// https://syzkaller.appspot.com/bug?id=e2dc9aea0465d1eea101bb24cb463e2a7efe7d17
// autogenerated by syzkaller (http://github.com/google/syzkaller)

#define _GNU_SOURCE

#include <endian.h>
#include <errno.h>
#include <signal.h>
#include <stdarg.h>
#include <stdio.h>
#include <sys/prctl.h>
#include <sys/syscall.h>
#include <sys/time.h>
#include <sys/wait.h>
#include <time.h>
#include <unistd.h>

__attribute__((noreturn)) static void doexit(int status)
{
  volatile unsigned i;
  syscall(__NR_exit_group, status);
  for (i = 0;; i++) {
  }
}

#include <stdint.h>
#include <string.h>

const int kFailStatus = 67;
const int kRetryStatus = 69;

static void fail(const char* msg, ...)
{
  int e = errno;
  va_list args;
  va_start(args, msg);
  vfprintf(stderr, msg, args);
  va_end(args);
  fprintf(stderr, " (errno %d)\n", e);
  doexit((e == ENOMEM || e == EAGAIN) ? kRetryStatus : kFailStatus);
}

static uint64_t current_time_ms()
{
  struct timespec ts;

  if (clock_gettime(CLOCK_MONOTONIC, &ts))
    fail("clock_gettime failed");
  return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
}

static void test();

void loop()
{
  int iter;
  for (iter = 0;; iter++) {
    int pid = fork();
    if (pid < 0)
      fail("loop fork failed");
    if (pid == 0) {
      prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
      setpgrp();
      test();
      doexit(0);
    }
    int status = 0;
    uint64_t start = current_time_ms();
    for (;;) {
      int res = waitpid(-1, &status, __WALL | WNOHANG);
      if (res == pid)
        break;
      usleep(1000);
      if (current_time_ms() - start > 5 * 1000) {
        kill(-pid, SIGKILL);
        kill(pid, SIGKILL);
        while (waitpid(-1, &status, __WALL) != pid) {
        }
        break;
      }
    }
  }
}

long r[4];
uint64_t procid;
void test()
{
  memset(r, -1, sizeof(r));
  syscall(__NR_mmap, 0x20000000, 0xfff000, 0x3, 0x32, 0xffffffff, 0x0);
  *(uint16_t*)0x20320fa8 = 0x26;
  memcpy((void*)0x20320faa,
         "\x61\x65\x61\x64\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
         14);
  *(uint32_t*)0x20320fb8 = 0x0;
  *(uint32_t*)0x20320fbc = 0x0;
  memcpy((void*)0x20320fc0,
         "\x72\x66\x63\x37\x35\x33\x39\x28\x63\x74\x72\x2d\x63\x61\x6d"
         "\x65\x6c\x6c\x69\x61\x2d\x61\x65\x73\x6e\x69\x2d\x61\x76\x78"
         "\x32\x2c\x67\x68\x61\x73\x68\x2d\x63\x6c\x6d\x75\x6c\x6e\x69"
         "\x29\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00",
         64);
  syscall(__NR_bind, 0xffffffff, 0x20320fa8, 0x58);
  r[0] = syscall(__NR_socket, 0x0, 0x5, 0x0);
  *(uint32_t*)0x20ab2000 = 0x4;
  syscall(__NR_getsockopt, r[0], 0x84, 0x8, 0x20d9dffc, 0x20ab2000);
  r[1] = syscall(__NR_socket, 0x26, 0x5, 0x0);
  *(uint16_t*)0x20ab5000 = 0x26;
  memcpy((void*)0x20ab5002,
         "\x61\x65\x61\x64\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
         14);
  *(uint32_t*)0x20ab5010 = 0x0;
  *(uint32_t*)0x20ab5014 = 0x0;
  memcpy((void*)0x20ab5018,
         "\x67\x63\x6d\x28\x74\x77\x6f\x66\x69\x73\x68\x29\x00\x00\x00"
         "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00",
         64);
  syscall(__NR_bind, r[1], 0x20ab5000, 0x58);
  memcpy((void*)0x204f7000, "\x64\x9c\x47\xad\x46\x39\x0d\xc8\x6d\xae"
                            "\x79\xfa\x40\x9d\x4d\x54",
         16);
  syscall(__NR_setsockopt, r[1], 0x117, 0x1, 0x204f7000, 0x10);
  r[2] = syscall(__NR_accept, r[1], 0x0, 0x0);
  *(uint64_t*)0x20e7dfc8 = 0x0;
  *(uint32_t*)0x20e7dfd0 = 0x0;
  *(uint64_t*)0x20e7dfd8 = 0x20e5ef90;
  *(uint64_t*)0x20e7dfe0 = 0x1;
  *(uint64_t*)0x20e7dfe8 = 0x20a93000;
  *(uint64_t*)0x20e7dff0 = 0x0;
  *(uint32_t*)0x20e7dff8 = 0x0;
  *(uint64_t*)0x20e5ef90 = 0x20205000;
  *(uint64_t*)0x20e5ef98 = 0x59;
  memcpy((void*)0x20205000,
         "\x08\x18\x15\xc3\xc0\xce\xc0\xf5\x66\x77\xed\x7a\x8e\xa6\xab"
         "\x38\xb0\xdd\x68\xdc\x50\x0d\xbe\x29\xff\xd7\x79\x69\x56\xa3"
         "\x60\x7f\xf1\xa3\x7c\xdf\xa8\xf0\xe4\x09\xdb\x54\x2a\xd1\xbe"
         "\x8a\x54\xe9\xb9\x6c\xf9\x39\xb0\xad\xe2\xdf\x0d\x31\xdf\x77"
         "\x6e\x89\xf3\xfb\x6f\xfa\x43\x78\xd2\xa1\x27\xaa\x21\xbe\x5b"
         "\x00\x78\xf0\xa9\xa6\xda\xa7\x83\x8d\x25\x2f\xf9\xea\x1d",
         89);
  syscall(__NR_sendmsg, r[2], 0x20e7dfc8, 0x20000000);
  *(uint64_t*)0x20b2f000 = 0x208e8000;
  *(uint32_t*)0x20b2f008 = 0x10;
  *(uint64_t*)0x20b2f010 = 0x20030fa0;
  *(uint64_t*)0x20b2f018 = 0x1;
  *(uint64_t*)0x20b2f020 = 0x20590000;
  *(uint64_t*)0x20b2f028 = 0x0;
  *(uint32_t*)0x20b2f030 = 0x0;
  *(uint64_t*)0x20030fa0 = 0x20588f73;
  *(uint64_t*)0x20030fa8 = 0x8d;
  syscall(__NR_recvmsg, r[2], 0x20b2f000, 0x0);
  syscall(__NR_setsockopt, 0xffffffff, 0x0, 0x0, 0x20000f96, 0x0);
  r[3] = syscall(__NR_socket, 0x2, 0x1, 0x0);
  *(uint16_t*)0x2092fff0 = 0x2;
  *(uint16_t*)0x2092fff2 = htobe16(0x4e20 + procid * 0x4ul);
  *(uint32_t*)0x2092fff4 = htobe32(0x0);
  *(uint8_t*)0x2092fff8 = 0x0;
  *(uint8_t*)0x2092fff9 = 0x0;
  *(uint8_t*)0x2092fffa = 0x0;
  *(uint8_t*)0x2092fffb = 0x0;
  *(uint8_t*)0x2092fffc = 0x0;
  *(uint8_t*)0x2092fffd = 0x0;
  *(uint8_t*)0x2092fffe = 0x0;
  *(uint8_t*)0x2092ffff = 0x0;
  syscall(__NR_sendto, r[3], 0x2092f000, 0x0, 0x0, 0x2092fff0, 0x10);
  *(uint32_t*)0x20938852 = 0x14;
  syscall(__NR_getpeername, 0xffffffff, 0x20938fec, 0x20938852);
  *(uint16_t*)0x20c6cfa8 = 0x26;
  memcpy((void*)0x20c6cfaa,
         "\x73\x6b\x63\x69\x70\x68\x65\x72\x00\x00\x00\x00\x00\x00",
         14);
  *(uint32_t*)0x20c6cfb8 = 0x0;
  *(uint32_t*)0x20c6cfbc = 0x0;
  memcpy((void*)0x20c6cfc0,
         "\x70\x63\x62\x63\x28\x61\x65\x73\x29\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00",
         64);
  syscall(__NR_bind, 0xffffffff, 0x20c6cfa8, 0x58);
  syscall(__NR_socketpair, 0x3, 0x7, 0xf0, 0x20000ff8);
  *(uint32_t*)0x203bcffc = 0x4;
  syscall(__NR_getsockopt, 0xffffffff, 0x101, 0x2, 0x20906000,
          0x203bcffc);
}

int main()
{
  int i;
  for (i = 0; i < 8; i++) {
    if (fork() == 0) {
      procid = i;
      loop();
      return 0;
    }
  }
  sleep(1000000);
  return 0;
}