last executing test programs:
kernel console output (not intermixed with test programs):
Warning: Permanently added '[localhost]:32264' (ED25519) to the list of known hosts.
[ 45.814461][ T40] audit: type=1400 audit(1777187404.187:62): avc: denied { name_bind } for pid=5648 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[ 45.852355][ T40] audit: type=1400 audit(1777187404.227:63): avc: denied { execute } for pid=5649 comm="sh" name="syz-executor" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[ 45.861698][ T40] audit: type=1400 audit(1777187404.237:64): avc: denied { execute_no_trans } for pid=5649 comm="sh" path="/syz-executor" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[ 47.983495][ T40] audit: type=1400 audit(1777187406.357:65): avc: denied { mounton } for pid=5649 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 47.993482][ T40] audit: type=1400 audit(1777187406.367:66): avc: denied { mount } for pid=5649 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 48.005987][ T5649] cgroup: Unknown subsys name 'net'
[ 48.158683][ T5649] cgroup: Unknown subsys name 'cpuset'
[ 48.165248][ T5649] cgroup: Unknown subsys name 'rlimit'
[ 48.168847][ T5704] BUG: sleeping function called from invalid context at mm/mmu_gather.c:142
[ 48.172527][ T5704] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 5704, name: cmp
[ 48.176389][ T5704] preempt_count: 0, expected: 0
[ 48.178037][ T5704] RCU nest depth: 1, expected: 0
[ 48.179624][ T5704] 2 locks held by cmp/5704:
[ 48.181066][ T5704] #0: ffff88803d5be538 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0x22c/0xa10
[ 48.184000][ T5704] #1: ffffffff8e7e54e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire.constprop.0+0x7/0x30
[ 48.187332][ T5704] CPU: 1 UID: 0 PID: 5704 Comm: cmp Not tainted syzkaller #0 PREEMPT(full)
[ 48.187345][ T5704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.187352][ T5704] Call Trace:
[ 48.187356][ T5704]
[ 48.187361][ T5704] dump_stack_lvl+0x100/0x190
[ 48.187376][ T5704] __might_resched.cold+0x1ec/0x232
[ 48.187391][ T5704] ? __pfx___might_resched+0x10/0x10
[ 48.187409][ T5704] __tlb_batch_free_encoded_pages+0x11e/0x280
[ 48.187427][ T5704] tlb_finish_mmu+0x1b0/0x810
[ 48.187442][ T5704] exit_mmap+0x454/0xa10
[ 48.187460][ T5704] ? __pfx_exit_mmap+0x10/0x10
[ 48.187473][ T5704] ? trace_contention_end+0x122/0x170
[ 48.187489][ T5704] ? uprobe_clear_state+0x5f/0x260
[ 48.187505][ T5704] ? uprobe_clear_state+0x5f/0x260
[ 48.187525][ T5704] ? __lock_acquire+0x4a5/0x2630
[ 48.187543][ T5704] ? arch_uprobe_clear_state+0x107/0x150
[ 48.187560][ T5704] __mmput+0x12a/0x410
[ 48.187576][ T5704] mmput+0x67/0x80
[ 48.187590][ T5704] do_exit+0x833/0x2a60
[ 48.187603][ T5704] ? do_raw_spin_lock+0x128/0x260
[ 48.187618][ T5704] ? __pfx_do_exit+0x10/0x10
[ 48.187628][ T5704] ? do_group_exit+0x1bd/0x2a0
[ 48.187639][ T5704] ? rcu_is_watching+0x12/0xc0
[ 48.187658][ T5704] do_group_exit+0xd5/0x2a0
[ 48.187670][ T5704] __x64_sys_exit_group+0x3e/0x50
[ 48.187682][ T5704] x64_sys_call+0x102c/0x1530
[ 48.187697][ T5704] do_syscall_64+0x10b/0xf80
[ 48.187709][ T5704] ? clear_bhb_loop+0x40/0x90
[ 48.187721][ T5704] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 48.187732][ T5704] RIP: 0033:0x7fd8f407d6c5
[ 48.187741][ T5704] Code: Unable to access opcode bytes at 0x7fd8f407d69b.
[ 48.187745][ T5704] RSP: 002b:00007ffe687a46e8 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7
[ 48.187754][ T5704] RAX: ffffffffffffffda RBX: 00007fd8f417efe8 RCX: 00007fd8f407d6c5
[ 48.187761][ T5704] RDX: 00000000000000e7 RSI: ffffffffffffff88 RDI: 0000000000000000
[ 48.187767][ T5704] RBP: 0000000000000001 R08: 00007ffe687a4678 R09: 0000000000000000
[ 48.187772][ T5704] R10: 00007ffe687a4510 R11: 0000000000000206 R12: 0000000000000000
[ 48.187778][ T5704] R13: 0000000000000000 R14: 00007fd8f417d680 R15: 00007fd8f417f000
[ 48.187791][ T5704]
[ 48.189146][ T5704]
[ 48.258621][ T5704] ====================================
[ 48.260352][ T5704] WARNING: cmp/5704 still has locks held!
[ 48.262167][ T5704] syzkaller #0 Tainted: G W
[ 48.264052][ T5704] ------------------------------------
[ 48.265830][ T5704] 1 lock held by cmp/5704:
[ 48.267244][ T5704] #0: ffffffff8e7e54e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire.constprop.0+0x7/0x30
[ 48.270513][ T5704]
[ 48.270513][ T5704] stack backtrace:
[ 48.272372][ T5704] CPU: 1 UID: 0 PID: 5704 Comm: cmp Tainted: G W syzkaller #0 PREEMPT(full)
[ 48.272387][ T5704] Tainted: [W]=WARN
[ 48.272390][ T5704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.272396][ T5704] Call Trace:
[ 48.272401][ T5704]
[ 48.272408][ T5704] dump_stack_lvl+0x100/0x190
[ 48.272424][ T5704] debug_check_no_locks_held+0x90/0xa0
[ 48.272436][ T5704] do_exit+0x13ea/0x2a60
[ 48.272448][ T5704] ? do_raw_spin_lock+0x128/0x260
[ 48.272462][ T5704] ? __pfx_do_exit+0x10/0x10
[ 48.272472][ T5704] ? do_group_exit+0x1bd/0x2a0
[ 48.272482][ T5704] ? rcu_is_watching+0x12/0xc0
[ 48.272499][ T5704] do_group_exit+0xd5/0x2a0
[ 48.272509][ T5704] __x64_sys_exit_group+0x3e/0x50
[ 48.272521][ T5704] x64_sys_call+0x102c/0x1530
[ 48.272535][ T5704] do_syscall_64+0x10b/0xf80
[ 48.272546][ T5704] ? clear_bhb_loop+0x40/0x90
[ 48.272557][ T5704] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 48.272567][ T5704] RIP: 0033:0x7fd8f407d6c5
[ 48.272575][ T5704] Code: Unable to access opcode bytes at 0x7fd8f407d69b.
[ 48.272580][ T5704] RSP: 002b:00007ffe687a46e8 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7
[ 48.272590][ T5704] RAX: ffffffffffffffda RBX: 00007fd8f417efe8 RCX: 00007fd8f407d6c5
[ 48.272596][ T5704] RDX: 00000000000000e7 RSI: ffffffffffffff88 RDI: 0000000000000000
[ 48.272602][ T5704] RBP: 0000000000000001 R08: 00007ffe687a4678 R09: 0000000000000000
[ 48.272608][ T5704] R10: 00007ffe687a4510 R11: 0000000000000206 R12: 0000000000000000
[ 48.272613][ T5704] R13: 0000000000000000 R14: 00007fd8f417d680 R15: 00007fd8f417f000
[ 48.272622][ T5704]
[ 48.523249][ T5709] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
Setting up swapspace version 1, size = 127995904 bytes
[ 49.009139][ T5649] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 52.087555][ T40] kauditd_printk_skb: 18 callbacks suppressed
[ 52.087572][ T40] audit: type=1400 audit(1777187410.467:85): avc: denied { execmem } for pid=5721 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1