git: e14e0a163225 - main - stress2: Added syzkaller reproducers

From: Peter Holm <pho_at_FreeBSD.org>
Date: Wed, 01 Jun 2022 08:04:09 UTC
The branch main has been updated by pho:

URL: https://cgit.FreeBSD.org/src/commit/?id=e14e0a163225e4363c08c3c954c84447f8a20c03

commit e14e0a163225e4363c08c3c954c84447f8a20c03
Author:     Peter Holm <pho@FreeBSD.org>
AuthorDate: 2022-06-01 08:02:08 +0000
Commit:     Peter Holm <pho@FreeBSD.org>
CommitDate: 2022-06-01 08:02:08 +0000

    stress2: Added syzkaller reproducers
---
 tools/test/stress2/misc/syzkaller54.sh | 324 +++++++++++++++++++++++++++++++++
 tools/test/stress2/misc/syzkaller55.sh | 197 ++++++++++++++++++++
 tools/test/stress2/misc/syzkaller57.sh | 267 +++++++++++++++++++++++++++
 3 files changed, 788 insertions(+)

diff --git a/tools/test/stress2/misc/syzkaller54.sh b/tools/test/stress2/misc/syzkaller54.sh
new file mode 100755
index 000000000000..dc3ce0dc876c
--- /dev/null
+++ b/tools/test/stress2/misc/syzkaller54.sh
@@ -0,0 +1,324 @@
+#!/bin/sh
+
+# panic: td 0xfffffe014f7193a0 is not suspended
+# cpuid = 5
+# time = 1652003036
+# KDB: stack backtrace:
+# db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe019a497c20
+# vpanic() at vpanic+0x17f/frame 0xfffffe019a497c70
+# panic() at panic+0x43/frame 0xfffffe019a497cd0
+# thread_single() at thread_single+0x766/frame 0xfffffe019a497d40
+# fork1() at fork1+0x1e1/frame 0xfffffe019a497da0
+# sys_rfork() at sys_rfork+0xa4/frame 0xfffffe019a497e00
+# amd64_syscall() at amd64_syscall+0x145/frame 0xfffffe019a497f30
+# fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe019a497f30
+# --- syscall (0, FreeBSD ELF64, nosys), rip = 0x82317b7da, rsp = 0x826544f48, rbp = 0x826544f70 ---
+# KDB: enter: panic
+# [ thread pid 17068 tid 104913 ]
+# Stopped at      kdb_enter+0x32: movq    $0,0x12795f3(%rip)
+# db> x/s version
+# FreeBSD 14.0-CURRENT #0 main-n255381-cbbce42345c51: Sun May  8 09:55:50 CEST 2022
+# pho@mercat1.netperf.freebsd.org:/usr/src/sys/amd64/compile/PHO
+# db> 
+
+[ `uname -p` != "amd64" ] && exit 0
+
+. ../default.cfg
+cat > /tmp/syzkaller54.c <<EOF
+// https://syzkaller.appspot.com/bug?id=346de481f8b814d103c440296a0adcb7ec6c46d4
+// autogenerated by syzkaller (https://github.com/google/syzkaller)
+// Reported-by: syzbot+9db4640d67478a0ced08@syzkaller.appspotmail.com
+
+#define _GNU_SOURCE
+
+#include <sys/types.h>
+
+#include <errno.h>
+#include <pthread.h>
+#include <pwd.h>
+#include <signal.h>
+#include <stdarg.h>
+#include <stdbool.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/endian.h>
+#include <sys/syscall.h>
+#include <sys/wait.h>
+#include <time.h>
+#include <unistd.h>
+
+static unsigned long long procid;
+
+static void kill_and_wait(int pid, int* status)
+{
+  kill(pid, SIGKILL);
+  while (waitpid(-1, status, 0) != pid) {
+  }
+}
+
+static void sleep_ms(uint64_t ms)
+{
+  usleep(ms * 1000);
+}
+
+static uint64_t current_time_ms(void)
+{
+  struct timespec ts;
+  if (clock_gettime(CLOCK_MONOTONIC, &ts))
+    exit(1);
+  return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
+}
+
+static void thread_start(void* (*fn)(void*), void* arg)
+{
+  pthread_t th;
+  pthread_attr_t attr;
+  pthread_attr_init(&attr);
+  pthread_attr_setstacksize(&attr, 128 << 10);
+  int i = 0;
+  for (; i < 100; i++) {
+    if (pthread_create(&th, &attr, fn, arg) == 0) {
+      pthread_attr_destroy(&attr);
+      return;
+    }
+    if (errno == EAGAIN) {
+      usleep(50);
+      continue;
+    }
+    break;
+  }
+  exit(1);
+}
+
+typedef struct {
+  pthread_mutex_t mu;
+  pthread_cond_t cv;
+  int state;
+} event_t;
+
+static void event_init(event_t* ev)
+{
+  if (pthread_mutex_init(&ev->mu, 0))
+    exit(1);
+  if (pthread_cond_init(&ev->cv, 0))
+    exit(1);
+  ev->state = 0;
+}
+
+static void event_reset(event_t* ev)
+{
+  ev->state = 0;
+}
+
+static void event_set(event_t* ev)
+{
+  pthread_mutex_lock(&ev->mu);
+  if (ev->state)
+    exit(1);
+  ev->state = 1;
+  pthread_mutex_unlock(&ev->mu);
+  pthread_cond_broadcast(&ev->cv);
+}
+
+static void event_wait(event_t* ev)
+{
+  pthread_mutex_lock(&ev->mu);
+  while (!ev->state)
+    pthread_cond_wait(&ev->cv, &ev->mu);
+  pthread_mutex_unlock(&ev->mu);
+}
+
+static int event_isset(event_t* ev)
+{
+  pthread_mutex_lock(&ev->mu);
+  int res = ev->state;
+  pthread_mutex_unlock(&ev->mu);
+  return res;
+}
+
+static int event_timedwait(event_t* ev, uint64_t timeout)
+{
+  uint64_t start = current_time_ms();
+  uint64_t now = start;
+  pthread_mutex_lock(&ev->mu);
+  for (;;) {
+    if (ev->state)
+      break;
+    uint64_t remain = timeout - (now - start);
+    struct timespec ts;
+    ts.tv_sec = remain / 1000;
+    ts.tv_nsec = (remain % 1000) * 1000 * 1000;
+    pthread_cond_timedwait(&ev->cv, &ev->mu, &ts);
+    now = current_time_ms();
+    if (now - start > timeout)
+      break;
+  }
+  int res = ev->state;
+  pthread_mutex_unlock(&ev->mu);
+  return res;
+}
+
+struct thread_t {
+  int created, call;
+  event_t ready, done;
+};
+
+static struct thread_t threads[16];
+static void execute_call(int call);
+static int running;
+
+static void* thr(void* arg)
+{
+  struct thread_t* th = (struct thread_t*)arg;
+  for (;;) {
+    event_wait(&th->ready);
+    event_reset(&th->ready);
+    execute_call(th->call);
+    __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED);
+    event_set(&th->done);
+  }
+  return 0;
+}
+
+static void execute_one(void)
+{
+  int i, call, thread;
+  for (call = 0; call < 12; call++) {
+    for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0]));
+         thread++) {
+      struct thread_t* th = &threads[thread];
+      if (!th->created) {
+        th->created = 1;
+        event_init(&th->ready);
+        event_init(&th->done);
+        event_set(&th->done);
+        thread_start(thr, th);
+      }
+      if (!event_isset(&th->done))
+        continue;
+      event_reset(&th->done);
+      th->call = call;
+      __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED);
+      event_set(&th->ready);
+      event_timedwait(&th->done, 50);
+      break;
+    }
+  }
+  for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++)
+    sleep_ms(1);
+}
+
+static void execute_one(void);
+
+#define WAIT_FLAGS 0
+
+static void loop(void)
+{
+  int iter = 0;
+  for (;; iter++) {
+    int pid = fork();
+    if (pid < 0)
+      exit(1);
+    if (pid == 0) {
+      execute_one();
+      exit(0);
+    }
+    int status = 0;
+    uint64_t start = current_time_ms();
+    for (;;) {
+      if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid)
+        break;
+      sleep_ms(1);
+      if (current_time_ms() - start < 5000)
+        continue;
+      kill_and_wait(pid, &status);
+      break;
+    }
+  }
+}
+
+uint64_t r[4] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff,
+                 0xffffffffffffffff};
+
+void execute_call(int call)
+{
+  intptr_t res = 0;
+  switch (call) {
+  case 0:
+    res = syscall(SYS_socket, 0x1cul, 1ul, 0x84);
+    if (res != -1)
+      r[0] = res;
+    break;
+  case 1:
+    syscall(SYS_connect, r[0], 0ul, 0ul);
+    break;
+  case 2:
+    res = syscall(SYS_socket, 0x1cul, 1ul, 0x84);
+    if (res != -1)
+      r[1] = res;
+    break;
+  case 3:
+    syscall(SYS_sendto, -1, 0ul, 0ul, 0ul, 0ul, 0ul);
+    break;
+  case 4:
+    syscall(SYS_dup2, r[1], -1);
+    break;
+  case 5:
+    res = syscall(SYS_dup2, -1, -1);
+    if (res != -1)
+      r[2] = res;
+    break;
+  case 6:
+    res = syscall(SYS_dup2, -1, r[2]);
+    if (res != -1)
+      r[3] = res;
+    break;
+  case 7:
+    syscall(SYS_sendmsg, r[3], 0ul, 0ul);
+    break;
+  case 8:
+    syscall(SYS_sendto, -1, 0ul, 0ul, 0ul, 0ul, 0ul);
+    break;
+  case 9:
+    memcpy((void*)0x20000100, "/dev/filemon\000", 13);
+    syscall(SYS_openat, 0xffffffffffffff9cul, 0x20000100ul, 0ul, 0ul);
+    break;
+  case 10:
+    syscall(SYS_rfork, 0x5000ul);
+    break;
+  case 11:
+    *(uint32_t*)0x20000080 = 0x13;
+    *(uint32_t*)0x20000084 = 0;
+    *(uint32_t*)0x20000088 = 0;
+    *(uint32_t*)0x2000008c = 0;
+    *(uint32_t*)0x20000090 = -1;
+    memset((void*)0x20000094, 0, 60);
+    syscall(SYS_procctl, 0ul, 0, 6ul, 0x20000080ul);
+    break;
+  }
+}
+int main(void)
+{
+  syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x1012ul, -1, 0ul);
+  for (procid = 0; procid < 4; procid++) {
+    if (fork() == 0) {
+      loop();
+    }
+  }
+  sleep(1000000);
+  return 0;
+}
+EOF
+mycc -o /tmp/syzkaller54 -Wall -Wextra -O0 /tmp/syzkaller54.c -l pthread ||
+    exit 1
+
+start=`date +%s`
+while [ $((`date +%s` - start)) -lt 120 ]; do
+	(cd /tmp; timeout 3m ./syzkaller54)
+done
+
+rm -rf /tmp/syzkaller54 /tmp/syzkaller54.c /tmp/syzkaller54.core \
+    /tmp/syzkaller.??????
+exit 0
diff --git a/tools/test/stress2/misc/syzkaller55.sh b/tools/test/stress2/misc/syzkaller55.sh
new file mode 100755
index 000000000000..9914587926cf
--- /dev/null
+++ b/tools/test/stress2/misc/syzkaller55.sh
@@ -0,0 +1,197 @@
+#!/bin/sh
+
+# panic: Counter goes negative
+# cpuid = 8
+# time = 1653397881
+# KDB: stack backtrace:
+# db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe014386fa40
+# vpanic() at vpanic+0x17f/frame 0xfffffe014386fa90
+# panic() at panic+0x43/frame 0xfffffe014386faf0
+# sctp_sorecvmsg() at sctp_sorecvmsg+0xf8e/frame 0xfffffe014386fc10
+# sctp_soreceive() at sctp_soreceive+0x196/frame 0xfffffe014386fe00
+# soreceive() at soreceive+0x4b/frame 0xfffffe014386fe20
+# soaio_process_sb() at soaio_process_sb+0x581/frame 0xfffffe014386feb0
+# soaio_kproc_loop() at soaio_kproc_loop+0xa9/frame 0xfffffe014386fef0
+# fork_exit() at fork_exit+0x80/frame 0xfffffe014386ff30
+# fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe014386ff30
+# --- trap 0xc, rip = 0x8220e08da, rsp = 0x820a211b8, rbp = 0x820a211e0 ---
+# KDB: enter: panic
+# [ thread pid 78762 tid 931834 ]
+# Stopped at      kdb_enter+0x32: movq    $0,0x1278fc3(%rip)
+# db> x/s version
+# FreeBSD 14.0-CURRENT #0 reap-n255780-cbbb27164fa: Tue May 24 13:42:53 CEST 2022
+# pho@mercat1.netperf.freebsd.org:/var/tmp/deviant3/sys/amd64/compile/PHO
+# db>
+
+[ `uname -p` != "amd64" ] && exit 0
+
+. ../default.cfg
+cat > /tmp/syzkaller55.c <<EOF
+// https://syzkaller.appspot.com/bug?id=ce7f451c017537296074d9203baaec292b311365
+// autogenerated by syzkaller (https://github.com/google/syzkaller)
+// Reported-by: syzbot+e256d42e9b390564530a@syzkaller.appspotmail.com
+
+#define _GNU_SOURCE
+
+#include <sys/types.h>
+
+#include <pwd.h>
+#include <signal.h>
+#include <stdarg.h>
+#include <stdbool.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/endian.h>
+#include <sys/syscall.h>
+#include <sys/wait.h>
+#include <time.h>
+#include <unistd.h>
+
+static unsigned long long procid;
+
+static void kill_and_wait(int pid, int* status)
+{
+  kill(pid, SIGKILL);
+  while (waitpid(-1, status, 0) != pid) {
+  }
+}
+
+static void sleep_ms(uint64_t ms)
+{
+  usleep(ms * 1000);
+}
+
+static uint64_t current_time_ms(void)
+{
+  struct timespec ts;
+  if (clock_gettime(CLOCK_MONOTONIC, &ts))
+    exit(1);
+  return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
+}
+
+static void execute_one(void);
+
+#define WAIT_FLAGS 0
+
+static void loop(void)
+{
+  int iter = 0;
+  for (;; iter++) {
+    int pid = fork();
+    if (pid < 0)
+      exit(1);
+    if (pid == 0) {
+      execute_one();
+      exit(0);
+    }
+    int status = 0;
+    uint64_t start = current_time_ms();
+    for (;;) {
+      if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid)
+        break;
+      sleep_ms(1);
+      if (current_time_ms() - start < 5000)
+        continue;
+      kill_and_wait(pid, &status);
+      break;
+    }
+  }
+}
+
+uint64_t r[3] = {0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff};
+
+void execute_one(void)
+{
+  intptr_t res = 0;
+  res = syscall(SYS_socket, 0x1cul, 1ul, 0x84);
+  if (res != -1)
+    r[0] = res;
+  *(uint8_t*)0x20000000 = 0x1c;
+  *(uint8_t*)0x20000001 = 0x1c;
+  *(uint16_t*)0x20000002 = htobe16(0x4e23 + procid * 4);
+  *(uint32_t*)0x20000004 = 0;
+  memset((void*)0x20000008, 0, 16);
+  *(uint32_t*)0x20000018 = 0;
+  syscall(SYS_bind, r[0], 0x20000000ul, 0x1cul);
+  *(uint8_t*)0x20000080 = 0x1c;
+  *(uint8_t*)0x20000081 = 0x1c;
+  *(uint16_t*)0x20000082 = htobe16(0x4e23 + procid * 4);
+  *(uint32_t*)0x20000084 = 0;
+  *(uint64_t*)0x20000088 = htobe64(0);
+  *(uint64_t*)0x20000090 = htobe64(1);
+  *(uint32_t*)0x20000098 = 0;
+  syscall(SYS_connect, r[0], 0x20000080ul, 0x1cul);
+  *(uint32_t*)0x20000400 = r[0];
+  *(uint64_t*)0x20000408 = 0;
+  *(uint64_t*)0x20000410 = 0x20000040;
+  memset((void*)0x20000040, 27, 1);
+  *(uint64_t*)0x20000418 = 1;
+  *(uint32_t*)0x20000420 = 0;
+  *(uint32_t*)0x20000424 = 0;
+  *(uint64_t*)0x20000428 = 0;
+  *(uint32_t*)0x20000430 = 0;
+  *(uint32_t*)0x20000434 = 0;
+  *(uint64_t*)0x20000438 = 0;
+  *(uint64_t*)0x20000440 = 0;
+  *(uint64_t*)0x20000448 = 0;
+  *(uint32_t*)0x20000450 = 0;
+  *(uint32_t*)0x20000454 = 0;
+  *(uint32_t*)0x20000458 = 0;
+  *(uint64_t*)0x20000460 = 0;
+  *(uint64_t*)0x20000468 = 0;
+  *(uint64_t*)0x20000470 = 0;
+  *(uint64_t*)0x20000478 = 0;
+  *(uint64_t*)0x20000480 = 0;
+  *(uint64_t*)0x20000488 = 0;
+  *(uint64_t*)0x20000490 = 0;
+  *(uint64_t*)0x20000498 = 0;
+  syscall(SYS_aio_read, 0x20000400ul);
+  memset((void*)0x200000c0, 89, 1);
+  syscall(SYS_sendto, r[0], 0x200000c0ul, 1ul, 0ul, 0ul, 0ul);
+  syscall(SYS_shutdown, r[0], 0ul);
+  res = syscall(SYS_socket, 0x1cul, 5ul, 0x84);
+  if (res != -1)
+    r[1] = res;
+  *(uint64_t*)0x200003c0 = 0;
+  *(uint32_t*)0x200003c8 = 0;
+  *(uint64_t*)0x200003d0 = 0x20000300;
+  *(uint64_t*)0x20000300 = 0x20000200;
+  memset((void*)0x20000200, 30, 1);
+  *(uint64_t*)0x20000308 = 1;
+  *(uint32_t*)0x200003d8 = 1;
+  *(uint64_t*)0x200003e0 = 0;
+  *(uint32_t*)0x200003e8 = 0;
+  *(uint32_t*)0x200003ec = 0;
+  syscall(SYS_sendmsg, r[0], 0x200003c0ul, 0ul);
+  res = syscall(SYS_dup2, r[0], r[1]);
+  if (res != -1)
+    r[2] = res;
+  *(uint32_t*)0x20000140 = 0;
+  memcpy((void*)0x20000144, "\x0a\x00\x01\x00\x01", 5);
+  syscall(SYS_setsockopt, r[2], 0x84, 0x901, 0x20000140ul, 0xaul);
+}
+int main(void)
+{
+  syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x1012ul, -1, 0ul);
+  for (procid = 0; procid < 4; procid++) {
+    if (fork() == 0) {
+      loop();
+    }
+  }
+  sleep(1000000);
+  return 0;
+}
+EOF
+mycc -o /tmp/syzkaller55 -Wall -Wextra -O0 /tmp/syzkaller55.c || exit 1
+
+kldstat | grep -q sctp || kldload sctp.ko
+start=`date +%s`
+while [ $((`date +%s` - start)) -lt 120 ]; do
+	(cd /tmp; timeout 3m ./syzkaller55)
+done
+
+rm -rf /tmp/syzkaller55 /tmp/syzkaller55.c /tmp/syzkaller55.core \
+    /tmp/syzkaller.??????
+exit 0
diff --git a/tools/test/stress2/misc/syzkaller57.sh b/tools/test/stress2/misc/syzkaller57.sh
new file mode 100755
index 000000000000..a90213744418
--- /dev/null
+++ b/tools/test/stress2/misc/syzkaller57.sh
@@ -0,0 +1,267 @@
+#!/bin/sh
+
+# panic: sbflush_internal: ccc 0 mb 0 mbcnt 256
+# cpuid = 6
+# time = 1653879149
+# KDB: stack backtrace:
+# db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe0694766c00
+# vpanic() at vpanic+0x17f/frame 0xfffffe0694766c50
+# panic() at panic+0x43/frame 0xfffffe0694766cb0
+# sbrelease_internal() at sbrelease_internal+0xb9/frame 0xfffffe0694766cd0
+# solisten_proto() at solisten_proto+0xb5/frame 0xfffffe0694766d30
+# sctp_listen() at sctp_listen+0x2f7/frame 0xfffffe0694766da0
+# solisten() at solisten+0x42/frame 0xfffffe0694766dc0
+# kern_listen() at kern_listen+0x7d/frame 0xfffffe0694766e00
+# amd64_syscall() at amd64_syscall+0x145/frame 0xfffffe0694766f30
+# fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe0694766f30
+# --- syscall (0, FreeBSD ELF64, nosys), rip = 0x82222e7da, rsp = 0x820d68d88, rbp = 0x820d68f00 ---
+# KDB: enter: panic
+# [ thread pid 12921 tid 741095 ]
+# Stopped at      kdb_enter+0x32: movq    $0,0x1277ff3(%rip)
+# db> x/s version
+# FreeBSD 14.0-CURRENT #0 main-n255847-d46174cd8838b: Sat May 28 20:56:08 CEST 2022
+# pho@mercat1.netperf.freebsd.org:/usr/src/sys/amd64/compile/PHO
+# db> 
+
+[ `uname -p` != "amd64" ] && exit 0
+
+. ../default.cfg
+cat > /tmp/syzkaller57.c <<EOF
+// https://syzkaller.appspot.com/bug?id=66d47f23f24ecf5536fd47d81defdb917c307bd2
+// autogenerated by syzkaller (https://github.com/google/syzkaller)
+// Reported-by: syzbot+6c484f116b9dc88f7db1@syzkaller.appspotmail.com
+
+#define _GNU_SOURCE
+
+#include <sys/types.h>
+
+#include <dirent.h>
+#include <errno.h>
+#include <pwd.h>
+#include <setjmp.h>
+#include <signal.h>
+#include <stdarg.h>
+#include <stdbool.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/endian.h>
+#include <sys/stat.h>
+#include <sys/syscall.h>
+#include <sys/wait.h>
+#include <time.h>
+#include <unistd.h>
+
+static __thread int skip_segv;
+static __thread jmp_buf segv_env;
+
+static void segv_handler(int sig, siginfo_t* info, void* ctx __unused)
+{
+  uintptr_t addr = (uintptr_t)info->si_addr;
+  const uintptr_t prog_start = 1 << 20;
+  const uintptr_t prog_end = 100 << 20;
+  int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0;
+  int valid = addr < prog_start || addr > prog_end;
+  if (sig == SIGBUS) {
+    valid = 1;
+  }
+  if (skip && valid) {
+    _longjmp(segv_env, 1);
+  }
+  exit(sig);
+}
+
+static void install_segv_handler(void)
+{
+  struct sigaction sa;
+  memset(&sa, 0, sizeof(sa));
+  sa.sa_sigaction = segv_handler;
+  sa.sa_flags = SA_NODEFER | SA_SIGINFO;
+  sigaction(SIGSEGV, &sa, NULL);
+  sigaction(SIGBUS, &sa, NULL);
+}
+
+#define NONFAILING(...)                                                        \
+  ({                                                                           \
+    int ok = 1;                                                                \
+    __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST);                       \
+    if (_setjmp(segv_env) == 0) {                                              \
+      __VA_ARGS__;                                                             \
+    } else                                                                     \
+      ok = 0;                                                                  \
+    __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST);                       \
+    ok;                                                                        \
+  })
+
+static void kill_and_wait(int pid, int* status)
+{
+  kill(pid, SIGKILL);
+  while (waitpid(-1, status, 0) != pid) {
+  }
+}
+
+static void sleep_ms(uint64_t ms)
+{
+  usleep(ms * 1000);
+}
+
+static uint64_t current_time_ms(void)
+{
+  struct timespec ts;
+  if (clock_gettime(CLOCK_MONOTONIC, &ts))
+    exit(1);
+  return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
+}
+
+static void use_temporary_dir(void)
+{
+  char tmpdir_template[] = "./syzkaller.XXXXXX";
+  char* tmpdir = mkdtemp(tmpdir_template);
+  if (!tmpdir)
+    exit(1);
+  if (chmod(tmpdir, 0777))
+    exit(1);
+  if (chdir(tmpdir))
+    exit(1);
+}
+
+static void __attribute__((noinline)) remove_dir(const char* dir)
+{
+  DIR* dp = opendir(dir);
+  if (dp == NULL) {
+    if (errno == EACCES) {
+      if (rmdir(dir))
+        exit(1);
+      return;
+    }
+    exit(1);
+  }
+  struct dirent* ep = 0;
+  while ((ep = readdir(dp))) {
+    if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0)
+      continue;
+    char filename[FILENAME_MAX];
+    snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name);
+    struct stat st;
+    if (lstat(filename, &st))
+      exit(1);
+    if (S_ISDIR(st.st_mode)) {
+      remove_dir(filename);
+      continue;
+    }
+    if (unlink(filename))
+      exit(1);
+  }
+  closedir(dp);
+  if (rmdir(dir))
+    exit(1);
+}
+
+static void execute_one(void);
+
+#define WAIT_FLAGS 0
+
+static void loop(void)
+{
+  int iter = 0;
+  for (;; iter++) {
+    char cwdbuf[32];
+    sprintf(cwdbuf, "./%d", iter);
+    if (mkdir(cwdbuf, 0777))
+      exit(1);
+    int pid = fork();
+    if (pid < 0)
+      exit(1);
+    if (pid == 0) {
+      if (chdir(cwdbuf))
+        exit(1);
+      execute_one();
+      exit(0);
+    }
+    int status = 0;
+    uint64_t start = current_time_ms();
+    for (;;) {
+      if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid)
+        break;
+      sleep_ms(1);
+      if (current_time_ms() - start < 5000) {
+        continue;
+      }
+      kill_and_wait(pid, &status);
+      break;
+    }
+    remove_dir(cwdbuf);
+  }
+}
+
+uint64_t r[1] = {0xffffffffffffffff};
+
+void execute_one(void)
+{
+  intptr_t res = 0;
+  res = syscall(SYS_socket, 0x1cul, 1ul, 0x84);
+  if (res != -1)
+    r[0] = res;
+  NONFAILING(*(uint8_t*)0x20000000 = 0x1c);
+  NONFAILING(*(uint8_t*)0x20000001 = 0x1c);
+  NONFAILING(*(uint16_t*)0x20000002 = htobe16(0x4e22));
+  NONFAILING(*(uint32_t*)0x20000004 = 0x20);
+  NONFAILING(memset((void*)0x20000008, 0, 16));
+  NONFAILING(*(uint32_t*)0x20000018 = 0x20);
+  syscall(SYS_bind, r[0], 0x20000000ul, 0x1cul);
+  NONFAILING(*(uint8_t*)0x20000180 = 0x1c);
+  NONFAILING(*(uint8_t*)0x20000181 = 0x1c);
+  NONFAILING(*(uint16_t*)0x20000182 = htobe16(0x4e22));
+  NONFAILING(*(uint32_t*)0x20000184 = 4);
+  NONFAILING(*(uint64_t*)0x20000188 = htobe64(0));
+  NONFAILING(*(uint64_t*)0x20000190 = htobe64(1));
+  NONFAILING(*(uint32_t*)0x20000198 = 4);
+  syscall(SYS_connect, r[0], 0x20000180ul, 0x1cul);
+  NONFAILING(memcpy(
+      (void*)0x20000480,
+      "\xa3\x1b\xe1\x78\x8e\x58\x9b\x38\x59\xf3\xbb\xdd\x7e\xf7\x51\x23\x97\x31"
+      "\xb2\x90\x4a\xd0\x4e\xb7\xdc\x37\xc6\x95\xf6\x05\x5c\xa8\x36\x54\x7e\x7b"
+      "\x6c\xc3\x7d\xae\x2a\xe4\x77\x08\x94\x67\x3c\x89\x65\x93\x24\x1c\x56\x3e"
+      "\x08\x69\x05\x35\xeb\x3b\x7f\x19\x7d\xda\x44\x54\xb4\x42\x4f\x34\xc8\x81"
+      "\x69\x4e\xac\xef\xa6\xd4\xb1\x61\x9d\xf1\x0b\x97\x7c\xd9\x82\x16\xc9\x7b"
+      "\x2e\xb3\x9f\x02\xde\x0f\xae\xe7\x0b\xec\xa3\x66\x3c\x2e\x6c\xd1\xca\x02"
+      "\xae\x0f\xd5\x65\xb9\x7c\x5c\xa0\xea\xfc\xa4\xc9\x13\x73\x14\x16\xba\xcc"
+      "\xae\x89\xe2\x68\x77\xfc\x2a\x8c\xa3\xee\xa8\x45\xf7\xc2\xcb\x48\x93\xe5"
+      "\x83\x52\x45\x26\xe3\xeb\x73\xa2\xe4\xf1\x11\xcf\x40\x5f\xef\x99\xc2\xa1"
+      "\xeb\x2c\x96\x70\x56\x88\xc8\xc7\x6b\xa1\x66\xd2\x23\x20\x07\x62\x69\xd2"
+      "\x1c\x52\xbb\x5e\x86\x43\x7d\x6c\x65\x44\x42\xf6\xd8\x45\xe2\xff\x77\xf9"
+      "\x24\xf0\x1d\x29\xf6\xd3\x74\x83\x25\x40\x56\x50\x17\x7f\xc3\x60\xd7\xed"
+      "\xb1\xfb\x7a\x74\x38\x2b\x47\x34\x93\x9c\xee\xc9\xb0\xbf\x7d\xc4\x19\xe2"
+      "\x77\x49\xbc\x71\x9c\x30\x8b\x57\x0f\x13\x4d\x93\x9d\x53\xa8\x03\xc1\x3b"
+      "\x5d\xc3\xbc\x20\xc4\x9e\xc1\x62\x69\xca\x92\x0f\x04\xa1\x0b\xea\xe7\x61"
+      "\x79\x99\x5a\x53\x1a\x27\x40\xf0\x0b\xc5\xe8\xb5\xf0\xd8\x1c\xd2\xca\x99"
+      "\x16\x70\xa8\xc5\xac\x0a\x6b\x99\x31\x0c\x90\xe2\xa5\xe0\xe3\x7c\x99\x3c"
+      "\xbd\xeb\x42\xcf\x74\xe0\xa8\xea\x4e\x64\xd8\x30\x46\x6d\x6e\x83\x7f\x21"
+      "\x00\x5c\xcf\x79\xfe\x19\xdd\xd5\xaf\x69\x9e\x1b\x67\xd5\x3f\x18\x4d\xe5"
+      "\x2a\xec\x02\x12\x92",
+      347));
+  syscall(SYS_sendto, r[0], 0x20000480ul, 0x15bul, 0x20108ul, 0ul, 0ul);
+  syscall(SYS_listen, r[0], 0x1f);
+}
+int main(void)
+{
+  syscall(SYS_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x1012ul, -1, 0ul);
+  install_segv_handler();
+  use_temporary_dir();
+  loop();
+  return 0;
+}
+EOF
+mycc -o /tmp/syzkaller57 -Wall -Wextra -O0 /tmp/syzkaller57.c || exit 1
+
+kldstat | grep -q sctp || { kldload sctp.ko && loaded=1; }
+for i in `jot 3`; do
+	(cd /tmp; timeout 3m ./syzkaller57) &
+done
+wait
+
+rm -rf /tmp/syzkaller57 /tmp/syzkaller57.c /tmp/syzkaller57.core \
+    /tmp/syzkaller.??????
+[ $loaded ] && kldunload sctp.ko
+exit 0