================================================ [ BUG: lock held when returning to user space! ] 4.9.124-g09eb2ba #31 Not tainted ------------------------------------------------ syz-executor0/28613 is leaving the kernel with locks still held! 1 lock held by syz-executor0/28613: #0: (&fi->mutex){+.+.+.}, at: [] fuse_lock_inode+0xa2/0xd0 fs/fuse/inode.c:362 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=28661 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25964 sclass=netlink_route_socket pig=28661 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23643 sclass=netlink_route_socket pig=28661 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=28718 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25964 sclass=netlink_route_socket pig=28718 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23643 sclass=netlink_route_socket pig=28718 comm=syz-executor4 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=28781 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25964 sclass=netlink_route_socket pig=28781 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23643 sclass=netlink_route_socket pig=28781 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=28832 comm=syz-executor4 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. selinux_nlmsg_perm: 8 callbacks suppressed SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=29026 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=29061 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=29089 comm=syz-executor4 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=29208 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=29223 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29231 sclass=netlink_route_socket pig=29256 comm=syz-executor4