syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x39b}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) BUG: memory leak unreferenced object 0xffff888041121400 (size 512): comm "syz-executor.4", pid 4930, jiffies 4294939580 (age 41.494s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................ backtrace: [<00000000db7f05d1>] kmalloc include/linux/slab.h:581 [inline] [<00000000db7f05d1>] kzalloc include/linux/slab.h:715 [inline] [<00000000db7f05d1>] seccomp_prepare_filter kernel/seccomp.c:661 [inline] [<00000000db7f05d1>] seccomp_prepare_user_filter kernel/seccomp.c:703 [inline] [<00000000db7f05d1>] seccomp_set_mode_filter kernel/seccomp.c:1824 [inline] [<00000000db7f05d1>] do_seccomp+0x2d5/0x27e0 kernel/seccomp.c:1944 [<000000006adb7304>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<000000006adb7304>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<000000003a403f54>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffffc9000f260000 (size 4096): comm "syz-executor.4", pid 4930, jiffies 4294939580 (age 41.494s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 05 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000039cb036>] __vmalloc_node_range+0xa7f/0x10b0 mm/vmalloc.c:3123 [<00000000ff377306>] __vmalloc_node+0xb5/0x100 mm/vmalloc.c:3160 [<000000002aa42adf>] bpf_prog_alloc_no_stats+0x38/0x340 kernel/bpf/core.c:88 [<0000000055e59f04>] bpf_prog_alloc+0x24/0x170 kernel/bpf/core.c:122 [<00000000ccadc4bc>] bpf_prog_create_from_user+0xad/0x2e0 net/core/filter.c:1413 [<000000004762e934>] seccomp_prepare_filter kernel/seccomp.c:666 [inline] [<000000004762e934>] seccomp_prepare_user_filter kernel/seccomp.c:703 [inline] [<000000004762e934>] seccomp_set_mode_filter kernel/seccomp.c:1824 [inline] [<000000004762e934>] do_seccomp+0x325/0x27e0 kernel/seccomp.c:1944 [<000000006adb7304>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<000000006adb7304>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<000000003a403f54>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888041450000 (size 2048): comm "syz-executor.4", pid 4930, jiffies 4294939580 (age 41.494s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000e635b7aa>] kmalloc include/linux/slab.h:581 [inline] [<00000000e635b7aa>] kzalloc include/linux/slab.h:715 [inline] [<00000000e635b7aa>] bpf_prog_alloc_no_stats+0xeb/0x340 kernel/bpf/core.c:92 [<0000000055e59f04>] bpf_prog_alloc+0x24/0x170 kernel/bpf/core.c:122 [<00000000ccadc4bc>] bpf_prog_create_from_user+0xad/0x2e0 net/core/filter.c:1413 [<000000004762e934>] seccomp_prepare_filter kernel/seccomp.c:666 [inline] [<000000004762e934>] seccomp_prepare_user_filter kernel/seccomp.c:703 [inline] [<000000004762e934>] seccomp_set_mode_filter kernel/seccomp.c:1824 [inline] [<000000004762e934>] do_seccomp+0x325/0x27e0 kernel/seccomp.c:1944 [<000000006adb7304>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<000000006adb7304>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<000000003a403f54>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88800ef1d700 (size 16): comm "syz-executor.4", pid 4930, jiffies 4294939580 (age 41.494s) hex dump (first 16 bytes): 01 00 8a 42 80 88 ff ff 28 25 e5 0c 80 88 ff ff ...B....(%...... backtrace: [<000000007887d056>] kmalloc include/linux/slab.h:581 [inline] [<000000007887d056>] bpf_prog_store_orig_filter+0x7b/0x1e0 net/core/filter.c:1136 [<000000006acc50b5>] bpf_prog_create_from_user+0x1c6/0x2e0 net/core/filter.c:1426 [<000000004762e934>] seccomp_prepare_filter kernel/seccomp.c:666 [inline] [<000000004762e934>] seccomp_prepare_user_filter kernel/seccomp.c:703 [inline] [<000000004762e934>] seccomp_set_mode_filter kernel/seccomp.c:1824 [inline] [<000000004762e934>] do_seccomp+0x325/0x27e0 kernel/seccomp.c:1944 [<000000006adb7304>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<000000006adb7304>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<000000003a403f54>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88800ce52528 (size 8): comm "syz-executor.4", pid 4930, jiffies 4294939580 (age 41.494s) hex dump (first 8 bytes): 06 00 00 00 00 00 ff 7f ........ backtrace: [<0000000017dd05f5>] kmemdup+0x23/0x50 mm/util.c:128 [<000000003ff30e69>] kmemdup include/linux/fortify-string.h:304 [inline] [<000000003ff30e69>] bpf_prog_store_orig_filter+0x103/0x1e0 net/core/filter.c:1143 [<000000006acc50b5>] bpf_prog_create_from_user+0x1c6/0x2e0 net/core/filter.c:1426 [<000000004762e934>] seccomp_prepare_filter kernel/seccomp.c:666 [inline] [<000000004762e934>] seccomp_prepare_user_filter kernel/seccomp.c:703 [inline] [<000000004762e934>] seccomp_set_mode_filter kernel/seccomp.c:1824 [inline] [<000000004762e934>] do_seccomp+0x325/0x27e0 kernel/seccomp.c:1944 [<000000006adb7304>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<000000006adb7304>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 [<000000003a403f54>] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: leak checking failed