last executing test programs:
kernel console output (not intermixed with test programs):
[ 44.038439][ T40] audit: type=1400 audit(1777450746.139:60): avc: denied { rlimitinh } for pid=5634 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 44.046735][ T40] audit: type=1400 audit(1777450746.139:61): avc: denied { siginh } for pid=5634 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
Warning: Permanently added '[localhost]:8518' (ED25519) to the list of known hosts.
[ 45.684898][ T40] audit: type=1400 audit(1777450747.809:62): avc: denied { name_bind } for pid=5641 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[ 45.713425][ T40] audit: type=1400 audit(1777450747.839:63): avc: denied { execute } for pid=5642 comm="sh" name="syz-executor" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[ 45.720954][ T40] audit: type=1400 audit(1777450747.839:64): avc: denied { execute_no_trans } for pid=5642 comm="sh" path="/syz-executor" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[ 47.969915][ T40] audit: type=1400 audit(1777450750.099:65): avc: denied { mounton } for pid=5642 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 47.981338][ T40] audit: type=1400 audit(1777450750.109:66): avc: denied { mount } for pid=5642 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 47.984858][ T5642] cgroup: Unknown subsys name 'net'
[ 48.159995][ T5642] cgroup: Unknown subsys name 'cpuset'
[ 48.166136][ T5642] cgroup: Unknown subsys name 'rlimit'
[ 48.302235][ T5677] BUG: sleeping function called from invalid context at mm/mmu_gather.c:142
[ 48.305132][ T5677] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 5677, name: rm
[ 48.308217][ T5677] preempt_count: 0, expected: 0
[ 48.309793][ T5677] RCU nest depth: 1, expected: 0
[ 48.311383][ T5677] 2 locks held by rm/5677:
[ 48.312865][ T5677] #0: ffff888022c20338 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0x22c/0xa10
[ 48.315617][ T5677] #1: ffffffff8e7e54e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire.constprop.0+0x7/0x30
[ 48.318972][ T5677] CPU: 1 UID: 0 PID: 5677 Comm: rm Not tainted syzkaller #0 PREEMPT(full)
[ 48.318985][ T5677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.318991][ T5677] Call Trace:
[ 48.318996][ T5677]
[ 48.319000][ T5677] dump_stack_lvl+0x100/0x190
[ 48.319028][ T5677] __might_resched.cold+0x1ec/0x232
[ 48.319043][ T5677] ? __pfx___might_resched+0x10/0x10
[ 48.319062][ T5677] __tlb_batch_free_encoded_pages+0x11e/0x280
[ 48.319079][ T5677] tlb_finish_mmu+0x1b0/0x810
[ 48.319094][ T5677] exit_mmap+0x454/0xa10
[ 48.319108][ T5677] ? __pfx_exit_mmap+0x10/0x10
[ 48.319120][ T5677] ? trace_contention_end+0x122/0x170
[ 48.319136][ T5677] ? uprobe_clear_state+0x5f/0x260
[ 48.319152][ T5677] ? uprobe_clear_state+0x5f/0x260
[ 48.319171][ T5677] ? __lock_acquire+0x4a5/0x2630
[ 48.319189][ T5677] ? arch_uprobe_clear_state+0x107/0x150
[ 48.319206][ T5677] __mmput+0x12a/0x410
[ 48.319222][ T5677] mmput+0x67/0x80
[ 48.319237][ T5677] do_exit+0x833/0x2a60
[ 48.319250][ T5677] ? do_raw_spin_lock+0x128/0x260
[ 48.319265][ T5677] ? __pfx_do_exit+0x10/0x10
[ 48.319275][ T5677] ? do_group_exit+0x1bd/0x2a0
[ 48.319286][ T5677] ? rcu_is_watching+0x12/0xc0
[ 48.319304][ T5677] do_group_exit+0xd5/0x2a0
[ 48.319317][ T5677] __x64_sys_exit_group+0x3e/0x50
[ 48.319328][ T5677] x64_sys_call+0x102c/0x1530
[ 48.319342][ T5677] do_syscall_64+0x10b/0xf80
[ 48.319354][ T5677] ? clear_bhb_loop+0x40/0x90
[ 48.319368][ T5677] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 48.319378][ T5677] RIP: 0033:0x7f9fc102d6c5
Setting up swapspace version 1, size = 127995904 bytes
[ 48.319387][ T5677] Code: Unable to access opcode bytes at 0x7f9fc102d69b.
[ 48.319392][ T5677] RSP: 002b:00007ffd51104bf8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7
[ 48.319401][ T5677] RAX: ffffffffffffffda RBX: 00007f9fc112efe8 RCX: 00007f9fc102d6c5
[ 48.319407][ T5677] RDX: 00000000000000e7 RSI: ffffffffffffff88 RDI: 0000000000000000
[ 48.319413][ T5677] RBP: 0000000000000001 R08: 00007ffd51104b88 R09: 0000000000000000
[ 48.319419][ T5677] R10: 00007ffd51104a20 R11: 0000000000000202 R12: 0000000000000000
[ 48.319425][ T5677] R13: 0000000000000000 R14: 00007f9fc112d680 R15: 00007f9fc112f000
[ 48.319438][ T5677]
[ 48.320811][ T5677]
[ 48.361322][ T5679] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 48.361747][ T5677] ====================================
[ 48.395489][ T5677] WARNING: rm/5677 still has locks held!
[ 48.397358][ T5677] syzkaller #0 Tainted: G W
[ 48.399254][ T5677] ------------------------------------
[ 48.401006][ T5677] 1 lock held by rm/5677:
[ 48.402397][ T5677] #0: ffffffff8e7e54e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire.constprop.0+0x7/0x30
[ 48.405600][ T5677]
[ 48.405600][ T5677] stack backtrace:
[ 48.407535][ T5677] CPU: 1 UID: 0 PID: 5677 Comm: rm Tainted: G W syzkaller #0 PREEMPT(full)
[ 48.407551][ T5677] Tainted: [W]=WARN
[ 48.407554][ T5677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 48.407561][ T5677] Call Trace:
[ 48.407565][ T5677]
[ 48.407569][ T5677] dump_stack_lvl+0x100/0x190
[ 48.407583][ T5677] debug_check_no_locks_held+0x90/0xa0
[ 48.407595][ T5677] do_exit+0x13ea/0x2a60
[ 48.407606][ T5677] ? do_raw_spin_lock+0x128/0x260
[ 48.407621][ T5677] ? __pfx_do_exit+0x10/0x10
[ 48.407630][ T5677] ? do_group_exit+0x1bd/0x2a0
[ 48.407641][ T5677] ? rcu_is_watching+0x12/0xc0
[ 48.407657][ T5677] do_group_exit+0xd5/0x2a0
[ 48.407667][ T5677] __x64_sys_exit_group+0x3e/0x50
[ 48.407678][ T5677] x64_sys_call+0x102c/0x1530
[ 48.407692][ T5677] do_syscall_64+0x10b/0xf80
[ 48.407704][ T5677] ? clear_bhb_loop+0x40/0x90
[ 48.407715][ T5677] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 48.407725][ T5677] RIP: 0033:0x7f9fc102d6c5
[ 48.407733][ T5677] Code: Unable to access opcode bytes at 0x7f9fc102d69b.
[ 48.407737][ T5677] RSP: 002b:00007ffd51104bf8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7
[ 48.407747][ T5677] RAX: ffffffffffffffda RBX: 00007f9fc112efe8 RCX: 00007f9fc102d6c5
[ 48.407754][ T5677] RDX: 00000000000000e7 RSI: ffffffffffffff88 RDI: 0000000000000000
[ 48.407760][ T5677] RBP: 0000000000000001 R08: 00007ffd51104b88 R09: 0000000000000000
[ 48.407765][ T5677] R10: 00007ffd51104a20 R11: 0000000000000202 R12: 0000000000000000
[ 48.407771][ T5677] R13: 0000000000000000 R14: 00007f9fc112d680 R15: 00007f9fc112f000
[ 48.407779][ T5677]
[ 48.859050][ T5642] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 51.085317][ T40] kauditd_printk_skb: 18 callbacks suppressed
[ 51.085332][ T40] audit: type=1400 audit(1777450753.209:85): avc: denied { execmem } for pid=5722 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1