Warning: Permanently added '10.128.0.137' (ECDSA) to the list of known hosts. [ 53.289754][ T24] audit: type=1400 audit(1558488348.058:36): avc: denied { map } for pid=7202 comm="syz-executor562" path="/root/syz-executor562300214" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 60.029670][ T7202] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) executing program [ 60.073202][ T7203] IPVS: ftp: loaded support on port[0] = 21 [ 65.974425][ T7202] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88812a28b700 (size 128): comm "syz-executor562", pid 7203, jiffies 4294943283 (age 7.920s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000003fb41d0e>] kmem_cache_alloc_trace+0x13d/0x280 [<00000000022fcadf>] packet_setsockopt+0xcad/0x1160 [<0000000061857fab>] __sys_setsockopt+0x98/0x120 [<000000002662523a>] __x64_sys_setsockopt+0x26/0x30 [<00000000f63a3e0a>] do_syscall_64+0x76/0x1a0 [<00000000da92d416>] entry_SYSCALL_64_after_hwframe+0x44/0xa9