last executing test programs:
kernel console output (not intermixed with test programs):
Warning: Permanently added '10.128.1.49' (ED25519) to the list of known hosts.
[ 40.787373][ T29] audit: type=1400 audit(1776981502.597:62): avc: denied { mounton } for pid=2960 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 40.811380][ T29] audit: type=1400 audit(1776981502.627:63): avc: denied { mount } for pid=2960 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 40.814593][ T2960] cgroup: Unknown subsys name 'net'
[ 40.841523][ T29] audit: type=1400 audit(1776981502.657:64): avc: denied { unmount } for pid=2960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 40.993668][ T2960] cgroup: Unknown subsys name 'cpuset'
[ 41.002592][ T2960] cgroup: Unknown subsys name 'rlimit'
[ 41.143345][ T2956] BUG: sleeping function called from invalid context at mm/memory.c:2007
[ 41.152049][ T2956] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 2956, name: udevd
[ 41.160940][ T2956] preempt_count: 0, expected: 0
[ 41.168531][ T2956] RCU nest depth: 1, expected: 0
[ 41.173661][ T2956] 2 locks held by udevd/2956:
[ 41.178551][ T2956] #0: ffff888122c48f38 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0x124/0xa10
[ 41.187775][ T2956] #1: ffffffff896ddaa0 (rcu_read_lock){....}-{1:3}, at: __pte_offset_map+0x2f/0x300
[ 41.197661][ T2956] CPU: 1 UID: 0 PID: 2956 Comm: udevd Not tainted syzkaller #0 PREEMPT(full)
[ 41.197694][ T2956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
[ 41.197711][ T2956] Call Trace:
[ 41.197720][ T2956]
[ 41.197731][ T2956] dump_stack_lvl+0x100/0x190
[ 41.197774][ T2956] __might_resched.cold+0x1ec/0x232
[ 41.197817][ T2956] ? __pfx___might_resched+0x10/0x10
[ 41.197851][ T2956] ? __zap_vma_range+0x1f78/0x41f0
[ 41.197896][ T2956] __zap_vma_range+0xad0/0x41f0
[ 41.197973][ T2956] ? __pfx___zap_vma_range+0x10/0x10
[ 41.198022][ T2956] ? find_held_lock+0x2b/0x80
[ 41.198077][ T2956] unmap_vmas+0x299/0x5f0
[ 41.198123][ T2956] ? __pfx_unmap_vmas+0x10/0x10
[ 41.198165][ T2956] ? mas_next_slot+0x10a3/0x1960
[ 41.198225][ T2956] exit_mmap+0x1ef/0xa10
[ 41.198270][ T2956] ? __pfx_exit_mmap+0x10/0x10
[ 41.198309][ T2956] ? rcu_is_watching+0x12/0xc0
[ 41.198358][ T2956] ? uprobe_clear_state+0x5f/0x260
[ 41.198410][ T2956] ? uprobe_clear_state+0x5f/0x260
[ 41.198487][ T2956] ? arch_uprobe_clear_state+0x107/0x150
[ 41.198529][ T2956] mmput+0xe0/0x430
[ 41.198574][ T2956] do_exit+0x833/0x2a60
[ 41.198612][ T2956] ? do_raw_spin_lock+0x128/0x260
[ 41.198649][ T2956] ? __pfx_do_exit+0x10/0x10
[ 41.198679][ T2956] ? do_group_exit+0x1bd/0x2a0
[ 41.198713][ T2956] ? rcu_is_watching+0x12/0xc0
[ 41.198760][ T2956] do_group_exit+0xd5/0x2a0
[ 41.198798][ T2956] __x64_sys_exit_group+0x3e/0x50
[ 41.198833][ T2956] x64_sys_call+0x102c/0x1530
[ 41.198867][ T2956] do_syscall_64+0x10b/0x7f0
[ 41.198895][ T2956] ? irqentry_exit+0xe5/0x6c0
[ 41.198943][ T2956] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 41.198974][ T2956] RIP: 0033:0x7fa02b30b6c5
[ 41.198998][ T2956] Code: Unable to access opcode bytes at 0x7fa02b30b69b.
[ 41.199010][ T2956] RSP: 002b:00007ffc6e029de8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 41.199036][ T2956] RAX: ffffffffffffffda RBX: 000055ca75bc08c0 RCX: 00007fa02b30b6c5
[ 41.199054][ T2956] RDX: 00000000000000e7 RSI: fffffffffffffe68 RDI: 0000000000000000
[ 41.199071][ T2956] RBP: 000055ca759072c0 R08: 0000000000000000 R09: 0000000000000000
[ 41.199088][ T2956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 41.199104][ T2956] R13: 00007ffc6e029e30 R14: 0000000000000000 R15: 0000000000000000
[ 41.199142][ T2956]
[ 41.248847][ T29] audit: type=1400 audit(1776981503.017:65): avc: denied { setattr } for pid=2960 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 41.256925][ T2956]
[ 41.281070][ T29] audit: type=1400 audit(1776981503.017:66): avc: denied { mounton } for pid=2960 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 41.284611][ T2956] =============================
[ 41.284621][ T2956] [ BUG: Invalid wait context ]
[ 41.284634][ T2956] syzkaller #0 Tainted: G W
[ 41.289419][ T29] audit: type=1400 audit(1776981503.017:67): avc: denied { mount } for pid=2960 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[ 41.294505][ T2956] -----------------------------
[ 41.294515][ T2956] udevd/2956 is trying to lock:
[ 41.294529][ T2956] ffff888122c48f38
[ 41.300598][ T2962] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 41.305328][ T2956] (&mm->mmap_lock
[ 41.309489][ T29] audit: type=1400 audit(1776981503.067:68): avc: denied { relabelto } for pid=2962 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 41.313285][ T2956] ){++++}-{4:4}, at: exit_mmap+0x22c/0xa10
[ 41.313339][ T2956] other info that might help us debug this:
[ 41.313349][ T2956] context-{5:5}
[ 41.319240][ T29] audit: type=1400 audit(1776981503.137:69): avc: denied { write } for pid=2962 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 41.322952][ T2956] 1 lock held by udevd/2956:
[ 41.322971][ T2956] #0: ffffffff896ddaa0 (rcu_read_lock){....}-{1:3}, at: __pte_offset_map+0x2f/0x300
[ 41.619382][ T2956] stack backtrace:
[ 41.623102][ T2956] CPU: 1 UID: 0 PID: 2956 Comm: udevd Tainted: G W syzkaller #0 PREEMPT(full)
[ 41.623127][ T2956] Tainted: [W]=WARN
[ 41.623133][ T2956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
[ 41.623142][ T2956] Call Trace:
[ 41.623150][ T2956]
[ 41.623157][ T2956] dump_stack_lvl+0x100/0x190
[ 41.623181][ T2956] __lock_acquire+0xfa4/0x2630
[ 41.623201][ T2956] ? __lock_acquire+0x4a5/0x2630
[ 41.623220][ T2956] lock_acquire+0x1b1/0x370
[ 41.623238][ T2956] ? exit_mmap+0x22c/0xa10
[ 41.623262][ T2956] ? __pfx___might_resched+0x10/0x10
[ 41.623284][ T2956] down_write+0x8b/0x1f0
[ 41.623300][ T2956] ? exit_mmap+0x22c/0xa10
[ 41.623323][ T2956] ? __pfx_down_write+0x10/0x10
[ 41.623340][ T2956] exit_mmap+0x22c/0xa10
[ 41.623364][ T2956] ? __pfx_exit_mmap+0x10/0x10
[ 41.623392][ T2956] ? rcu_is_watching+0x12/0xc0
[ 41.623417][ T2956] ? uprobe_clear_state+0x5f/0x260
[ 41.623443][ T2956] ? uprobe_clear_state+0x5f/0x260
[ 41.623474][ T2956] ? arch_uprobe_clear_state+0x107/0x150
[ 41.623495][ T2956] mmput+0xe0/0x430
[ 41.623520][ T2956] do_exit+0x833/0x2a60
[ 41.623539][ T2956] ? do_raw_spin_lock+0x128/0x260
[ 41.623561][ T2956] ? __pfx_do_exit+0x10/0x10
[ 41.623578][ T2956] ? do_group_exit+0x1bd/0x2a0
[ 41.623597][ T2956] ? rcu_is_watching+0x12/0xc0
[ 41.623621][ T2956] do_group_exit+0xd5/0x2a0
[ 41.623640][ T2956] __x64_sys_exit_group+0x3e/0x50
[ 41.623660][ T2956] x64_sys_call+0x102c/0x1530
[ 41.623676][ T2956] do_syscall_64+0x10b/0x7f0
[ 41.623693][ T2956] ? irqentry_exit+0xe5/0x6c0
[ 41.623719][ T2956] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 41.623737][ T2956] RIP: 0033:0x7fa02b30b6c5
[ 41.623750][ T2956] Code: Unable to access opcode bytes at 0x7fa02b30b69b.
Setting up swapspace version 1, size = 127995904 bytes
[ 41.623757][ T2956] RSP: 002b:00007ffc6e029de8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 41.623773][ T2956] RAX: ffffffffffffffda RBX: 000055ca75bc08c0 RCX: 00007fa02b30b6c5
[ 41.623784][ T2956] RDX: 00000000000000e7 RSI: fffffffffffffe68 RDI: 0000000000000000
[ 41.623794][ T2956] RBP: 000055ca759072c0 R08: 0000000000000000 R09: 0000000000000000
[ 41.623804][ T2956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 41.623814][ T2956] R13: 00007ffc6e029e30 R14: 0000000000000000 R15: 0000000000000000
[ 41.623827][ T2956]
[ 41.864789][ T29] audit: type=1400 audit(1776981503.677:70): avc: denied { read } for pid=2960 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 41.890488][ T29] audit: type=1400 audit(1776981503.677:71): avc: denied { open } for pid=2960 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 41.890903][ T2960] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k