# https://syzkaller.appspot.com/bug?id=7a1f6ac2754386d3210dabd59e73ca16775f25cf # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":8,"slowdown":1,"sandbox":"none","sandbox_arg":0,"leak":true,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan3\x00'}) r0 = open(0x0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket(0x18, 0x0, 0x0) close(r2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'macvtap0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000480)={0x1d, r4}, 0x18) connect$can_j1939(r2, &(0x7f0000000000)={0x1d, r4}, 0x18) sendfile(r2, r1, 0x0, 0x80005) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x8040) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0)