# https://syzkaller.appspot.com/bug?id=de23f6e644d3432614a9ee76939949c960abea97 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"procs":1,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"netdev":true,"segv":true} r0 = socket(0xd, 0x80000, 0x81) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0xe, 0x4) r1 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x1f, 0x7, 0x101, 0x9, 0x0, 0x180000000, 0x8004, 0x0, 0x2, 0x100, 0x9, 0x7, 0x3, 0x5, 0x0, 0x1, 0x65d1, 0x76b39f1e, 0x1, 0x1, 0x1ff, 0x4f, 0x9, 0xd1c7, 0x7, 0x0, 0x2, 0x7, 0xffffffffffffff7f, 0x7b80, 0x4, 0x80, 0x44c, 0x20, 0x0, 0x0, 0x0, 0x2438c0000000, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x2000, 0x5523c6a5, 0x5, 0x7, 0x4, 0x80000000, 0xffff}, 0xffffffffffffffff, 0x4, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xffffffffffffffc1) recvfrom(r0, &(0x7f0000000100)=""/230, 0xe6, 0x2000, &(0x7f0000000200)=@rc={0x1f, {0x7, 0xfff, 0x1336a00000000000, 0x4, 0x2, 0xffffffff}, 0x209}, 0x80) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/ip6_mr_cache\x00') r3 = openat$cgroup_subtree(r2, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x9) pwritev(r3, &(0x7f0000001600)=[{&(0x7f0000000340)}, {&(0x7f0000001340)}, {&(0x7f0000001380)}, {&(0x7f0000001440)}, {&(0x7f0000001540)}], 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000001680)={'bridge_slave_1\x00', {0x2, 0x4e20, @multicast1}}) ppoll(&(0x7f00000016c0)=[{r1, 0x100}, {r1, 0x5708}, {r0, 0x2000}, {r0, 0x8}, {r3, 0xa0c0}], 0x5, &(0x7f0000001700)={0x0, 0x989680}, &(0x7f0000001740)={0x7}, 0x8) write$P9_RREMOVE(r2, &(0x7f0000001780)={0x7, 0x7b, 0x1}, 0x7) lgetxattr(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)=@random={'security.', "047b5b736563757269747976626f786e65743070726f63557d776c616e315b00"}, &(0x7f0000001840)=""/20, 0x14) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001880)=0x0) fcntl$setownex(r3, 0xf, &(0x7f00000018c0)={0x2, r4}) open_by_handle_at(r0, &(0x7f0000001900)={0x8, 0xfff}, 0x80) setsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f00000019c0), 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/ptmx\x00', 0x60080, 0x0) read(r5, &(0x7f0000001ac0)=""/12, 0xc)