# https://syzkaller.appspot.com/bug?id=13209f8977fc3caa386022d1539dd6a99c43afe6
# See https://goo.gl/kgGztJ for information about syzkaller reproducers.
#{"threaded":true,"repeat":true,"procs":6,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true}
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)={0x1})
pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
splice(r1, &(0x7f0000000240)=0x7ffd, r0, 0x0, 0x1ff, 0xb)
mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0)
execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500))
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00')
pread64(r2, &(0x7f00000012c0), 0x0, 0x0)