r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) BUG: memory leak unreferenced object 0xffff88800df73c00 (size 512): comm "syz-executor.4", pid 29679, jiffies 4297014468 (age 25.418s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 14 4c 42 80 88 ff ff 00 10 70 00 00 c9 ff ff ..LB......p..... backtrace: [<00000000dccd4e0e>] kmalloc include/linux/slab.h:552 [inline] [<00000000dccd4e0e>] kzalloc include/linux/slab.h:664 [inline] [<00000000dccd4e0e>] seccomp_prepare_filter kernel/seccomp.c:565 [inline] [<00000000dccd4e0e>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<00000000dccd4e0e>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<00000000dccd4e0e>] do_seccomp+0x2d5/0x25f0 kernel/seccomp.c:1692 [<00000000acf50543>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<00000000b2b5d6d4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffffc90000701000 (size 4096): comm "syz-executor.4", pid 29679, jiffies 4297014468 (age 25.418s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 05 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000b409fab2>] __vmalloc_node_range+0x574/0x9e0 mm/vmalloc.c:2571 [<000000008c2ee43a>] __vmalloc_node+0xb5/0x100 mm/vmalloc.c:2603 [<0000000029053b2f>] bpf_prog_alloc_no_stats+0x32/0x2b0 kernel/bpf/core.c:85 [<000000005498c466>] bpf_prog_alloc+0x2c/0x230 kernel/bpf/core.c:113 [<000000008e5c52c0>] bpf_prog_create_from_user+0xad/0x2e0 net/core/filter.c:1413 [<00000000662e1dd8>] seccomp_prepare_filter kernel/seccomp.c:570 [inline] [<00000000662e1dd8>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<00000000662e1dd8>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<00000000662e1dd8>] do_seccomp+0x31a/0x25f0 kernel/seccomp.c:1692 [<00000000acf50543>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<00000000b2b5d6d4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88800e598000 (size 1024): comm "syz-executor.4", pid 29679, jiffies 4297014468 (age 25.418s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000a742c7d1>] kmalloc include/linux/slab.h:552 [inline] [<00000000a742c7d1>] kzalloc include/linux/slab.h:664 [inline] [<00000000a742c7d1>] bpf_prog_alloc_no_stats+0xb9/0x2b0 kernel/bpf/core.c:89 [<000000005498c466>] bpf_prog_alloc+0x2c/0x230 kernel/bpf/core.c:113 [<000000008e5c52c0>] bpf_prog_create_from_user+0xad/0x2e0 net/core/filter.c:1413 [<00000000662e1dd8>] seccomp_prepare_filter kernel/seccomp.c:570 [inline] [<00000000662e1dd8>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<00000000662e1dd8>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<00000000662e1dd8>] do_seccomp+0x31a/0x25f0 kernel/seccomp.c:1692 [<00000000acf50543>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<00000000b2b5d6d4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: leak checking failed