1*8a272653SPeter Holm#!/bin/sh 2*8a272653SPeter Holm 3*8a272653SPeter Holm# Fatal trap 12: page fault while in kernel mode 4*8a272653SPeter Holm# cpuid = 0; apic id = 00 5*8a272653SPeter Holm# fault virtual address = 0x18 6*8a272653SPeter Holm# fault code = supervisor read data, page not present 7*8a272653SPeter Holm# instruction pointer = 0x20:0xffffffff80ffe995 8*8a272653SPeter Holm# stack pointer = 0x28:0xfffffe0015e1d6f0 9*8a272653SPeter Holm# frame pointer = 0x28:0xfffffe0015e1d720 10*8a272653SPeter Holm# code segment = base 0x0, limit 0xfffff, type 0x1b 11*8a272653SPeter Holm# = DPL 0, pres 1, long 1, def32 0, gran 1 12*8a272653SPeter Holm# processor eflags = interrupt enabled, resume, IOPL = 0 13*8a272653SPeter Holm# current process = 744 (syz-executor7538254) 14*8a272653SPeter Holm# trap number = 12 15*8a272653SPeter Holm# panic: page fault 16*8a272653SPeter Holm# cpuid = 0 17*8a272653SPeter Holm# time = 1575776142 18*8a272653SPeter Holm# KDB: stack backtrace: 19*8a272653SPeter Holm# db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe0015e1d2f0 20*8a272653SPeter Holm# vpanic() at vpanic+0x1c7/frame 0xfffffe0015e1d360 21*8a272653SPeter Holm# panic() at panic+0x43/frame 0xfffffe0015e1d3c0 22*8a272653SPeter Holm# trap_fatal() at trap_fatal+0x4cc/frame 0xfffffe0015e1d440 23*8a272653SPeter Holm# trap_pfault() at trap_pfault+0xdc/frame 0xfffffe0015e1d4e0 24*8a272653SPeter Holm# trap() at trap+0x441/frame 0xfffffe0015e1d620 25*8a272653SPeter Holm# calltrap() at calltrap+0x8/frame 0xfffffe0015e1d620 26*8a272653SPeter Holm# --- trap 0xc, rip = 0xffffffff80ffe995, rsp = 0xfffffe0015e1d6f0, rbp = 0xfffffe0015e1d720 --- 27*8a272653SPeter Holm# __mtx_assert() at __mtx_assert+0x85/frame 0xfffffe0015e1d720 28*8a272653SPeter Holm# uipc_send() at uipc_send+0xeec/frame 0xfffffe0015e1d810 29*8a272653SPeter Holm# sosend_generic() at sosend_generic+0x707/frame 0xfffffe0015e1d8d0 30*8a272653SPeter Holm# sosend() at sosend+0xc6/frame 0xfffffe0015e1d940 31*8a272653SPeter Holm# kern_sendit() at kern_sendit+0x32d/frame 0xfffffe0015e1d9f0 32*8a272653SPeter Holm# sendit() at sendit+0x226/frame 0xfffffe0015e1da50 33*8a272653SPeter Holm# sys_sendmsg() at sys_sendmsg+0x8b/frame 0xfffffe0015e1dab0 34*8a272653SPeter Holm# amd64_syscall() at amd64_syscall+0x46d/frame 0xfffffe0015e1dbf0 35*8a272653SPeter Holm# fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe0015e1dbf0 36*8a272653SPeter Holm# --- syscall (0, FreeBSD ELF64, nosys), rip = 0x41c3ea, rsp = 0x7fffffffeb98, rbp = 0x7fffffffebf0 --- 37*8a272653SPeter Holm 38*8a272653SPeter Holm# Reproduced on r359818 39*8a272653SPeter Holm# Fixed by r359893 40*8a272653SPeter Holm 41*8a272653SPeter Holm[ `uname -p` = "i386" ] && exit 0 42*8a272653SPeter Holm 43*8a272653SPeter Holm. ../default.cfg 44*8a272653SPeter Holmcat > /tmp/syzkaller9.c <<EOF 45*8a272653SPeter Holm// http://syzkaller.backtrace.io:8080/report?id=03a08d05681c3e7f38ab6ab3f0d025105c3dcea3 46*8a272653SPeter Holm// autogenerated by syzkaller (https://github.com/google/syzkaller) 47*8a272653SPeter Holm 48*8a272653SPeter Holm#define _GNU_SOURCE 49*8a272653SPeter Holm 50*8a272653SPeter Holm#include <pwd.h> 51*8a272653SPeter Holm#include <stdarg.h> 52*8a272653SPeter Holm#include <stdbool.h> 53*8a272653SPeter Holm#include <stdint.h> 54*8a272653SPeter Holm#include <stdio.h> 55*8a272653SPeter Holm#include <stdlib.h> 56*8a272653SPeter Holm#include <string.h> 57*8a272653SPeter Holm#include <sys/endian.h> 58*8a272653SPeter Holm#include <sys/syscall.h> 59*8a272653SPeter Holm#include <unistd.h> 60*8a272653SPeter Holm 61*8a272653SPeter Holmuint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff}; 62*8a272653SPeter Holm 63*8a272653SPeter Holmint main(void) 64*8a272653SPeter Holm{ 65*8a272653SPeter Holm syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 3ul, 0x1012ul, -1, 0ul); 66*8a272653SPeter Holm intptr_t res = 0; 67*8a272653SPeter Holm res = syscall(SYS_socket, 1ul, 5ul, 0ul); 68*8a272653SPeter Holm if (res != -1) 69*8a272653SPeter Holm r[0] = res; 70*8a272653SPeter Holm memcpy((void*)0x20000000, "\x1d\x01\x2e\x2f\x66\x69\x6c\x65\x30\x00", 10); 71*8a272653SPeter Holm syscall(SYS_bind, r[0], 0x20000000ul, 0xaul); 72*8a272653SPeter Holm syscall(SYS_listen, r[0], 0); 73*8a272653SPeter Holm res = syscall(SYS_socket, 1ul, 5ul, 0ul); 74*8a272653SPeter Holm if (res != -1) 75*8a272653SPeter Holm r[1] = res; 76*8a272653SPeter Holm *(uint64_t*)0x20002640 = 0x20000000; 77*8a272653SPeter Holm *(uint8_t*)0x20000000 = 0xa; 78*8a272653SPeter Holm *(uint8_t*)0x20000001 = 1; 79*8a272653SPeter Holm memcpy((void*)0x20000002, "./file0\000", 8); 80*8a272653SPeter Holm *(uint32_t*)0x20002648 = 0xa; 81*8a272653SPeter Holm *(uint64_t*)0x20002650 = 0; 82*8a272653SPeter Holm *(uint64_t*)0x20002658 = 0; 83*8a272653SPeter Holm *(uint64_t*)0x20002660 = 0x20002580; 84*8a272653SPeter Holm memcpy((void*)0x20002580, 85*8a272653SPeter Holm "\x10\x00\x00\x00\xff\xff\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00", 86*8a272653SPeter Holm 16); 87*8a272653SPeter Holm *(uint64_t*)0x20002668 = 0x10; 88*8a272653SPeter Holm *(uint32_t*)0x20002670 = 0; 89*8a272653SPeter Holm syscall(SYS_sendmsg, r[1], 0x20002640ul, 0ul); 90*8a272653SPeter Holm return 0; 91*8a272653SPeter Holm} 92*8a272653SPeter HolmEOF 93*8a272653SPeter Holmmycc -o /tmp/syzkaller9 -Wall -Wextra -O2 /tmp/syzkaller9.c -lpthread || 94*8a272653SPeter Holm exit 1 95*8a272653SPeter Holm 96*8a272653SPeter Holm(cd /tmp; ./syzkaller9) & 97*8a272653SPeter Holmsleep 60 98*8a272653SPeter Holmpkill -9 syzkaller9 99*8a272653SPeter Holmwait 100*8a272653SPeter Holm 101*8a272653SPeter Holmrm -f /tmp/syzkaller9 /tmp/syzkaller9.c /tmp/syzkaller9.core /tmp/file0 102*8a272653SPeter Holmexit 0 103