Warning: Permanently added '10.128.0.137' (ECDSA) to the list of known hosts.
[   53.289754][   T24] audit: type=1400 audit(1558488348.058:36): avc:  denied  { map } for  pid=7202 comm="syz-executor562" path="/root/syz-executor562300214" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
[   60.029670][ T7202] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
executing program
[   60.073202][ T7203] IPVS: ftp: loaded support on port[0] = 21
[   65.974425][ T7202] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff88812a28b700 (size 128):
  comm "syz-executor562", pid 7203, jiffies 4294943283 (age 7.920s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000003fb41d0e>] kmem_cache_alloc_trace+0x13d/0x280
    [<00000000022fcadf>] packet_setsockopt+0xcad/0x1160
    [<0000000061857fab>] __sys_setsockopt+0x98/0x120
    [<000000002662523a>] __x64_sys_setsockopt+0x26/0x30
    [<00000000f63a3e0a>] do_syscall_64+0x76/0x1a0
    [<00000000da92d416>] entry_SYSCALL_64_after_hwframe+0x44/0xa9