audit: type=1400 audit(1578049517.012:1242): avc: denied { map } for pid=13654 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1578049517.082:1243): avc: denied { map } for pid=13656 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 BUG: sleeping function called from invalid context at kernel/locking/mutex.c:908 in_atomic(): 1, irqs_disabled(): 0, pid: 28, name: kauditd 2 locks held by kauditd/28: #0: 000000006d8560da (console_lock){+.+.}, at: console_trylock_spinning kernel/printk/printk.c:1661 [inline] #0: 000000006d8560da (console_lock){+.+.}, at: vprintk_emit+0x267/0x6d0 kernel/printk/printk.c:1936 #1: 00000000895f4eda ((&sp->resync_t)){+.-.}, at: lockdep_copy_map include/linux/lockdep.h:168 [inline] #1: 00000000895f4eda ((&sp->resync_t)){+.-.}, at: call_timer_fn+0xda/0x720 kernel/time/timer.c:1316 Preemption disabled at: [] vprintk_emit+0x262/0x6d0 kernel/printk/printk.c:1930 CPU: 0 PID: 28 Comm: kauditd Not tainted 4.19.92-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 ___might_sleep.cold+0x1bd/0x1f6 kernel/sched/core.c:6192 __might_sleep+0x95/0x190 kernel/sched/core.c:6145 __mutex_lock_common kernel/locking/mutex.c:908 [inline] __mutex_lock+0xc8/0x1300 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 tpk_write+0x5d/0x340 drivers/char/ttyprintk.c:123 resync_tnc+0x1b6/0x320 drivers/net/hamradio/6pack.c:522 call_timer_fn+0x18d/0x720 kernel/time/timer.c:1326 expire_timers kernel/time/timer.c:1363 [inline] __run_timers kernel/time/timer.c:1684 [inline] __run_timers kernel/time/timer.c:1652 [inline] run_timer_softirq+0x64f/0x16a0 kernel/time/timer.c:1697 __do_softirq+0x25c/0x921 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x13b/0x550 arch/x86/kernel/apic/apic.c:1094 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:console_unlock+0xc26/0x10d0 kernel/printk/printk.c:2437 Code: fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 56 04 00 00 48 83 3d e3 ff 9c 07 00 0f 84 b6 02 00 00 e8 90 e9 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 64 ff ff ff e8 7b e9 15 00 48 8b 7d 08 c7 05 4d RSP: 0018:ffff8880a99dfb88 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: ffff8880a99d2000 RBX: 0000000000000200 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: ffffffff81555bf0 RDI: 0000000000000293 RBP: ffff8880a99dfc10 R08: ffff8880a99d2000 R09: ffff8880a99d28a0 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffffffff84628b60 R14: 0000000000000111 R15: ffffffff89656490 vprintk_emit+0x280/0x6d0 kernel/printk/printk.c:1937 vprintk_default+0x28/0x30 kernel/printk/printk.c:1979 vprintk_func+0x7e/0x189 kernel/printk/printk_safe.c:398 printk+0xba/0xed kernel/printk/printk.c:2012 kauditd_printk_skb kernel/audit.c:546 [inline] kauditd_hold_skb.cold+0x3f/0x4e kernel/audit.c:579 kauditd_send_queue+0x12d/0x170 kernel/audit.c:742 kauditd_thread+0x71c/0xa50 kernel/audit.c:868 kthread+0x354/0x420 kernel/kthread.c:246 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ================================ WARNING: inconsistent lock state 4.19.92-syzkaller #0 Tainted: G W -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. kauditd/28 [HC0[0]:SC1[1]:HE1:SE0] takes: 00000000b91aa3d1 (&tpk_port.port_write_mutex){+.?.}, at: tpk_write+0x5d/0x340 drivers/char/ttyprintk.c:123 {SOFTIRQ-ON-W} state was registered at: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3903 __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 tpk_close+0x50/0x95 drivers/char/ttyprintk.c:104 tty_release+0x3ba/0xe90 drivers/tty/tty_io.c:1678 __fput+0x2dd/0x8b0 fs/file_table.c:278 ____fput+0x16/0x20 fs/file_table.c:309 task_work_run+0x145/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x273/0x2c0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x53d/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe irq event stamp: 29264 hardirqs last enabled at (29264): [] dump_stack+0x1f6/0x210 lib/dump_stack.c:123 hardirqs last disabled at (29263): [] dump_stack+0xb1/0x210 lib/dump_stack.c:100 softirqs last enabled at (29178): [] __do_softirq+0x633/0x921 kernel/softirq.c:318 softirqs last disabled at (29199): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (29199): [] irq_exit+0x180/0x1d0 kernel/softirq.c:412 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&tpk_port.port_write_mutex); lock(&tpk_port.port_write_mutex); *** DEADLOCK *** 2 locks held by kauditd/28: #0: 000000006d8560da (console_lock){+.+.}, at: console_trylock_spinning kernel/printk/printk.c:1661 [inline] #0: 000000006d8560da (console_lock){+.+.}, at: vprintk_emit+0x267/0x6d0 kernel/printk/printk.c:1936 #1: 00000000895f4eda ((&sp->resync_t)){+.-.}, at: lockdep_copy_map include/linux/lockdep.h:168 [inline] #1: 00000000895f4eda ((&sp->resync_t)){+.-.}, at: call_timer_fn+0xda/0x720 kernel/time/timer.c:1316 stack backtrace: CPU: 0 PID: 28 Comm: kauditd Tainted: G W 4.19.92-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 print_usage_bug.cold+0x330/0x42a kernel/locking/lockdep.c:2540 valid_state kernel/locking/lockdep.c:2553 [inline] mark_lock_irq kernel/locking/lockdep.c:2747 [inline] mark_lock+0xd1b/0x1370 kernel/locking/lockdep.c:3127 mark_irqflags kernel/locking/lockdep.c:3005 [inline] __lock_acquire+0xc62/0x49c0 kernel/locking/lockdep.c:3368 lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3903 __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 tpk_write+0x5d/0x340 drivers/char/ttyprintk.c:123 resync_tnc+0x1b6/0x320 drivers/net/hamradio/6pack.c:522 call_timer_fn+0x18d/0x720 kernel/time/timer.c:1326 expire_timers kernel/time/timer.c:1363 [inline] __run_timers kernel/time/timer.c:1684 [inline] __run_timers kernel/time/timer.c:1652 [inline] run_timer_softirq+0x64f/0x16a0 kernel/time/timer.c:1697 __do_softirq+0x25c/0x921 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x13b/0x550 arch/x86/kernel/apic/apic.c:1094 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:console_unlock+0xc26/0x10d0 kernel/printk/printk.c:2437 Code: fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 56 04 00 00 48 83 3d e3 ff 9c 07 00 0f 84 b6 02 00 00 e8 90 e9 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 64 ff ff ff e8 7b e9 15 00 48 8b 7d 08 c7 05 4d RSP: 0018:ffff8880a99dfb88 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: ffff8880a99d2000 RBX: 0000000000000200 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: ffffffff81555bf0 RDI: 0000000000000293 RBP: ffff8880a99dfc10 R08: ffff8880a99d2000 R09: ffff8880a99d28a0 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: ffffffff84628b60 R14: 0000000000000111 R15: ffffffff89656490 vprintk_emit+0x280/0x6d0 kernel/printk/printk.c:1937 vprintk_default+0x28/0x30 kernel/printk/printk.c:1979 vprintk_func+0x7e/0x189 kernel/printk/printk_safe.c:398 printk+0xba/0xed kernel/printk/printk.c:2012 kauditd_printk_skb kernel/audit.c:546 [inline] kauditd_hold_skb.cold+0x3f/0x4e kernel/audit.c:579 kauditd_send_queue+0x12d/0x170 kernel/audit.c:742 kauditd_thread+0x71c/0xa50 kernel/audit.c:868 kthread+0x354/0x420 kernel/kthread.c:246 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 [U] `è audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_backlog=65 > audit_backlog_limit=64 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: '›' (00000000d64b3536): kobject_add_internal: parent: 'net', set: 'devices' kobject: '›' (00000000d64b3536): kobject_uevent_env kobject: 'loop3' (00000000093743a2): kobject_uevent_env kobject: '›' (00000000d64b3536): fill_kobj_path: path = '/devices/virtual/net/›' kobject: 'loop3' (00000000093743a2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'queues' (00000000d652eeb5): kobject_add_internal: parent: '›', set: '' kobject: 'queues' (00000000d652eeb5): kobject_uevent_env kobject: 'queues' (00000000d652eeb5): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop0' (0000000053258ee1): kobject_uevent_env kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0' protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'rx-0' (00000000068b988d): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'loop0' (0000000053258ee1): kobject_uevent_env kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'rx-0' (00000000068b988d): kobject_uevent_env kobject: 'rx-0' (00000000068b988d): fill_kobj_path: path = '/devices/virtual/net/›/queues/rx-0' kobject: 'tx-0' (0000000065467a08): kobject_add_internal: parent: 'queues', set: 'queues' kobject: 'tx-0' (0000000065467a08): kobject_uevent_env kobject: 'tx-0' (0000000065467a08): fill_kobj_path: path = '/devices/virtual/net/›/queues/tx-0' kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (00000000093743a2): kobject_uevent_env kobject: 'loop3' (00000000093743a2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (0000000053258ee1): kobject_uevent_env kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2' kauditd_printk_skb: 342 callbacks suppressed audit: type=1400 audit(1578049522.102:1422): avc: denied { map } for pid=13757 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop3' (00000000093743a2): kobject_uevent_env kobject: 'loop3' (00000000093743a2): fill_kobj_path: path = '/devices/virtual/block/loop3' audit: type=1400 audit(1578049522.102:1423): avc: denied { map } for pid=13757 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5' audit: type=1400 audit(1578049522.102:1424): avc: denied { map } for pid=13757 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (0000000053258ee1): kobject_uevent_env audit: type=1400 audit(1578049522.102:1425): avc: denied { map } for pid=13757 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'loop1' (0000000045fd018a): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop1' (0000000045fd018a): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' audit: type=1400 audit(1578049522.122:1426): avc: denied { map } for pid=13759 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4' audit: type=1400 audit(1578049522.122:1427): avc: denied { map } for pid=13759 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 BUG: sleeping function called from invalid context at kernel/locking/mutex.c:908 in_atomic(): 1, irqs_disabled(): 0, pid: 3666, name: udevd INFO: lockdep is turned off. Preemption disabled at: [] avc_reclaim_node security/selinux/avc.c:547 [inline] [] avc_alloc_node+0x1e3/0x630 security/selinux/avc.c:581 CPU: 0 PID: 3666 Comm: udevd Tainted: G W 4.19.92-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x197/0x210 lib/dump_stack.c:118 ___might_sleep.cold+0x1bd/0x1f6 kernel/sched/core.c:6192 kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' __might_sleep+0x95/0x190 kernel/sched/core.c:6145 __mutex_lock_common kernel/locking/mutex.c:908 [inline] __mutex_lock+0xc8/0x1300 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 audit: audit_backlog=65 > audit_backlog_limit=64 tpk_write+0x5d/0x340 drivers/char/ttyprintk.c:123 resync_tnc+0x1b6/0x320 drivers/net/hamradio/6pack.c:522 call_timer_fn+0x18d/0x720 kernel/time/timer.c:1326 audit: audit_lost=93 audit_rate_limit=0 audit_backlog_limit=64 expire_timers kernel/time/timer.c:1363 [inline] __run_timers kernel/time/timer.c:1684 [inline] __run_timers kernel/time/timer.c:1652 [inline] run_timer_softirq+0x64f/0x16a0 kernel/time/timer.c:1697 audit: backlog limit exceeded audit: audit_backlog=65 > audit_backlog_limit=64 __do_softirq+0x25c/0x921 kernel/softirq.c:292 kobject: 'kvm' (0000000022a06c39): kobject_uevent_env invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x13b/0x550 arch/x86/kernel/apic/apic.c:1094 kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0x95/0xe0 kernel/locking/spinlock.c:184 Code: 48 c7 c0 c8 5b f2 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d 4a fa a5 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 2c af fc f9 65 8b 05 35 8c b5 78 RSP: 0018:ffff8880971efac0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: 1ffffffff11e4b79 RBX: 0000000000000293 RCX: 1ffffffff127737c RDX: dffffc0000000000 RSI: ffffffff8170801e RDI: 0000000000000293 RBP: ffff8880971efad0 R08: ffff8880971e2340 R09: fffffbfff15b3177 R10: fffffbfff15b3176 R11: ffffffff8ad98bb3 R12: ffffffff8ad98bb0 R13: ffffffff8ad98bb0 R14: 0000000000000000 R15: ffffffff8ad9c688 spin_unlock_irqrestore include/linux/spinlock.h:384 [inline] avc_reclaim_node security/selinux/avc.c:562 [inline] avc_alloc_node+0x44e/0x630 security/selinux/avc.c:581 avc_insert security/selinux/avc.c:696 [inline] avc_compute_av+0x22d/0x690 security/selinux/avc.c:1026 avc_has_perm_noaudit security/selinux/avc.c:1167 [inline] avc_has_perm+0x32d/0x610 security/selinux/avc.c:1202 inode_has_perm.isra.0+0x176/0x210 security/selinux/hooks.c:1852 dentry_has_perm security/selinux/hooks.c:1869 [inline] selinux_inode_readlink+0xf4/0x150 security/selinux/hooks.c:3147 security_inode_readlink+0xcf/0x120 security/security.c:693 do_readlinkat+0x1d5/0x320 fs/stat.c:403 __do_sys_readlink fs/stat.c:427 [inline] __se_sys_readlink fs/stat.c:424 [inline] __x64_sys_readlink+0x78/0xb0 fs/stat.c:424 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fc3dc5f0577 Code: f0 ff ff 77 02 f3 c3 48 8b 15 bd 38 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 90 90 b8 59 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 91 38 2b 00 31 d2 48 29 c2 64 RSP: 002b:00007ffdb4224668 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 RAX: ffffffffffffffda RBX: 00000000011a9030 RCX: 00007fc3dc5f0577 RDX: 0000000000000400 RSI: 00007ffdb4224670 RDI: 00007ffdb4224b50 RBP: 00007ffdb42253b0 R08: 00007ffdb42253b0 R09: 00007fc3dc644de0 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdb4224b50 R13: 0000000000000400 R14: 00000000011c3cb0 R15: 00000000011a9030 kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'loop0' (0000000053258ee1): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop1' (0000000045fd018a): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: 'loop1' (0000000045fd018a): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: 'loop3' (00000000093743a2): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop3' (00000000093743a2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: 'loop0' (0000000053258ee1): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop1' (0000000045fd018a): kobject_uevent_env kobject: 'loop1' (0000000045fd018a): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop3' (00000000093743a2): kobject_uevent_env kobject: 'loop3' (00000000093743a2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'kvm' (0000000022a06c39): kobject_uevent_env kauditd_printk_skb: 215 callbacks suppressed audit: type=1400 audit(1578049527.112:1641): avc: denied { map } for pid=13874 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm' audit: type=1400 audit(1578049527.162:1642): avc: denied { map } for pid=13875 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1578049527.202:1643): avc: denied { map } for pid=13875 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5' audit: type=1400 audit(1578049527.222:1644): avc: denied { map } for pid=13874 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): fill_kobj_path: path = '/devices/platform/vhci_hcd.3/usb7/7-0:1.0' kobject: 'loop0' (0000000053258ee1): kobject_uevent_env kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env audit: type=1400 audit(1578049527.222:1645): avc: denied { map } for pid=13874 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! kobject: 'loop1' (0000000045fd018a): kobject_uevent_env audit: type=1400 audit(1578049527.232:1646): avc: denied { map } for pid=13875 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop1' (0000000045fd018a): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! audit: type=1400 audit(1578049527.232:1647): avc: denied { map } for pid=13875 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop! audit: type=1400 audit(1578049527.272:1648): avc: denied { map } for pid=13875 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2'