acct(&(0x7f0000000040)='./file0\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fallocate(r0, 0x1, 0x9, 0x5) unshare(0x48020200) BUG: memory leak unreferenced object 0xffff888040ee0400 (size 512): comm "syz-executor.0", pid 5739, jiffies 4295210797 (age 18.863s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 80 2b 12 00 c9 ff ff ..........+..... backtrace: [<00000000fffacd31>] kmalloc include/linux/slab.h:552 [inline] [<00000000fffacd31>] kzalloc include/linux/slab.h:664 [inline] [<00000000fffacd31>] seccomp_prepare_filter kernel/seccomp.c:565 [inline] [<00000000fffacd31>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<00000000fffacd31>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<00000000fffacd31>] do_seccomp+0x2d5/0x25e0 kernel/seccomp.c:1692 [<00000000d5a0c1bd>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<000000003d69a910>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffffc900122b8000 (size 4096): comm "syz-executor.0", pid 5739, jiffies 4295210797 (age 18.863s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 05 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000000a97c1db>] __vmalloc_node_range+0x573/0x9e0 mm/vmalloc.c:2571 [<00000000f200d460>] __vmalloc_node+0xb5/0x100 mm/vmalloc.c:2603 [<000000005c55c3b5>] bpf_prog_alloc_no_stats+0x32/0x2b0 kernel/bpf/core.c:87 [<000000006c94f8ef>] bpf_prog_alloc+0x2c/0x230 kernel/bpf/core.c:115 [<00000000fb2ee547>] bpf_prog_create_from_user+0xb2/0x2e0 net/core/filter.c:1413 [<0000000092d24c8b>] seccomp_prepare_filter kernel/seccomp.c:570 [inline] [<0000000092d24c8b>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<0000000092d24c8b>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<0000000092d24c8b>] do_seccomp+0x31a/0x25e0 kernel/seccomp.c:1692 [<00000000d5a0c1bd>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<000000003d69a910>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888017e52000 (size 1024): comm "syz-executor.0", pid 5739, jiffies 4295210797 (age 18.863s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bcbd0a36>] kmalloc include/linux/slab.h:552 [inline] [<00000000bcbd0a36>] kzalloc include/linux/slab.h:664 [inline] [<00000000bcbd0a36>] bpf_prog_alloc_no_stats+0xb9/0x2b0 kernel/bpf/core.c:91 [<000000006c94f8ef>] bpf_prog_alloc+0x2c/0x230 kernel/bpf/core.c:115 [<00000000fb2ee547>] bpf_prog_create_from_user+0xb2/0x2e0 net/core/filter.c:1413 [<0000000092d24c8b>] seccomp_prepare_filter kernel/seccomp.c:570 [inline] [<0000000092d24c8b>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<0000000092d24c8b>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<0000000092d24c8b>] do_seccomp+0x31a/0x25e0 kernel/seccomp.c:1692 [<00000000d5a0c1bd>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<000000003d69a910>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8880416e7400 (size 512): comm "syz-executor.0", pid 5739, jiffies 4295210899 (age 18.761s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 04 ee 40 80 88 ff ff 00 50 71 00 00 c9 ff ff ...@.....Pq..... backtrace: [<00000000fffacd31>] kmalloc include/linux/slab.h:552 [inline] [<00000000fffacd31>] kzalloc include/linux/slab.h:664 [inline] [<00000000fffacd31>] seccomp_prepare_filter kernel/seccomp.c:565 [inline] [<00000000fffacd31>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<00000000fffacd31>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<00000000fffacd31>] do_seccomp+0x2d5/0x25e0 kernel/seccomp.c:1692 [<00000000d5a0c1bd>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<000000003d69a910>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: leak checking failed