======================================================
[ INFO: possible circular locking dependency detected ]
4.4.120-gd63fdf6 #29 Not tainted
-------------------------------------------------------
syz-executor5/7050 is trying to acquire lock:
 (&sb->s_type->i_mutex_key#10){+.+.+.}, at: [<ffffffff81463361>] shmem_file_llseek+0xf1/0x240 mm/shmem.c:1816

but task is already holding lock:
 (ashmem_mutex){+.+.+.}, at: [<ffffffff82c62016>] ashmem_llseek+0x56/0x1f0 drivers/staging/android/ashmem.c:330

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

       [<ffffffff8123d7ce>] lock_acquire+0x15e/0x460 kernel/locking/lockdep.c:3592
       [<ffffffff8376a39b>] __mutex_lock_common kernel/locking/mutex.c:521 [inline]
       [<ffffffff8376a39b>] mutex_lock_nested+0xbb/0x850 kernel/locking/mutex.c:621
       [<ffffffff82c61463>] ashmem_mmap+0x53/0x400 drivers/staging/android/ashmem.c:366
       [<ffffffff814b0e4f>] mmap_region+0x94f/0x1250 mm/mmap.c:1664
       [<ffffffff814b1c4d>] do_mmap+0x4fd/0x9d0 mm/mmap.c:1441
       [<ffffffff814700ce>] do_mmap_pgoff include/linux/mm.h:1915 [inline]
       [<ffffffff814700ce>] vm_mmap_pgoff+0x16e/0x1c0 mm/util.c:296
       [<ffffffff814afe1f>] SYSC_mmap_pgoff mm/mmap.c:1491 [inline]
       [<ffffffff814afe1f>] SyS_mmap_pgoff+0x33f/0x560 mm/mmap.c:1449
       [<ffffffff81006d91>] do_syscall_32_irqs_on arch/x86/entry/common.c:392 [inline]
       [<ffffffff81006d91>] do_fast_syscall_32+0x321/0x8a0 arch/x86/entry/common.c:459
       [<ffffffff837752ea>] sysenter_flags_fixed+0xd/0x17

       [<ffffffff8123d7ce>] lock_acquire+0x15e/0x460 kernel/locking/lockdep.c:3592
       [<ffffffff814956ea>] __might_fault+0x14a/0x1d0 mm/memory.c:3810
       [<ffffffff8155ab22>] copy_to_user arch/x86/include/asm/uaccess.h:760 [inline]
       [<ffffffff8155ab22>] filldir+0x162/0x2d0 fs/readdir.c:180
       [<ffffffff8159820e>] dir_emit_dot include/linux/fs.h:3070 [inline]
       [<ffffffff8159820e>] dir_emit_dots include/linux/fs.h:3081 [inline]
       [<ffffffff8159820e>] dcache_readdir+0x11e/0x7b0 fs/libfs.c:150
       [<ffffffff8155a768>] iterate_dir+0x1c8/0x420 fs/readdir.c:42
       [<ffffffff8155b45a>] SYSC_getdents fs/readdir.c:215 [inline]
       [<ffffffff8155b45a>] SyS_getdents+0x14a/0x270 fs/readdir.c:196
       [<ffffffff8377395f>] entry_SYSCALL_64_fastpath+0x1c/0x98

       [<ffffffff8123ab2f>] check_prev_add kernel/locking/lockdep.c:1853 [inline]
       [<ffffffff8123ab2f>] check_prevs_add kernel/locking/lockdep.c:1958 [inline]
       [<ffffffff8123ab2f>] validate_chain kernel/locking/lockdep.c:2144 [inline]
       [<ffffffff8123ab2f>] __lock_acquire+0x371f/0x4b50 kernel/locking/lockdep.c:3213
       [<ffffffff8123d7ce>] lock_acquire+0x15e/0x460 kernel/locking/lockdep.c:3592
       [<ffffffff8376a39b>] __mutex_lock_common kernel/locking/mutex.c:521 [inline]
       [<ffffffff8376a39b>] mutex_lock_nested+0xbb/0x850 kernel/locking/mutex.c:621
       [<ffffffff81463361>] shmem_file_llseek+0xf1/0x240 mm/shmem.c:1816
       [<ffffffff8151c762>] vfs_llseek+0xa2/0xd0 fs/read_write.c:260
       [<ffffffff82c620a7>] ashmem_llseek+0xe7/0x1f0 drivers/staging/android/ashmem.c:342
       [<ffffffff8151e6db>] vfs_llseek fs/read_write.c:260 [inline]
       [<ffffffff8151e6db>] SYSC_lseek fs/read_write.c:285 [inline]
       [<ffffffff8151e6db>] SyS_lseek fs/read_write.c:276 [inline]
       [<ffffffff8151e6db>] C_SYSC_lseek fs/read_write.c:297 [inline]
       [<ffffffff8151e6db>] compat_SyS_lseek+0xeb/0x170 fs/read_write.c:295
       [<ffffffff81006d91>] do_syscall_32_irqs_on arch/x86/entry/common.c:392 [inline]
       [<ffffffff81006d91>] do_fast_syscall_32+0x321/0x8a0 arch/x86/entry/common.c:459
       [<ffffffff837752ea>] sysenter_flags_fixed+0xd/0x17

other info that might help us debug this:

Chain exists of:
 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(ashmem_mutex);
                               lock(&mm->mmap_sem);
                               lock(ashmem_mutex);
  lock(&sb->s_type->i_mutex_key#10);

 *** DEADLOCK ***

1 lock held by syz-executor5/7050:
 #0:  (ashmem_mutex){+.+.+.}, at: [<ffffffff82c62016>] ashmem_llseek+0x56/0x1f0 drivers/staging/android/ashmem.c:330

stack backtrace:
CPU: 1 PID: 7050 Comm: syz-executor5 Not tainted 4.4.120-gd63fdf6 #29
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 0000000000000000 63fa5c589185f620 ffff8801d45dfa58 ffffffff81d0408d
 ffffffff851a0010 ffffffff851a9d00 ffffffff851be7c0 ffff8801d40988f8
 ffff8801d4098000 ffff8801d45dfaa0 ffffffff81233ba1 ffff8801d40988f8
Call Trace:
 [<ffffffff81d0408d>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81d0408d>] dump_stack+0xc1/0x124 lib/dump_stack.c:51
 [<ffffffff81233ba1>] print_circular_bug+0x271/0x310 kernel/locking/lockdep.c:1226
 [<ffffffff8123ab2f>] check_prev_add kernel/locking/lockdep.c:1853 [inline]
 [<ffffffff8123ab2f>] check_prevs_add kernel/locking/lockdep.c:1958 [inline]
 [<ffffffff8123ab2f>] validate_chain kernel/locking/lockdep.c:2144 [inline]
 [<ffffffff8123ab2f>] __lock_acquire+0x371f/0x4b50 kernel/locking/lockdep.c:3213
 [<ffffffff8123d7ce>] lock_acquire+0x15e/0x460 kernel/locking/lockdep.c:3592
 [<ffffffff8376a39b>] __mutex_lock_common kernel/locking/mutex.c:521 [inline]
 [<ffffffff8376a39b>] mutex_lock_nested+0xbb/0x850 kernel/locking/mutex.c:621
 [<ffffffff81463361>] shmem_file_llseek+0xf1/0x240 mm/shmem.c:1816
 [<ffffffff8151c762>] vfs_llseek+0xa2/0xd0 fs/read_write.c:260
 [<ffffffff82c620a7>] ashmem_llseek+0xe7/0x1f0 drivers/staging/android/ashmem.c:342
 [<ffffffff8151e6db>] vfs_llseek fs/read_write.c:260 [inline]
 [<ffffffff8151e6db>] SYSC_lseek fs/read_write.c:285 [inline]
 [<ffffffff8151e6db>] SyS_lseek fs/read_write.c:276 [inline]
 [<ffffffff8151e6db>] C_SYSC_lseek fs/read_write.c:297 [inline]
 [<ffffffff8151e6db>] compat_SyS_lseek+0xeb/0x170 fs/read_write.c:295
 [<ffffffff81006d91>] do_syscall_32_irqs_on arch/x86/entry/common.c:392 [inline]
 [<ffffffff81006d91>] do_fast_syscall_32+0x321/0x8a0 arch/x86/entry/common.c:459
 [<ffffffff837752ea>] sysenter_flags_fixed+0xd/0x17
audit: type=1400 audit(1521758979.478:20): avc:  denied  { ioctl } for  pid=7115 comm="syz-executor6" path="socket:[16476]" dev="sockfs" ino=16476 ioctlcmd=4508 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
audit: type=1400 audit(1521758979.728:21): avc:  denied  { create } for  pid=7195 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=key permissive=1
IPv4: Oversized IP packet from 127.0.0.1
audit: type=1400 audit(1521758980.008:22): avc:  denied  { create } for  pid=7279 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
audit: type=1400 audit(1521758980.048:23): avc:  denied  { setattr } for  pid=7279 comm="syz-executor1" name="NETLINK" dev="sockfs" ino=16638 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
rfkill: input handler disabled
rfkill: input handler enabled
rfkill: input handler disabled
rfkill: input handler enabled
audit: type=1400 audit(1521758980.098:24): avc:  denied  { ioctl } for  pid=7279 comm="syz-executor1" path="socket:[16638]" dev="sockfs" ino=16638 ioctlcmd=8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
audit: type=1400 audit(1521758980.138:25): avc:  denied  { create } for  pid=7279 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
binder: 7355:7357 ioctl c018620b 20000080 returned -14
binder: 7355:7357 ioctl c018620b 20000040 returned -14
audit: type=1400 audit(1521758980.328:26): avc:  denied  { create } for  pid=7367 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
binder: 7355:7357 ioctl c018620b 20000080 returned -14
binder: 7355:7377 ioctl c018620b 20000040 returned -14
binder: 7452:7456 transaction failed 29201/-28, size 0-0 line 3128
binder: 7452:7456 ioctl 40046205 8 returned -22
binder: BINDER_SET_CONTEXT_MGR already set
binder: 7452:7456 ioctl 40046207 0 returned -16
binder_alloc: 7452: binder_alloc_buf, no vma
binder: 7452:7473 transaction failed 29189/-3, size 0-0 line 3128
binder: 7452:7473 ioctl 40046205 8 returned -22
sg_write: data in/out 67174367/148 bytes for SCSI command 0xe0-- guessing data in;
   program syz-executor7 not setting count and/or reply_len properly
binder: BINDER_SET_CONTEXT_MGR already set
binder: 7637:7644 ioctl 40046207 0 returned -16
audit_printk_skb: 24 callbacks suppressed
audit: type=1400 audit(1521758982.048:35): avc:  denied  { create } for  pid=7738 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
audit: type=1400 audit(1521758982.118:36): avc:  denied  { write } for  pid=7738 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
audit: type=1400 audit(1521758982.118:37): avc:  denied  { setopt } for  pid=7738 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
binder: 7786:7804 got reply transaction with no transaction stack
binder: 7786:7804 transaction failed 29201/-71, size 0-0 line 2921
TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
vmalloc: allocation failure: 0 bytes
IPVS: Creating netns size=2552 id=9
syz-executor1: page allocation failure: order:0, mode:0x24000c2
CPU: 1 PID: 8036 Comm: syz-executor1 Not tainted 4.4.120-gd63fdf6 #29
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 0000000000000000 36238a6b1fbec18d ffff8801d299f898 ffffffff81d0408d
 1ffff1003a533f16[   57.064720] pktgen: kernel_thread() failed for cpu 1
pktgen: Cannot create thread for cpu 1 (-4)
IPVS: Creating netns size=2552 id=10
 ffff8800b5004800 00000000024000c2 0000000000000000
 0000000000000001 ffff8801d299f9a8 ffffffff81431059 ffffffff838ac620
Call Trace:
 [<ffffffff81d0408d>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81d0408d>] dump_stack+0xc1/0x124 lib/dump_stack.c:51
 [<ffffffff81431059>] warn_alloc_failed+0x1d9/0x240 mm/page_alloc.c:2757
 [<ffffffff814c868d>] __vmalloc_node_range+0x41d/0x630 mm/vmalloc.c:1692
 [<ffffffff814c896b>] __vmalloc_node mm/vmalloc.c:1715 [inline]
 [<ffffffff814c896b>] __vmalloc_node_flags mm/vmalloc.c:1729 [inline]
 [<ffffffff814c896b>] vmalloc+0x5b/0x70 mm/vmalloc.c:1744
 [<ffffffff81b70350>] sel_write_load+0x130/0xff0 security/selinux/selinuxfs.c:527
 [<ffffffff8151d373>] __vfs_write+0x103/0x450 fs/read_write.c:489
 [<ffffffff8151f1da>] vfs_write+0x18a/0x530 fs/read_write.c:538
 [<ffffffff81521c4f>] SYSC_pwrite64 fs/read_write.c:627 [inline]
 [<ffffffff81521c4f>] SyS_pwrite64+0x13f/0x170 fs/read_write.c:614
 [<ffffffff81119cb9>] sys32_pwrite+0x39/0x50 arch/x86/ia32/sys_ia32.c:186
 [<ffffffff81006d91>] do_syscall_32_irqs_on arch/x86/entry/common.c:392 [inline]
 [<ffffffff81006d91>] do_fast_syscall_32+0x321/0x8a0 arch/x86/entry/common.c:459
 [<ffffffff837752ea>] sysenter_flags_fixed+0xd/0x17
Mem-Info:
active_anon:52414 inactive_anon:45 isolated_anon:0
 active_file:3708 inactive_file:8296 isolated_file:0
 unevictable:2 dirty:115 writeback:0 unstable:0
 slab_reclaimable:6112 slab_unreclaimable:59342
 mapped:23826 shmem:51 pagetables:631 bounce:0
 free:1474755 free_pcp:541 free_cma:0
DMA free:15904kB min:160kB low:200kB high:240kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:15992kB managed:15904kB mlocked:0kB dirty:0kB writeback:0kB mapped:0kB shmem:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB unstable:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? yes
lowmem_reserve[]: 0 2911 6411 6411
DMA32 free:2666232kB min:30608kB low:38260kB high:45912kB active_anon:96544kB inactive_anon:112kB active_file:6464kB inactive_file:19224kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:3129292kB managed:2982732kB mlocked:0kB dirty:188kB writeback:0kB mapped:51044kB shmem:120kB slab_reclaimable:11564kB slab_unreclaimable:107020kB kernel_stack:3296kB pagetables:1404kB unstable:0kB bounce:0kB free_pcp:1280kB local_pcp:612kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no
lowmem_reserve[]: 0 0 3500 3500
Normal free:3217292kB min:36808kB low:46008kB high:55212kB active_anon:113052kB inactive_anon:68kB active_file:8380kB inactive_file:13960kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:4718592kB managed:3584660kB mlocked:0kB dirty:276kB writeback:0kB mapped:44216kB shmem:84kB slab_reclaimable:12884kB slab_unreclaimable:130364kB kernel_stack:2816kB pagetables:1076kB unstable:0kB bounce:0kB free_pcp:1004kB local_pcp:532kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no
lowmem_reserve[]: 0 0 0 0
DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB
DMA32: 391*4kB (UME) 182*8kB (UM) 141*16kB (UME) 131*32kB (UME) 78*64kB (UM) 21*128kB (UM) 15*256kB (UME) 11*512kB (UM) 40*1024kB (UM) 5*2048kB (M) 632*4096kB (M) = 2666492kB
Normal: 229*4kB (UME) 163*8kB (UME) 147*16kB (UME) 117*32kB (UME) 95*64kB (UME) 25*128kB (UM) 11*256kB (M) 26*512kB (M) 49*1024kB (UME) 4*2048kB (ME) 763*4096kB (M) = 3217340kB
Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB
12059 total pagecache pages
0 pages in swap cache
Swap cache stats: add 0, delete 0, find 0/0
Free swap  = 0kB
Total swap = 0kB
1965969 pages RAM
0 pages HighMem/MovableOnly
320145 pages reserved
vmalloc: allocation failure: 0 bytes
syz-executor1: page allocation failure: order:0, mode:0x24000c2
CPU: 1 PID: 8047 Comm: syz-executor1 Not tainted 4.4.120-gd63fdf6 #29
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 0000000000000000 cd69b043e4a7d9a1 ffff8801d6f7f898 ffffffff81d0408d
 1ffff1003adeff16 ffff8801d233e000 00000000024000c2 0000000000000000
 0000000000000001 ffff8801d6f7f9a8 ffffffff81431059 ffffffff838ac620
Call Trace:
 [<ffffffff81d0408d>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81d0408d>] dump_stack+0xc1/0x124 lib/dump_stack.c:51
 [<ffffffff81431059>] warn_alloc_failed+0x1d9/0x240 mm/page_alloc.c:2757
 [<ffffffff814c868d>] __vmalloc_node_range+0x41d/0x630 mm/vmalloc.c:1692
 [<ffffffff814c896b>] __vmalloc_node mm/vmalloc.c:1715 [inline]
 [<ffffffff814c896b>] __vmalloc_node_flags mm/vmalloc.c:1729 [inline]
 [<ffffffff814c896b>] vmalloc+0x5b/0x70 mm/vmalloc.c:1744
 [<ffffffff81b70350>] sel_write_load+0x130/0xff0 security/selinux/selinuxfs.c:527
 [<ffffffff8151d373>] __vfs_write+0x103/0x450 fs/read_write.c:489
 [<ffffffff8151f1da>] vfs_write+0x18a/0x530 fs/read_write.c:538
 [<ffffffff81521c4f>] SYSC_pwrite64 fs/read_write.c:627 [inline]
 [<ffffffff81521c4f>] SyS_pwrite64+0x13f/0x170 fs/read_write.c:614
 [<ffffffff81119cb9>] sys32_pwrite+0x39/0x50 arch/x86/ia32/sys_ia32.c:186
 [<ffffffff81006d91>] do_syscall_32_irqs_on arch/x86/entry/common.c:392 [inline]
 [<ffffffff81006d91>] do_fast_syscall_32+0x321/0x8a0 arch/x86/entry/common.c:459
 [<ffffffff837752ea>] sysenter_flags_fixed+0xd/0x17
Mem-Info:
active_anon:52378 inactive_anon:45 isolated_anon:0
 active_file:3711 inactive_file:8296 isolated_file:0
 unevictable:0 dirty:118 writeback:0 unstable:0
 slab_reclaimable:6114 slab_unreclaimable:59180
 mapped:23815 shmem:51 pagetables:607 bounce:0
 free:1475081 free_pcp:577 free_cma:0
DMA free:15904kB min:160kB low:200kB high:240kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:15992kB managed:15904kB mlocked:0kB dirty:0kB writeback:0kB mapped:0kB shmem:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB unstable:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? yes
lowmem_reserve[]: 0 2911 6411 6411
DMA32 free:2666776kB min:30608kB low:38260kB high:45912kB active_anon:96460kB inactive_anon:112kB active_file:6464kB inactive_file:19224kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:3129292kB managed:2982732kB mlocked:0kB dirty:188kB writeback:0kB mapped:51044kB shmem:120kB slab_reclaimable:11564kB slab_unreclaimable:106748kB kernel_stack:3168kB pagetables:1352kB unstable:0kB bounce:0kB free_pcp:1296kB local_pcp:612kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no
lowmem_reserve[]: 0 0 3500 3500
Normal free:3217628kB min:36808kB low:46008kB high:55212kB active_anon:113052kB inactive_anon:68kB active_file:8380kB inactive_file:13960kB unevictable:0kB isolated(anon):0kB isolated(file):0kB present:4718592kB managed:3584660kB mlocked:0kB dirty:300kB writeback:0kB mapped:44216kB shmem:84kB slab_reclaimable:12896kB slab_unreclaimable:129988kB kernel_stack:2784kB pagetables:1076kB unstable:0kB bounce:0kB free_pcp:1000kB local_pcp:532kB free_cma:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no
lowmem_reserve[]: 0 0 0 0
DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB
DMA32: 406*4kB (UME) 184*8kB (UM) 142*16kB (UME) 135*32kB (UME) 79*64kB (UM) 21*128kB (UM) 15*256kB (UME) 11*512kB (UM) 40*1024kB (UM) 5*2048kB (M) 632*4096kB (M) = 2666776kB
Normal: 229*4kB (UME) 163*8kB (UME) 147*16kB (UME) 129*32kB (UME) 95*64kB (UME) 25*128kB (UM) 11*256kB (M) 26*512kB (M) 49*1024kB (UME) 4*2048kB (ME) 763*4096kB (M) = 3217724kB
Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB
12065 total pagecache pages
0 pages in swap cache
Swap cache stats: add 0, delete 0, find 0/0
Free swap  = 0kB
Total swap = 0kB
1965969 pages RAM
0 pages HighMem/MovableOnly
320145 pages reserved
binder: 8053:8056 ioctl c0306201 2000a000 returned -14
TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
binder: 8060:8062 ioctl 40046205 3 returned -22
binder: 8053:8056 ioctl c0306201 2000a000 returned -14
binder: 8060:8062 ioctl 40046205 3 returned -22
TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
audit: type=1400 audit(1521758985.238:38): avc:  denied  { create } for  pid=8104 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
audit: type=1400 audit(1521758985.238:39): avc:  denied  { write } for  pid=8104 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
audit: type=1400 audit(1521758985.258:40): avc:  denied  { read } for  pid=8104 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
audit: type=1400 audit(1521758986.008:41): avc:  denied  { create } for  pid=8203 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
audit: type=1400 audit(1521758986.088:42): avc:  denied  { create } for  pid=8203 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
audit: type=1400 audit(1521758986.288:43): avc:  denied  { set_context_mgr } for  pid=8245 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1
binder: 8245:8246 BC_INCREFS_DONE u1c24000000000001 no match
binder: 8245:8246 unknown command 1819811011
binder: 8245:8246 ioctl c0306201 20a94fd0 returned -22
binder: BINDER_SET_CONTEXT_MGR already set
binder: 8245:8246 ioctl 40046207 0 returned -16
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=24 sclass=netlink_audit_socket
audit: type=1400 audit(1521758987.228:44): avc:  denied  { create } for  pid=8411 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=24 sclass=netlink_audit_socket
audit: type=1400 audit(1521758987.268:45): avc:  denied  { create } for  pid=8411 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
audit: type=1400 audit(1521758987.318:46): avc:  denied  { write } for  pid=8411 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1