perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000680)}, 0x6010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tcp_mem(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x1f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x100000000}, 0x8005, 0x7f, 0x6, 0x6, 0xfffffffffffffd1b, 0x8, 0x3ff, 0x0, 0x7, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) lseek(r0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') pread64(r2, &(0x7f00000002c0)=""/106, 0x7d, 0x76) lseek(0xffffffffffffffff, 0xfffffffffffff6e6, 0x0) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x6)