audit: type=1400 audit(1578049517.012:1242): avc:  denied  { map } for  pid=13654 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
audit: type=1400 audit(1578049517.082:1243): avc:  denied  { map } for  pid=13656 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
BUG: sleeping function called from invalid context at kernel/locking/mutex.c:908
in_atomic(): 1, irqs_disabled(): 0, pid: 28, name: kauditd
2 locks held by kauditd/28:
 #0: 000000006d8560da (console_lock){+.+.}, at: console_trylock_spinning kernel/printk/printk.c:1661 [inline]
 #0: 000000006d8560da (console_lock){+.+.}, at: vprintk_emit+0x267/0x6d0 kernel/printk/printk.c:1936
 #1: 00000000895f4eda ((&sp->resync_t)){+.-.}, at: lockdep_copy_map include/linux/lockdep.h:168 [inline]
 #1: 00000000895f4eda ((&sp->resync_t)){+.-.}, at: call_timer_fn+0xda/0x720 kernel/time/timer.c:1316
Preemption disabled at:
[<ffffffff81559542>] vprintk_emit+0x262/0x6d0 kernel/printk/printk.c:1930
CPU: 0 PID: 28 Comm: kauditd Not tainted 4.19.92-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 ___might_sleep.cold+0x1bd/0x1f6 kernel/sched/core.c:6192
 __might_sleep+0x95/0x190 kernel/sched/core.c:6145
 __mutex_lock_common kernel/locking/mutex.c:908 [inline]
 __mutex_lock+0xc8/0x1300 kernel/locking/mutex.c:1072
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087
 tpk_write+0x5d/0x340 drivers/char/ttyprintk.c:123
 resync_tnc+0x1b6/0x320 drivers/net/hamradio/6pack.c:522
 call_timer_fn+0x18d/0x720 kernel/time/timer.c:1326
 expire_timers kernel/time/timer.c:1363 [inline]
 __run_timers kernel/time/timer.c:1684 [inline]
 __run_timers kernel/time/timer.c:1652 [inline]
 run_timer_softirq+0x64f/0x16a0 kernel/time/timer.c:1697
 __do_softirq+0x25c/0x921 kernel/softirq.c:292
 invoke_softirq kernel/softirq.c:372 [inline]
 irq_exit+0x180/0x1d0 kernel/softirq.c:412
 exiting_irq arch/x86/include/asm/apic.h:536 [inline]
 smp_apic_timer_interrupt+0x13b/0x550 arch/x86/kernel/apic/apic.c:1094
 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893
 </IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline]
RIP: 0010:console_unlock+0xc26/0x10d0 kernel/printk/printk.c:2437
Code: fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 56 04 00 00 48 83 3d e3 ff 9c 07 00 0f 84 b6 02 00 00 e8 90 e9 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 64 ff ff ff e8 7b e9 15 00 48 8b 7d 08 c7 05 4d
RSP: 0018:ffff8880a99dfb88 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13
RAX: ffff8880a99d2000 RBX: 0000000000000200 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff81555bf0 RDI: 0000000000000293
RBP: ffff8880a99dfc10 R08: ffff8880a99d2000 R09: ffff8880a99d28a0
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffffffff84628b60 R14: 0000000000000111 R15: ffffffff89656490
 vprintk_emit+0x280/0x6d0 kernel/printk/printk.c:1937
 vprintk_default+0x28/0x30 kernel/printk/printk.c:1979
 vprintk_func+0x7e/0x189 kernel/printk/printk_safe.c:398
 printk+0xba/0xed kernel/printk/printk.c:2012
 kauditd_printk_skb kernel/audit.c:546 [inline]
 kauditd_hold_skb.cold+0x3f/0x4e kernel/audit.c:579
 kauditd_send_queue+0x12d/0x170 kernel/audit.c:742
 kauditd_thread+0x71c/0xa50 kernel/audit.c:868
 kthread+0x354/0x420 kernel/kthread.c:246
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

================================
WARNING: inconsistent lock state
4.19.92-syzkaller #0 Tainted: G        W        
--------------------------------
inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage.
kauditd/28 [HC0[0]:SC1[1]:HE1:SE0] takes:
00000000b91aa3d1 (&tpk_port.port_write_mutex){+.?.}, at: tpk_write+0x5d/0x340 drivers/char/ttyprintk.c:123
{SOFTIRQ-ON-W} state was registered at:
  lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3903
  __mutex_lock_common kernel/locking/mutex.c:925 [inline]
  __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072
  mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087
  tpk_close+0x50/0x95 drivers/char/ttyprintk.c:104
  tty_release+0x3ba/0xe90 drivers/tty/tty_io.c:1678
  __fput+0x2dd/0x8b0 fs/file_table.c:278
  ____fput+0x16/0x20 fs/file_table.c:309
  task_work_run+0x145/0x1c0 kernel/task_work.c:113
  tracehook_notify_resume include/linux/tracehook.h:193 [inline]
  exit_to_usermode_loop+0x273/0x2c0 arch/x86/entry/common.c:167
  prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
  syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
  do_syscall_64+0x53d/0x620 arch/x86/entry/common.c:296
  entry_SYSCALL_64_after_hwframe+0x49/0xbe
irq event stamp: 29264
hardirqs last  enabled at (29264): [<ffffffff8744b8b6>] dump_stack+0x1f6/0x210 lib/dump_stack.c:123
hardirqs last disabled at (29263): [<ffffffff8744b771>] dump_stack+0xb1/0x210 lib/dump_stack.c:100
softirqs last  enabled at (29178): [<ffffffff87800633>] __do_softirq+0x633/0x921 kernel/softirq.c:318
softirqs last disabled at (29199): [<ffffffff814079a0>] invoke_softirq kernel/softirq.c:372 [inline]
softirqs last disabled at (29199): [<ffffffff814079a0>] irq_exit+0x180/0x1d0 kernel/softirq.c:412

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(&tpk_port.port_write_mutex);
  <Interrupt>
    lock(&tpk_port.port_write_mutex);

 *** DEADLOCK ***

2 locks held by kauditd/28:
 #0: 000000006d8560da (console_lock){+.+.}, at: console_trylock_spinning kernel/printk/printk.c:1661 [inline]
 #0: 000000006d8560da (console_lock){+.+.}, at: vprintk_emit+0x267/0x6d0 kernel/printk/printk.c:1936
 #1: 00000000895f4eda ((&sp->resync_t)){+.-.}, at: lockdep_copy_map include/linux/lockdep.h:168 [inline]
 #1: 00000000895f4eda ((&sp->resync_t)){+.-.}, at: call_timer_fn+0xda/0x720 kernel/time/timer.c:1316

stack backtrace:
CPU: 0 PID: 28 Comm: kauditd Tainted: G        W         4.19.92-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 print_usage_bug.cold+0x330/0x42a kernel/locking/lockdep.c:2540
 valid_state kernel/locking/lockdep.c:2553 [inline]
 mark_lock_irq kernel/locking/lockdep.c:2747 [inline]
 mark_lock+0xd1b/0x1370 kernel/locking/lockdep.c:3127
 mark_irqflags kernel/locking/lockdep.c:3005 [inline]
 __lock_acquire+0xc62/0x49c0 kernel/locking/lockdep.c:3368
 lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:3903
 __mutex_lock_common kernel/locking/mutex.c:925 [inline]
 __mutex_lock+0xf7/0x1300 kernel/locking/mutex.c:1072
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087
 tpk_write+0x5d/0x340 drivers/char/ttyprintk.c:123
 resync_tnc+0x1b6/0x320 drivers/net/hamradio/6pack.c:522
 call_timer_fn+0x18d/0x720 kernel/time/timer.c:1326
 expire_timers kernel/time/timer.c:1363 [inline]
 __run_timers kernel/time/timer.c:1684 [inline]
 __run_timers kernel/time/timer.c:1652 [inline]
 run_timer_softirq+0x64f/0x16a0 kernel/time/timer.c:1697
 __do_softirq+0x25c/0x921 kernel/softirq.c:292
 invoke_softirq kernel/softirq.c:372 [inline]
 irq_exit+0x180/0x1d0 kernel/softirq.c:412
 exiting_irq arch/x86/include/asm/apic.h:536 [inline]
 smp_apic_timer_interrupt+0x13b/0x550 arch/x86/kernel/apic/apic.c:1094
 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893
 </IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline]
RIP: 0010:console_unlock+0xc26/0x10d0 kernel/printk/printk.c:2437
Code: fc ff df 48 c1 e8 03 80 3c 08 00 0f 85 56 04 00 00 48 83 3d e3 ff 9c 07 00 0f 84 b6 02 00 00 e8 90 e9 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 64 ff ff ff e8 7b e9 15 00 48 8b 7d 08 c7 05 4d
RSP: 0018:ffff8880a99dfb88 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13
RAX: ffff8880a99d2000 RBX: 0000000000000200 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffffffff81555bf0 RDI: 0000000000000293
RBP: ffff8880a99dfc10 R08: ffff8880a99d2000 R09: ffff8880a99d28a0
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffffffff84628b60 R14: 0000000000000111 R15: ffffffff89656490
 vprintk_emit+0x280/0x6d0 kernel/printk/printk.c:1937
 vprintk_default+0x28/0x30 kernel/printk/printk.c:1979
 vprintk_func+0x7e/0x189 kernel/printk/printk_safe.c:398
 printk+0xba/0xed kernel/printk/printk.c:2012
 kauditd_printk_skb kernel/audit.c:546 [inline]
 kauditd_hold_skb.cold+0x3f/0x4e kernel/audit.c:579
 kauditd_send_queue+0x12d/0x170 kernel/audit.c:742
 kauditd_thread+0x71c/0xa50 kernel/audit.c:868
 kthread+0x354/0x420 kernel/kthread.c:246
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
[U] `�
audit: audit_backlog=65 > audit_backlog_limit=64
audit: audit_backlog=65 > audit_backlog_limit=64
audit: audit_backlog=65 > audit_backlog_limit=64
audit: audit_backlog=65 > audit_backlog_limit=64
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
kobject: '�' (00000000d64b3536): kobject_add_internal: parent: 'net', set: 'devices'
kobject: '�' (00000000d64b3536): kobject_uevent_env
kobject: 'loop3' (00000000093743a2): kobject_uevent_env
kobject: '�' (00000000d64b3536): fill_kobj_path: path = '/devices/virtual/net/�'
kobject: 'loop3' (00000000093743a2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'queues' (00000000d652eeb5): kobject_add_internal: parent: '�', set: '<NULL>'
kobject: 'queues' (00000000d652eeb5): kobject_uevent_env
kobject: 'queues' (00000000d652eeb5): kobject_uevent_env: filter function caused the event to drop!
kobject: 'loop0' (0000000053258ee1): kobject_uevent_env
kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0'
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env
kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'rx-0' (00000000068b988d): kobject_add_internal: parent: 'queues', set: 'queues'
kobject: 'loop0' (0000000053258ee1): kobject_uevent_env
kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'rx-0' (00000000068b988d): kobject_uevent_env
kobject: 'rx-0' (00000000068b988d): fill_kobj_path: path = '/devices/virtual/net/�/queues/rx-0'
kobject: 'tx-0' (0000000065467a08): kobject_add_internal: parent: 'queues', set: 'queues'
kobject: 'tx-0' (0000000065467a08): kobject_uevent_env
kobject: 'tx-0' (0000000065467a08): fill_kobj_path: path = '/devices/virtual/net/�/queues/tx-0'
kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env
kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop3' (00000000093743a2): kobject_uevent_env
kobject: 'loop3' (00000000093743a2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env
kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'loop0' (0000000053258ee1): kobject_uevent_env
kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env
kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env
kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env
kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kauditd_printk_skb: 342 callbacks suppressed
audit: type=1400 audit(1578049522.102:1422): avc:  denied  { map } for  pid=13757 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: 'loop3' (00000000093743a2): kobject_uevent_env
kobject: 'loop3' (00000000093743a2): fill_kobj_path: path = '/devices/virtual/block/loop3'
audit: type=1400 audit(1578049522.102:1423): avc:  denied  { map } for  pid=13757 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5'
audit: type=1400 audit(1578049522.102:1424): avc:  denied  { map } for  pid=13757 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop0' (0000000053258ee1): kobject_uevent_env
audit: type=1400 audit(1578049522.102:1425): avc:  denied  { map } for  pid=13757 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'loop1' (0000000045fd018a): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop1' (0000000045fd018a): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
audit: type=1400 audit(1578049522.122:1426): avc:  denied  { map } for  pid=13759 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env
kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4'
audit: type=1400 audit(1578049522.122:1427): avc:  denied  { map } for  pid=13759 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
BUG: sleeping function called from invalid context at kernel/locking/mutex.c:908
in_atomic(): 1, irqs_disabled(): 0, pid: 3666, name: udevd
INFO: lockdep is turned off.
Preemption disabled at:
[<ffffffff831d5a83>] avc_reclaim_node security/selinux/avc.c:547 [inline]
[<ffffffff831d5a83>] avc_alloc_node+0x1e3/0x630 security/selinux/avc.c:581
CPU: 0 PID: 3666 Comm: udevd Tainted: G        W         4.19.92-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x197/0x210 lib/dump_stack.c:118
 ___might_sleep.cold+0x1bd/0x1f6 kernel/sched/core.c:6192
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
 __might_sleep+0x95/0x190 kernel/sched/core.c:6145
 __mutex_lock_common kernel/locking/mutex.c:908 [inline]
 __mutex_lock+0xc8/0x1300 kernel/locking/mutex.c:1072
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087
audit: audit_backlog=65 > audit_backlog_limit=64
 tpk_write+0x5d/0x340 drivers/char/ttyprintk.c:123
 resync_tnc+0x1b6/0x320 drivers/net/hamradio/6pack.c:522
 call_timer_fn+0x18d/0x720 kernel/time/timer.c:1326
audit: audit_lost=93 audit_rate_limit=0 audit_backlog_limit=64
 expire_timers kernel/time/timer.c:1363 [inline]
 __run_timers kernel/time/timer.c:1684 [inline]
 __run_timers kernel/time/timer.c:1652 [inline]
 run_timer_softirq+0x64f/0x16a0 kernel/time/timer.c:1697
audit: backlog limit exceeded
audit: audit_backlog=65 > audit_backlog_limit=64
 __do_softirq+0x25c/0x921 kernel/softirq.c:292
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
 invoke_softirq kernel/softirq.c:372 [inline]
 irq_exit+0x180/0x1d0 kernel/softirq.c:412
 exiting_irq arch/x86/include/asm/apic.h:536 [inline]
 smp_apic_timer_interrupt+0x13b/0x550 arch/x86/kernel/apic/apic.c:1094
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893
 </IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline]
RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline]
RIP: 0010:_raw_spin_unlock_irqrestore+0x95/0xe0 kernel/locking/spinlock.c:184
Code: 48 c7 c0 c8 5b f2 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d 4a fa a5 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 2c af fc f9 65 8b 05 35 8c b5 78
RSP: 0018:ffff8880971efac0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13
RAX: 1ffffffff11e4b79 RBX: 0000000000000293 RCX: 1ffffffff127737c
RDX: dffffc0000000000 RSI: ffffffff8170801e RDI: 0000000000000293
RBP: ffff8880971efad0 R08: ffff8880971e2340 R09: fffffbfff15b3177
R10: fffffbfff15b3176 R11: ffffffff8ad98bb3 R12: ffffffff8ad98bb0
R13: ffffffff8ad98bb0 R14: 0000000000000000 R15: ffffffff8ad9c688
 spin_unlock_irqrestore include/linux/spinlock.h:384 [inline]
 avc_reclaim_node security/selinux/avc.c:562 [inline]
 avc_alloc_node+0x44e/0x630 security/selinux/avc.c:581
 avc_insert security/selinux/avc.c:696 [inline]
 avc_compute_av+0x22d/0x690 security/selinux/avc.c:1026
 avc_has_perm_noaudit security/selinux/avc.c:1167 [inline]
 avc_has_perm+0x32d/0x610 security/selinux/avc.c:1202
 inode_has_perm.isra.0+0x176/0x210 security/selinux/hooks.c:1852
 dentry_has_perm security/selinux/hooks.c:1869 [inline]
 selinux_inode_readlink+0xf4/0x150 security/selinux/hooks.c:3147
 security_inode_readlink+0xcf/0x120 security/security.c:693
 do_readlinkat+0x1d5/0x320 fs/stat.c:403
 __do_sys_readlink fs/stat.c:427 [inline]
 __se_sys_readlink fs/stat.c:424 [inline]
 __x64_sys_readlink+0x78/0xb0 fs/stat.c:424
 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7fc3dc5f0577
Code: f0 ff ff 77 02 f3 c3 48 8b 15 bd 38 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 90 90 b8 59 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 91 38 2b 00 31 d2 48 29 c2 64
RSP: 002b:00007ffdb4224668 EFLAGS: 00000246 ORIG_RAX: 0000000000000059
RAX: ffffffffffffffda RBX: 00000000011a9030 RCX: 00007fc3dc5f0577
RDX: 0000000000000400 RSI: 00007ffdb4224670 RDI: 00007ffdb4224b50
RBP: 00007ffdb42253b0 R08: 00007ffdb42253b0 R09: 00007fc3dc644de0
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdb4224b50
R13: 0000000000000400 R14: 00000000011c3cb0 R15: 00000000011a9030
kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env
kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'loop0' (0000000053258ee1): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env
kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env
kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop1' (0000000045fd018a): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: 'loop1' (0000000045fd018a): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: 'loop3' (00000000093743a2): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop3' (00000000093743a2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop4' (00000000e45c34d4): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'loop4' (00000000e45c34d4): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env
kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5'
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: 'loop0' (0000000053258ee1): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop1' (0000000045fd018a): kobject_uevent_env
kobject: 'loop1' (0000000045fd018a): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2'
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop3' (00000000093743a2): kobject_uevent_env
kobject: 'loop3' (00000000093743a2): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'kvm' (0000000022a06c39): kobject_uevent_env
kauditd_printk_skb: 215 callbacks suppressed
audit: type=1400 audit(1578049527.112:1641): avc:  denied  { map } for  pid=13874 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: 'kvm' (0000000022a06c39): fill_kobj_path: path = '/devices/virtual/misc/kvm'
audit: type=1400 audit(1578049527.162:1642): avc:  denied  { map } for  pid=13875 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
audit: type=1400 audit(1578049527.202:1643): avc:  denied  { map } for  pid=13875 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: 'loop5' (000000003b7fa65c): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop5' (000000003b7fa65c): fill_kobj_path: path = '/devices/virtual/block/loop5'
audit: type=1400 audit(1578049527.222:1644): avc:  denied  { map } for  pid=13874 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): fill_kobj_path: path = '/devices/platform/vhci_hcd.3/usb7/7-0:1.0'
kobject: 'loop0' (0000000053258ee1): kobject_uevent_env
kobject: 'loop0' (0000000053258ee1): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
audit: type=1400 audit(1578049527.222:1645): avc:  denied  { map } for  pid=13874 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
kobject: 'loop1' (0000000045fd018a): kobject_uevent_env
audit: type=1400 audit(1578049527.232:1646): avc:  denied  { map } for  pid=13875 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: 'loop1' (0000000045fd018a): fill_kobj_path: path = '/devices/virtual/block/loop1'
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
audit: type=1400 audit(1578049527.232:1647): avc:  denied  { map } for  pid=13875 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env
kobject: '7-0:1.0' (0000000017c08a22): kobject_uevent_env: uevent_suppress caused the event to drop!
audit: type=1400 audit(1578049527.272:1648): avc:  denied  { map } for  pid=13875 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
kobject: 'loop2' (00000000f79abb6e): kobject_uevent_env
kobject: 'loop2' (00000000f79abb6e): fill_kobj_path: path = '/devices/virtual/block/loop2'