[ 73.972084] syz-fuzzer (1233) used greatest stack depth: 24856 bytes left [ 84.788960] sshd (1317) used greatest stack depth: 24792 bytes left [ 91.328293] kauditd_printk_skb: 16 callbacks suppressed [ 91.328310] audit: type=1400 audit(1661914407.707:135): avc: denied { mount } for pid=1337 comm="syz-executor0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 91.356190] audit: type=1400 audit(1661914407.708:136): avc: denied { mounton } for pid=1337 comm="syz-executor0" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 91.379682] audit: type=1400 audit(1661914407.712:137): avc: denied { use } for pid=1337 comm="syz-executor0" path="pipe:[18650]" dev="pipefs" ino=18650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=fd permissive=1 [ 451.047401] audit: type=1400 audit(1661914767.426:138): avc: denied { append } for pid=950 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 451.069369] audit: type=1400 audit(1661914767.426:139): avc: denied { open } for pid=950 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 451.091397] audit: type=1400 audit(1661914767.426:140): avc: denied { getattr } for pid=950 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 451.328168] sshd (8481) used greatest stack depth: 24688 bytes left Warning: Permanently added '10.128.1.81' (ECDSA) to the list of known hosts. [ 456.744618] audit: type=1400 audit(1661914773.123:141): avc: denied { ioctl } for pid=8488 comm="syz-executor292" path="/dev/kvm" dev="devtmpfs" ino=86 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 456.748727] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.