| // memory leak in pfkey_xfrm_policy2msg_prep |
| // https://syzkaller.appspot.com/bug?id=a8e738a29ae80ea17c25ab6a136d95f7e96f76dc |
| // status:fixed |
| // autogenerated by syzkaller (https://github.com/google/syzkaller) |
| |
| #define _GNU_SOURCE |
| |
| #include <dirent.h> |
| #include <endian.h> |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <signal.h> |
| #include <stdarg.h> |
| #include <stdbool.h> |
| #include <stdint.h> |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/prctl.h> |
| #include <sys/stat.h> |
| #include <sys/syscall.h> |
| #include <sys/types.h> |
| #include <sys/wait.h> |
| #include <time.h> |
| #include <unistd.h> |
| |
| static void sleep_ms(uint64_t ms) |
| { |
| usleep(ms * 1000); |
| } |
| |
| static uint64_t current_time_ms(void) |
| { |
| struct timespec ts; |
| if (clock_gettime(CLOCK_MONOTONIC, &ts)) |
| exit(1); |
| return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000; |
| } |
| |
| static bool write_file(const char* file, const char* what, ...) |
| { |
| char buf[1024]; |
| va_list args; |
| va_start(args, what); |
| vsnprintf(buf, sizeof(buf), what, args); |
| va_end(args); |
| buf[sizeof(buf) - 1] = 0; |
| int len = strlen(buf); |
| int fd = open(file, O_WRONLY | O_CLOEXEC); |
| if (fd == -1) |
| return false; |
| if (write(fd, buf, len) != len) { |
| int err = errno; |
| close(fd); |
| errno = err; |
| return false; |
| } |
| close(fd); |
| return true; |
| } |
| |
| static void kill_and_wait(int pid, int* status) |
| { |
| kill(-pid, SIGKILL); |
| kill(pid, SIGKILL); |
| int i; |
| for (i = 0; i < 100; i++) { |
| if (waitpid(-1, status, WNOHANG | __WALL) == pid) |
| return; |
| usleep(1000); |
| } |
| DIR* dir = opendir("/sys/fs/fuse/connections"); |
| if (dir) { |
| for (;;) { |
| struct dirent* ent = readdir(dir); |
| if (!ent) |
| break; |
| if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0) |
| continue; |
| char abort[300]; |
| snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort", |
| ent->d_name); |
| int fd = open(abort, O_WRONLY); |
| if (fd == -1) { |
| continue; |
| } |
| if (write(fd, abort, 1) < 0) { |
| } |
| close(fd); |
| } |
| closedir(dir); |
| } else { |
| } |
| while (waitpid(-1, status, __WALL) != pid) { |
| } |
| } |
| |
| static void setup_test() |
| { |
| prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0); |
| setpgrp(); |
| write_file("/proc/self/oom_score_adj", "1000"); |
| } |
| |
| #define KMEMLEAK_FILE "/sys/kernel/debug/kmemleak" |
| |
| static void setup_leak() |
| { |
| if (!write_file(KMEMLEAK_FILE, "scan")) |
| exit(1); |
| sleep(5); |
| if (!write_file(KMEMLEAK_FILE, "scan")) |
| exit(1); |
| if (!write_file(KMEMLEAK_FILE, "clear")) |
| exit(1); |
| } |
| |
| static void check_leaks(void) |
| { |
| int fd = open(KMEMLEAK_FILE, O_RDWR); |
| if (fd == -1) |
| exit(1); |
| uint64_t start = current_time_ms(); |
| if (write(fd, "scan", 4) != 4) |
| exit(1); |
| sleep(1); |
| while (current_time_ms() - start < 4 * 1000) |
| sleep(1); |
| if (write(fd, "scan", 4) != 4) |
| exit(1); |
| static char buf[128 << 10]; |
| ssize_t n = read(fd, buf, sizeof(buf) - 1); |
| if (n < 0) |
| exit(1); |
| int nleaks = 0; |
| if (n != 0) { |
| sleep(1); |
| if (write(fd, "scan", 4) != 4) |
| exit(1); |
| if (lseek(fd, 0, SEEK_SET) < 0) |
| exit(1); |
| n = read(fd, buf, sizeof(buf) - 1); |
| if (n < 0) |
| exit(1); |
| buf[n] = 0; |
| char* pos = buf; |
| char* end = buf + n; |
| while (pos < end) { |
| char* next = strstr(pos + 1, "unreferenced object"); |
| if (!next) |
| next = end; |
| char prev = *next; |
| *next = 0; |
| fprintf(stderr, "BUG: memory leak\n%s\n", pos); |
| *next = prev; |
| pos = next; |
| nleaks++; |
| } |
| } |
| if (write(fd, "clear", 5) != 5) |
| exit(1); |
| close(fd); |
| if (nleaks) |
| exit(1); |
| } |
| |
| static void execute_one(void); |
| |
| #define WAIT_FLAGS __WALL |
| |
| static void loop(void) |
| { |
| int iter; |
| for (iter = 0;; iter++) { |
| int pid = fork(); |
| if (pid < 0) |
| exit(1); |
| if (pid == 0) { |
| setup_test(); |
| execute_one(); |
| exit(0); |
| } |
| int status = 0; |
| uint64_t start = current_time_ms(); |
| for (;;) { |
| if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid) |
| break; |
| sleep_ms(1); |
| if (current_time_ms() - start < 5 * 1000) |
| continue; |
| kill_and_wait(pid, &status); |
| break; |
| } |
| check_leaks(); |
| } |
| } |
| |
| uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff}; |
| |
| void execute_one(void) |
| { |
| intptr_t res = 0; |
| res = syscall(__NR_socket, 0xa, 2, 0); |
| if (res != -1) |
| r[0] = res; |
| res = syscall(__NR_socket, 0xf, 3, 2); |
| if (res != -1) |
| r[1] = res; |
| *(uint8_t*)0x200004c0 = 0xfe; |
| *(uint8_t*)0x200004c1 = 0x80; |
| *(uint8_t*)0x200004c2 = 0; |
| *(uint8_t*)0x200004c3 = 0; |
| *(uint8_t*)0x200004c4 = 0; |
| *(uint8_t*)0x200004c5 = 0; |
| *(uint8_t*)0x200004c6 = 0; |
| *(uint8_t*)0x200004c7 = 0; |
| *(uint8_t*)0x200004c8 = 0; |
| *(uint8_t*)0x200004c9 = 0; |
| *(uint8_t*)0x200004ca = 0; |
| *(uint8_t*)0x200004cb = 0; |
| *(uint8_t*)0x200004cc = 0; |
| *(uint8_t*)0x200004cd = 0; |
| *(uint8_t*)0x200004ce = 0; |
| *(uint8_t*)0x200004cf = 0xbb; |
| *(uint32_t*)0x200004d0 = htobe32(0xe0000001); |
| *(uint16_t*)0x200004e0 = htobe16(0); |
| *(uint16_t*)0x200004e2 = htobe16(0); |
| *(uint16_t*)0x200004e4 = htobe16(0); |
| *(uint16_t*)0x200004e6 = htobe16(0); |
| *(uint16_t*)0x200004e8 = 0xa; |
| *(uint8_t*)0x200004ea = 0; |
| *(uint8_t*)0x200004eb = 0; |
| *(uint8_t*)0x200004ec = 0; |
| *(uint32_t*)0x200004f0 = 0; |
| *(uint32_t*)0x200004f4 = 0; |
| *(uint64_t*)0x200004f8 = 0; |
| *(uint64_t*)0x20000500 = 0; |
| *(uint64_t*)0x20000508 = 0; |
| *(uint64_t*)0x20000510 = 0; |
| *(uint64_t*)0x20000518 = 0; |
| *(uint64_t*)0x20000520 = 0; |
| *(uint64_t*)0x20000528 = 0; |
| *(uint64_t*)0x20000530 = 0; |
| *(uint64_t*)0x20000538 = 0; |
| *(uint64_t*)0x20000540 = 0; |
| *(uint64_t*)0x20000548 = 0; |
| *(uint64_t*)0x20000550 = 0; |
| *(uint32_t*)0x20000558 = 0; |
| *(uint32_t*)0x2000055c = 0; |
| *(uint8_t*)0x20000560 = 0; |
| *(uint8_t*)0x20000561 = 0; |
| *(uint8_t*)0x20000562 = 0; |
| *(uint8_t*)0x20000563 = 0; |
| *(uint32_t*)0x20000568 = htobe32(0xe0000002); |
| *(uint32_t*)0x20000578 = htobe32(0); |
| *(uint8_t*)0x2000057c = 0x2b; |
| *(uint16_t*)0x20000580 = 0; |
| *(uint8_t*)0x20000584 = 0xac; |
| *(uint8_t*)0x20000585 = 0x14; |
| *(uint8_t*)0x20000586 = 0x14; |
| *(uint8_t*)0x20000587 = 0xaa; |
| *(uint32_t*)0x20000594 = 0; |
| *(uint8_t*)0x20000598 = 2; |
| *(uint8_t*)0x20000599 = 0; |
| *(uint8_t*)0x2000059a = 0; |
| *(uint32_t*)0x2000059c = 0; |
| *(uint32_t*)0x200005a0 = 0; |
| *(uint32_t*)0x200005a4 = 0; |
| syscall(__NR_setsockopt, r[0], 0x29, 0x23, 0x200004c0, 0xe8); |
| *(uint64_t*)0x20000200 = 0; |
| *(uint32_t*)0x20000208 = 0; |
| *(uint64_t*)0x20000210 = 0x20000380; |
| *(uint64_t*)0x20000380 = 0x20000080; |
| memcpy((void*)0x20000080, |
| "\x02\x12\x00\x00\x02\x00\x00\x00\x0a\x00\x00\x97\xd3\xd3\x44\x73", |
| 16); |
| *(uint64_t*)0x20000388 = 0x10; |
| *(uint64_t*)0x20000218 = 1; |
| *(uint64_t*)0x20000220 = 0; |
| *(uint64_t*)0x20000228 = 0; |
| *(uint32_t*)0x20000230 = 0; |
| syscall(__NR_sendmsg, r[1], 0x20000200, 0); |
| } |
| int main(void) |
| { |
| syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0); |
| setup_leak(); |
| loop(); |
| return 0; |
| } |