# https://syzkaller.appspot.com/bug?id=2bf7e8a31b3d0f4a606a861ed1e76926d628617f
# See https://goo.gl/kgGztJ for information about syzkaller reproducers.
#{"procs":1,"sandbox":"","fault_call":-1}
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00')
preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/66, 0xfeac}], 0x1, 0x0)
pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
splice(r2, 0x0, r1, 0x0, 0x4000002, 0x0)
mknod(&(0x7f0000000140)='./file0\x00', 0x1040, 0x0)
execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0)