# https://syzkaller.appspot.com/bug?id=2c9e43516d5dfb1913cdd13856f93842eaaffb79
# See https://goo.gl/kgGztJ for information about syzkaller reproducers.
#{"threaded":true,"repeat":true,"procs":1,"sandbox":"","fault_call":-1}
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0)
fchdir(r0)
r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp6\x00')
r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
sendfile(r2, r1, &(0x7f0000000040), 0x100000001)
r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0)
pipe(&(0x7f00000001c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_elf32(r5, &(0x7f0000000200)=ANY=[@ANYBLOB='4'], 0x1)
splice(r4, 0x0, r3, &(0x7f0000000100), 0x400000000003, 0x0)
mknod(&(0x7f00000000c0)='./file0\x00', 0x100000000001040, 0x0)
execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000775000))
r6 = syz_open_procfs(0x0, &(0x7f0000000400)='io\x00')
pread64(r6, &(0x7f00009f3000), 0x352, 0x0)