2020/04/02 16:11:29 executed programs: 8 2020/04/02 16:11:36 executed programs: 15 BUG: memory leak unreferenced object 0xffff888103e2a700 (size 256): comm "syz-executor.1", pid 8565, jiffies 4294947873 (age 9.880s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 61 0b a1 38 00 00 00 00 c0 d5 a2 03 81 88 ff ff a..8............ backtrace: [<00000000b05df744>] kmalloc_node include/linux/slab.h:578 [inline] [<00000000b05df744>] sock_hash_alloc_elem net/core/sock_map.c:782 [inline] [<00000000b05df744>] sock_hash_update_common+0x31d/0x5c0 net/core/sock_map.c:842 [<000000006341d2ca>] sock_hash_update_elem+0x1e5/0x210 net/core/sock_map.c:900 [<00000000811d34af>] bpf_map_update_value.isra.0+0x141/0x2f0 kernel/bpf/syscall.c:169 [<000000003f37a7c2>] map_update_elem kernel/bpf/syscall.c:1100 [inline] [<000000003f37a7c2>] __do_sys_bpf+0x16bf/0x1f00 kernel/bpf/syscall.c:3691 [<000000004ce14e99>] do_syscall_64+0x6e/0x220 arch/x86/entry/common.c:295 [<00000000bbbb11f3>] entry_SYSCALL_64_after_hwframe+0x44/0xa9