# https://syzkaller.appspot.com/bug?id=bd5ae47242a8c5b7e386424149fee705d3af500c # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"procs":1,"sandbox":"","fault_call":-1} clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') pread64(r0, &(0x7f00000012c0), 0x0, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) splice(r2, &(0x7f0000000240)=0x7ffd, r1, 0x0, 0x1ff, 0x0)