// https://syzkaller.appspot.com/bug?id=0e06e9b4ed9a043361196cb8413cdc16a15b4b1f
// autogenerated by syzkaller (http://github.com/google/syzkaller)

#define _GNU_SOURCE
#include <endian.h>
#include <fcntl.h>
#include <stdint.h>
#include <stdio.h>
#include <string.h>
#include <string.h>
#include <sys/stat.h>
#include <sys/syscall.h>
#include <unistd.h>

static uintptr_t syz_open_dev(uintptr_t a0, uintptr_t a1, uintptr_t a2)
{
  if (a0 == 0xc || a0 == 0xb) {
    char buf[128];
    sprintf(buf, "/dev/%s/%d:%d", a0 == 0xc ? "char" : "block", (uint8_t)a1,
            (uint8_t)a2);
    return open(buf, O_RDWR, 0);
  } else {
    char buf[1024];
    char* hash;
    strncpy(buf, (char*)a0, sizeof(buf));
    buf[sizeof(buf) - 1] = 0;
    while ((hash = strchr(buf, '#'))) {
      *hash = '0' + (char)(a1 % 10);
      a1 /= 10;
    }
    return open(buf, a2, 0);
  }
}

static void execute_one();
extern unsigned long long procid;

void loop()
{
  while (1) {
    execute_one();
  }
}

uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff};
void execute_one()
{
  long res = 0;
  memcpy((void*)0x20000280, "/dev/input/event#", 18);
  res = syz_open_dev(0x20000280, 2, 0);
  if (res != -1)
    r[0] = res;
  *(uint32_t*)0x20000000 = 0;
  *(uint32_t*)0x20000004 = 0xfffffffd;
  syscall(__NR_ioctl, r[0], 0x40084503, 0x20000000);
  memcpy((void*)0x20000040, "/dev/input/event#", 18);
  res = syz_open_dev(0x20000040, 2, 0x10000000028001);
  if (res != -1)
    r[1] = res;
  *(uint64_t*)0x20000000 = 0;
  *(uint64_t*)0x20000008 = 0;
  *(uint16_t*)0x20000010 = 1;
  *(uint16_t*)0x20000012 = 0x46;
  *(uint32_t*)0x20000014 = 2;
  *(uint64_t*)0x20000018 = 0;
  *(uint64_t*)0x20000020 = 0x2710;
  *(uint16_t*)0x20000028 = 3;
  *(uint16_t*)0x2000002a = 0;
  *(uint32_t*)0x2000002c = 0;
  syscall(__NR_write, r[1], 0x20000000, 0x30);
}

int main()
{
  syscall(__NR_mmap, 0x20000000, 0x1000000, 3, 0x32, -1, 0);
  for (;;) {
    loop();
  }
}