# https://syzkaller.appspot.com/bug?id=e425e78882a74c9f11887b10fc6d4b47d11bbe9a # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"slowdown":1,"sandbox":"namespace","tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"tmpdir":true,"segv":true} socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x18, 0x0, 0x0) close(r0) signalfd(0xffffffffffffffff, &(0x7f0000000100)={[0x437199d0]}, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) connect$can_j1939(r0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80005) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x2b, @rand_addr=0x64010102, 0x4e24, 0x2, 'nq\x00', 0x2a, 0x7, 0x4c}, 0x2c) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) r2 = socket(0x18, 0x0, 0x0) close(r2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) r4 = socket$inet(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000480)={0x1d, r5}, 0x21) connect$can_j1939(r2, &(0x7f0000000000)={0x1d, r5}, 0x18) sendfile(r2, r1, 0x0, 0x80005)