# https://syzkaller.appspot.com/bug?id=3c27eae7bdba97293b68e79c9700ac110f977eed # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"procs":1,"sandbox":"","fault_call":-1,"tmpdir":true} r0 = socket(0xd, 0x1, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x800, 0x1) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000080)={@multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0xd}}, 0xc) ioctl(r0, 0x8912, &(0x7f0000000240)) getsockname(r1, &(0x7f0000000280)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x16}, 0x3, r3}) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xd}, @rand_addr}, 0xc) perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$netrom(r0, &(0x7f0000000140)=@full, &(0x7f00000001c0)=0x48, 0x80000) r5 = userfaultfd(0x80000) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000fcdfe8)={0xaa}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) socket$nl_crypto(0x10, 0x3, 0x15) r6 = socket$inet(0x2, 0x2, 0x0) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r7, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x1, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2, 0x0, 0x4}}, 0x2e) close(r6) close(r7)