# https://syzkaller.appspot.com/bug?id=69f917f1840b7fa73e062d44cf5bbf0c953e74a2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","fault_call":-1,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"vhci":true,"sysctl":true,"tmpdir":true,"segv":true} perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ef5a9db7ae822a99aa0c9882d5e2eea191ab2bdfa180f2d9b699c6deab89e04eb2e27a355feeed16594a8cbf27b9afb59d8f85d47cefbb6d00", 0x22}, 0x60) r2 = dup3(r0, r0, 0x0) listen(r1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='children\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000740)={0x0, 0x401, 0x80, 0x1}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000440)={0x0, 0x8001, 0x6, 0x1}) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) dup3(r4, r3, 0x0) perf_event_open$cgroup(0x0, r4, 0x5, r5, 0x1) bind$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ef5a9db7ae82ff99aa0c9882d5e2eea191ab2bdfa180f2d9b699c689e04eb2e27a355feeed16594a8cbf27b9afb59d8f85d47cefbb6d00", 0x22}, 0x60)