2020/04/02 16:11:29 executed programs: 8
2020/04/02 16:11:36 executed programs: 15
BUG: memory leak
unreferenced object 0xffff888103e2a700 (size 256):
comm "syz-executor.1", pid 8565, jiffies 4294947873 (age 9.880s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
61 0b a1 38 00 00 00 00 c0 d5 a2 03 81 88 ff ff a..8............
backtrace:
[<00000000b05df744>] kmalloc_node include/linux/slab.h:578 [inline]
[<00000000b05df744>] sock_hash_alloc_elem net/core/sock_map.c:782 [inline]
[<00000000b05df744>] sock_hash_update_common+0x31d/0x5c0 net/core/sock_map.c:842
[<000000006341d2ca>] sock_hash_update_elem+0x1e5/0x210 net/core/sock_map.c:900
[<00000000811d34af>] bpf_map_update_value.isra.0+0x141/0x2f0 kernel/bpf/syscall.c:169
[<000000003f37a7c2>] map_update_elem kernel/bpf/syscall.c:1100 [inline]
[<000000003f37a7c2>] __do_sys_bpf+0x16bf/0x1f00 kernel/bpf/syscall.c:3691
[<000000004ce14e99>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295
[<00000000bbbb11f3>] entry_SYSCALL_64_after_hwframe+0x44/0xa9