// https://syzkaller.appspot.com/bug?id=6605237fdbccd96ca99c9feba4430500abdc77ec
// autogenerated by syzkaller (https://github.com/google/syzkaller)

#define _GNU_SOURCE

#include <endian.h>
#include <errno.h>
#include <fcntl.h>
#include <stddef.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/ioctl.h>
#include <sys/mount.h>
#include <sys/stat.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <unistd.h>

#include <linux/loop.h>

#ifndef __NR_memfd_create
#define __NR_memfd_create 319
#endif

static unsigned long long procid;

struct fs_image_segment {
  void* data;
  uintptr_t size;
  uintptr_t offset;
};
static int setup_loop_device(long unsigned size, long unsigned nsegs,
                             struct fs_image_segment* segs,
                             const char* loopname, int* memfd_p, int* loopfd_p)
{
  int err = 0, loopfd = -1;
  int memfd = syscall(__NR_memfd_create, "syzkaller", 0);
  if (memfd == -1) {
    err = errno;
    goto error;
  }
  if (ftruncate(memfd, size)) {
    err = errno;
    goto error_close_memfd;
  }
  for (size_t i = 0; i < nsegs; i++) {
    if (pwrite(memfd, segs[i].data, segs[i].size, segs[i].offset) < 0) {
    }
  }
  loopfd = open(loopname, O_RDWR);
  if (loopfd == -1) {
    err = errno;
    goto error_close_memfd;
  }
  if (ioctl(loopfd, LOOP_SET_FD, memfd)) {
    if (errno != EBUSY) {
      err = errno;
      goto error_close_loop;
    }
    ioctl(loopfd, LOOP_CLR_FD, 0);
    usleep(1000);
    if (ioctl(loopfd, LOOP_SET_FD, memfd)) {
      err = errno;
      goto error_close_loop;
    }
  }
  *memfd_p = memfd;
  *loopfd_p = loopfd;
  return 0;

error_close_loop:
  close(loopfd);
error_close_memfd:
  close(memfd);
error:
  errno = err;
  return -1;
}

static long syz_mount_image(volatile long fsarg, volatile long dir,
                            volatile unsigned long size,
                            volatile unsigned long nsegs,
                            volatile long segments, volatile long flags,
                            volatile long optsarg, volatile long change_dir)
{
  struct fs_image_segment* segs = (struct fs_image_segment*)segments;
  int res = -1, err = 0, loopfd = -1, memfd = -1, need_loop_device = !!segs;
  char* mount_opts = (char*)optsarg;
  char* target = (char*)dir;
  char* fs = (char*)fsarg;
  char* source = NULL;
  char loopname[64];
  if (need_loop_device) {
    memset(loopname, 0, sizeof(loopname));
    snprintf(loopname, sizeof(loopname), "/dev/loop%llu", procid);
    if (setup_loop_device(size, nsegs, segs, loopname, &memfd, &loopfd) == -1)
      return -1;
    source = loopname;
  }
  mkdir(target, 0777);
  char opts[256];
  memset(opts, 0, sizeof(opts));
  if (strlen(mount_opts) > (sizeof(opts) - 32)) {
  }
  strncpy(opts, mount_opts, sizeof(opts) - 32);
  if (strcmp(fs, "iso9660") == 0) {
    flags |= MS_RDONLY;
  } else if (strncmp(fs, "ext", 3) == 0) {
    if (strstr(opts, "errors=panic") || strstr(opts, "errors=remount-ro") == 0)
      strcat(opts, ",errors=continue");
  } else if (strcmp(fs, "xfs") == 0) {
    strcat(opts, ",nouuid");
  }
  res = mount(source, target, fs, flags, opts);
  if (res == -1) {
    err = errno;
    goto error_clear_loop;
  }
  res = open(target, O_RDONLY | O_DIRECTORY);
  if (res == -1) {
    err = errno;
    goto error_clear_loop;
  }
  if (change_dir) {
    res = chdir(target);
    if (res == -1) {
      err = errno;
    }
  }

error_clear_loop:
  if (need_loop_device) {
    ioctl(loopfd, LOOP_CLR_FD, 0);
    close(loopfd);
    close(memfd);
  }
  errno = err;
  return res;
}

uint64_t r[1] = {0xffffffffffffffff};

int main(void)
{
  syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul);
  syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul);
  syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul);
  intptr_t res = 0;
  memcpy((void*)0x20000000, "reiserfs\000", 9);
  memcpy((void*)0x20000100, "./file0\000", 8);
  *(uint64_t*)0x20000540 = 0x200003c0;
  memcpy((void*)0x200003c0, "\xcf\x58", 2);
  *(uint64_t*)0x20000548 = 2;
  *(uint64_t*)0x20000550 = 6;
  *(uint64_t*)0x20000558 = 0x20000140;
  memcpy((void*)0x20000140, "\x8c\xb6\x37", 3);
  *(uint64_t*)0x20000560 = 3;
  *(uint64_t*)0x20000568 = 0x24;
  *(uint64_t*)0x20000570 = 0x20000080;
  memcpy((void*)0x20000080,
         "\x00\xf5\x00\x1d\xfd\x68\xdf\x5e\xc5\xcc\x2e\x7f\x55\x90\x6b\x1e\xe0"
         "\x95\x0e\xae\x3a\x56\x3d\xe9\x94\x71\x90\x8f\x2b\xa7\x71\xf2\x09\x3c"
         "\x51\xd0\x1d\xe6\xe7\x05\xae\x01\x00\x00\x00\xcd\x1a\xd0\x2b\x54\xa4"
         "\xe7\xfc\x8b",
         54);
  *(uint64_t*)0x20000578 = 0x36;
  *(uint64_t*)0x20000580 = 0x40;
  *(uint64_t*)0x20000588 = 0x20010000;
  memcpy((void*)0x20010000,
         "\x00\x04\x00\x00\xec\x01\x00\x00\x13\x02\x00\x00\x12\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x02\x00\x00\x00\x01\x00\x00\x61\x1c\xad\x49\xe1\x00"
         "\x00\x00\x1e\x00\x00\x00\x00\x00\x00\x00\x00\x10\xcc\x03\x10\x00\x01"
         "\x00\x52\x65\x49\x73\x45\x72\x33\x46\x73\x00\x00\x00\x02\x00\x00\x00"
         "\x02\x00\x01\x00\x02\x00\x01\x02\x00\x00\x00\x00\x01\x00\x00\x00\x12"
         "\x31\x2a\x23\x12\x12\x33\x12\x33\x12\x31\x12\x34\x13\x41\x24\x12\x73"
         "\x79\x7a\x6b\x61\x6c\x6c\x65\x72\x00\x00\x00\x00\x00\x00\x00\x01\x00"
         "\x1e\x00\x3a\xc1\x65\x5f\x00\x4e\xed",
         128);
  *(uint64_t*)0x20000590 = 0x80;
  *(uint64_t*)0x20000598 = 0x10000;
  *(uint64_t*)0x200005a0 = 0x200001c0;
  memcpy((void*)0x200001c0,
         "\x00\xfe\xff\x00\x00\x00\x05\x00\x08\x00\x00\x08\xf9\xe8\xc3\xda\xd3"
         "\xb1\x94\x2a\x21\xb9\x00\x10\x08\x00\x03\x54\x00\x48\xb2\x56\x07\x82"
         "\x8b\x96\xe2\x7e\xa5\x80\x19\x56\x00\x00\x00\x00\x00\x00\x00\xf1\xff"
         "\xff\xff\x9e\x08",
         55);
  *(uint64_t*)0x200005a8 = 0x37;
  *(uint64_t*)0x200005b0 = 0x100c0;
  *(uint64_t*)0x200005b8 = 0x20000300;
  memcpy((void*)0x20000300,
         "\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x02\x00\x00\x00\x01\x00\x00\x61\x1c\xad\x49\xe1\x00"
         "\x00\x00\x1e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
         64);
  *(uint64_t*)0x200005c0 = 0x40;
  *(uint64_t*)0x200005c8 = 0x212000;
  *(uint64_t*)0x200005d0 = 0x20011300;
  memcpy((void*)0x20011300,
         "\x01\x00\x02\x00\x5c\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x02\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x00\x00\x00\x00\x2c\x00\xd4\x0f\x01\x00\x01\x00\x00"
         "\x00\x02\x00\x00\x00\x01\x00\x00\x00\xf4\x01\x00\x00\x02\x00\x30\x00"
         "\xa4\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
         "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
         96);
  *(uint64_t*)0x200005d8 = 0x60;
  *(uint64_t*)0x200005e0 = 0x213000;
  *(uint64_t*)0x200005e8 = 0x20000600;
  memcpy(
      (void*)0x20000600,
      "\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x02\x00\x00\x00\x28\x00"
      "\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x20\x00\x04\x00"
      "\x2e\x2e\x00\x00\x00\x00\x00\x00\x2e\x00\xe2\xff\x00\x00\x00\x00\xed\x41"
      "\x00\x00\x03\x00\x00\x3a\xc1\x65\x5f\x3a\xc1\x65\x5f\x3a\xc1\x65\xea\xff"
      "\x68\x1d\xff\x7b\x5a\x40\x01\x4c\x8c\xf4\xe7\x12\xf4\xd5\x86\x26\x23\x83"
      "\x1c\x45\xf0\x3b\x61\x76\x25\x60\xc6\x84\xe8\xcd\xec\xf5\x0d\x6d\xbe\xd8"
      "\x7b\x7e\x98\xed\x1f\xaf\xaa\xf8\x9f\xeb\xcc\x1d\x25\x7e\x3c\x27\xd1\x3f"
      "\xed\xa4\xdf\x4a\x3b\x6e\xfb\xf7\x51\xf0\x95\x6a\x29\x84\x97\x1a\xaf\x1e"
      "\x82\xec\xf7\x8e\x9d\x7e\xe3\xe6\xeb\xa6\xff\xa6\xae\x0e\x58\x74\x5a\x60"
      "\x74\xad\x5d\xe6\x93\x95\x0c\x84\x8e\x6d\x1d\x28\x09\x15\xe0\x53\xa1\x26"
      "\xe5\xab\x66\x11\x9a\xd4\x0a\x28\xa1\xbb\xab\x7e\x08\x6e\x5e\xc3\x5f\xeb"
      "\x04\xb3\xb7\x02\x6b\x71\xa9\xea\x75\x93\x67\x08\xf4\xff\x15\x77\xa3\x77"
      "\x50\xa0\x42\xbf\xa7\xca\x16\xe3\xc2\x78\x3c\x16\x67\x49\x0f\x02\x60\x5c"
      "\x3b\x46\x11\xf4\x88\x08\xde\x55\x3d\x99\xb7\xb4\xcf\xa0\x60\x12\x1f\x11"
      "\x63\xd8\x3f\x02\xdd\x03\x97\xe0\xa6\xf8\xe7\xdb\x3a\xbd\x4a\x2c\xd1\x16"
      "\x10\x8a\x3c\x66\xab\xe1\x45\x34\x1c\x08\xdf\x6d\xcd\xd6\x92\xfe\x1e\x3b"
      "\x7d\xde\xb7\xc9\x4c\x24\x55\x44\x6c\x00\x00\x00\x00\x00\x00\x00\x00\x00"
      "\x00",
      307);
  *(uint64_t*)0x200005f0 = 0x133;
  *(uint64_t*)0x200005f8 = 0x213fa0;
  *(uint64_t*)0x20000180 = 0;
  res = -1;
  res = syz_mount_image(0x20000000, 0x20000100, 0x400010, 8, 0x20000540,
                        0x20040a, 0x20000180, 0);
  if (res != -1)
    r[0] = res;
  syscall(__NR_sync);
  *(uint64_t*)0x20000040 = 4;
  syscall(__NR_ioctl, r[0], 0x40087602, 0x20000040ul);
  return 0;
}