syzkaller login: [ 28.036097][ T25] audit: type=1400 audit(1565891389.929:35): avc: denied { map } for pid=6967 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.228' (ECDSA) to the list of known hosts. [ 34.087424][ T25] audit: type=1400 audit(1565891395.979:36): avc: denied { map } for pid=6981 comm="syz-executor545" path="/root/syz-executor545321246" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 40.975198][ T6984] IPVS: ftp: loaded support on port[0] = 21 [ 40.988362][ T25] audit: type=1400 audit(1565891402.879:37): avc: denied { create } for pid=6984 comm="syz-executor545" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 41.038383][ T25] audit: type=1400 audit(1565891402.929:38): avc: denied { write } for pid=6984 comm="syz-executor545" path="socket:[29909]" dev="sockfs" ino=29909 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 41.038427][ T6986] netlink: 'syz-executor545': attribute type 2 has an invalid length. [ 47.095726][ T6981] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 49.127609][ T6981] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810e921c80 (size 128): comm "syz-executor545", pid 6986, jiffies 4294941368 (age 8.110s) hex dump (first 32 bytes): 00 e0 de 24 81 88 ff ff 00 1b 92 0e 81 88 ff ff ...$............ c0 ab f4 21 81 88 ff ff 00 00 00 00 00 00 00 00 ...!............ backtrace: [<00000000a8586175>] kmem_cache_alloc_trace+0x145/0x2c0 [<00000000203b985f>] ovs_vport_alloc+0x37/0xf0 [<000000004ac4c511>] internal_dev_create+0x24/0x1d0 [<000000009735c3c8>] ovs_vport_add+0x81/0x190 [<00000000a3be7c33>] new_vport+0x19/0x80 [<00000000a996850b>] ovs_dp_cmd_new+0x22f/0x410 [<00000000e3021b4e>] genl_family_rcv_msg+0x2ab/0x5b0 [<0000000027ffb67c>] genl_rcv_msg+0x54/0xa0 [<00000000ca3e69a0>] netlink_rcv_skb+0x61/0x170 [<0000000052566dcd>] genl_rcv+0x29/0x40 [<0000000057670652>] netlink_unicast+0x1ec/0x2d0 [<0000000047471a62>] netlink_sendmsg+0x270/0x480 [<00000000aac99337>] sock_sendmsg+0x54/0x70 [<000000004a035e3c>] kernel_sendmsg+0x44/0x50 [<000000002b11dd0e>] sock_no_sendpage+0x9d/0xd0 [<0000000041a2990f>] kernel_sendpage+0x54/0x90 BUG: memory leak unreferenced object 0xffff888121f4abc0 (size 64): comm "syz-executor545", pid 6986, jiffies 4294941368 (age 8.110s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 48 8e 2f 21 81 88 ff ff ........H./!.... 00 00 00 00 00 00 00 00 02 00 00 00 05 35 82 c1 .............5.. backtrace: [<00000000ef5e5d86>] __kmalloc+0x169/0x300 [<00000000e6cb27e2>] ovs_vport_set_upcall_portids+0x54/0xd0 [<0000000055c9689b>] ovs_vport_alloc+0x7f/0xf0 [<000000004ac4c511>] internal_dev_create+0x24/0x1d0 [<000000009735c3c8>] ovs_vport_add+0x81/0x190 [<00000000a3be7c33>] new_vport+0x19/0x80 [<00000000a996850b>] ovs_dp_cmd_new+0x22f/0x410 [<00000000e3021b4e>] genl_family_rcv_msg+0x2ab/0x5b0 [<0000000027ffb67c>] genl_rcv_msg+0x54/0xa0 [<00000000ca3e69a0>] netlink_rcv_skb+0x61/0x170 [<0000000052566dcd>] genl_rcv+0x29/0x40 [<0000000057670652>] netlink_unicast+0x1ec/0x2d0 [<0000000047471a62>] netlink_sendmsg+0x270/0x480 [<00000000aac99337>] sock_sendmsg+0x54/0x70 [<000000004a035e3c>] kernel_sendmsg+0x44/0x50 [<000000002b11dd0e>] sock_no_sendpage+0x9d/0xd0