ucma_write: process 323 (syz-executor.1) changed security contexts after opening file descriptor, this is not allowed. ------------[ cut here ]------------ ODEBUG: free active (active state 1) object type: rcu_head hint: (null) WARNING: CPU: 0 PID: 10911 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 lib/debugobjects.c:325 Kernel panic - not syncing: panic_on_warn set ... CPU: 0 PID: 10911 Comm: syz-executor.2 Not tainted 4.19.75 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 panic+0x263/0x507 kernel/panic.c:185 __warn.cold+0x20/0x4a kernel/panic.c:540 report_bug+0x263/0x2b0 lib/bug.c:186 fixup_bug arch/x86/kernel/traps.c:178 [inline] fixup_bug arch/x86/kernel/traps.c:173 [inline] do_error_trap+0x204/0x360 arch/x86/kernel/traps.c:296 do_invalid_op+0x1b/0x20 arch/x86/kernel/traps.c:316 invalid_op+0x14/0x20 arch/x86/entry/entry_64.S:1037 RIP: 0010:debug_print_object+0x168/0x250 lib/debugobjects.c:325 Code: dd 20 56 82 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 20 56 82 87 48 c7 c7 60 4b 82 87 e8 d6 04 19 fe <0f> 0b 83 05 cb 83 17 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 RSP: 0018:ffff8880502e7600 EFLAGS: 00010082 RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 RDX: 0000000000035822 RSI: ffffffff8155dbd6 RDI: ffffed100a05ceb2 RBP: ffff8880502e7640 R08: ffff88805030c440 R09: ffffed1015d03ee3 R10: ffffed1015d03ee2 R11: ffff8880ae81f717 R12: 0000000000000001 R13: ffffffff8879f200 R14: 0000000000000000 R15: ffff888094c03360 __debug_check_no_obj_freed lib/debugobjects.c:785 [inline] debug_check_no_obj_freed+0x29f/0x464 lib/debugobjects.c:817 kmem_cache_free+0x18f/0x260 mm/slab.c:3764 free_task_struct kernel/fork.c:162 [inline] free_task+0xdd/0x120 kernel/fork.c:416 __put_task_struct+0x20f/0x4c0 kernel/fork.c:689 put_task_struct include/linux/sched/task.h:96 [inline] finish_task_switch+0x52b/0x780 kernel/sched/core.c:2710 context_switch kernel/sched/core.c:2829 [inline] __schedule+0x86e/0x1dc0 kernel/sched/core.c:3474 preempt_schedule_common+0x4f/0xe0 kernel/sched/core.c:3598 preempt_schedule+0x4b/0x60 kernel/sched/core.c:3624 ___preempt_schedule+0x16/0x18 __do_cpuid_ent+0xc32/0x2f20 arch/x86/kvm/cpuid.c:716 do_cpuid_ent arch/x86/kvm/cpuid.c:727 [inline] kvm_dev_ioctl_get_cpuid+0x423/0xbd0 arch/x86/kvm/cpuid.c:818 kvm_arch_dev_ioctl+0x2fd/0x4a0 arch/x86/kvm/x86.c:3066 kvm_dev_ioctl+0x132/0x1710 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3294 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688 ksys_ioctl+0xab/0xd0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710 do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459897 Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007efd3dac7068 EFLAGS: 00000207 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007efd3dac7830 RCX: 0000000000459897 RDX: 00007efd3dac7830 RSI: 00000000c008ae05 RDI: 0000000000000007 RBP: 0000000000000000 R08: 0000000000000090 R09: 00000000000000a8 R10: 00000000000000b3 R11: 0000000000000207 R12: 0000000000000007 R13: 0000000020fe8000 R14: 00000000004dfbe8 R15: 00000000ffffffff ======================================================