blob: efed34e2671449eb9df3a3f726989f02f1d7b790 [file] [log] [blame]
// general protection fault in crypto_remove_spawns
// https://syzkaller.appspot.com/bug?id=406e8923b864c8454494e6a3d61c50dbd962d37c
// status:fixed
// autogenerated by syzkaller (http://github.com/google/syzkaller)
#define _GNU_SOURCE
#include <errno.h>
#include <pthread.h>
#include <signal.h>
#include <stdarg.h>
#include <stdio.h>
#include <stdlib.h>
#include <sys/prctl.h>
#include <sys/syscall.h>
#include <sys/time.h>
#include <sys/wait.h>
#include <time.h>
#include <unistd.h>
__attribute__((noreturn)) static void doexit(int status)
{
volatile unsigned i;
syscall(__NR_exit_group, status);
for (i = 0;; i++) {
}
}
#include <stdint.h>
#include <string.h>
const int kFailStatus = 67;
const int kRetryStatus = 69;
static void fail(const char* msg, ...)
{
int e = errno;
va_list args;
va_start(args, msg);
vfprintf(stderr, msg, args);
va_end(args);
fprintf(stderr, " (errno %d)\n", e);
doexit((e == ENOMEM || e == EAGAIN) ? kRetryStatus : kFailStatus);
}
static uint64_t current_time_ms()
{
struct timespec ts;
if (clock_gettime(CLOCK_MONOTONIC, &ts))
fail("clock_gettime failed");
return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
}
static void test();
void loop()
{
int iter;
for (iter = 0;; iter++) {
int pid = fork();
if (pid < 0)
fail("clone failed");
if (pid == 0) {
prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
setpgrp();
test();
doexit(0);
}
int status = 0;
uint64_t start = current_time_ms();
for (;;) {
int res = waitpid(-1, &status, __WALL | WNOHANG);
if (res == pid)
break;
usleep(1000);
if (current_time_ms() - start > 5 * 1000) {
kill(-pid, SIGKILL);
kill(pid, SIGKILL);
while (waitpid(-1, &status, __WALL) != pid) {
}
break;
}
}
}
}
#ifndef __NR_mmap
#define __NR_mmap 192
#endif
#ifndef __NR_socket
#define __NR_socket 359
#endif
#ifndef __NR_bind
#define __NR_bind 361
#endif
#undef __NR_mmap
#define __NR_mmap __NR_mmap2
long r[15];
void* thr(void* arg)
{
switch ((long)arg) {
case 0:
r[0] = syscall(__NR_mmap, 0x20000000ul, 0xfff000ul, 0x3ul, 0x32ul,
0xfffffffffffffffful, 0x0ul);
break;
case 1:
r[1] = syscall(__NR_socket, 0x26ul, 0x5ul, 0x0ul);
break;
case 2:
*(uint16_t*)0x20000000 = (uint16_t)0x26;
memcpy((void*)0x20000002,
"\x68\x61\x73\x68\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
14);
*(uint32_t*)0x20000010 = (uint32_t)0x20;
*(uint32_t*)0x20000014 = (uint32_t)0xffffffffffffffff;
memcpy((void*)0x20000018,
"\x63\x6d\x61\x63\x28\x64\x65\x73\x33\x5f\x65\x64\x65\x29"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00",
64);
r[7] = syscall(__NR_bind, r[1], 0x20000000ul, 0x58ul);
break;
case 3:
r[8] = syscall(__NR_socket, 0x26ul, 0x5ul, 0x0ul);
break;
case 4:
*(uint16_t*)0x20000fa8 = (uint16_t)0x26;
memcpy((void*)0x20000faa,
"\x61\x65\x61\x64\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
14);
*(uint32_t*)0x20000fb8 = (uint32_t)0x0;
*(uint32_t*)0x20000fbc = (uint32_t)0x0;
memcpy((void*)0x20000fc0,
"\x61\x75\x74\x68\x65\x6e\x63\x28\x63\x6d\x61\x63\x28\x64"
"\x65\x73\x33\x5f\x65\x64\x65\x2d\x61\x73\x6d\x29\x2c\x70"
"\x63\x62\x63\x2d\x61\x65\x73\x2d\x61\x65\x73\x6e\x69\x29"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00",
64);
r[14] = syscall(__NR_bind, r[8], 0x20000fa8ul, 0x58ul);
break;
}
return 0;
}
void test()
{
long i;
pthread_t th[10];
memset(r, -1, sizeof(r));
srand(getpid());
for (i = 0; i < 5; i++) {
pthread_create(&th[i], 0, thr, (void*)i);
usleep(rand() % 10000);
}
for (i = 0; i < 5; i++) {
pthread_create(&th[5 + i], 0, thr, (void*)i);
if (rand() % 2)
usleep(rand() % 10000);
}
usleep(rand() % 100000);
}
int main()
{
loop();
return 0;
}