)
+{
+ kill(pid, SIGKILL);
+ while (waitpid(-1, status, 0) != pid) {
+ }
+}
+
+static void sleep_ms(uint64_t ms)
+{
+ usleep(ms * 1000);
+}
+
+static uint64_t current_time_ms(void)
+{
+ struct timespec ts;
+ if (clock_gettime(CLOCK_MONOTONIC, &ts))
+ exit(1);
+ return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
+}
+
+static void use_temporary_dir(void)
+{
+ char tmpdir_template[] = "./syzkaller.XXXXXX";
+ char* tmpdir = mkdtemp(tmpdir_template);
+ if (!tmpdir)
+ exit(1);
+ if (chmod(tmpdir, 0777))
+ exit(1);
+ if (chdir(tmpdir))
+ exit(1);
+}
+
+static void reset_flags(const char* filename)
+{
+ struct stat st;
+ if (lstat(filename, &st))
+ exit(1);
+ st.st_flags &= ~(SF_NOUNLINK | UF_NOUNLINK | SF_IMMUTABLE | UF_IMMUTABLE |
+ SF_APPEND | UF_APPEND);
+ if (lchflags(filename, st.st_flags))
+ exit(1);
+}
+static void __attribute__((noinline)) remove_dir(const char* dir)
+{
+ DIR* dp = opendir(dir);
+ if (dp == NULL) {
+ if (errno == EACCES) {
+ if (rmdir(dir))
+ exit(1);
+ return;
+ }
+ exit(1);
+ }
+ struct dirent* ep = 0;
+ while ((ep = readdir(dp))) {
+ if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0)
+ continue;
+ char filename[FILENAME_MAX];
+ snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name);
+ struct stat st;
+ if (lstat(filename, &st))
+ exit(1);
+ if (S_ISDIR(st.st_mode)) {
+ remove_dir(filename);
+ continue;
+ }
+ if (unlink(filename)) {
+ if (errno == EPERM) {
+ reset_flags(filename);
+ reset_flags(dir);
+ if (unlink(filename) == 0)
+ continue;
+ }
+ exit(1);
+ }
+ }
+ closedir(dp);
+ while (rmdir(dir)) {
+ if (errno == EPERM) {
+ reset_flags(dir);
+ if (rmdir(dir) == 0)
+ break;
+ }
+ exit(1);
+ }
+}
+
+static void execute_one(void);
+
+#define WAIT_FLAGS 0
+
+static void loop(void)
+{
+ int iter = 0;
+ for (;; iter++) {
+ char cwdbuf[32];
+ sprintf(cwdbuf, "./%d", iter);
+ if (mkdir(cwdbuf, 0777))
+ exit(1);
+ int pid = fork();
+ if (pid < 0)
+ exit(1);
+ if (pid == 0) {
+ if (chdir(cwdbuf))
+ exit(1);
+ execute_one();
+ exit(0);
+ }
+ int status = 0;
+ uint64_t start = current_time_ms();
+ for (;;) {
+ sleep_ms(10);
+ if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid)
+ break;
+ if (current_time_ms() - start < 5000)
+ continue;
+ kill_and_wait(pid, &status);
+ break;
+ }
+ remove_dir(cwdbuf);
+ }
+}
+
+uint64_t r[1] = {0xffffffffffffffff};
+
+void execute_one(void)
+{
+ intptr_t res = 0;
+ if (write(1, "executing program\n", sizeof("executing program\n") - 1)) {
+ }
+ // openat\$evdev arguments: [
+ // fd: const = 0xffffffffffffff9c (8 bytes)
+ // file: ptr[in, buffer] {
+ // buffer: {2f 64 65 76 2f 69 6e 70 75 74 2f 65 76 65 6e 74 4e 00}
+ // (length 0x12)
+ // }
+ // flags: open_flags = 0x100 (8 bytes)
+ // mode: const = 0x0 (8 bytes)
+ // ]
+ // returns fd_evdev
+ NONFAILING(memcpy((void*)0x200000000040, "/dev/input/eventN\000", 18));
+ syscall(SYS_openat, /*fd=*/0xffffffffffffff9cul, /*file=*/0x200000000040ul,
+ /*flags=O_NOFOLLOW*/ 0x100ul, /*mode=*/0ul);
+ // kqueue arguments: [
+ // ]
+ // returns kqueue
+ syscall(SYS_kqueue);
+ // pipe2 arguments: [
+ // pipefd: ptr[out, pipefd] {
+ // pipefd {
+ // rfd: fd (resource)
+ // wfd: fd (resource)
+ // }
+ // }
+ // flags: pipe_flags = 0x0 (8 bytes)
+ // ]
+ syscall(SYS_pipe2, /*pipefd=*/0x200000000480ul, /*flags=*/0ul);
+ // socket\$unix arguments: [
+ // domain: const = 0x1 (8 bytes)
+ // type: unix_socket_type = 0x5 (8 bytes)
+ // proto: const = 0x0 (1 bytes)
+ // ]
+ // returns sock_unix
+ syscall(SYS_socket, /*domain=*/1ul, /*type=SOCK_SEQPACKET*/ 5ul, /*proto=*/0);
+ // kqueue arguments: [
+ // ]
+ // returns kqueue
+ syscall(SYS_kqueue);
+ // mprotect arguments: [
+ // addr: VMA[0x2000]
+ // len: len = 0x2000 (8 bytes)
+ // prot: mmap_prot = 0x5 (8 bytes)
+ // ]
+ syscall(SYS_mprotect, /*addr=*/0x200000000000ul, /*len=*/0x2000ul,
+ /*prot=PROT_READ|PROT_EXEC*/ 5ul);
+ // symlink arguments: [
+ // old: ptr[in, buffer] {
+ // buffer: {2e 00} (length 0x2)
+ // }
+ // new: ptr[in, buffer] {
+ // buffer: {2e 2f 66 69 6c 65 30 00} (length 0x8)
+ // }
+ // ]
+ NONFAILING(memcpy((void*)0x200000000000, ".\000", 2));
+ NONFAILING(memcpy((void*)0x200000000040, "./file0\000", 8));
+ syscall(SYS_symlink, /*old=*/0x200000000000ul, /*new=*/0x200000000040ul);
+ // __specialfd\$inotify arguments: [
+ // type: const = 0x2 (8 bytes)
+ // req: ptr[in, specialfd_inotify] {
+ // specialfd_inotify {
+ // flags: inotify_flags = 0x0 (4 bytes)
+ // }
+ // }
+ // len: len = 0x4 (8 bytes)
+ // ]
+ // returns fd_inotify
+ NONFAILING(*(uint32_t*)0x200000000180 = 0);
+ res = syscall(SYS___specialfd, /*type=*/2ul, /*req=*/0x200000000180ul,
+ /*len=*/4ul);
+ if (res != -1)
+ r[0] = res;
+ // inotify_add_watch_at arguments: [
+ // fd: fd_inotify (resource)
+ // dfd: fd_dir (resource)
+ // file: ptr[in, buffer] {
+ // buffer: {2e 2f 66 69 6c 65 30 61 61 61 61 61 61 61 61 61 61 61 61 61
+ // 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
+ // 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
+ // 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
+ // 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
+ // 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
+ // 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
+ // 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
+ // 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
+ // 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
+ // 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 2f 66
+ // 69 6c 65 30 00} (length 0xff)
+ // }
+ // mask: inotify_mask = 0x82000204 (8 bytes)
+ // ]
+ // returns inotifydesc
+ NONFAILING(
+ memcpy((void*)0x200000000040,
+ "./"
+ "file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+ "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+ "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+ "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\000",
+ 255));
+ syscall(SYS_inotify_add_watch_at, /*fd=*/r[0], /*dfd=*/(intptr_t)-1,
+ /*file=*/0x200000000040ul,
+ /*mask=IN_ONESHOT|IN_DONT_FOLLOW|IN_DELETE|IN_ATTRIB*/ 0x82000204ul);
+ // unlink arguments: [
+ // path: ptr[in, buffer] {
+ // buffer: {2e 2f 66 69 6c 65 30 00} (length 0x8)
+ // }
+ // ]
+ NONFAILING(memcpy((void*)0x200000000040, "./file0\000", 8));
+ syscall(SYS_unlink, /*path=*/0x200000000040ul);
+}
+int main(void)
+{
+ syscall(SYS_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul,
+ /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul,
+ /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x1012ul,
+ /*fd=*/(intptr_t)-1, /*offset=*/0ul);
+ const char* reason;
+ (void)reason;
+ install_segv_handler();
+ use_temporary_dir();
+ loop();
+ return 0;
+}
+EOF
+mycc -o /tmp/$prog -Wall -Wextra -O0 /tmp/$prog.c -lpthread || exit 1
+
+(cd ../testcases/swap; ./swap -t 3m -i 30 -l 100 > /dev/null 2>&1) &
+sleep 5
+
+work=/tmp/$prog.dir
+rm -rf $work
+mkdir $work
+cd /tmp/$prog.dir
+for i in `jot 30`; do
+ (
+ mkdir d$i
+ cd d$i
+ timeout 3m /tmp/$prog > /dev/null 2>&1 &
+ )
+done
+while pgrep -q $prog; do sleep 2; done
+while pkill swap; do :; done
+wait
+
+rm -rf /tmp/$prog /tmp/$prog.c /tmp/$prog.core /tmp/syzkaller.?????? $work
+exit 0