sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="40d9ed2c6a655682008a7d0919a57140d7000000", @ANYRES16=0x0, @ANYBLOB="000125bd7000ffdbdf2501000000080007000000000024000300"/58], 0x40}, 0x1, 0x0, 0x0, 0x84010}, 0xc000004) r4 = gettid() waitid(0x2, r4, 0x0, 0x4, 0x0) BUG: memory leak unreferenced object 0xffff8880484ccc00 (size 512): comm "syz-executor.2", pid 13420, jiffies 4296044186 (age 19.823s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 70 77 00 00 c9 ff ff .........pw..... backtrace: [<00000000faea2af8>] kmalloc include/linux/slab.h:552 [inline] [<00000000faea2af8>] kzalloc include/linux/slab.h:664 [inline] [<00000000faea2af8>] seccomp_prepare_filter kernel/seccomp.c:565 [inline] [<00000000faea2af8>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<00000000faea2af8>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<00000000faea2af8>] do_seccomp+0x2d5/0x25e0 kernel/seccomp.c:1692 [<00000000c8455363>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<00000000d052e271>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888018267800 (size 512): comm "syz-executor.2", pid 13454, jiffies 4296044232 (age 19.777s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 cc 4c 48 80 88 ff ff 00 50 72 00 00 c9 ff ff ..LH.....Pr..... backtrace: [<00000000faea2af8>] kmalloc include/linux/slab.h:552 [inline] [<00000000faea2af8>] kzalloc include/linux/slab.h:664 [inline] [<00000000faea2af8>] seccomp_prepare_filter kernel/seccomp.c:565 [inline] [<00000000faea2af8>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<00000000faea2af8>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<00000000faea2af8>] do_seccomp+0x2d5/0x25e0 kernel/seccomp.c:1692 [<00000000c8455363>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<00000000d052e271>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffffc90000725000 (size 4096): comm "syz-executor.2", pid 13454, jiffies 4296044232 (age 19.777s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 05 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000003d7262e9>] __vmalloc_node_range+0x573/0x9e0 mm/vmalloc.c:2571 [<00000000c3f99fc6>] __vmalloc_node+0xb5/0x100 mm/vmalloc.c:2603 [<0000000058266621>] bpf_prog_alloc_no_stats+0x32/0x2b0 kernel/bpf/core.c:87 [<00000000600398e2>] bpf_prog_alloc+0x2c/0x230 kernel/bpf/core.c:115 [<0000000038e89e19>] bpf_prog_create_from_user+0xb2/0x2e0 net/core/filter.c:1413 [<00000000d8fbbff2>] seccomp_prepare_filter kernel/seccomp.c:570 [inline] [<00000000d8fbbff2>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<00000000d8fbbff2>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<00000000d8fbbff2>] do_seccomp+0x31a/0x25e0 kernel/seccomp.c:1692 [<00000000c8455363>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<00000000d052e271>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: leak checking failed