// https://syzkaller.appspot.com/bug?id=7460667e2e38fd3c09ade09fea7c1dc0757b757d
// autogenerated by syzkaller (https://github.com/google/syzkaller)

#define _GNU_SOURCE

#include <endian.h>
#include <fcntl.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/stat.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <unistd.h>

static long syz_open_dev(volatile long a0, volatile long a1, volatile long a2)
{
  if (a0 == 0xc || a0 == 0xb) {
    char buf[128];
    sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1,
            (uint8_t)a2);
    return open(buf, O_RDWR, 0);
  } else {
    char buf[1024];
    char* hash;
    strncpy(buf, (char*)a0, sizeof(buf) - 1);
    buf[sizeof(buf) - 1] = 0;
    while ((hash = strchr(buf, '#'))) {
      *hash = '0' + (char)(a1 % 10);
      a1 /= 10;
    }
    return open(buf, a2, 0);
  }
}

uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff};

int main(void)
{
  syscall(__NR_mmap, /*addr=*/0x1ffff000ul, /*len=*/0x1000ul, /*prot=*/0ul,
          /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1,
          /*offset=*/0ul);
  syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0x1000000ul,
          /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul,
          /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1,
          /*offset=*/0ul);
  syscall(__NR_mmap, /*addr=*/0x21000000ul, /*len=*/0x1000ul, /*prot=*/0ul,
          /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1,
          /*offset=*/0ul);
  const char* reason;
  (void)reason;
  intptr_t res = 0;
  if (write(1, "executing program\n", sizeof("executing program\n") - 1)) {
  }
  memcpy((void*)0x20000040, "/dev/uinput\000", 12);
  res = syscall(__NR_openat, /*fd=*/0xffffffffffffff9cul, /*file=*/0x20000040ul,
                /*flags=*/0, /*mode=*/0);
  if (res != -1)
    r[0] = res;
  *(uint16_t*)0x20000180 = 0;
  *(uint16_t*)0x20000182 = 0;
  *(uint16_t*)0x20000184 = 0;
  *(uint16_t*)0x20000186 = 0;
  memcpy((void*)0x20000188,
         "syz1\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000"
         "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000"
         "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000"
         "\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000"
         "\000\000\000\000\000\000\000\000\000",
         80);
  *(uint32_t*)0x200001d8 = 0x3e;
  syscall(__NR_ioctl, /*fd=*/r[0], /*cmd=*/0x405c5503, /*arg=*/0x20000180ul);
  syscall(__NR_ioctl, /*fd=*/r[0], /*cmd=*/0x4004556b, /*arg=*/0x51ul);
  syscall(__NR_ioctl, /*fd=*/r[0], /*cmd=*/0x5501, 0);
  memcpy((void*)0x200000c0, "/dev/input/event#\000", 18);
  res = -1;
  res = syz_open_dev(/*dev=*/0x200000c0, /*id=*/0x40, /*flags=*/0);
  if (res != -1)
    r[1] = res;
  *(uint16_t*)0x20000300 = 0x50;
  *(uint16_t*)0x20000302 = -1;
  *(uint16_t*)0x20000304 = 0;
  *(uint16_t*)0x20000306 = 0;
  *(uint16_t*)0x20000308 = 0;
  *(uint16_t*)0x2000030a = 0;
  *(uint16_t*)0x2000030c = 0;
  *(uint16_t*)0x20000310 = 0;
  *(uint16_t*)0x20000312 = 0;
  *(uint16_t*)0x20000314 = 0;
  *(uint16_t*)0x20000316 = 0;
  *(uint16_t*)0x20000318 = 0;
  syscall(__NR_ioctl, /*fd=*/r[1], /*cmd=*/0x40304580, /*arg=*/0x20000300ul);
  return 0;
}