// https://syzkaller.appspot.com/bug?id=762e7debe9358b9fb086b72671bc0b97bc686a88
// autogenerated by syzkaller (https://github.com/google/syzkaller)

#define _GNU_SOURCE

#include <arpa/inet.h>
#include <dirent.h>
#include <endian.h>
#include <errno.h>
#include <fcntl.h>
#include <net/if.h>
#include <net/if_arp.h>
#include <netinet/in.h>
#include <pthread.h>
#include <sched.h>
#include <setjmp.h>
#include <signal.h>
#include <stdarg.h>
#include <stdbool.h>
#include <stddef.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/ioctl.h>
#include <sys/mman.h>
#include <sys/mount.h>
#include <sys/prctl.h>
#include <sys/resource.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/syscall.h>
#include <sys/time.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <time.h>
#include <unistd.h>

#include <linux/capability.h>
#include <linux/futex.h>
#include <linux/genetlink.h>
#include <linux/if_addr.h>
#include <linux/if_ether.h>
#include <linux/if_link.h>
#include <linux/if_tun.h>
#include <linux/in6.h>
#include <linux/ip.h>
#include <linux/loop.h>
#include <linux/neighbour.h>
#include <linux/net.h>
#include <linux/netlink.h>
#include <linux/rtnetlink.h>
#include <linux/tcp.h>
#include <linux/veth.h>

#ifndef __NR_memfd_create
#define __NR_memfd_create 319
#endif

static unsigned long long procid;

static __thread int clone_ongoing;
static __thread int skip_segv;
static __thread jmp_buf segv_env;

static void segv_handler(int sig, siginfo_t* info, void* ctx)
{
  if (__atomic_load_n(&clone_ongoing, __ATOMIC_RELAXED) != 0) {
    exit(sig);
  }
  uintptr_t addr = (uintptr_t)info->si_addr;
  const uintptr_t prog_start = 1 << 20;
  const uintptr_t prog_end = 100 << 20;
  int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0;
  int valid = addr < prog_start || addr > prog_end;
  if (skip && valid) {
    _longjmp(segv_env, 1);
  }
  exit(sig);
}

static void install_segv_handler(void)
{
  struct sigaction sa;
  memset(&sa, 0, sizeof(sa));
  sa.sa_handler = SIG_IGN;
  syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8);
  syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8);
  memset(&sa, 0, sizeof(sa));
  sa.sa_sigaction = segv_handler;
  sa.sa_flags = SA_NODEFER | SA_SIGINFO;
  sigaction(SIGSEGV, &sa, NULL);
  sigaction(SIGBUS, &sa, NULL);
}

#define NONFAILING(...)                                                        \
  ({                                                                           \
    int ok = 1;                                                                \
    __atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST);                       \
    if (_setjmp(segv_env) == 0) {                                              \
      __VA_ARGS__;                                                             \
    } else                                                                     \
      ok = 0;                                                                  \
    __atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST);                       \
    ok;                                                                        \
  })

static void sleep_ms(uint64_t ms)
{
  usleep(ms * 1000);
}

static uint64_t current_time_ms(void)
{
  struct timespec ts;
  if (clock_gettime(CLOCK_MONOTONIC, &ts))
    exit(1);
  return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
}

static void use_temporary_dir(void)
{
  char tmpdir_template[] = "./syzkaller.XXXXXX";
  char* tmpdir = mkdtemp(tmpdir_template);
  if (!tmpdir)
    exit(1);
  if (chmod(tmpdir, 0777))
    exit(1);
  if (chdir(tmpdir))
    exit(1);
}

static void thread_start(void* (*fn)(void*), void* arg)
{
  pthread_t th;
  pthread_attr_t attr;
  pthread_attr_init(&attr);
  pthread_attr_setstacksize(&attr, 128 << 10);
  int i = 0;
  for (; i < 100; i++) {
    if (pthread_create(&th, &attr, fn, arg) == 0) {
      pthread_attr_destroy(&attr);
      return;
    }
    if (errno == EAGAIN) {
      usleep(50);
      continue;
    }
    break;
  }
  exit(1);
}

typedef struct {
  int state;
} event_t;

static void event_init(event_t* ev)
{
  ev->state = 0;
}

static void event_reset(event_t* ev)
{
  ev->state = 0;
}

static void event_set(event_t* ev)
{
  if (ev->state)
    exit(1);
  __atomic_store_n(&ev->state, 1, __ATOMIC_RELEASE);
  syscall(SYS_futex, &ev->state, FUTEX_WAKE | FUTEX_PRIVATE_FLAG, 1000000);
}

static void event_wait(event_t* ev)
{
  while (!__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE))
    syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, 0);
}

static int event_isset(event_t* ev)
{
  return __atomic_load_n(&ev->state, __ATOMIC_ACQUIRE);
}

static int event_timedwait(event_t* ev, uint64_t timeout)
{
  uint64_t start = current_time_ms();
  uint64_t now = start;
  for (;;) {
    uint64_t remain = timeout - (now - start);
    struct timespec ts;
    ts.tv_sec = remain / 1000;
    ts.tv_nsec = (remain % 1000) * 1000 * 1000;
    syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, &ts);
    if (__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE))
      return 1;
    now = current_time_ms();
    if (now - start > timeout)
      return 0;
  }
}

static bool write_file(const char* file, const char* what, ...)
{
  char buf[1024];
  va_list args;
  va_start(args, what);
  vsnprintf(buf, sizeof(buf), what, args);
  va_end(args);
  buf[sizeof(buf) - 1] = 0;
  int len = strlen(buf);
  int fd = open(file, O_WRONLY | O_CLOEXEC);
  if (fd == -1)
    return false;
  if (write(fd, buf, len) != len) {
    int err = errno;
    close(fd);
    errno = err;
    return false;
  }
  close(fd);
  return true;
}

struct nlmsg {
  char* pos;
  int nesting;
  struct nlattr* nested[8];
  char buf[4096];
};

static void netlink_init(struct nlmsg* nlmsg, int typ, int flags,
                         const void* data, int size)
{
  memset(nlmsg, 0, sizeof(*nlmsg));
  struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf;
  hdr->nlmsg_type = typ;
  hdr->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | flags;
  memcpy(hdr + 1, data, size);
  nlmsg->pos = (char*)(hdr + 1) + NLMSG_ALIGN(size);
}

static void netlink_attr(struct nlmsg* nlmsg, int typ, const void* data,
                         int size)
{
  struct nlattr* attr = (struct nlattr*)nlmsg->pos;
  attr->nla_len = sizeof(*attr) + size;
  attr->nla_type = typ;
  if (size > 0)
    memcpy(attr + 1, data, size);
  nlmsg->pos += NLMSG_ALIGN(attr->nla_len);
}

static int netlink_send_ext(struct nlmsg* nlmsg, int sock, uint16_t reply_type,
                            int* reply_len, bool dofail)
{
  if (nlmsg->pos > nlmsg->buf + sizeof(nlmsg->buf) || nlmsg->nesting)
    exit(1);
  struct nlmsghdr* hdr = (struct nlmsghdr*)nlmsg->buf;
  hdr->nlmsg_len = nlmsg->pos - nlmsg->buf;
  struct sockaddr_nl addr;
  memset(&addr, 0, sizeof(addr));
  addr.nl_family = AF_NETLINK;
  ssize_t n = sendto(sock, nlmsg->buf, hdr->nlmsg_len, 0,
                     (struct sockaddr*)&addr, sizeof(addr));
  if (n != (ssize_t)hdr->nlmsg_len) {
    if (dofail)
      exit(1);
    return -1;
  }
  n = recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0);
  if (reply_len)
    *reply_len = 0;
  if (n < 0) {
    if (dofail)
      exit(1);
    return -1;
  }
  if (n < (ssize_t)sizeof(struct nlmsghdr)) {
    errno = EINVAL;
    if (dofail)
      exit(1);
    return -1;
  }
  if (hdr->nlmsg_type == NLMSG_DONE)
    return 0;
  if (reply_len && hdr->nlmsg_type == reply_type) {
    *reply_len = n;
    return 0;
  }
  if (n < (ssize_t)(sizeof(struct nlmsghdr) + sizeof(struct nlmsgerr))) {
    errno = EINVAL;
    if (dofail)
      exit(1);
    return -1;
  }
  if (hdr->nlmsg_type != NLMSG_ERROR) {
    errno = EINVAL;
    if (dofail)
      exit(1);
    return -1;
  }
  errno = -((struct nlmsgerr*)(hdr + 1))->error;
  return -errno;
}

static int netlink_send(struct nlmsg* nlmsg, int sock)
{
  return netlink_send_ext(nlmsg, sock, 0, NULL, true);
}

static int netlink_query_family_id(struct nlmsg* nlmsg, int sock,
                                   const char* family_name, bool dofail)
{
  struct genlmsghdr genlhdr;
  memset(&genlhdr, 0, sizeof(genlhdr));
  genlhdr.cmd = CTRL_CMD_GETFAMILY;
  netlink_init(nlmsg, GENL_ID_CTRL, 0, &genlhdr, sizeof(genlhdr));
  netlink_attr(nlmsg, CTRL_ATTR_FAMILY_NAME, family_name,
               strnlen(family_name, GENL_NAMSIZ - 1) + 1);
  int n = 0;
  int err = netlink_send_ext(nlmsg, sock, GENL_ID_CTRL, &n, dofail);
  if (err < 0) {
    return -1;
  }
  uint16_t id = 0;
  struct nlattr* attr = (struct nlattr*)(nlmsg->buf + NLMSG_HDRLEN +
                                         NLMSG_ALIGN(sizeof(genlhdr)));
  for (; (char*)attr < nlmsg->buf + n;
       attr = (struct nlattr*)((char*)attr + NLMSG_ALIGN(attr->nla_len))) {
    if (attr->nla_type == CTRL_ATTR_FAMILY_ID) {
      id = *(uint16_t*)(attr + 1);
      break;
    }
  }
  if (!id) {
    errno = EINVAL;
    return -1;
  }
  recv(sock, nlmsg->buf, sizeof(nlmsg->buf), 0);
  return id;
}

static void netlink_device_change(struct nlmsg* nlmsg, int sock,
                                  const char* name, bool up, const char* master,
                                  const void* mac, int macsize,
                                  const char* new_name)
{
  struct ifinfomsg hdr;
  memset(&hdr, 0, sizeof(hdr));
  if (up)
    hdr.ifi_flags = hdr.ifi_change = IFF_UP;
  hdr.ifi_index = if_nametoindex(name);
  netlink_init(nlmsg, RTM_NEWLINK, 0, &hdr, sizeof(hdr));
  if (new_name)
    netlink_attr(nlmsg, IFLA_IFNAME, new_name, strlen(new_name));
  if (master) {
    int ifindex = if_nametoindex(master);
    netlink_attr(nlmsg, IFLA_MASTER, &ifindex, sizeof(ifindex));
  }
  if (macsize)
    netlink_attr(nlmsg, IFLA_ADDRESS, mac, macsize);
  int err = netlink_send(nlmsg, sock);
  if (err < 0) {
  }
}

static int netlink_add_addr(struct nlmsg* nlmsg, int sock, const char* dev,
                            const void* addr, int addrsize)
{
  struct ifaddrmsg hdr;
  memset(&hdr, 0, sizeof(hdr));
  hdr.ifa_family = addrsize == 4 ? AF_INET : AF_INET6;
  hdr.ifa_prefixlen = addrsize == 4 ? 24 : 120;
  hdr.ifa_scope = RT_SCOPE_UNIVERSE;
  hdr.ifa_index = if_nametoindex(dev);
  netlink_init(nlmsg, RTM_NEWADDR, NLM_F_CREATE | NLM_F_REPLACE, &hdr,
               sizeof(hdr));
  netlink_attr(nlmsg, IFA_LOCAL, addr, addrsize);
  netlink_attr(nlmsg, IFA_ADDRESS, addr, addrsize);
  return netlink_send(nlmsg, sock);
}

static void netlink_add_addr4(struct nlmsg* nlmsg, int sock, const char* dev,
                              const char* addr)
{
  struct in_addr in_addr;
  inet_pton(AF_INET, addr, &in_addr);
  int err = netlink_add_addr(nlmsg, sock, dev, &in_addr, sizeof(in_addr));
  if (err < 0) {
  }
}

static void netlink_add_addr6(struct nlmsg* nlmsg, int sock, const char* dev,
                              const char* addr)
{
  struct in6_addr in6_addr;
  inet_pton(AF_INET6, addr, &in6_addr);
  int err = netlink_add_addr(nlmsg, sock, dev, &in6_addr, sizeof(in6_addr));
  if (err < 0) {
  }
}

static void netlink_add_neigh(struct nlmsg* nlmsg, int sock, const char* name,
                              const void* addr, int addrsize, const void* mac,
                              int macsize)
{
  struct ndmsg hdr;
  memset(&hdr, 0, sizeof(hdr));
  hdr.ndm_family = addrsize == 4 ? AF_INET : AF_INET6;
  hdr.ndm_ifindex = if_nametoindex(name);
  hdr.ndm_state = NUD_PERMANENT;
  netlink_init(nlmsg, RTM_NEWNEIGH, NLM_F_EXCL | NLM_F_CREATE, &hdr,
               sizeof(hdr));
  netlink_attr(nlmsg, NDA_DST, addr, addrsize);
  netlink_attr(nlmsg, NDA_LLADDR, mac, macsize);
  int err = netlink_send(nlmsg, sock);
  if (err < 0) {
  }
}

static struct nlmsg nlmsg;

static int tunfd = -1;

#define TUN_IFACE "syz_tun"
#define LOCAL_MAC 0xaaaaaaaaaaaa
#define REMOTE_MAC 0xaaaaaaaaaabb
#define LOCAL_IPV4 "172.20.20.170"
#define REMOTE_IPV4 "172.20.20.187"
#define LOCAL_IPV6 "fe80::aa"
#define REMOTE_IPV6 "fe80::bb"

#define IFF_NAPI 0x0010

static void initialize_tun(void)
{
  tunfd = open("/dev/net/tun", O_RDWR | O_NONBLOCK);
  if (tunfd == -1) {
    printf("tun: can't open /dev/net/tun: please enable CONFIG_TUN=y\n");
    printf("otherwise fuzzing or reproducing might not work as intended\n");
    return;
  }
  const int kTunFd = 200;
  if (dup2(tunfd, kTunFd) < 0)
    exit(1);
  close(tunfd);
  tunfd = kTunFd;
  struct ifreq ifr;
  memset(&ifr, 0, sizeof(ifr));
  strncpy(ifr.ifr_name, TUN_IFACE, IFNAMSIZ);
  ifr.ifr_flags = IFF_TAP | IFF_NO_PI;
  if (ioctl(tunfd, TUNSETIFF, (void*)&ifr) < 0) {
    exit(1);
  }
  char sysctl[64];
  sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/accept_dad", TUN_IFACE);
  write_file(sysctl, "0");
  sprintf(sysctl, "/proc/sys/net/ipv6/conf/%s/router_solicitations", TUN_IFACE);
  write_file(sysctl, "0");
  int sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE);
  if (sock == -1)
    exit(1);
  netlink_add_addr4(&nlmsg, sock, TUN_IFACE, LOCAL_IPV4);
  netlink_add_addr6(&nlmsg, sock, TUN_IFACE, LOCAL_IPV6);
  uint64_t macaddr = REMOTE_MAC;
  struct in_addr in_addr;
  inet_pton(AF_INET, REMOTE_IPV4, &in_addr);
  netlink_add_neigh(&nlmsg, sock, TUN_IFACE, &in_addr, sizeof(in_addr),
                    &macaddr, ETH_ALEN);
  struct in6_addr in6_addr;
  inet_pton(AF_INET6, REMOTE_IPV6, &in6_addr);
  netlink_add_neigh(&nlmsg, sock, TUN_IFACE, &in6_addr, sizeof(in6_addr),
                    &macaddr, ETH_ALEN);
  macaddr = LOCAL_MAC;
  netlink_device_change(&nlmsg, sock, TUN_IFACE, true, 0, &macaddr, ETH_ALEN,
                        NULL);
  close(sock);
}

static int read_tun(char* data, int size)
{
  if (tunfd < 0)
    return -1;
  int rv = read(tunfd, data, size);
  if (rv < 0) {
    if (errno == EAGAIN || errno == EBADF || errno == EBADFD)
      return -1;
    exit(1);
  }
  return rv;
}

static void flush_tun()
{
  char data[1000];
  while (read_tun(&data[0], sizeof(data)) != -1) {
  }
}

#define MAX_FDS 30

//% This code is derived from puff.{c,h}, found in the zlib development. The
//% original files come with the following copyright notice:

//% Copyright (C) 2002-2013 Mark Adler, all rights reserved
//% version 2.3, 21 Jan 2013
//% This software is provided 'as-is', without any express or implied
//% warranty.  In no event will the author be held liable for any damages
//% arising from the use of this software.
//% Permission is granted to anyone to use this software for any purpose,
//% including commercial applications, and to alter it and redistribute it
//% freely, subject to the following restrictions:
//% 1. The origin of this software must not be misrepresented; you must not
//%    claim that you wrote the original software. If you use this software
//%    in a product, an acknowledgment in the product documentation would be
//%    appreciated but is not required.
//% 2. Altered source versions must be plainly marked as such, and must not be
//%    misrepresented as being the original software.
//% 3. This notice may not be removed or altered from any source distribution.
//% Mark Adler    madler@alumni.caltech.edu

//% BEGIN CODE DERIVED FROM puff.{c,h}

#define MAXBITS 15
#define MAXLCODES 286
#define MAXDCODES 30
#define MAXCODES (MAXLCODES + MAXDCODES)
#define FIXLCODES 288

struct puff_state {
  unsigned char* out;
  unsigned long outlen;
  unsigned long outcnt;
  const unsigned char* in;
  unsigned long inlen;
  unsigned long incnt;
  int bitbuf;
  int bitcnt;
  jmp_buf env;
};
static int puff_bits(struct puff_state* s, int need)
{
  long val = s->bitbuf;
  while (s->bitcnt < need) {
    if (s->incnt == s->inlen)
      longjmp(s->env, 1);
    val |= (long)(s->in[s->incnt++]) << s->bitcnt;
    s->bitcnt += 8;
  }
  s->bitbuf = (int)(val >> need);
  s->bitcnt -= need;
  return (int)(val & ((1L << need) - 1));
}
static int puff_stored(struct puff_state* s)
{
  s->bitbuf = 0;
  s->bitcnt = 0;
  if (s->incnt + 4 > s->inlen)
    return 2;
  unsigned len = s->in[s->incnt++];
  len |= s->in[s->incnt++] << 8;
  if (s->in[s->incnt++] != (~len & 0xff) ||
      s->in[s->incnt++] != ((~len >> 8) & 0xff))
    return -2;
  if (s->incnt + len > s->inlen)
    return 2;
  if (s->outcnt + len > s->outlen)
    return 1;
  for (; len--; s->outcnt++, s->incnt++) {
    if (s->in[s->incnt])
      s->out[s->outcnt] = s->in[s->incnt];
  }
  return 0;
}
struct puff_huffman {
  short* count;
  short* symbol;
};
static int puff_decode(struct puff_state* s, const struct puff_huffman* h)
{
  int first = 0;
  int index = 0;
  int bitbuf = s->bitbuf;
  int left = s->bitcnt;
  int code = first = index = 0;
  int len = 1;
  short* next = h->count + 1;
  while (1) {
    while (left--) {
      code |= bitbuf & 1;
      bitbuf >>= 1;
      int count = *next++;
      if (code - count < first) {
        s->bitbuf = bitbuf;
        s->bitcnt = (s->bitcnt - len) & 7;
        return h->symbol[index + (code - first)];
      }
      index += count;
      first += count;
      first <<= 1;
      code <<= 1;
      len++;
    }
    left = (MAXBITS + 1) - len;
    if (left == 0)
      break;
    if (s->incnt == s->inlen)
      longjmp(s->env, 1);
    bitbuf = s->in[s->incnt++];
    if (left > 8)
      left = 8;
  }
  return -10;
}
static int puff_construct(struct puff_huffman* h, const short* length, int n)
{
  int len;
  for (len = 0; len <= MAXBITS; len++)
    h->count[len] = 0;
  int symbol;
  for (symbol = 0; symbol < n; symbol++)
    (h->count[length[symbol]])++;
  if (h->count[0] == n)
    return 0;
  int left = 1;
  for (len = 1; len <= MAXBITS; len++) {
    left <<= 1;
    left -= h->count[len];
    if (left < 0)
      return left;
  }
  short offs[MAXBITS + 1];
  offs[1] = 0;
  for (len = 1; len < MAXBITS; len++)
    offs[len + 1] = offs[len] + h->count[len];
  for (symbol = 0; symbol < n; symbol++)
    if (length[symbol] != 0)
      h->symbol[offs[length[symbol]]++] = symbol;
  return left;
}
static int puff_codes(struct puff_state* s, const struct puff_huffman* lencode,
                      const struct puff_huffman* distcode)
{
  static const short lens[29] = {3,  4,  5,  6,   7,   8,   9,   10,  11, 13,
                                 15, 17, 19, 23,  27,  31,  35,  43,  51, 59,
                                 67, 83, 99, 115, 131, 163, 195, 227, 258};
  static const short lext[29] = {0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 2, 2, 2,
                                 2, 3, 3, 3, 3, 4, 4, 4, 4, 5, 5, 5, 5, 0};
  static const short dists[30] = {
      1,    2,    3,    4,    5,    7,    9,    13,    17,    25,
      33,   49,   65,   97,   129,  193,  257,  385,   513,   769,
      1025, 1537, 2049, 3073, 4097, 6145, 8193, 12289, 16385, 24577};
  static const short dext[30] = {0, 0, 0,  0,  1,  1,  2,  2,  3,  3,
                                 4, 4, 5,  5,  6,  6,  7,  7,  8,  8,
                                 9, 9, 10, 10, 11, 11, 12, 12, 13, 13};
  int symbol;
  do {
    symbol = puff_decode(s, lencode);
    if (symbol < 0)
      return symbol;
    if (symbol < 256) {
      if (s->outcnt == s->outlen)
        return 1;
      if (symbol)
        s->out[s->outcnt] = symbol;
      s->outcnt++;
    } else if (symbol > 256) {
      symbol -= 257;
      if (symbol >= 29)
        return -10;
      int len = lens[symbol] + puff_bits(s, lext[symbol]);
      symbol = puff_decode(s, distcode);
      if (symbol < 0)
        return symbol;
      unsigned dist = dists[symbol] + puff_bits(s, dext[symbol]);
      if (dist > s->outcnt)
        return -11;
      if (s->outcnt + len > s->outlen)
        return 1;
      while (len--) {
        if (dist <= s->outcnt && s->out[s->outcnt - dist])
          s->out[s->outcnt] = s->out[s->outcnt - dist];
        s->outcnt++;
      }
    }
  } while (symbol != 256);
  return 0;
}
static int puff_fixed(struct puff_state* s)
{
  static int virgin = 1;
  static short lencnt[MAXBITS + 1], lensym[FIXLCODES];
  static short distcnt[MAXBITS + 1], distsym[MAXDCODES];
  static struct puff_huffman lencode, distcode;
  if (virgin) {
    lencode.count = lencnt;
    lencode.symbol = lensym;
    distcode.count = distcnt;
    distcode.symbol = distsym;
    short lengths[FIXLCODES];
    int symbol;
    for (symbol = 0; symbol < 144; symbol++)
      lengths[symbol] = 8;
    for (; symbol < 256; symbol++)
      lengths[symbol] = 9;
    for (; symbol < 280; symbol++)
      lengths[symbol] = 7;
    for (; symbol < FIXLCODES; symbol++)
      lengths[symbol] = 8;
    puff_construct(&lencode, lengths, FIXLCODES);
    for (symbol = 0; symbol < MAXDCODES; symbol++)
      lengths[symbol] = 5;
    puff_construct(&distcode, lengths, MAXDCODES);
    virgin = 0;
  }
  return puff_codes(s, &lencode, &distcode);
}
static int puff_dynamic(struct puff_state* s)
{
  static const short order[19] = {16, 17, 18, 0, 8,  7, 9,  6, 10, 5,
                                  11, 4,  12, 3, 13, 2, 14, 1, 15};
  int nlen = puff_bits(s, 5) + 257;
  int ndist = puff_bits(s, 5) + 1;
  int ncode = puff_bits(s, 4) + 4;
  if (nlen > MAXLCODES || ndist > MAXDCODES)
    return -3;
  short lengths[MAXCODES];
  int index;
  for (index = 0; index < ncode; index++)
    lengths[order[index]] = puff_bits(s, 3);
  for (; index < 19; index++)
    lengths[order[index]] = 0;
  short lencnt[MAXBITS + 1], lensym[MAXLCODES];
  struct puff_huffman lencode = {lencnt, lensym};
  int err = puff_construct(&lencode, lengths, 19);
  if (err != 0)
    return -4;
  index = 0;
  while (index < nlen + ndist) {
    int symbol;
    int len;
    symbol = puff_decode(s, &lencode);
    if (symbol < 0)
      return symbol;
    if (symbol < 16)
      lengths[index++] = symbol;
    else {
      len = 0;
      if (symbol == 16) {
        if (index == 0)
          return -5;
        len = lengths[index - 1];
        symbol = 3 + puff_bits(s, 2);
      } else if (symbol == 17)
        symbol = 3 + puff_bits(s, 3);
      else
        symbol = 11 + puff_bits(s, 7);
      if (index + symbol > nlen + ndist)
        return -6;
      while (symbol--)
        lengths[index++] = len;
    }
  }
  if (lengths[256] == 0)
    return -9;
  err = puff_construct(&lencode, lengths, nlen);
  if (err && (err < 0 || nlen != lencode.count[0] + lencode.count[1]))
    return -7;
  short distcnt[MAXBITS + 1], distsym[MAXDCODES];
  struct puff_huffman distcode = {distcnt, distsym};
  err = puff_construct(&distcode, lengths + nlen, ndist);
  if (err && (err < 0 || ndist != distcode.count[0] + distcode.count[1]))
    return -8;
  return puff_codes(s, &lencode, &distcode);
}
static int puff(unsigned char* dest, unsigned long* destlen,
                const unsigned char* source, unsigned long sourcelen)
{
  struct puff_state s = {
      .out = dest,
      .outlen = *destlen,
      .outcnt = 0,
      .in = source,
      .inlen = sourcelen,
      .incnt = 0,
      .bitbuf = 0,
      .bitcnt = 0,
  };
  int err;
  if (setjmp(s.env) != 0)
    err = 2;
  else {
    int last;
    do {
      last = puff_bits(&s, 1);
      int type = puff_bits(&s, 2);
      err = type == 0 ? puff_stored(&s)
                      : (type == 1 ? puff_fixed(&s)
                                   : (type == 2 ? puff_dynamic(&s) : -1));
      if (err != 0)
        break;
    } while (!last);
  }
  *destlen = s.outcnt;
  return err;
}

//% END CODE DERIVED FROM puff.{c,h}

#define ZLIB_HEADER_WIDTH 2

static int puff_zlib_to_file(const unsigned char* source,
                             unsigned long sourcelen, int dest_fd)
{
  if (sourcelen < ZLIB_HEADER_WIDTH)
    return 0;
  source += ZLIB_HEADER_WIDTH;
  sourcelen -= ZLIB_HEADER_WIDTH;
  const unsigned long max_destlen = 132 << 20;
  void* ret = mmap(0, max_destlen, PROT_WRITE | PROT_READ,
                   MAP_PRIVATE | MAP_ANON, -1, 0);
  if (ret == MAP_FAILED)
    return -1;
  unsigned char* dest = (unsigned char*)ret;
  unsigned long destlen = max_destlen;
  int err = puff(dest, &destlen, source, sourcelen);
  if (err) {
    munmap(dest, max_destlen);
    errno = -err;
    return -1;
  }
  if (write(dest_fd, dest, destlen) != (ssize_t)destlen) {
    munmap(dest, max_destlen);
    return -1;
  }
  return munmap(dest, max_destlen);
}

static int setup_loop_device(unsigned char* data, unsigned long size,
                             const char* loopname, int* loopfd_p)
{
  int err = 0, loopfd = -1;
  int memfd = syscall(__NR_memfd_create, "syzkaller", 0);
  if (memfd == -1) {
    err = errno;
    goto error;
  }
  if (puff_zlib_to_file(data, size, memfd)) {
    err = errno;
    goto error_close_memfd;
  }
  loopfd = open(loopname, O_RDWR);
  if (loopfd == -1) {
    err = errno;
    goto error_close_memfd;
  }
  if (ioctl(loopfd, LOOP_SET_FD, memfd)) {
    if (errno != EBUSY) {
      err = errno;
      goto error_close_loop;
    }
    ioctl(loopfd, LOOP_CLR_FD, 0);
    usleep(1000);
    if (ioctl(loopfd, LOOP_SET_FD, memfd)) {
      err = errno;
      goto error_close_loop;
    }
  }
  close(memfd);
  *loopfd_p = loopfd;
  return 0;

error_close_loop:
  close(loopfd);
error_close_memfd:
  close(memfd);
error:
  errno = err;
  return -1;
}

static void reset_loop_device(const char* loopname)
{
  int loopfd = open(loopname, O_RDWR);
  if (loopfd == -1) {
    return;
  }
  if (ioctl(loopfd, LOOP_CLR_FD, 0)) {
  }
  close(loopfd);
}

static long syz_mount_image(volatile long fsarg, volatile long dir,
                            volatile long flags, volatile long optsarg,
                            volatile long change_dir,
                            volatile unsigned long size, volatile long image)
{
  unsigned char* data = (unsigned char*)image;
  int res = -1, err = 0, need_loop_device = !!size;
  char* mount_opts = (char*)optsarg;
  char* target = (char*)dir;
  char* fs = (char*)fsarg;
  char* source = NULL;
  char loopname[64];
  if (need_loop_device) {
    int loopfd;
    memset(loopname, 0, sizeof(loopname));
    snprintf(loopname, sizeof(loopname), "/dev/loop%llu", procid);
    if (setup_loop_device(data, size, loopname, &loopfd) == -1)
      return -1;
    close(loopfd);
    source = loopname;
  }
  mkdir(target, 0777);
  char opts[256];
  memset(opts, 0, sizeof(opts));
  if (strlen(mount_opts) > (sizeof(opts) - 32)) {
  }
  strncpy(opts, mount_opts, sizeof(opts) - 32);
  if (strcmp(fs, "iso9660") == 0) {
    flags |= MS_RDONLY;
  } else if (strncmp(fs, "ext", 3) == 0) {
    bool has_remount_ro = false;
    char* remount_ro_start = strstr(opts, "errors=remount-ro");
    if (remount_ro_start != NULL) {
      char after = *(remount_ro_start + strlen("errors=remount-ro"));
      char before = remount_ro_start == opts ? '\0' : *(remount_ro_start - 1);
      has_remount_ro = ((before == '\0' || before == ',') &&
                        (after == '\0' || after == ','));
    }
    if (strstr(opts, "errors=panic") || !has_remount_ro)
      strcat(opts, ",errors=continue");
  } else if (strcmp(fs, "xfs") == 0) {
    strcat(opts, ",nouuid");
  }
  res = mount(source, target, fs, flags, opts);
  if (res == -1) {
    err = errno;
    goto error_clear_loop;
  }
  res = open(target, O_RDONLY | O_DIRECTORY);
  if (res == -1) {
    err = errno;
    goto error_clear_loop;
  }
  if (change_dir) {
    res = chdir(target);
    if (res == -1) {
      err = errno;
    }
  }

error_clear_loop:
  if (need_loop_device)
    reset_loop_device(loopname);
  errno = err;
  return res;
}

#define XT_TABLE_SIZE 1536
#define XT_MAX_ENTRIES 10

struct xt_counters {
  uint64_t pcnt, bcnt;
};

struct ipt_getinfo {
  char name[32];
  unsigned int valid_hooks;
  unsigned int hook_entry[5];
  unsigned int underflow[5];
  unsigned int num_entries;
  unsigned int size;
};

struct ipt_get_entries {
  char name[32];
  unsigned int size;
  uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)];
};

struct ipt_replace {
  char name[32];
  unsigned int valid_hooks;
  unsigned int num_entries;
  unsigned int size;
  unsigned int hook_entry[5];
  unsigned int underflow[5];
  unsigned int num_counters;
  struct xt_counters* counters;
  uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)];
};

struct ipt_table_desc {
  const char* name;
  struct ipt_getinfo info;
  struct ipt_replace replace;
};

static struct ipt_table_desc ipv4_tables[] = {
    {.name = "filter"}, {.name = "nat"},      {.name = "mangle"},
    {.name = "raw"},    {.name = "security"},
};

static struct ipt_table_desc ipv6_tables[] = {
    {.name = "filter"}, {.name = "nat"},      {.name = "mangle"},
    {.name = "raw"},    {.name = "security"},
};

#define IPT_BASE_CTL 64
#define IPT_SO_SET_REPLACE (IPT_BASE_CTL)
#define IPT_SO_GET_INFO (IPT_BASE_CTL)
#define IPT_SO_GET_ENTRIES (IPT_BASE_CTL + 1)

struct arpt_getinfo {
  char name[32];
  unsigned int valid_hooks;
  unsigned int hook_entry[3];
  unsigned int underflow[3];
  unsigned int num_entries;
  unsigned int size;
};

struct arpt_get_entries {
  char name[32];
  unsigned int size;
  uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)];
};

struct arpt_replace {
  char name[32];
  unsigned int valid_hooks;
  unsigned int num_entries;
  unsigned int size;
  unsigned int hook_entry[3];
  unsigned int underflow[3];
  unsigned int num_counters;
  struct xt_counters* counters;
  uint64_t entrytable[XT_TABLE_SIZE / sizeof(uint64_t)];
};

struct arpt_table_desc {
  const char* name;
  struct arpt_getinfo info;
  struct arpt_replace replace;
};

static struct arpt_table_desc arpt_tables[] = {
    {.name = "filter"},
};

#define ARPT_BASE_CTL 96
#define ARPT_SO_SET_REPLACE (ARPT_BASE_CTL)
#define ARPT_SO_GET_INFO (ARPT_BASE_CTL)
#define ARPT_SO_GET_ENTRIES (ARPT_BASE_CTL + 1)

static void checkpoint_iptables(struct ipt_table_desc* tables, int num_tables,
                                int family, int level)
{
  int fd = socket(family, SOCK_STREAM, IPPROTO_TCP);
  if (fd == -1) {
    switch (errno) {
    case EAFNOSUPPORT:
    case ENOPROTOOPT:
    case ENOENT:
      return;
    }
    exit(1);
  }
  for (int i = 0; i < num_tables; i++) {
    struct ipt_table_desc* table = &tables[i];
    strcpy(table->info.name, table->name);
    strcpy(table->replace.name, table->name);
    socklen_t optlen = sizeof(table->info);
    if (getsockopt(fd, level, IPT_SO_GET_INFO, &table->info, &optlen)) {
      switch (errno) {
      case EPERM:
      case ENOENT:
      case ENOPROTOOPT:
        continue;
      }
      exit(1);
    }
    if (table->info.size > sizeof(table->replace.entrytable))
      exit(1);
    if (table->info.num_entries > XT_MAX_ENTRIES)
      exit(1);
    struct ipt_get_entries entries;
    memset(&entries, 0, sizeof(entries));
    strcpy(entries.name, table->name);
    entries.size = table->info.size;
    optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size;
    if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen))
      exit(1);
    table->replace.valid_hooks = table->info.valid_hooks;
    table->replace.num_entries = table->info.num_entries;
    table->replace.size = table->info.size;
    memcpy(table->replace.hook_entry, table->info.hook_entry,
           sizeof(table->replace.hook_entry));
    memcpy(table->replace.underflow, table->info.underflow,
           sizeof(table->replace.underflow));
    memcpy(table->replace.entrytable, entries.entrytable, table->info.size);
  }
  close(fd);
}

static void reset_iptables(struct ipt_table_desc* tables, int num_tables,
                           int family, int level)
{
  int fd = socket(family, SOCK_STREAM, IPPROTO_TCP);
  if (fd == -1) {
    switch (errno) {
    case EAFNOSUPPORT:
    case ENOPROTOOPT:
    case ENOENT:
      return;
    }
    exit(1);
  }
  for (int i = 0; i < num_tables; i++) {
    struct ipt_table_desc* table = &tables[i];
    if (table->info.valid_hooks == 0)
      continue;
    struct ipt_getinfo info;
    memset(&info, 0, sizeof(info));
    strcpy(info.name, table->name);
    socklen_t optlen = sizeof(info);
    if (getsockopt(fd, level, IPT_SO_GET_INFO, &info, &optlen))
      exit(1);
    if (memcmp(&table->info, &info, sizeof(table->info)) == 0) {
      struct ipt_get_entries entries;
      memset(&entries, 0, sizeof(entries));
      strcpy(entries.name, table->name);
      entries.size = table->info.size;
      optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size;
      if (getsockopt(fd, level, IPT_SO_GET_ENTRIES, &entries, &optlen))
        exit(1);
      if (memcmp(table->replace.entrytable, entries.entrytable,
                 table->info.size) == 0)
        continue;
    }
    struct xt_counters counters[XT_MAX_ENTRIES];
    table->replace.num_counters = info.num_entries;
    table->replace.counters = counters;
    optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) +
             table->replace.size;
    if (setsockopt(fd, level, IPT_SO_SET_REPLACE, &table->replace, optlen))
      exit(1);
  }
  close(fd);
}

static void checkpoint_arptables(void)
{
  int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
  if (fd == -1) {
    switch (errno) {
    case EAFNOSUPPORT:
    case ENOPROTOOPT:
    case ENOENT:
      return;
    }
    exit(1);
  }
  for (unsigned i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) {
    struct arpt_table_desc* table = &arpt_tables[i];
    strcpy(table->info.name, table->name);
    strcpy(table->replace.name, table->name);
    socklen_t optlen = sizeof(table->info);
    if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &table->info, &optlen)) {
      switch (errno) {
      case EPERM:
      case ENOENT:
      case ENOPROTOOPT:
        continue;
      }
      exit(1);
    }
    if (table->info.size > sizeof(table->replace.entrytable))
      exit(1);
    if (table->info.num_entries > XT_MAX_ENTRIES)
      exit(1);
    struct arpt_get_entries entries;
    memset(&entries, 0, sizeof(entries));
    strcpy(entries.name, table->name);
    entries.size = table->info.size;
    optlen = sizeof(entries) - sizeof(entries.entrytable) + table->info.size;
    if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen))
      exit(1);
    table->replace.valid_hooks = table->info.valid_hooks;
    table->replace.num_entries = table->info.num_entries;
    table->replace.size = table->info.size;
    memcpy(table->replace.hook_entry, table->info.hook_entry,
           sizeof(table->replace.hook_entry));
    memcpy(table->replace.underflow, table->info.underflow,
           sizeof(table->replace.underflow));
    memcpy(table->replace.entrytable, entries.entrytable, table->info.size);
  }
  close(fd);
}

static void reset_arptables()
{
  int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
  if (fd == -1) {
    switch (errno) {
    case EAFNOSUPPORT:
    case ENOPROTOOPT:
    case ENOENT:
      return;
    }
    exit(1);
  }
  for (unsigned i = 0; i < sizeof(arpt_tables) / sizeof(arpt_tables[0]); i++) {
    struct arpt_table_desc* table = &arpt_tables[i];
    if (table->info.valid_hooks == 0)
      continue;
    struct arpt_getinfo info;
    memset(&info, 0, sizeof(info));
    strcpy(info.name, table->name);
    socklen_t optlen = sizeof(info);
    if (getsockopt(fd, SOL_IP, ARPT_SO_GET_INFO, &info, &optlen))
      exit(1);
    if (memcmp(&table->info, &info, sizeof(table->info)) == 0) {
      struct arpt_get_entries entries;
      memset(&entries, 0, sizeof(entries));
      strcpy(entries.name, table->name);
      entries.size = table->info.size;
      optlen = sizeof(entries) - sizeof(entries.entrytable) + entries.size;
      if (getsockopt(fd, SOL_IP, ARPT_SO_GET_ENTRIES, &entries, &optlen))
        exit(1);
      if (memcmp(table->replace.entrytable, entries.entrytable,
                 table->info.size) == 0)
        continue;
    } else {
    }
    struct xt_counters counters[XT_MAX_ENTRIES];
    table->replace.num_counters = info.num_entries;
    table->replace.counters = counters;
    optlen = sizeof(table->replace) - sizeof(table->replace.entrytable) +
             table->replace.size;
    if (setsockopt(fd, SOL_IP, ARPT_SO_SET_REPLACE, &table->replace, optlen))
      exit(1);
  }
  close(fd);
}

#define NF_BR_NUMHOOKS 6
#define EBT_TABLE_MAXNAMELEN 32
#define EBT_CHAIN_MAXNAMELEN 32
#define EBT_BASE_CTL 128
#define EBT_SO_SET_ENTRIES (EBT_BASE_CTL)
#define EBT_SO_GET_INFO (EBT_BASE_CTL)
#define EBT_SO_GET_ENTRIES (EBT_SO_GET_INFO + 1)
#define EBT_SO_GET_INIT_INFO (EBT_SO_GET_ENTRIES + 1)
#define EBT_SO_GET_INIT_ENTRIES (EBT_SO_GET_INIT_INFO + 1)

struct ebt_replace {
  char name[EBT_TABLE_MAXNAMELEN];
  unsigned int valid_hooks;
  unsigned int nentries;
  unsigned int entries_size;
  struct ebt_entries* hook_entry[NF_BR_NUMHOOKS];
  unsigned int num_counters;
  struct ebt_counter* counters;
  char* entries;
};

struct ebt_entries {
  unsigned int distinguisher;
  char name[EBT_CHAIN_MAXNAMELEN];
  unsigned int counter_offset;
  int policy;
  unsigned int nentries;
  char data[0] __attribute__((aligned(__alignof__(struct ebt_replace))));
};

struct ebt_table_desc {
  const char* name;
  struct ebt_replace replace;
  char entrytable[XT_TABLE_SIZE];
};

static struct ebt_table_desc ebt_tables[] = {
    {.name = "filter"},
    {.name = "nat"},
    {.name = "broute"},
};

static void checkpoint_ebtables(void)
{
  int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
  if (fd == -1) {
    switch (errno) {
    case EAFNOSUPPORT:
    case ENOPROTOOPT:
    case ENOENT:
      return;
    }
    exit(1);
  }
  for (size_t i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) {
    struct ebt_table_desc* table = &ebt_tables[i];
    strcpy(table->replace.name, table->name);
    socklen_t optlen = sizeof(table->replace);
    if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_INFO, &table->replace,
                   &optlen)) {
      switch (errno) {
      case EPERM:
      case ENOENT:
      case ENOPROTOOPT:
        continue;
      }
      exit(1);
    }
    if (table->replace.entries_size > sizeof(table->entrytable))
      exit(1);
    table->replace.num_counters = 0;
    table->replace.entries = table->entrytable;
    optlen = sizeof(table->replace) + table->replace.entries_size;
    if (getsockopt(fd, SOL_IP, EBT_SO_GET_INIT_ENTRIES, &table->replace,
                   &optlen))
      exit(1);
  }
  close(fd);
}

static void reset_ebtables()
{
  int fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
  if (fd == -1) {
    switch (errno) {
    case EAFNOSUPPORT:
    case ENOPROTOOPT:
    case ENOENT:
      return;
    }
    exit(1);
  }
  for (unsigned i = 0; i < sizeof(ebt_tables) / sizeof(ebt_tables[0]); i++) {
    struct ebt_table_desc* table = &ebt_tables[i];
    if (table->replace.valid_hooks == 0)
      continue;
    struct ebt_replace replace;
    memset(&replace, 0, sizeof(replace));
    strcpy(replace.name, table->name);
    socklen_t optlen = sizeof(replace);
    if (getsockopt(fd, SOL_IP, EBT_SO_GET_INFO, &replace, &optlen))
      exit(1);
    replace.num_counters = 0;
    table->replace.entries = 0;
    for (unsigned h = 0; h < NF_BR_NUMHOOKS; h++)
      table->replace.hook_entry[h] = 0;
    if (memcmp(&table->replace, &replace, sizeof(table->replace)) == 0) {
      char entrytable[XT_TABLE_SIZE];
      memset(&entrytable, 0, sizeof(entrytable));
      replace.entries = entrytable;
      optlen = sizeof(replace) + replace.entries_size;
      if (getsockopt(fd, SOL_IP, EBT_SO_GET_ENTRIES, &replace, &optlen))
        exit(1);
      if (memcmp(table->entrytable, entrytable, replace.entries_size) == 0)
        continue;
    }
    for (unsigned j = 0, h = 0; h < NF_BR_NUMHOOKS; h++) {
      if (table->replace.valid_hooks & (1 << h)) {
        table->replace.hook_entry[h] =
            (struct ebt_entries*)table->entrytable + j;
        j++;
      }
    }
    table->replace.entries = table->entrytable;
    optlen = sizeof(table->replace) + table->replace.entries_size;
    if (setsockopt(fd, SOL_IP, EBT_SO_SET_ENTRIES, &table->replace, optlen))
      exit(1);
  }
  close(fd);
}

static void checkpoint_net_namespace(void)
{
  checkpoint_ebtables();
  checkpoint_arptables();
  checkpoint_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]),
                      AF_INET, SOL_IP);
  checkpoint_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]),
                      AF_INET6, SOL_IPV6);
}

static void reset_net_namespace(void)
{
  reset_ebtables();
  reset_arptables();
  reset_iptables(ipv4_tables, sizeof(ipv4_tables) / sizeof(ipv4_tables[0]),
                 AF_INET, SOL_IP);
  reset_iptables(ipv6_tables, sizeof(ipv6_tables) / sizeof(ipv6_tables[0]),
                 AF_INET6, SOL_IPV6);
}

static void mount_cgroups(const char* dir, const char** controllers, int count)
{
  if (mkdir(dir, 0777)) {
    return;
  }
  char enabled[128] = {0};
  int i = 0;
  for (; i < count; i++) {
    if (mount("none", dir, "cgroup", 0, controllers[i])) {
      continue;
    }
    umount(dir);
    strcat(enabled, ",");
    strcat(enabled, controllers[i]);
  }
  if (enabled[0] == 0) {
    if (rmdir(dir) && errno != EBUSY)
      exit(1);
    return;
  }
  if (mount("none", dir, "cgroup", 0, enabled + 1)) {
    if (rmdir(dir) && errno != EBUSY)
      exit(1);
  }
  if (chmod(dir, 0777)) {
  }
}

static void mount_cgroups2(const char** controllers, int count)
{
  if (mkdir("/syzcgroup/unified", 0777)) {
    return;
  }
  if (mount("none", "/syzcgroup/unified", "cgroup2", 0, NULL)) {
    if (rmdir("/syzcgroup/unified") && errno != EBUSY)
      exit(1);
    return;
  }
  if (chmod("/syzcgroup/unified", 0777)) {
  }
  int control = open("/syzcgroup/unified/cgroup.subtree_control", O_WRONLY);
  if (control == -1)
    return;
  int i;
  for (i = 0; i < count; i++)
    if (write(control, controllers[i], strlen(controllers[i])) < 0) {
    }
  close(control);
}

static void setup_cgroups()
{
  const char* unified_controllers[] = {"+cpu", "+io", "+pids"};
  const char* net_controllers[] = {"net", "net_prio", "devices", "blkio",
                                   "freezer"};
  const char* cpu_controllers[] = {"cpuset", "cpuacct", "hugetlb", "rlimit",
                                   "memory"};
  if (mkdir("/syzcgroup", 0777)) {
    return;
  }
  mount_cgroups2(unified_controllers,
                 sizeof(unified_controllers) / sizeof(unified_controllers[0]));
  mount_cgroups("/syzcgroup/net", net_controllers,
                sizeof(net_controllers) / sizeof(net_controllers[0]));
  mount_cgroups("/syzcgroup/cpu", cpu_controllers,
                sizeof(cpu_controllers) / sizeof(cpu_controllers[0]));
  write_file("/syzcgroup/cpu/cgroup.clone_children", "1");
  write_file("/syzcgroup/cpu/cpuset.memory_pressure_enabled", "1");
}

static void setup_cgroups_loop()
{
  int pid = getpid();
  char file[128];
  char cgroupdir[64];
  snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid);
  if (mkdir(cgroupdir, 0777)) {
  }
  snprintf(file, sizeof(file), "%s/pids.max", cgroupdir);
  write_file(file, "32");
  snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir);
  write_file(file, "%d", pid);
  snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid);
  if (mkdir(cgroupdir, 0777)) {
  }
  snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir);
  write_file(file, "%d", pid);
  snprintf(file, sizeof(file), "%s/memory.soft_limit_in_bytes", cgroupdir);
  write_file(file, "%d", 299 << 20);
  snprintf(file, sizeof(file), "%s/memory.limit_in_bytes", cgroupdir);
  write_file(file, "%d", 300 << 20);
  snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid);
  if (mkdir(cgroupdir, 0777)) {
  }
  snprintf(file, sizeof(file), "%s/cgroup.procs", cgroupdir);
  write_file(file, "%d", pid);
}

static void setup_cgroups_test()
{
  char cgroupdir[64];
  snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/unified/syz%llu", procid);
  if (symlink(cgroupdir, "./cgroup")) {
  }
  snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/cpu/syz%llu", procid);
  if (symlink(cgroupdir, "./cgroup.cpu")) {
  }
  snprintf(cgroupdir, sizeof(cgroupdir), "/syzcgroup/net/syz%llu", procid);
  if (symlink(cgroupdir, "./cgroup.net")) {
  }
}

static void initialize_cgroups()
{
  if (mkdir("./syz-tmp/newroot/syzcgroup", 0700))
    exit(1);
  if (mkdir("./syz-tmp/newroot/syzcgroup/unified", 0700))
    exit(1);
  if (mkdir("./syz-tmp/newroot/syzcgroup/cpu", 0700))
    exit(1);
  if (mkdir("./syz-tmp/newroot/syzcgroup/net", 0700))
    exit(1);
  unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE;
  if (mount("/syzcgroup/unified", "./syz-tmp/newroot/syzcgroup/unified", NULL,
            bind_mount_flags, NULL)) {
  }
  if (mount("/syzcgroup/cpu", "./syz-tmp/newroot/syzcgroup/cpu", NULL,
            bind_mount_flags, NULL)) {
  }
  if (mount("/syzcgroup/net", "./syz-tmp/newroot/syzcgroup/net", NULL,
            bind_mount_flags, NULL)) {
  }
}

static void setup_binderfs();
static void setup_fusectl();
static void sandbox_common_mount_tmpfs(void)
{
  write_file("/proc/sys/fs/mount-max", "100000");
  if (mkdir("./syz-tmp", 0777))
    exit(1);
  if (mount("", "./syz-tmp", "tmpfs", 0, NULL))
    exit(1);
  if (mkdir("./syz-tmp/newroot", 0777))
    exit(1);
  if (mkdir("./syz-tmp/newroot/dev", 0700))
    exit(1);
  unsigned bind_mount_flags = MS_BIND | MS_REC | MS_PRIVATE;
  if (mount("/dev", "./syz-tmp/newroot/dev", NULL, bind_mount_flags, NULL))
    exit(1);
  if (mkdir("./syz-tmp/newroot/proc", 0700))
    exit(1);
  if (mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL))
    exit(1);
  if (mkdir("./syz-tmp/newroot/selinux", 0700))
    exit(1);
  const char* selinux_path = "./syz-tmp/newroot/selinux";
  if (mount("/selinux", selinux_path, NULL, bind_mount_flags, NULL)) {
    if (errno != ENOENT)
      exit(1);
    if (mount("/sys/fs/selinux", selinux_path, NULL, bind_mount_flags, NULL) &&
        errno != ENOENT)
      exit(1);
  }
  if (mkdir("./syz-tmp/newroot/sys", 0700))
    exit(1);
  if (mount("/sys", "./syz-tmp/newroot/sys", 0, bind_mount_flags, NULL))
    exit(1);
  if (mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL,
            bind_mount_flags, NULL) &&
      errno != ENOENT)
    exit(1);
  if (mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL,
            bind_mount_flags, NULL) &&
      errno != ENOENT)
    exit(1);
  if (mount("/proc/sys/fs/binfmt_misc",
            "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, bind_mount_flags,
            NULL) &&
      errno != ENOENT)
    exit(1);
  initialize_cgroups();
  if (mkdir("./syz-tmp/pivot", 0777))
    exit(1);
  if (syscall(SYS_pivot_root, "./syz-tmp", "./syz-tmp/pivot")) {
    if (chdir("./syz-tmp"))
      exit(1);
  } else {
    if (chdir("/"))
      exit(1);
    if (umount2("./pivot", MNT_DETACH))
      exit(1);
  }
  if (chroot("./newroot"))
    exit(1);
  if (chdir("/"))
    exit(1);
  setup_binderfs();
  setup_fusectl();
}

static void setup_fusectl()
{
  if (mount(0, "/sys/fs/fuse/connections", "fusectl", 0, 0)) {
  }
}

static void setup_binderfs()
{
  if (mkdir("/dev/binderfs", 0777)) {
  }
  if (mount("binder", "/dev/binderfs", "binder", 0, NULL)) {
  }
}

static void loop();

static void sandbox_common()
{
  prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
  if (getppid() == 1)
    exit(1);
  struct rlimit rlim;
  rlim.rlim_cur = rlim.rlim_max = (200 << 20);
  setrlimit(RLIMIT_AS, &rlim);
  rlim.rlim_cur = rlim.rlim_max = 32 << 20;
  setrlimit(RLIMIT_MEMLOCK, &rlim);
  rlim.rlim_cur = rlim.rlim_max = 136 << 20;
  setrlimit(RLIMIT_FSIZE, &rlim);
  rlim.rlim_cur = rlim.rlim_max = 1 << 20;
  setrlimit(RLIMIT_STACK, &rlim);
  rlim.rlim_cur = rlim.rlim_max = 128 << 20;
  setrlimit(RLIMIT_CORE, &rlim);
  rlim.rlim_cur = rlim.rlim_max = 256;
  setrlimit(RLIMIT_NOFILE, &rlim);
  if (unshare(CLONE_NEWNS)) {
  }
  if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, NULL)) {
  }
  if (unshare(CLONE_NEWIPC)) {
  }
  if (unshare(0x02000000)) {
  }
  if (unshare(CLONE_NEWUTS)) {
  }
  if (unshare(CLONE_SYSVSEM)) {
  }
  typedef struct {
    const char* name;
    const char* value;
  } sysctl_t;
  static const sysctl_t sysctls[] = {
      {"/proc/sys/kernel/shmmax", "16777216"},
      {"/proc/sys/kernel/shmall", "536870912"},
      {"/proc/sys/kernel/shmmni", "1024"},
      {"/proc/sys/kernel/msgmax", "8192"},
      {"/proc/sys/kernel/msgmni", "1024"},
      {"/proc/sys/kernel/msgmnb", "1024"},
      {"/proc/sys/kernel/sem", "1024 1048576 500 1024"},
  };
  unsigned i;
  for (i = 0; i < sizeof(sysctls) / sizeof(sysctls[0]); i++)
    write_file(sysctls[i].name, sysctls[i].value);
}

static int wait_for_loop(int pid)
{
  if (pid < 0)
    exit(1);
  int status = 0;
  while (waitpid(-1, &status, __WALL) != pid) {
  }
  return WEXITSTATUS(status);
}

static void drop_caps(void)
{
  struct __user_cap_header_struct cap_hdr = {};
  struct __user_cap_data_struct cap_data[2] = {};
  cap_hdr.version = _LINUX_CAPABILITY_VERSION_3;
  cap_hdr.pid = getpid();
  if (syscall(SYS_capget, &cap_hdr, &cap_data))
    exit(1);
  const int drop = (1 << CAP_SYS_PTRACE) | (1 << CAP_SYS_NICE);
  cap_data[0].effective &= ~drop;
  cap_data[0].permitted &= ~drop;
  cap_data[0].inheritable &= ~drop;
  if (syscall(SYS_capset, &cap_hdr, &cap_data))
    exit(1);
}

static int do_sandbox_none(void)
{
  if (unshare(CLONE_NEWPID)) {
  }
  int pid = fork();
  if (pid != 0)
    return wait_for_loop(pid);
  sandbox_common();
  drop_caps();
  if (unshare(CLONE_NEWNET)) {
  }
  write_file("/proc/sys/net/ipv4/ping_group_range", "0 65535");
  initialize_tun();
  sandbox_common_mount_tmpfs();
  loop();
  exit(1);
}

#define FS_IOC_SETFLAGS _IOW('f', 2, long)
static void remove_dir(const char* dir)
{
  int iter = 0;
  DIR* dp = 0;
  const int umount_flags = MNT_FORCE | UMOUNT_NOFOLLOW;

retry:
  while (umount2(dir, umount_flags) == 0) {
  }
  dp = opendir(dir);
  if (dp == NULL) {
    if (errno == EMFILE) {
      exit(1);
    }
    exit(1);
  }
  struct dirent* ep = 0;
  while ((ep = readdir(dp))) {
    if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0)
      continue;
    char filename[FILENAME_MAX];
    snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name);
    while (umount2(filename, umount_flags) == 0) {
    }
    struct stat st;
    if (lstat(filename, &st))
      exit(1);
    if (S_ISDIR(st.st_mode)) {
      remove_dir(filename);
      continue;
    }
    int i;
    for (i = 0;; i++) {
      if (unlink(filename) == 0)
        break;
      if (errno == EPERM) {
        int fd = open(filename, O_RDONLY);
        if (fd != -1) {
          long flags = 0;
          if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) {
          }
          close(fd);
          continue;
        }
      }
      if (errno == EROFS) {
        break;
      }
      if (errno != EBUSY || i > 100)
        exit(1);
      if (umount2(filename, umount_flags))
        exit(1);
    }
  }
  closedir(dp);
  for (int i = 0;; i++) {
    if (rmdir(dir) == 0)
      break;
    if (i < 100) {
      if (errno == EPERM) {
        int fd = open(dir, O_RDONLY);
        if (fd != -1) {
          long flags = 0;
          if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) {
          }
          close(fd);
          continue;
        }
      }
      if (errno == EROFS) {
        break;
      }
      if (errno == EBUSY) {
        if (umount2(dir, umount_flags))
          exit(1);
        continue;
      }
      if (errno == ENOTEMPTY) {
        if (iter < 100) {
          iter++;
          goto retry;
        }
      }
    }
    exit(1);
  }
}

static void kill_and_wait(int pid, int* status)
{
  kill(-pid, SIGKILL);
  kill(pid, SIGKILL);
  for (int i = 0; i < 100; i++) {
    if (waitpid(-1, status, WNOHANG | __WALL) == pid)
      return;
    usleep(1000);
  }
  DIR* dir = opendir("/sys/fs/fuse/connections");
  if (dir) {
    for (;;) {
      struct dirent* ent = readdir(dir);
      if (!ent)
        break;
      if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0)
        continue;
      char abort[300];
      snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort",
               ent->d_name);
      int fd = open(abort, O_WRONLY);
      if (fd == -1) {
        continue;
      }
      if (write(fd, abort, 1) < 0) {
      }
      close(fd);
    }
    closedir(dir);
  } else {
  }
  while (waitpid(-1, status, __WALL) != pid) {
  }
}

static void setup_loop()
{
  setup_cgroups_loop();
  checkpoint_net_namespace();
}

static void reset_loop()
{
  char buf[64];
  snprintf(buf, sizeof(buf), "/dev/loop%llu", procid);
  int loopfd = open(buf, O_RDWR);
  if (loopfd != -1) {
    ioctl(loopfd, LOOP_CLR_FD, 0);
    close(loopfd);
  }
  reset_net_namespace();
}

static void setup_test()
{
  prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
  setpgrp();
  setup_cgroups_test();
  write_file("/proc/self/oom_score_adj", "1000");
  flush_tun();
  if (symlink("/dev/binderfs", "./binderfs")) {
  }
}

static void close_fds()
{
  for (int fd = 3; fd < MAX_FDS; fd++)
    close(fd);
}

static const char* setup_binfmt_misc()
{
  if (mount(0, "/proc/sys/fs/binfmt_misc", "binfmt_misc", 0, 0) &&
      errno != EBUSY) {
    return NULL;
  }
  if (!write_file("/proc/sys/fs/binfmt_misc/register",
                  ":syz0:M:0:\x01::./file0:") ||
      !write_file("/proc/sys/fs/binfmt_misc/register",
                  ":syz1:M:1:\x02::./file0:POC"))
    return "write(/proc/sys/fs/binfmt_misc/register) failed";
  return NULL;
}

static const char* setup_usb()
{
  if (chmod("/dev/raw-gadget", 0666))
    return "failed to chmod /dev/raw-gadget";
  return NULL;
}

static void setup_sysctl()
{
  int cad_pid = fork();
  if (cad_pid < 0)
    exit(1);
  if (cad_pid == 0) {
    for (;;)
      sleep(100);
  }
  char tmppid[32];
  snprintf(tmppid, sizeof(tmppid), "%d", cad_pid);
  struct {
    const char* name;
    const char* data;
  } files[] = {
      {"/sys/kernel/debug/x86/nmi_longest_ns", "10000000000"},
      {"/proc/sys/kernel/hung_task_check_interval_secs", "20"},
      {"/proc/sys/net/core/bpf_jit_kallsyms", "1"},
      {"/proc/sys/net/core/bpf_jit_harden", "0"},
      {"/proc/sys/kernel/kptr_restrict", "0"},
      {"/proc/sys/kernel/softlockup_all_cpu_backtrace", "1"},
      {"/proc/sys/fs/mount-max", "100"},
      {"/proc/sys/vm/oom_dump_tasks", "0"},
      {"/proc/sys/debug/exception-trace", "0"},
      {"/proc/sys/kernel/printk", "7 4 1 3"},
      {"/proc/sys/kernel/keys/gc_delay", "1"},
      {"/proc/sys/vm/oom_kill_allocating_task", "1"},
      {"/proc/sys/kernel/ctrl-alt-del", "0"},
      {"/proc/sys/kernel/cad_pid", tmppid},
  };
  for (size_t i = 0; i < sizeof(files) / sizeof(files[0]); i++) {
    if (!write_file(files[i].name, files[i].data)) {
    }
  }
  kill(cad_pid, SIGKILL);
  while (waitpid(cad_pid, NULL, 0) != cad_pid)
    ;
}

struct thread_t {
  int created, call;
  event_t ready, done;
};

static struct thread_t threads[16];
static void execute_call(int call);
static int running;

static void* thr(void* arg)
{
  struct thread_t* th = (struct thread_t*)arg;
  for (;;) {
    event_wait(&th->ready);
    event_reset(&th->ready);
    execute_call(th->call);
    __atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED);
    event_set(&th->done);
  }
  return 0;
}

static void execute_one(void)
{
  if (write(1, "executing program\n", sizeof("executing program\n") - 1)) {
  }
  int i, call, thread;
  for (call = 0; call < 9; call++) {
    for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0]));
         thread++) {
      struct thread_t* th = &threads[thread];
      if (!th->created) {
        th->created = 1;
        event_init(&th->ready);
        event_init(&th->done);
        event_set(&th->done);
        thread_start(thr, th);
      }
      if (!event_isset(&th->done))
        continue;
      event_reset(&th->done);
      th->call = call;
      __atomic_fetch_add(&running, 1, __ATOMIC_RELAXED);
      event_set(&th->ready);
      event_timedwait(&th->done,
                      50 + (call == 0 ? 4000 : 0) + (call == 7 ? 4000 : 0));
      break;
    }
  }
  for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++)
    sleep_ms(1);
  close_fds();
}

static void execute_one(void);

#define WAIT_FLAGS __WALL

static void loop(void)
{
  setup_loop();
  int iter = 0;
  for (;; iter++) {
    char cwdbuf[32];
    sprintf(cwdbuf, "./%d", iter);
    if (mkdir(cwdbuf, 0777))
      exit(1);
    reset_loop();
    int pid = fork();
    if (pid < 0)
      exit(1);
    if (pid == 0) {
      if (chdir(cwdbuf))
        exit(1);
      setup_test();
      execute_one();
      exit(0);
    }
    int status = 0;
    uint64_t start = current_time_ms();
    for (;;) {
      sleep_ms(10);
      if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid)
        break;
      if (current_time_ms() - start < 5000)
        continue;
      kill_and_wait(pid, &status);
      break;
    }
    remove_dir(cwdbuf);
  }
}

uint64_t r[1] = {0xffffffffffffffff};

void execute_call(int call)
{
  intptr_t res = 0;
  switch (call) {
  case 0:
    NONFAILING(memcpy((void*)0x20000040, "ext4\000", 5));
    NONFAILING(memcpy((void*)0x200001c0, "./file2\000", 8));
    NONFAILING(memcpy((void*)0x20000200, "nogrpid", 7));
    NONFAILING(*(uint8_t*)0x20000207 = 0x2c);
    NONFAILING(memcpy((void*)0x20000208, "resuid", 6));
    NONFAILING(*(uint8_t*)0x2000020e = 0x3d);
    NONFAILING(sprintf((char*)0x2000020f, "0x%016llx", (long long)0xee01));
    NONFAILING(*(uint8_t*)0x20000221 = 0x2c);
    NONFAILING(memcpy((void*)0x20000222, "debug_want_extra_isize", 22));
    NONFAILING(*(uint8_t*)0x20000238 = 0x3d);
    NONFAILING(sprintf((char*)0x20000239, "0x%016llx", (long long)0x68));
    NONFAILING(*(uint8_t*)0x2000024b = 0x2c);
    NONFAILING(memcpy((void*)0x2000024c, "debug", 5));
    NONFAILING(*(uint8_t*)0x20000251 = 0x2c);
    NONFAILING(memcpy((void*)0x20000252, "nombcache", 9));
    NONFAILING(*(uint8_t*)0x2000025b = 0x2c);
    NONFAILING(memcpy((void*)0x2000025c, "quota", 5));
    NONFAILING(*(uint8_t*)0x20000261 = 0x2c);
    NONFAILING(*(uint8_t*)0x20000262 = 0);
    NONFAILING(memcpy(
        (void*)0x20000940,
        "\x78\x9c\xec\xdb\xcf\x6b\x1c\x55\x1c\x00\xf0\xef\xcc\x26\xad\xfd\x65"
        "\x62\xa9\x3f\x9a\x56\x8d\x56\x31\xf8\x23\x69\xd2\x5a\x7b\xf0\xa2\x28"
        "\x78\x50\x10\xf4\x50\x8f\x31\x49\x4b\xec\xb6\x91\x26\x82\x2d\x41\xa3"
        "\x48\x3d\x4a\xc1\xbb\x78\x14\xfc\x0b\x3c\xe9\x45\xd4\x93\xe0\x55\xef"
        "\x52\x28\x92\x4b\xab\xa7\x95\xd9\x9d\x49\x76\x37\xbb\x69\x92\x6e\xb2"
        "\xd5\xfd\x7c\x60\x92\xf7\x66\xde\xf2\xde\x77\x67\xde\xee\x7b\xf3\x76"
        "\x02\xe8\x59\xc3\xd9\x9f\x24\x62\x7f\x44\xfc\x1e\x11\x03\xb5\x6c\x63"
        "\x81\xe1\xda\xbf\x5b\xcb\x8b\x53\x7f\x2f\x2f\x4e\x25\x51\xa9\xbc\xf5"
        "\x57\x52\x2d\x77\x73\x79\x71\xaa\x28\x5a\xbc\x6e\x5f\x91\xe9\x8b\x48"
        "\x3f\x4b\xe2\x48\x8b\x7a\xe7\x2f\x5f\x39\x3f\x59\x2e\xcf\x5c\xca\xf3"
        "\x63\x0b\x17\xde\x1f\x9b\xbf\x7c\xe5\xb9\xd9\x0b\x93\xe7\x66\xce\xcd"
        "\x5c\x9c\x38\x7d\xfa\xe4\x89\xf1\x17\x4e\x4d\x3c\xdf\x91\x38\xb3\xb8"
        "\x6e\x0e\x7d\x34\x77\xf4\xf0\x6b\xef\x5c\x7b\x63\xea\xcc\xb5\x77\x7f"
        "\xfe\x36\x29\xe2\x6f\x8a\xa3\x43\x86\xd7\x3b\xf8\x64\xa5\xd2\xe1\xea"
        "\xba\xeb\x40\x5d\x3a\xe9\xeb\x62\x43\xd8\x94\x52\xad\x9b\x46\x7f\xb5"
        "\xff\x0f\x44\x29\x56\x4f\xde\x40\xbc\xfa\x69\x57\x1b\x07\x6c\xab\x4a"
        "\xa5\x52\x79\xa0\xfd\xe1\xa5\x0a\xf0\x3f\x96\x44\xb7\x5b\x00\x74\x47"
        "\xf1\x45\x9f\xcd\x7f\x8b\x6d\x87\x86\x1e\x77\x85\x1b\x2f\xd5\x26\x40"
        "\x59\xdc\xb7\xf2\xad\x76\xa4\x2f\xd2\xbc\x4c\x7f\xd3\xfc\xb6\x93\x86"
        "\x23\xe2\xcc\xd2\x3f\x5f\x65\x5b\x6c\xcf\x7d\x08\x00\x80\x06\xdf\x67"
        "\xe3\x9f\x67\x5b\x8d\xff\xd2\xa8\xbf\x2f\x74\x6f\xbe\x86\x32\x18\x11"
        "\xf7\x45\xc4\xc1\x88\x38\x15\x11\x87\x22\xe2\xfe\x88\x6a\xd9\x07\x23"
        "\xe2\xa1\x4d\xd6\xdf\xbc\x48\xb2\x76\xfc\x93\x5e\xdf\x52\x60\x1b\x94"
        "\x8d\xff\x5e\xcc\xd7\xb6\x1a\xc7\x7f\xc5\xe8\x2f\x06\x4b\x79\xee\x40"
        "\x35\xfe\xfe\xe4\xec\x6c\x79\xe6\x78\xfe\x9e\x8c\x44\xff\xee\x2c\x3f"
        "\xbe\x4e\x1d\x3f\xbc\xf2\xdb\x17\xed\x8e\xd5\x8f\xff\xb2\x2d\xab\xbf"
        "\x18\x0b\xe6\xed\xb8\xde\xb7\xbb\xf1\x35\xd3\x93\x0b\x93\x77\x12\x73"
        "\xbd\x1b\x9f\x44\x0c\xf5\xb5\x8a\x3f\x59\x59\x09\x48\x22\xe2\x70\x44"
        "\x0c\x6d\xb1\x8e\xd9\xa7\xbf\x39\xda\xee\xd8\xed\xe3\x5f\x47\x07\xd6"
        "\x99\x2a\x5f\x47\x3c\x55\x3b\xff\x4b\xd1\x14\x7f\x21\x59\x7f\x7d\x72"
        "\xec\x9e\x28\xcf\x1c\x1f\x2b\xae\x8a\xb5\x7e\xf9\xf5\xea\x9b\xed\xea"
        "\xbf\xa3\xf8\x3b\x20\x3b\xff\x7b\x5b\x5e\xff\x2b\xf1\x0f\x26\xf5\xeb"
        "\xb5\xf3\x9b\xaf\xe3\xea\x1f\x9f\xb7\x9d\xd3\x6c\xf5\xfa\xdf\x95\xbc"
        "\xdd\xb0\xef\xc3\xc9\x85\x85\x4b\xe3\x11\xbb\x92\xd7\x6b\x8d\xae\xdf"
        "\x3f\xd1\x54\x6e\x62\xb5\x7c\x16\xff\xc8\xb1\xd6\xfd\xff\x60\xac\xbe"
        "\x13\x47\x22\x22\xbb\x88\x1f\x8e\x88\x47\x22\xe2\xd1\xbc\xed\x8f\x45"
        "\xc4\xe3\x11\x71\x6c\x9d\xf8\x7f\x7a\xf9\x89\xf7\xb6\x1e\xff\xf6\xca"
        "\xe2\x9f\xde\xd4\xf9\x5f\x4d\xec\x8a\xe6\x3d\xad\x13\xa5\xf3\x3f\x7e"
        "\xd7\x50\xe9\xe0\x66\xe2\xcf\xce\xff\xc9\x6a\x6a\x24\xdf\xb3\x91\xcf"
        "\xbf\x8d\xb4\x6b\x6b\x57\x33\x00\x00\x00\xfc\xf7\xa4\x11\xb1\x3f\x92"
        "\x74\x74\x25\x9d\xa6\xa3\xa3\xb5\xdf\xf0\x1f\x8a\xbd\x69\x79\x6e\x7e"
        "\xe1\x99\xb3\x73\x1f\x5c\x9c\xae\x3d\x23\x30\x18\xfd\x69\x71\xa7\x6b"
        "\xa0\xee\x7e\xe8\x78\x3e\xad\x2f\xf2\x13\x4d\xf9\x13\xf9\x7d\xe3\x2f"
        "\x4b\x7b\xaa\xf9\xd1\xa9\xb9\xf2\x74\xb7\x83\x87\x1e\xb7\xaf\x4d\xff"
        "\xcf\xfc\x59\xea\x76\xeb\x80\x6d\xe7\x79\x2d\xe8\x5d\xfa\x3f\xf4\x2e"
        "\xfd\x1f\x7a\x97\xfe\x0f\xbd\xab\x45\xff\xdf\xd3\x8d\x76\x00\x3b\xaf"
        "\xd5\xf7\xff\xc7\x5d\x68\x07\xb0\xf3\x9a\xfa\xbf\x65\x3f\xe8\x21\xe6"
        "\xff\xd0\xbb\xf4\x7f\xe8\x5d\xfa\x3f\xf4\xa4\xf9\x3d\x71\xfb\x87\xe4"
        "\x25\x24\xd6\x24\x22\xbd\x2b\x9a\x21\xb1\x4d\x89\x6e\x7f\x32\x01\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
        "\x00\x00\x00\x00\x00\x74\xc6\xbf\x01\x00\x00\xff\xff\x50\x38\xe6\xd5",
        1071));
    NONFAILING(syz_mount_image(/*fs=*/0x20000040, /*dir=*/0x200001c0,
                               /*flags=MS_NODEV|MS_NOATIME*/ 0x404,
                               /*opts=*/0x20000200, /*chdir=*/3, /*size=*/0x42f,
                               /*img=*/0x20000940));
    break;
  case 1:
    NONFAILING(memcpy((void*)0x20000000, "./file0\000", 8));
    syscall(__NR_chdir, /*dir=*/0x20000000ul);
    break;
  case 2:
    NONFAILING(memcpy((void*)0x20000040, "./bus\000", 6));
    syscall(__NR_creat, /*file=*/0x20000040ul, /*mode=*/0ul);
    break;
  case 3:
    NONFAILING(memcpy((void*)0x20000040, "hugetlb.2MB.usage_in_bytes\000", 27));
    syscall(__NR_openat, /*fd=*/0xffffff9c, /*file=*/0x20000040ul,
            /*flags=*/0x275a, /*mode=*/0);
    break;
  case 4:
    NONFAILING(memcpy((void*)0x20000380, "/dev/loop", 9));
    NONFAILING(*(uint8_t*)0x20000389 = 0x30 + procid * 1);
    NONFAILING(*(uint8_t*)0x2000038a = 0);
    NONFAILING(memcpy((void*)0x20000140, "./bus\000", 6));
    syscall(__NR_mount, /*src=*/0x20000380ul, /*dst=*/0x20000140ul,
            /*type=*/0ul, /*flags=MS_BIND*/ 0x1000ul, /*data=*/0ul);
    break;
  case 5:
    NONFAILING(memcpy((void*)0x200002c0, "./bus\000", 6));
    res = syscall(__NR_open, /*file=*/0x200002c0ul,
                  /*flags=O_SYNC|O_DIRECT|O_RDWR*/ 0x105002ul, /*mode=*/0ul);
    if (res != -1)
      r[0] = res;
    break;
  case 6:
    syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0x800000ul,
            /*prot=PROT_WRITE*/ 2ul,
            /*flags=MAP_STACK|MAP_POPULATE|MAP_FIXED|MAP_SHARED*/ 0x28011ul,
            /*fd=*/r[0], /*offset=*/0ul);
    break;
  case 7:
    NONFAILING(memcpy((void*)0x20000040, "exfat\000", 6));
    NONFAILING(memcpy((void*)0x20000180, "\351\037q\211Y\036\2223aK\000", 11));
    NONFAILING(*(uint8_t*)0x200003c0 = -1);
    NONFAILING(*(uint8_t*)0x200003c1 = -1);
    NONFAILING(sprintf((char*)0x200003c2, "0x%016llx", (long long)-1));
    NONFAILING(*(uint64_t*)0x200003d4 = -1);
    NONFAILING(*(uint8_t*)0x200003dc = -1);
    NONFAILING(sprintf((char*)0x200003dd, "%020llu", (long long)0));
    NONFAILING(memcpy(
        (void*)0x20001b00,
        "\x78\x9c\xec\xdc\x0b\xb8\x4e\xd5\xf6\x30\xf0\x31\xe6\x9c\x8b\x4d\xd2"
        "\x9b\xe4\x3e\xc7\x1c\x8b\x37\x6d\x4c\x97\x24\xb9\x24\xc9\x25\x49\x92"
        "\x23\x49\x6e\x09\x21\x49\x92\x90\xdc\x6f\x49\x48\x42\xee\x49\xee\x21"
        "\xb9\x85\xe4\x7e\xbf\xe5\x9e\x24\x49\x92\x24\x24\x24\x99\xdf\xe3\x9c"
        "\xce\xd7\x39\xa7\xf3\xff\xf7\xf5\xff\xf7\x7d\x9e\xef\xbf\xc7\xef\x79"
        "\xd6\xf3\xce\xf1\xae\x77\xcc\x35\xe6\x1e\x7b\xef\x77\xad\xb5\x9f\x77"
        "\x7f\xd3\x61\x48\xe5\xba\x55\x2a\xd4\x66\x66\xf8\x6f\xc1\xbf\x3d\x74"
        "\x07\x80\x14\x00\xe8\x0f\x00\xd7\x01\x40\x04\x00\x25\xb2\x94\xc8\x72"
        "\x65\x7f\x06\x8d\xdd\xff\x7b\x07\x11\x7f\xae\x87\xa6\x5f\xed\x0a\xc4"
        "\xd5\x24\xfd\x4f\xdb\xa4\xff\x69\x9b\xf4\x3f\x6d\x93\xfe\xa7\x6d\xd2"
        "\xff\xb4\x4d\xfa\x9f\xb6\x49\xff\xd3\x36\xe9\xbf\x10\x69\xd9\xf6\x19"
        "\x39\xaf\x97\x2d\xed\x6e\x72\xff\x3f\x2d\x93\xf7\xff\xff\x41\x8e\x16"
        "\x1e\xfb\xc5\xc6\xc2\x37\x76\xfc\x03\x29\xd2\xff\xb4\x4d\xfa\x9f\xb6"
        "\x49\xff\xd3\x36\xe9\x7f\xda\x26\xfd\x4f\xdb\xa4\xff\x69\x9b\xf4\x3f"
        "\x6d\x93\xfe\x0b\x91\x96\xfd\xd7\xef\x1d\xcb\xdf\x0e\xfe\x27\x6c\x57"
        "\xfb\xfb\x4f\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10"
        "\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08"
        "\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84"
        "\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42"
        "\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21"
        "\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10"
        "\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08"
        "\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x44\xda\x70\x21\xfc\xca"
        "\x00\xc0\xdf\xc7\x57\xbb\x2e\x21\x84\x10\x42\x08\x21\x84\x10\x42\xfc"
        "\x79\x42\xfa\xab\x5d\x81\x10\x42\x08\x21\x84\x10\x42\x08\x21\xfe\xef"
        "\x43\x50\xa0\xc1\x40\x04\xe9\x20\x3d\xa4\x40\x06\xc8\x08\xd7\x40\x26"
        "\xb8\x16\x32\xc3\x75\x90\x80\xeb\x21\x0b\xdc\x00\x59\xe1\x46\xc8\x06"
        "\xd9\x21\x07\xe4\x84\x5c\x90\x1b\xf2\x80\x05\x02\x07\x0c\x31\xe4\x85"
        "\x7c\x90\x84\x9b\x20\x3f\xdc\x0c\xa9\x50\x00\x0a\x42\x21\xf0\x50\x18"
        "\x8a\x40\x51\x28\x06\xb7\x40\x71\xb8\x15\x4a\xc0\x6d\x50\x12\x6e\x87"
        "\x52\x50\x1a\xca\x40\x59\xb8\x03\xca\xc1\x9d\x50\x1e\xee\x82\x0a\x70"
        "\x37\x54\x84\x4a\x50\x19\xaa\xc0\x3d\x50\x15\xee\x85\x6a\x70\x1f\x54"
        "\x87\xfb\xa1\x06\x3c\x00\x35\xe1\x41\xa8\x05\x7f\x81\xda\xf0\x10\xd4"
        "\x81\x87\xa1\x2e\x3c\x02\xf5\xe0\x51\xa8\x0f\x0d\xa0\x21\x34\x82\xc6"
        "\xff\xa5\xfc\x17\xa0\x0b\xbc\x08\x5d\xa1\x1b\x74\x87\x1e\xd0\x13\x7a"
        "\x41\x6f\xe8\x03\x7d\xa1\x1f\xf4\x87\x97\x60\x00\xbc\x0c\x03\xe1\x15"
        "\x18\x04\x83\x61\x08\xbc\x0a\x43\xe1\x35\x18\x06\xaf\xc3\x70\x18\x01"
        "\x23\xe1\x0d\x18\x05\xa3\x61\x0c\x8c\x85\x71\x30\x1e\x26\xc0\x9b\x30"
        "\x11\xde\x82\x49\xf0\x36\x4c\x86\x29\x30\x15\xa6\xc1\x74\x98\x01\x33"
        "\xe1\x1d\x98\x05\xb3\x61\x0e\xbc\x0b\x73\xe1\x3d\x98\x07\xf3\x61\x01"
        "\x2c\x84\x45\xf0\x3e\x2c\x86\x25\xb0\x14\x3e\x80\x65\xf0\x21\x2c\x87"
        "\x15\xb0\x12\x56\xc1\x6a\x58\x03\x6b\x61\x1d\xac\x87\x0d\xb0\x11\x36"
        "\xc1\x66\xd8\x02\x5b\x61\x1b\x6c\x87\x8f\x60\x07\xec\x84\x5d\xb0\x1b"
        "\xf6\xc0\x5e\xd8\x07\x1f\xc3\x7e\xf8\x04\x0e\xc0\xa7\x70\x10\x3e\xfb"
        "\x83\xf9\xe7\xff\x25\xbf\x23\x02\x02\x2a\x54\x68\xd0\x60\x3a\x4c\x87"
        "\x29\x98\x82\x19\x31\x23\x66\xc2\x4c\x98\x19\x33\x63\x02\x13\x98\x05"
        "\xb3\x60\x56\xcc\x8a\xd9\x30\x1b\xe6\xc0\x1c\x98\x0b\x73\x61\x1e\xcc"
        "\x83\x84\x84\x8c\x8c\x79\x31\x2f\x26\x31\x89\xf9\x31\x3f\xa6\x62\x2a"
        "\x16\xc4\x82\xe8\xd1\x63\x11\x2c\x82\xc5\xf0\x16\x2c\x8e\xc5\xb1\x04"
        "\x96\xc0\x92\x58\x12\x4b\x61\x69\x2c\x8d\x65\xb1\x2c\x96\xc3\x72\x58"
        "\x1e\xcb\x63\x05\xac\x80\x15\xb1\x22\x56\xc6\xca\x78\x0f\xde\x83\xf7"
        "\x62\x35\xac\x86\xd5\xb1\x3a\xd6\xc0\x1a\x58\x13\x6b\x62\x2d\xac\x85"
        "\xb5\xb1\x36\xd6\xc1\x3a\x58\x17\xeb\x62\x3d\xac\x87\xf5\xb1\x3e\x36"
        "\xc4\x86\xd8\x18\x1b\x63\x13\x6c\x82\x4d\xb1\x29\x36\xc7\xe6\xd8\x02"
        "\x5b\x60\x2b\x6c\x85\xad\xb1\x35\xb6\xc1\x36\xd8\x16\xdb\x62\x3b\x6c"
        "\x87\xed\xb1\x3d\x76\xc0\x0e\xd8\x11\x3b\x61\x27\x7c\x01\x5f\xc0\x17"
        "\xf1\x45\xec\x86\x15\x55\x0f\xec\x89\x3d\xb1\x37\xf6\xc6\xbe\xd8\x0f"
        "\xfb\xe1\x4b\x38\x00\x5f\xc6\x97\xf1\x15\x1c\x84\x83\x71\x08\xbe\x8a"
        "\xaf\xe2\x6b\x38\x0c\xcf\xe1\x70\x1c\x81\x23\x71\x24\x96\x53\xa3\x71"
        "\x0c\x8e\x45\x56\xe3\x71\x02\x4e\xc0\x89\x38\x11\x27\xe1\x24\x9c\x8c"
        "\x53\x70\x0a\x4e\xc3\xe9\x38\x03\x67\xe2\x4c\x9c\x85\xb3\x71\x36\xbe"
        "\x8b\x73\xf1\x3d\x7c\x0f\xe7\xe3\x7c\x5c\x88\x8b\x70\x11\x2e\xc6\x25"
        "\xb8\x14\x97\xe2\x32\x3c\x8f\xcb\x71\x05\xae\xc4\x55\xb8\x1a\xd7\xe0"
        "\x6a\x5c\x87\xeb\x71\x1d\x6e\xc4\x4d\xb8\x11\xb7\xe0\x16\xdc\x86\xdb"
        "\xf0\x23\xfc\x08\x77\xe2\x4e\xdc\x8d\xbb\x71\x2f\x1a\x00\xfc\x18\x3f"
        "\xc1\x4f\x70\x10\x1e\xc4\x83\x78\x08\x0f\xe1\x61\x3c\x8c\x47\xf0\x08"
        "\x1e\xc5\xa3\x78\x0c\x8f\xe1\x71\x3c\x8e\x27\xf0\x04\x9e\xc4\x93\x78"
        "\x0a\x4f\xe3\x19\x3c\x8d\x67\xf1\x2c\x9e\xc3\xf3\x78\x01\x2f\xe0\x45"
        "\xbc\x88\x97\xf0\xb9\x5c\x5f\xd5\xd9\x5b\x60\xc3\x20\x50\x57\x18\x65"
        "\x54\x3a\x95\x4e\xa5\xa8\x14\x95\x51\x65\x54\x99\x54\x26\x95\x59\x65"
        "\x56\x09\x95\x50\x59\x54\x16\x95\x55\x65\x55\xd9\x54\x36\x95\x43\xe5"
        "\x50\xb9\x54\x2e\x95\x47\xe5\x51\xa4\x48\xb1\x8a\x55\x5e\x95\x57\x25"
        "\x55\x52\xe5\x57\xf9\x55\xaa\x4a\x55\x05\x55\x41\xe5\x95\x57\x45\x54"
        "\x11\x55\x4c\x15\x53\xc5\x55\x71\x55\x42\xdd\xa6\x4a\xaa\xdb\x55\x29"
        "\x55\x5a\x35\xf3\x65\x55\x59\x55\x4e\x35\xf7\xe5\xd5\x5d\xaa\x82\xaa"
        "\xa0\x2a\xaa\x4a\xaa\xb2\xaa\xa2\xaa\xa8\xaa\xaa\xaa\xaa\xa6\xaa\xa9"
        "\xea\xaa\xba\xaa\xa1\x6a\xa8\x9a\xea\x41\x55\x4b\xf5\xc0\xbe\xf8\x90"
        "\xba\xd2\x99\xba\x6a\x30\xd6\x53\x43\xb0\xbe\x6a\xa0\x1a\xaa\x46\xea"
        "\x35\x7c\x4c\x35\x51\xc3\xb0\xa9\x6a\xa6\x9a\xab\x27\xd4\x08\x1c\x8e"
        "\xad\x54\x13\xdf\x5a\x3d\xa5\xda\xa8\x31\xd8\x56\x3d\xa3\xc6\xe2\xb3"
        "\xaa\xbd\x1a\x8f\x1d\xd4\xf3\xaa\xa3\xea\xa4\x3a\xab\x17\x54\x17\xd5"
        "\xd4\x77\x55\xdd\xd4\x64\xec\xa1\x7a\xaa\x69\xd8\x5b\xf5\x51\x7d\x55"
        "\x3f\x35\x0b\x2b\xa9\x2b\x1d\xab\xac\x5e\x51\x83\xd4\x60\x35\x44\xbd"
        "\xaa\x16\xe2\x6b\x6a\x98\x7a\x5d\x0d\x57\x23\xd4\x48\xf5\x86\x1a\xa5"
        "\x46\xab\x31\x6a\xac\x1a\xa7\xc6\xab\x09\xea\x4d\x35\x51\xbd\xa5\x26"
        "\xa9\xb7\xd5\x64\x35\x45\x4d\x55\xd3\xd4\x74\x35\x43\xcd\x54\xef\xa8"
        "\x59\x6a\xb6\x9a\xa3\xde\x55\x73\xd5\x7b\x6a\x9e\x9a\xaf\x16\xa8\x85"
        "\x6a\x91\x7a\x5f\x2d\x56\x4b\xd4\x52\xf5\x81\x5a\xa6\x3e\x54\xcb\xd5"
        "\x0a\xb5\x52\xad\x52\xab\xd5\x1a\xb5\x56\xad\x53\xeb\xd5\x06\xb5\x51"
        "\x6d\x52\x9b\xd5\x16\xb5\x55\x6d\x53\xdb\xd5\x47\x6a\x87\xda\xa9\x76"
        "\xa9\xdd\x6a\x8f\xda\xab\xf6\xa9\x8f\xd5\x7e\xf5\x89\x3a\xa0\x3e\x55"
        "\x07\xd5\x67\xea\x90\xfa\x5c\x1d\x56\x5f\xa8\x23\xea\x4b\x75\x54\x7d"
        "\xa5\x8e\xa9\xaf\xd5\x71\xf5\x8d\x3a\xa1\xbe\x55\x27\xd5\x77\xea\x94"
        "\x3a\xad\xce\xa8\xef\xd5\x59\xf5\x83\x3a\xa7\xce\xab\x0b\xea\x47\x75"
        "\x51\xfd\xa4\x2e\xa9\x9f\xd5\x65\x15\x14\x68\xd4\x4a\x6b\x6d\x74\xa4"
        "\xd3\xe9\xf4\x3a\x45\x67\xd0\x19\xf5\x35\x3a\x93\xbe\x56\x67\xd6\xd7"
        "\xe9\x84\xbe\x5e\x67\xd1\x37\xe8\xac\xfa\x46\x9d\x4d\x67\xd7\x39\x74"
        "\x4e\x9d\x4b\xe7\xd6\x79\xb4\xd5\xa4\x9d\x66\x1d\xeb\xbc\x3a\x9f\x4e"
        "\xea\x9b\x74\x7e\x7d\xb3\x4e\xd5\x05\x74\x41\x5d\x48\x7b\x5d\x58\x17"
        "\xd1\x45\x75\x31\x7d\x8b\x2e\xae\x6f\xd5\x25\xf4\x6d\xba\xa4\xbe\x5d"
        "\x97\xd2\xa5\x75\x19\x5d\x56\xdf\xa1\xcb\xe9\x3b\x75\x79\x7d\x97\xae"
        "\xa0\xef\xd6\x15\x75\x25\x5d\x59\x57\xd1\xf7\xe8\xaa\xfa\x5e\x5d\x4d"
        "\xdf\xa7\xab\xeb\xfb\x75\x0d\xfd\x80\xae\xa9\x1f\xd4\xb5\xf4\x5f\x74"
        "\x6d\xfd\x90\xae\xa3\x1f\xd6\x75\xf5\x23\xba\x9e\x7e\x54\xd7\xd7\x0d"
        "\x74\x43\xdd\x48\x37\xd6\x8f\xe9\x26\xfa\x71\xdd\x54\x37\xd3\xcd\xf5"
        "\x13\xba\x85\x6e\xa9\x5b\xe9\x27\x75\x6b\xfd\x94\x6e\xa3\x9f\xd6\x6d"
        "\xf5\x33\xba\x9d\x7e\x56\xb7\xd7\xcf\xe9\x0e\xfa\x79\xdd\x51\x77\xd2"
        "\x9d\xf5\xcf\xfa\xb2\x0e\xba\xab\xee\xa6\xbb\xeb\x1e\xba\xa7\xee\xa5"
        "\x7b\xeb\x3e\xba\xaf\xee\xa7\xfb\xeb\x97\xf4\x00\xfd\xb2\x1e\xa8\x5f"
        "\xd1\x83\xf4\x60\x3d\x44\xbf\xaa\x87\xea\xd7\xf4\x30\xfd\xba\x1e\xae"
        "\x47\xe8\x91\xfa\x0d\x3d\x4a\x8f\xd6\x63\xf4\x58\x3d\x4e\x8f\xd7\x13"
        "\xf4\x9b\x7a\xa2\x7e\x4b\x4f\xd2\x6f\xeb\xc9\x7a\x8a\x9e\xaa\xa7\xe9"
        "\xe9\x7a\x86\xee\xfb\xcb\x4c\x73\xfe\x0f\xf2\xdf\xfa\x37\xf9\x03\xff"
        "\x7a\xf4\x6d\x7a\xbb\xfe\x48\xef\xd0\x3b\xf5\x2e\xbd\x5b\xef\xd1\x7b"
        "\xf5\x3e\xbd\x4f\xef\xd7\xfb\xf5\x01\x7d\x40\x1f\xd4\x07\xf5\x21\x7d"
        "\x48\x1f\xd6\x87\xf5\x11\x7d\x44\x1f\xd5\x47\xf5\x31\x7d\x4c\x1f\xd7"
        "\xc7\xf5\x09\x7d\x42\x9f\xd4\x27\xf5\x29\x7d\x5a\xff\xa8\xbf\xd7\x67"
        "\xf5\x0f\xfa\x9c\x3e\xaf\xcf\xeb\x1f\xf5\x45\x7d\x51\x5f\xfa\xe5\x6b"
        "\x00\x06\x8d\x32\xda\x18\x13\x99\x74\x26\xbd\x49\x31\x19\x4c\x46\x73"
        "\x8d\xc9\x64\xae\x35\x99\xcd\x75\x26\x61\xae\x37\x59\xcc\x0d\x26\xab"
        "\xb9\xd1\x64\x33\xd9\x4d\x0e\x93\xd3\xe4\x32\xb9\x4d\x1e\x63\x0d\x19"
        "\x67\xd8\xc4\x26\xaf\xc9\x67\x92\xe6\x26\xfc\xe5\x84\xc2\x14\x34\x85"
        "\x8c\x37\x85\x4d\x11\x53\xf4\x8f\xe4\x9b\xfc\xe6\x66\x93\x6a\x0a\xfc"
        "\x53\xfe\xef\xd5\xd7\xd8\x34\x36\x4d\x4c\x13\xd3\xd4\x34\x35\xcd\x4d"
        "\x73\xd3\xc2\xb4\x30\xad\x4c\x2b\xd3\xda\xb4\x36\x6d\x4c\x1b\xd3\xd6"
        "\xb4\x35\xed\x4c\x3b\xd3\xde\xb4\x37\x1d\x4c\x07\xd3\xd1\x74\x34\x9d"
        "\x4d\x67\xd3\xc5\x74\x31\x5d\x4d\x57\xd3\xdd\x74\x37\x3d\x4d\x2f\xd3"
        "\xdb\xf4\x31\x7d\x4d\x3f\xd3\xdf\xbc\x64\x06\x98\x01\x66\xa0\x19\x68"
        "\x06\x99\x41\x66\x88\x19\x62\x86\x9a\xa1\x66\x98\x19\x66\x86\x9b\xe1"
        "\x66\xa4\x19\x69\x46\x99\x51\x66\x8c\x19\x63\xc6\x99\x71\x66\x82\x99"
        "\x60\x26\x9a\x89\x66\x92\x99\x64\x26\x9b\xc9\x66\xaa\x99\x6a\xa6\x9b"
        "\xe9\x66\xa6\x99\x69\x66\x99\x59\x66\x8e\x99\x63\xe6\x9a\xb9\x66\x9e"
        "\x99\x67\x16\x98\x05\x66\x91\x59\x64\x16\x9b\xc5\x66\xa9\x59\x6a\x96"
        "\x99\x65\x66\xb9\x59\x61\x56\x98\x55\x66\x95\x59\x63\xd6\x98\x75\x66"
        "\x9d\xd9\x60\x36\x98\x4d\x66\x93\xd9\x62\xb6\x98\xe5\x66\xbb\xd9\x6e"
        "\x76\x98\x1d\x66\x97\xd9\x65\xf6\x98\x3d\x66\x9f\xd9\x67\xf6\x9b\xfd"
        "\xe6\x80\x39\x60\x0e\x9a\x83\xe6\x90\x39\x64\x0e\x9b\xc3\xe6\x88\x39"
        "\x62\x8e\x9a\xa3\xe6\x98\x39\x66\x8e\x9b\xe3\xe6\x84\x39\x61\x4e\x9a"
        "\x93\xe6\x94\x39\x65\xce\x98\x33\xe6\xac\x39\x6b\xce\x99\x73\xe6\x82"
        "\xb9\x60\x2e\x9a\x8b\xe6\x92\xb9\x64\x2e\x9b\xcb\x57\x4e\xfb\x22\x15"
        "\xa9\xc8\x44\x26\x4a\x17\xa5\x8b\x52\xa2\x94\x28\x63\x94\x31\xca\x14"
        "\x65\x8a\x32\x47\x99\xa3\x44\x94\x88\xb2\x44\x59\xa2\xac\xd1\x8d\x51"
        "\xb6\x28\x7b\x94\x23\xca\x19\xe5\x8a\x72\x47\x79\x22\x1b\x51\xe4\x22"
        "\x8e\xe2\x28\x6f\x94\x2f\x4a\x46\x37\x45\xf9\xa3\x9b\xa3\xd4\xa8\x40"
        "\x54\x30\x2a\x14\xf9\xa8\x70\x54\x24\x2a\x1a\x15\x8b\x6e\x89\x8a\x47"
        "\xb7\x46\x25\xa2\xdb\xa2\x92\xd1\xed\x51\xa9\xa8\x74\x54\x26\x2a\x1b"
        "\xdd\x11\x95\x8b\xee\x8c\xca\x47\x77\x45\x15\xa2\xbb\xa3\x8a\x51\xa5"
        "\xa8\x72\x54\x25\xba\x27\xaa\x1a\xdd\x1b\x55\x8b\xee\x8b\xaa\x47\xf7"
        "\x47\x35\xa2\x07\xa2\x9a\xd1\x83\x51\xad\xe8\x2f\x51\xed\xe8\xa1\xa8"
        "\x4e\xf4\x70\x54\x37\x7a\x24\xaa\x17\x3d\x1a\xd5\x8f\x1a\x44\x0d\xa3"
        "\x46\x51\xe3\x3f\x75\xfe\x10\xce\x65\x7f\xdc\x77\xb5\xdd\x6c\x77\xdb"
        "\xc3\xf6\xb4\xbd\x6c\x6f\xdb\xc7\xf6\xb5\xfd\x6c\x7f\xfb\x92\x1d\x60"
        "\x5f\xb6\x03\xed\x2b\x76\x90\x1d\x6c\x87\xd8\x57\xed\x50\xfb\x9a\x1d"
        "\x66\x5f\xb7\xc3\xed\x08\x3b\xd2\xbe\x61\x47\xd9\xd1\x76\x8c\x1d\x6b"
        "\xc7\xd9\xf1\x76\x82\x7d\xd3\x4e\xb4\x6f\xd9\x49\xf6\x6d\x3b\xd9\x4e"
        "\xb1\x53\xed\x34\x3b\xdd\xce\xb0\x33\xed\x3b\x76\x96\x9d\x6d\xe7\xd8"
        "\x77\xed\x5c\xfb\x9e\x9d\x67\xe7\xdb\x05\x76\xa1\x5d\x64\xdf\xb7\x8b"
        "\xed\x12\xbb\xd4\x7e\x60\x97\xd9\x0f\xed\x72\xbb\xc2\xae\xb4\xab\xec"
        "\x6a\xbb\xc6\xae\xb5\xeb\xec\x7a\xbb\xc1\x6e\xb4\x9b\xec\x66\xbb\xc5"
        "\x6e\xb5\xdb\xec\x76\xfb\x91\xdd\x61\x77\xda\x5d\x76\xb7\xdd\x63\xf7"
        "\xda\x7d\xf6\x63\xbb\xdf\x7e\x62\x0f\xd8\x4f\xed\x41\xfb\x99\x3d\x64"
        "\x3f\xb7\x87\xed\x17\xf6\x88\xfd\xd2\x1e\xb5\x5f\xd9\x63\xf6\x6b\x7b"
        "\xdc\x7e\x63\x4f\xd8\x6f\xed\x49\xfb\x9d\x3d\x65\x4f\xdb\x33\xf6\x7b"
        "\x7b\xd6\xfe\x60\xcf\xd9\xf3\xf6\x82\xfd\xd1\x5e\xb4\x3f\xd9\x4b\xf6"
        "\x67\x7b\xd9\x86\x2b\x27\xf7\x57\xde\xde\xc9\x90\xa1\x74\x94\x8e\x52"
        "\x28\x85\x32\x52\x46\xca\x44\x99\x28\x33\x65\xa6\x04\x25\x28\x0b\x65"
        "\xa1\xac\x94\x95\xb2\x51\x36\xca\x41\x39\x28\x17\xe5\xa2\x3c\x94\x87"
        "\xae\x60\x62\xca\x4b\x79\x29\x49\x49\xca\x4f\xf9\x29\x95\x52\xa9\x20"
        "\x15\x24\x4f\x9e\x8a\x50\x11\x2a\x46\xc5\xa8\x38\x15\xa7\x12\x54\x82"
        "\x4a\x52\x49\x2a\x45\xa5\xa8\x0c\x95\xa1\x3b\xe8\x0e\xba\x93\xee\xa4"
        "\xbb\xe8\x2e\xba\x9b\xee\xa6\x4a\x54\x89\xaa\x50\x15\xaa\x4a\x55\xa9"
        "\x1a\x55\xa3\xea\x54\x9d\x6a\x50\x0d\xaa\x49\x35\xa9\x16\xd5\xa2\xda"
        "\x54\x9b\xea\x50\x1d\xaa\x4b\x75\xa9\x1e\xd5\xa3\xfa\x54\x9f\x1a\x52"
        "\x43\x6a\x4c\x8d\xa9\x09\x35\xa1\xa6\xd4\x94\x9a\x53\x73\x6a\x41\x2d"
        "\xa8\x15\xb5\xa2\xd6\xd4\x9a\xda\x50\x1b\x6a\x4b\x6d\xa9\x1d\xb5\xa3"
        "\xf6\xd4\x9e\x3a\x50\x07\xea\x48\x1d\xa9\x33\x75\xa6\x2e\xd4\x85\xba"
        "\x52\x57\xea\x4e\xdd\xa9\x27\xf5\xa4\xde\xd4\x9b\xfa\x52\x5f\xea\x4f"
        "\xfd\x69\x00\x0d\xa0\x81\x34\x90\x06\xd1\x20\x1a\x42\x43\x68\x28\x0d"
        "\xa5\x61\x34\x8c\x86\xd3\x08\x1a\x49\x6f\xd0\x28\x1a\x4d\x63\x68\x2c"
        "\x8d\xa3\xf1\x34\x81\x26\xd0\x44\x9a\x48\x93\x68\x12\x4d\xa6\xc9\x34"
        "\x95\xa6\xd2\x74\x9a\x4e\x33\x69\x26\xcd\xa2\x59\x34\x87\xe6\xd0\x5c"
        "\x9a\x4b\xf3\x68\x1e\x2d\xa0\x05\xb4\x88\x16\xd1\x62\x5a\x4c\x4b\x69"
        "\x29\x2d\xa3\x65\xb4\x9c\x96\xd3\x4a\x5a\x49\xab\x69\x35\xad\xa5\xb5"
        "\xb4\x9e\xd6\xd3\x46\xda\x48\x9b\x69\x33\x6d\xa5\xad\xb4\x9d\xb6\xd3"
        "\x0e\xda\x41\xbb\x68\x17\xed\xa1\x3d\xb4\x8f\xf6\xd1\x7e\xda\x4f\x07"
        "\xe8\x00\x1d\xa4\x83\x74\x88\x0e\x05\x04\xa0\x23\x74\x84\x8e\xd2\x51"
        "\x3a\x46\xc7\xe8\x38\x1d\xa7\x13\x74\x82\x4e\xd2\x49\x3a\x45\xa7\xe8"
        "\x0c\x9d\xa1\xb3\x74\x96\xce\xd1\x39\xba\x40\x17\xe8\x22\xfd\x44\x97"
        "\xe8\x67\xba\x4c\x81\x52\x5c\x06\x97\xd1\x5d\xe3\x32\xb9\x6b\x5d\x66"
        "\x77\x9d\xfb\xd7\x38\x87\xcb\xe9\x72\xb9\xdc\x2e\x8f\xb3\x2e\x9b\xcb"
        "\xfe\x4f\x31\x39\xe7\x52\x5d\x01\x57\xf0\xef\x97\x98\xae\xa8\x4b\x4d"
        "\xb9\xf2\x58\xc8\x79\x57\xd8\x15\x71\x45\x5d\x29\x57\xda\x95\x71\x65"
        "\xdd\x1d\xae\x9c\xbb\xd3\x95\xff\x4d\x5c\xd5\xdd\xeb\xaa\xb9\xfb\x5c"
        "\x75\x77\xbf\xab\xe2\xee\xf9\xa7\xb8\x86\x7b\xc0\xd5\x74\x8f\xb8\x5a"
        "\xee\x51\x57\xdb\x35\x70\x75\x5c\x23\x57\xd7\x3d\xe2\xea\xb9\x47\x5d"
        "\x7d\xd7\xc0\x35\x74\x8d\x5c\x0b\xd7\xd2\xb5\x72\x4f\xba\xd6\xee\x29"
        "\xd7\xc6\x3d\xfd\x9b\x78\xb1\x5b\xe2\xd6\xbb\x0d\x6e\xa3\xdb\xe4\xf6"
        "\xbb\x4f\xdc\x05\xf7\xa3\x3b\xee\xbe\x71\x17\xdd\x4f\xae\xab\xeb\xe6"
        "\xfa\xbb\x97\xdc\x00\xf7\xb2\x1b\xe8\x5e\x71\x83\xdc\xe0\xdf\xc4\x23"
        "\xdd\x1b\x6e\x94\x1b\xed\xc6\xb8\xb1\x6e\x9c\x1b\xff\x9b\x78\xaa\x9b"
        "\xe6\xa6\xbb\x19\x6e\xa6\x7b\xc7\xcd\x72\xb3\x7f\x13\x2f\x72\xef\xbb"
        "\xb9\x6e\xa9\x9b\xe7\xe6\xbb\x05\x6e\xe1\x5f\xe3\x2b\x35\x2d\x75\x1f"
        "\xb8\x65\xee\x43\xb7\xdc\xad\x70\x2b\xdd\x2a\xb7\xda\xad\x71\x6b\xdd"
        "\xba\xff\x5d\xeb\x2a\xb7\xc5\x6d\x75\xdb\xdc\x3e\xf7\xb1\xdb\xe1\x76"
        "\xba\x5d\x6e\xb7\xdb\xe3\xf6\xfe\x35\xbe\xb2\x8e\x03\xee\x53\x77\xd0"
        "\x7d\xe6\x8e\xb9\xaf\xdd\x61\xf7\x85\x3b\xe2\x4e\xb8\xa3\xee\xab\xbf"
        "\xc6\x57\xd6\x77\xc2\x7d\xeb\x4e\xba\xef\xdc\x29\x77\xda\x9d\x71\xdf"
        "\xbb\xb3\xee\x07\x77\xce\x9d\xbf\xb2\xfe\x70\x65\xed\xdf\xbb\x9f\xdd"
        "\x65\x17\x1c\x30\xb2\x62\xcd\x86\x23\x4e\xc7\xe9\x39\x85\x33\x70\x46"
        "\xbe\x86\x33\xf1\xb5\x9c\x99\xaf\xe3\x04\x5f\xcf\x59\xf8\x06\xce\xca"
        "\x37\x72\x36\xce\xce\x39\x38\x27\xe7\xe2\xdc\x9c\x87\x2d\x13\x3b\x66"
        "\x8e\x39\x2f\xe7\xe3\x24\xdf\xc4\xf9\xf9\x66\x4e\xe5\x02\x5c\x90\x0b"
        "\xb1\xe7\xc2\x5c\x84\x8b\x72\x31\xbe\x85\x8b\xf3\xad\x5c\x82\x6f\xe3"
        "\x92\x7c\x3b\x97\xe2\xd2\x5c\x86\xcb\xf2\x1d\x5c\x8e\xef\xe4\xf2\x7c"
        "\x17\x57\xe0\xbb\xb9\x22\x57\xe2\xca\x5c\x85\xef\xe1\xaa\x7c\x2f\x57"
        "\xe3\xfb\xb8\x3a\xdf\xcf\x35\xf8\x01\xae\xc9\x0f\x72\x2d\xfe\x0b\xd7"
        "\xe6\x87\xb8\x0e\x3f\xcc\x75\xf9\x11\xae\xc7\x8f\x72\x7d\x6e\xc0\x0d"
        "\xb9\x11\x37\xe6\xc7\xb8\x09\x3f\xce\x4d\xb9\x19\x37\xe7\x27\xb8\x05"
        "\xb7\xe4\x56\xfc\x24\xb7\xe6\xa7\xb8\x0d\x3f\xcd\x6d\xf9\x19\x6e\xc7"
        "\xcf\x72\x7b\x7e\x8e\x3b\xf0\xf3\xdc\x91\x3b\x71\x67\x7e\x81\xbb\xf0"
        "\x8b\xdc\x95\xbb\x71\x77\xee\xc1\x3d\xb9\x17\xf7\xe6\x3e\xdc\x97\xfb"
        "\x71\x7f\x7e\x89\x07\xf0\xcb\x3c\x90\x5f\xe1\x41\x3c\x98\x87\xf0\xab"
        "\x3c\x94\x5f\xe3\x61\xfc\x3a\x0f\xe7\x11\x3c\x92\xdf\xe0\x51\x3c\x9a"
        "\xc7\xf0\x58\x1e\xc7\xe3\x79\x02\xbf\xc9\x13\xf9\x2d\x9e\xc4\x6f\xf3"
        "\x64\x9e\xc2\x53\x79\x1a\x4f\xe7\x19\x3c\x93\xdf\xe1\x59\x3c\x9b\xe7"
        "\xf0\xbb\x3c\x97\xdf\xe3\x79\x3c\x9f\x17\xf0\x42\x5e\xc4\xef\xf3\x62"
        "\x5e\xc2\x4b\xf9\x03\x5e\xc6\x1f\xf2\x72\x5e\xc1\x2b\x79\x15\xaf\xe6"
        "\x35\xbc\x96\xd7\xf1\x7a\xde\xc0\x1b\x79\x13\x6f\xe6\x2d\xbc\x95\xb7"
        "\xf1\x76\xfe\x88\x77\xf0\x4e\xde\xc5\xbb\x79\x0f\xef\xe5\x7d\xfc\x31"
        "\xef\xe7\x0c\xbf\xfc\xc0\x7d\xc6\x87\xf8\x73\x3e\xcc\x5f\xf0\x11\xfe"
        "\x92\x8f\xf2\x57\x7c\x8c\xbf\xe6\xe3\xfc\x0d\x9f\xe0\x6f\xf9\x24\x7f"
        "\xc7\xa7\xf8\x34\x9f\xe1\xef\xf9\x2c\xff\xc0\xe7\xf8\x3c\x5f\xe0\x1f"
        "\xf9\x22\xff\xc4\x97\xf8\x67\xbe\xcc\x81\x21\xc6\x58\xc5\x3a\x36\x71"
        "\x14\xa7\x8b\xd3\xc7\x29\x71\x86\x38\x63\x7c\x4d\x9c\x29\xbe\x36\xce"
        "\x1c\x5f\x17\x27\xe2\xeb\xe3\x2c\xf1\x0d\x71\xd6\xf8\xc6\x38\x5b\x9c"
        "\x3d\xce\x11\xe7\x8c\x73\xc5\xb9\xe3\x3c\xb1\x8d\x29\x76\x31\xc7\x71"
        "\x9c\x37\xce\x17\x27\xe3\x9b\xe2\xfc\xf1\xcd\x71\x6a\x5c\x20\x2e\x18"
        "\x17\x8a\x7d\x5c\x38\x2e\x12\x17\x8d\x8b\xc5\xb7\xc4\xc5\xe3\x5b\xe3"
        "\x12\xf1\x6d\x71\xc9\xf8\xf6\xb8\x54\x5c\x3a\x7e\xe4\xfe\xb2\xf1\x1d"
        "\x71\xb9\xf8\xce\xb8\x7c\x7c\x57\x5c\x21\xbe\x3b\xae\x18\x57\x8a\x2b"
        "\xc7\x55\xe2\x7b\xe2\xaa\xf1\xbd\x71\xb5\xf8\xbe\xb8\x7a\x7c\x7f\x5c"
        "\x3c\x7e\x20\xae\x19\x3f\x18\xc3\x2f\x9f\x57\xa9\x13\x3f\x1c\xd7\x8d"
        "\x1f\x89\xeb\xc5\x8f\xc6\xf5\xe3\x06\x71\xc3\xb8\x51\xdc\x38\x7e\x2c"
        "\x6e\x12\x3f\x1e\x37\x8d\x9b\xc5\xcd\xe3\x27\xe2\x16\x71\xcb\xb8\x55"
        "\xfc\x64\xdc\x3a\x7e\x2a\x6e\x13\x3f\xfd\xbb\xfb\xbb\xc7\x3d\xe2\x9e"
        "\x71\xaf\xb8\x57\x1c\xc2\x7d\x7a\x41\x72\x61\x72\x51\xf2\xfd\xe4\xe2"
        "\xe4\x92\xe4\xd2\xe4\x07\xc9\x65\xc9\x0f\x93\xcb\x93\x2b\x92\x2b\x93"
        "\xab\x92\xab\x93\x6b\x92\x6b\x93\xeb\x92\xeb\x93\x1b\x92\x1b\x93\x9b"
        "\x92\x9b\x93\x5b\x92\x5b\x93\xdb\x92\x21\x54\x49\x0f\x1e\xbd\xf2\xda"
        "\x1b\x1f\xf9\x74\x3e\xbd\x4f\xf1\x19\x7c\x46\x7f\x8d\xcf\xe4\xaf\xf5"
        "\x99\xfd\x75\x3e\xe1\xaf\xf7\x59\xfc\x0d\x3e\xab\xbf\xd1\x67\xf3\xd9"
        "\x7d\x0e\x9f\xd3\xe7\xf2\xb9\x7d\x1e\x6f\x3d\x79\xe7\xd9\xc7\x3e\xaf"
        "\xcf\xe7\x93\xfe\x26\x9f\xdf\xdf\xec\x53\x7d\x01\x5f\xd0\x17\xf2\xde"
        "\x17\xf6\x45\x7c\x23\xdf\xd8\x37\xf6\x4d\xfc\xe3\xbe\xa9\x6f\xe6\x9b"
        "\xfb\x27\xfc\x13\xbe\xa5\x6f\xe9\x9f\xf4\x4f\xfa\xa7\x7c\x1b\xff\xb4"
        "\x6f\xeb\x9f\xf1\xed\xfc\xb3\xbe\xbd\x7f\xce\x3f\xe7\x9f\xf7\x1d\x7d"
        "\x27\xdf\xd9\xbf\xe0\xbb\xf8\x17\x7d\x57\xdf\xcd\x77\xf7\xdd\x7d\x4f"
        "\xdf\xd3\xf7\xf6\xbd\x7d\x5f\xdf\xd7\xf7\xf7\xfd\xfd\x00\x3f\xc0\x0f"
        "\xf4\x03\xfd\x20\x3f\xc8\x0f\xf1\x43\xfc\x50\x3f\xd4\x0f\xf3\xc3\xfc"
        "\x70\x3f\xdc\x8f\xf4\x23\xfd\x28\x3f\xca\x8f\xf1\x63\xfc\x38\x3f\xce"
        "\x4f\xf0\x13\xfc\x44\x3f\xd1\x4f\xf2\x93\x7c\x04\x00\x53\xfd\x54\x3f"
        "\xdd\x4f\xf7\x33\xfd\x4c\x3f\xcb\xcf\xf2\x73\xfc\x1c\x3f\x37\x75\xae"
        "\x9f\xe7\xe7\xf9\x05\x7e\x81\x5f\xe4\x17\xf9\xc5\x7e\xb1\x5f\xea\x97"
        "\xfa\x65\x7e\x99\x5f\xee\x97\xfb\x95\x7e\xa5\x5f\xed\x57\xfb\xb5\x7e"
        "\xad\x5f\xef\xd7\xfb\x8d\x7e\xa3\xdf\xec\x37\xfb\xad\x7e\xab\xdf\xee"
        "\xb7\xfb\x1d\x7e\x87\xdf\xe5\x77\xf9\x3d\x7e\x8f\xdf\xe7\xf7\xf9\xfd"
        "\x7e\xbf\x3f\xe0\x0f\xf8\x83\xfe\xa0\x3f\xe4\x0f\xf9\xc3\xfe\xb0\x3f"
        "\xe2\xbf\xf4\x47\xfd\x57\xfe\x98\xff\xda\x1f\xf7\xdf\xf8\x13\xfe\x5b"
        "\x7f\xd2\x7f\xe7\x4f\xf9\xd3\xfe\x8c\xff\xde\x9f\xf5\x3f\xf8\x73\xfe"
        "\xbc\xbf\xe0\x7f\xf4\x17\xfd\x4f\xfe\x92\xff\xd9\x5f\xf6\xc1\x4f\x48"
        "\xbc\x99\x98\x98\x78\x2b\x31\x29\xf1\x76\x62\x72\x62\x4a\x62\x6a\x62"
        "\x5a\x62\x7a\x62\x46\x62\x66\xe2\x9d\xc4\xac\xc4\xec\xc4\x9c\xc4\xbb"
        "\x89\xb9\x89\xf7\x12\xf3\x12\xf3\x13\x0b\x12\x0b\x13\x8b\x12\xef\x27"
        "\x16\x27\x96\x24\x96\x26\x3e\x48\x2c\x4b\x7c\x98\x58\x9e\x58\x91\x58"
        "\x99\x58\x95\x58\x9d\x58\x63\x20\xe4\xde\x11\x87\xbc\x21\x5f\x48\x86"
        "\x9b\x42\xfe\x70\x73\x48\x0d\x05\x42\xc1\x50\x28\xf8\x50\x38\x14\x09"
        "\x45\x43\xb1\x70\x4b\x28\x1e\x6e\x0d\x25\xc2\x6d\xa1\x64\xb8\x3d\x94"
        "\x0a\xa5\x43\x99\xf0\x68\xa8\x1f\x1a\x84\x86\xa1\x51\x68\x1c\x1e\x0b"
        "\x4d\xc2\xe3\xa1\x69\x68\x16\x9a\x87\x27\x42\x8b\xd0\x32\xb4\x0a\x4f"
        "\x86\xd6\xe1\xa9\xd0\x26\x3c\x1d\xda\x86\x67\x42\xbb\xf0\x6c\x68\x1f"
        "\x9e\x0b\x1d\xc2\xf3\xa1\x63\xe8\x14\x3a\x87\x17\x42\x97\xf0\x62\xe8"
        "\x1a\xba\x85\xee\xa1\x47\xe8\x19\x7a\x85\xde\xa1\x4f\xe8\x1b\xfa\x85"
        "\xfe\xe1\xa5\x30\x20\xbc\x1c\x06\x86\x57\xc2\xa0\x30\x38\x0c\x09\xaf"
        "\x86\xa1\xe1\xb5\x30\x2c\xbc\x1e\x86\x87\x11\x61\x64\x78\x23\x8c\x0a"
        "\xa3\xc3\x98\x30\x36\x8c\x0b\xe3\xc3\x84\xf0\x66\x98\x18\xde\x0a\x93"
        "\xc2\xdb\x61\x72\x98\x12\xa6\x86\x69\x61\x7a\x98\x11\x66\x86\x77\xc2"
        "\xac\x30\x3b\xcc\x09\xef\x86\xb9\xe1\xbd\x30\x2f\xcc\x0f\x0b\xc2\xc2"
        "\xb0\x28\xbc\x1f\x16\x87\x25\x61\x69\xf8\x20\x2c\x0b\x1f\x86\xe5\x61"
        "\x45\x58\x19\x56\x85\xd5\x61\x4d\x58\x1b\xd6\x85\xf5\x61\x43\xd8\x18"
        "\x36\x85\xcd\x61\x4b\xd8\x1a\xb6\x85\xed\xe1\xa3\xb0\x23\xec\x0c\xbb"
        "\xc2\xee\xb0\x27\xec\x0d\xfb\xc2\xc7\x61\x7f\xf8\x24\x1c\x08\x9f\x86"
        "\x83\xe1\xb3\x70\x28\x7c\x1e\x0e\x87\x2f\xc2\x91\xf0\x65\x38\x1a\xbe"
        "\x0a\xc7\xc2\xd7\xe1\x78\xf8\x26\x9c\x08\xdf\x86\x93\xe1\xbb\x70\x2a"
        "\x9c\x0e\x67\xc2\xf7\xe1\x6c\xf8\x21\x9c\x0b\xe7\xc3\x85\xf0\x63\xb8"
        "\x18\x7e\x0a\x97\xc2\xcf\xe1\xf2\x1f\xfc\xcc\x5a\xa5\x3f\xf3\x16\xba"
        "\x10\x42\x08\x21\xc4\xff\x47\x7a\xfd\xce\xfe\x1e\xff\xe6\x39\x03\x00"
        "\xea\x97\xf1\x4f\x21\x84\x6b\x77\xe6\x3c\xfa\x8f\xfb\x35\x00\x6c\xce"
        "\xf6\xb7\x71\x1f\x95\xab\x45\x02\x00\x9e\xea\xd6\xe1\xa1\xbf\x6f\x15"
        "\x2b\x76\xef\xde\xfd\x97\xd7\x2e\xd7\x10\xe5\x9b\x0f\x00\x89\x7f\x39"
        "\xc0\x2f\xf1\x0a\x68\x0e\x2d\xa1\x35\x34\x83\x62\xff\xb6\xbe\x3e\xaa"
        "\xd3\x45\xfe\x9d\xf9\x93\xb7\x01\x64\xfc\x87\x9c\x14\xf8\x35\xfe\x75"
        "\xfe\xcf\xff\x83\xf9\x1f\x7b\x62\xe4\xe2\x92\xf1\x85\x2c\xff\xc9\xfc"
        "\xf3\x01\x52\xf3\xfd\x9a\x73\xe5\x2a\xfc\xef\xf1\x0a\x68\x7e\x65\x35"
        "\xd0\x0c\x8a\xff\x07\xf3\x67\x6f\xf2\x3b\xf5\x67\xf8\x62\x02\x40\xd3"
        "\x7f\xc8\xc9\x04\x00\x4d\x33\xfc\x6b\xfd\x45\xe0\x71\x78\x1a\x5a\xff"
        "\xd3\x2b\x85\x10\x42\x08\x21\x84\x10\x42\x88\xbf\xe9\xa3\xca\xb4\xfb"
        "\xbd\xeb\xe7\x2b\xd7\xe7\xb9\xcc\xaf\x39\xe9\xe1\xd7\xf8\xf7\xae\xcf"
        "\x85\x10\x42\x08\x21\x84\x10\x42\x08\x71\xf5\x3d\xdb\xa9\xf3\x93\x8f"
        "\xb5\x6e\xdd\xac\x9d\x0c\x64\x20\x83\x34\x36\x68\xf9\x9f\xbc\xe6\x6a"
        "\xff\x66\x12\x42\x08\x21\x84\x10\x42\xfc\xd9\x7e\x3d\xe9\xff\xf5\xb9"
        "\x0c\x57\xb3\x20\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10"
        "\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08"
        "\x21\x84\x10\x42\x08\x21\x84\x10\x22\x0d\xfa\x7f\xf1\x9f\xc6\xae\xf6"
        "\x1a\x85\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84"
        "\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42"
        "\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x08\x21\x84\x10\x42\x88\xab"
        "\xed\x7f\x05\x00\x00\xff\xff\x0f\x98\x37\x7d",
        5383));
    NONFAILING(syz_mount_image(
        /*fs=*/0x20000040, /*dir=*/0x20000180,
        /*flags=MS_I_VERSION|MS_POSIXACL|MS_RELATIME|MS_NOSUID|MS_NOEXEC*/
        0xa1000a, /*opts=*/0x200003c0, /*chdir=*/0x21, /*size=*/0x1507,
        /*img=*/0x20001b00));
    break;
  case 8:
    NONFAILING(memcpy((void*)0x20000000, "./file0\000", 8));
    syscall(__NR_mknod, /*file=*/0x20000000ul, /*mode=*/0ul,
            /*dev=*/0x701 + procid * 2);
    break;
  }
}
int main(void)
{
  syscall(__NR_mmap, /*addr=*/0x1ffff000ul, /*len=*/0x1000ul, /*prot=*/0ul,
          /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1,
          /*offset=*/0ul);
  syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0x1000000ul,
          /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul,
          /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1,
          /*offset=*/0ul);
  syscall(__NR_mmap, /*addr=*/0x21000000ul, /*len=*/0x1000ul, /*prot=*/0ul,
          /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul, /*fd=*/-1,
          /*offset=*/0ul);
  setup_sysctl();
  setup_cgroups();
  const char* reason;
  (void)reason;
  if ((reason = setup_binfmt_misc()))
    printf("the reproducer may not work as expected: binfmt_misc setup failed: "
           "%s\n",
           reason);
  if ((reason = setup_usb()))
    printf("the reproducer may not work as expected: USB injection setup "
           "failed: %s\n",
           reason);
  install_segv_handler();
  for (procid = 0; procid < 5; procid++) {
    if (fork() == 0) {
      use_temporary_dir();
      do_sandbox_none();
    }
  }
  sleep(1000000);
  return 0;
}