[ 26.082326][ T25] audit: type=1804 audit(1570031763.214:49): pid=6978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 26.082334][ T25] audit: type=1804 audit(1570031763.214:50): pid=6978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 26.082343][ T25] audit: type=1804 audit(1570031763.234:51): pid=6976 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 26.082470][ T25] audit: type=1804 audit(1570031763.234:52): pid=6980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 26.166117][ T25] audit: type=1804 audit(1570031763.234:53): pid=6978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="getty" name="/run/utmp" dev="sda1" ino=1421 res=1 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 47.791446][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 47.791453][ T25] audit: type=1400 audit(1570031784.964:62): avc: denied { map } for pid=6989 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.139' (ECDSA) to the list of known hosts. [ 53.692427][ T25] audit: type=1400 audit(1570031790.864:63): avc: denied { map } for pid=7001 comm="syz-executor934" path="/root/syz-executor934613798" dev="sda1" ino=16498 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 60.678601][ T25] audit: type=1400 audit(1570031797.844:64): avc: denied { create } for pid=7002 comm="syz-executor934" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 60.679715][ T7002] netlink: 'syz-executor934': attribute type 2 has an invalid length. [ 60.705356][ T25] audit: type=1400 audit(1570031797.844:65): avc: denied { write } for pid=7002 comm="syz-executor934" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 executing program [ 65.999951][ T7003] netlink: 'syz-executor934': attribute type 2 has an invalid length. executing program [ 72.269206][ T7004] netlink: 'syz-executor934': attribute type 2 has an invalid length. executing program [ 77.555484][ T7005] netlink: 'syz-executor934': attribute type 2 has an invalid length. [ 78.451423][ T7001] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810edd9500 (size 128): comm "syz-executor934", pid 7004, jiffies 4294944501 (age 13.440s) hex dump (first 32 bytes): 00 10 ba 0f 81 88 ff ff 80 94 dd 0e 81 88 ff ff ................ 00 40 62 1d 81 88 ff ff 00 00 00 00 00 00 00 00 .@b............. backtrace: [<00000000ff642bfc>] kmem_cache_alloc_trace+0x145/0x2c0 [<000000001e77390b>] ovs_vport_alloc+0x37/0xf0 [<00000000f840842a>] internal_dev_create+0x24/0x1d0 [<0000000096a4923a>] ovs_vport_add+0x81/0x190 [<0000000090b7f35e>] new_vport+0x19/0x80 [<00000000a00be744>] ovs_dp_cmd_new+0x290/0x410 [<0000000060f94fca>] genl_family_rcv_msg+0x2ab/0x5b0 [<00000000e8b357b0>] genl_rcv_msg+0x54/0xa0 [<00000000b98e547b>] netlink_rcv_skb+0x61/0x170 [<0000000025a8df94>] genl_rcv+0x29/0x40 [<0000000098feee63>] netlink_unicast+0x1ec/0x2d0 [<0000000078e8298d>] netlink_sendmsg+0x270/0x480 [<00000000de2585d4>] sock_sendmsg+0x54/0x70 [<000000002c881b3d>] ___sys_sendmsg+0x393/0x3c0 [<00000000e4a5f1dd>] __sys_sendmsg+0x80/0xf0 [<000000002f25de70>] __x64_sys_sendmsg+0x23/0x30