# https://syzkaller.appspot.com/bug?id=3c27eae7bdba97293b68e79c9700ac110f977eed
# See https://goo.gl/kgGztJ for information about syzkaller reproducers.
#{"threaded":true,"procs":1,"sandbox":"","fault_call":-1,"tmpdir":true}
r0 = socket(0xd, 0x1, 0x0)
r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0)
openat(r1, &(0x7f0000000100)='./file0\x00', 0x800, 0x1)
r2 = socket$inet(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000080)={@multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0xd}}, 0xc)
ioctl(r0, 0x8912, &(0x7f0000000240))
getsockname(r1, &(0x7f0000000280)=@ll={0x0, 0x0, <r3=>0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x80)
ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x16}, 0x3, r3})
r4 = socket$inet(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xd}, @rand_addr}, 0xc)
perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
accept4$netrom(r0, &(0x7f0000000140)=@full, &(0x7f00000001c0)=0x48, 0x80000)
r5 = userfaultfd(0x80000)
ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000fcdfe8)={0xaa})
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
socket$l2tp(0x18, 0x1, 0x1)
socket$nl_crypto(0x10, 0x3, 0x15)
r6 = socket$inet(0x2, 0x2, 0x0)
r7 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r7, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x1, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2, 0x0, 0x4}}, 0x2e)
close(r6)
close(r7)