| // memory leak in bcsp_recv |
| // https://syzkaller.appspot.com/bug?id=84f71cc91e3c76e86a37858f87f0807ee8294deb |
| // status:fixed |
| // autogenerated by syzkaller (https://github.com/google/syzkaller) |
| |
| #define _GNU_SOURCE |
| |
| #include <dirent.h> |
| #include <endian.h> |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <signal.h> |
| #include <stdarg.h> |
| #include <stdbool.h> |
| #include <stdint.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/prctl.h> |
| #include <sys/stat.h> |
| #include <sys/syscall.h> |
| #include <sys/types.h> |
| #include <sys/wait.h> |
| #include <time.h> |
| #include <unistd.h> |
| |
| unsigned long long procid; |
| |
| static void sleep_ms(uint64_t ms) |
| { |
| usleep(ms * 1000); |
| } |
| |
| static uint64_t current_time_ms(void) |
| { |
| struct timespec ts; |
| if (clock_gettime(CLOCK_MONOTONIC, &ts)) |
| exit(1); |
| return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; |
| } |
| |
| static bool write_file(const char* file, const char* what, ...) |
| { |
| char buf[1024]; |
| va_list args; |
| va_start(args, what); |
| vsnprintf(buf, sizeof(buf), what, args); |
| va_end(args); |
| buf[sizeof(buf) - 1] = 0; |
| int len = strlen(buf); |
| int fd = open(file, O_WRONLY | O_CLOEXEC); |
| if (fd == -1) |
| return false; |
| if (write(fd, buf, len) != len) { |
| int err = errno; |
| close(fd); |
| errno = err; |
| return false; |
| } |
| close(fd); |
| return true; |
| } |
| |
| static void kill_and_wait(int pid, int* status) |
| { |
| kill(-pid, SIGKILL); |
| kill(pid, SIGKILL); |
| int i; |
| for (i = 0; i < 100; i++) { |
| if (waitpid(-1, status, WNOHANG | __WALL) == pid) |
| return; |
| usleep(1000); |
| } |
| DIR* dir = opendir("/sys/fs/fuse/connections"); |
| if (dir) { |
| for (;;) { |
| struct dirent* ent = readdir(dir); |
| if (!ent) |
| break; |
| if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0) |
| continue; |
| char abort[300]; |
| snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort", |
| ent->d_name); |
| int fd = open(abort, O_WRONLY); |
| if (fd == -1) { |
| continue; |
| } |
| if (write(fd, abort, 1) < 0) { |
| } |
| close(fd); |
| } |
| closedir(dir); |
| } else { |
| } |
| while (waitpid(-1, status, __WALL) != pid) { |
| } |
| } |
| |
| static void setup_test() |
| { |
| prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); |
| setpgrp(); |
| write_file("/proc/self/oom_score_adj", "1000"); |
| } |
| |
| #define KMEMLEAK_FILE "/sys/kernel/debug/kmemleak" |
| |
| static void setup_leak() |
| { |
| if (!write_file(KMEMLEAK_FILE, "scan")) |
| exit(1); |
| sleep(5); |
| if (!write_file(KMEMLEAK_FILE, "scan")) |
| exit(1); |
| if (!write_file(KMEMLEAK_FILE, "clear")) |
| exit(1); |
| } |
| |
| static void check_leaks(void) |
| { |
| int fd = open(KMEMLEAK_FILE, O_RDWR); |
| if (fd == -1) |
| exit(1); |
| uint64_t start = current_time_ms(); |
| if (write(fd, "scan", 4) != 4) |
| exit(1); |
| sleep(1); |
| while (current_time_ms() - start < 4 * 1000) |
| sleep(1); |
| if (write(fd, "scan", 4) != 4) |
| exit(1); |
| static char buf[128 << 10]; |
| ssize_t n = read(fd, buf, sizeof(buf) - 1); |
| if (n < 0) |
| exit(1); |
| int nleaks = 0; |
| if (n != 0) { |
| sleep(1); |
| if (write(fd, "scan", 4) != 4) |
| exit(1); |
| if (lseek(fd, 0, SEEK_SET) < 0) |
| exit(1); |
| n = read(fd, buf, sizeof(buf) - 1); |
| if (n < 0) |
| exit(1); |
| buf[n] = 0; |
| char* pos = buf; |
| char* end = buf + n; |
| while (pos < end) { |
| char* next = strstr(pos + 1, "unreferenced object"); |
| if (!next) |
| next = end; |
| char prev = *next; |
| *next = 0; |
| fprintf(stderr, "BUG: memory leak\n%s\n", pos); |
| *next = prev; |
| pos = next; |
| nleaks++; |
| } |
| } |
| if (write(fd, "clear", 5) != 5) |
| exit(1); |
| close(fd); |
| if (nleaks) |
| exit(1); |
| } |
| |
| static void execute_one(void); |
| |
| #define WAIT_FLAGS __WALL |
| |
| static void loop(void) |
| { |
| int iter; |
| for (iter = 0;; iter++) { |
| int pid = fork(); |
| if (pid < 0) |
| exit(1); |
| if (pid == 0) { |
| setup_test(); |
| execute_one(); |
| exit(0); |
| } |
| int status = 0; |
| uint64_t start = current_time_ms(); |
| for (;;) { |
| if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) |
| break; |
| sleep_ms(1); |
| if (current_time_ms() - start < 5 * 1000) |
| continue; |
| kill_and_wait(pid, &status); |
| break; |
| } |
| check_leaks(); |
| } |
| } |
| |
| uint64_t r[1] = {0xffffffffffffffff}; |
| |
| void execute_one(void) |
| { |
| intptr_t res = 0; |
| memcpy((void*)0x20000000, "/dev/ptmx\000", 10); |
| res = syscall(__NR_openat, 0xffffffffffffff9c, 0x20000000, 0, 0); |
| if (res != -1) |
| r[0] = res; |
| *(uint32_t*)0x20000040 = 0xf; |
| syscall(__NR_ioctl, r[0], 0x5423, 0x20000040); |
| syscall(__NR_ioctl, r[0], 0x400455c8, 1); |
| *(uint32_t*)0x20000100 = 0; |
| syscall(__NR_ioctl, r[0], 0x5412, 0x20000100); |
| } |
| int main(void) |
| { |
| syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); |
| setup_leak(); |
| for (procid = 0; procid < 8; procid++) { |
| if (fork() == 0) { |
| loop(); |
| } |
| } |
| sleep(1000000); |
| return 0; |
| } |