# https://syzkaller.appspot.com/bug?id=b934188668db347cbcbaa3e11d4e47b65a013c30
# See https://goo.gl/kgGztJ for information about syzkaller reproducers.
#{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"close_fds":true,"wifi":true,"ieee802154":true,"swap":true,"tmpdir":true,"segv":true}
syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff)
r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
r1 = socket(0x18, 0x0, 0x0)
close(r1)
r2 = socket$can_j1939(0x1d, 0x2, 0x7)
ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000180)={'vxcan0\x00', <r3=>0x0})
bind$can_j1939(r2, &(0x7f0000000480)={0x1d, r3}, 0x18)
connect$can_j1939(r1, &(0x7f0000000000)={0x1d, r3}, 0x18)
sendfile(r1, r0, 0x0, 0x80005)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r4 = socket(0x18, 0x0, 0x0)
close(r4)
r5 = socket$can_j1939(0x1d, 0x2, 0x7)
r6 = socket$inet(0x2, 0x4000000000000001, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000040)={'vxcan0\x00', <r7=>0x0})
bind$can_j1939(r5, &(0x7f0000000340)={0x1d, r7}, 0x18)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
r8 = socket$nl_route(0x10, 0x3, 0x0)
r9 = socket$packet(0x11, 0x3, 0x300)
getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, <r10=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200))
sendmsg$nl_route(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r10, @ANYBLOB], 0x20}}, 0x0)