r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = fork() r2 = fork() kcmp(r1, r2, 0x600, r0, r0) socket$nl_audit(0x10, 0x3, 0x9) BUG: memory leak unreferenced object 0xffff8880450dc800 (size 512): comm "syz-executor.2", pid 12838, jiffies 4296306979 (age 19.912s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 d8 f0 44 80 88 ff ff 00 90 7b 00 00 c9 ff ff ...D......{..... backtrace: [<000000007b05a08c>] kmalloc include/linux/slab.h:552 [inline] [<000000007b05a08c>] kzalloc include/linux/slab.h:664 [inline] [<000000007b05a08c>] seccomp_prepare_filter kernel/seccomp.c:565 [inline] [<000000007b05a08c>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<000000007b05a08c>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<000000007b05a08c>] do_seccomp+0x2d5/0x25f0 kernel/seccomp.c:1692 [<000000004d2eb9c1>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<00000000aa5ec08e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffffc900007b9000 (size 4096): comm "syz-executor.2", pid 12838, jiffies 4296306979 (age 19.912s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 05 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000009eda6a22>] __vmalloc_node_range+0x574/0x9e0 mm/vmalloc.c:2571 [<00000000534b03da>] __vmalloc_node+0xb5/0x100 mm/vmalloc.c:2603 [<00000000ef5e2a9d>] bpf_prog_alloc_no_stats+0x32/0x2b0 kernel/bpf/core.c:87 [<00000000fd70e17b>] bpf_prog_alloc+0x2c/0x230 kernel/bpf/core.c:115 [<000000001872c138>] bpf_prog_create_from_user+0xad/0x2e0 net/core/filter.c:1413 [<00000000949bcca3>] seccomp_prepare_filter kernel/seccomp.c:570 [inline] [<00000000949bcca3>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<00000000949bcca3>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<00000000949bcca3>] do_seccomp+0x31a/0x25f0 kernel/seccomp.c:1692 [<000000004d2eb9c1>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<00000000aa5ec08e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8880090a7000 (size 1024): comm "syz-executor.2", pid 12838, jiffies 4296306979 (age 19.912s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000009571a549>] kmalloc include/linux/slab.h:552 [inline] [<000000009571a549>] kzalloc include/linux/slab.h:664 [inline] [<000000009571a549>] bpf_prog_alloc_no_stats+0xb9/0x2b0 kernel/bpf/core.c:91 [<00000000fd70e17b>] bpf_prog_alloc+0x2c/0x230 kernel/bpf/core.c:115 [<000000001872c138>] bpf_prog_create_from_user+0xad/0x2e0 net/core/filter.c:1413 [<00000000949bcca3>] seccomp_prepare_filter kernel/seccomp.c:570 [inline] [<00000000949bcca3>] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] [<00000000949bcca3>] seccomp_set_mode_filter kernel/seccomp.c:1572 [inline] [<00000000949bcca3>] do_seccomp+0x31a/0x25f0 kernel/seccomp.c:1692 [<000000004d2eb9c1>] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 [<00000000aa5ec08e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: leak checking failed