CFI failure at __traceiter_sched_switch+0x9b/0xd0 include/trace/events/sched.h:222 (target: tp_stub_func+0x0/0x10; expected type: 0xee1f7a69) invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 2586 Comm: syz.7.9916 Tainted: G W syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 include/trace/events/sched.h:222 Code: 80 3c 30 00 74 05 e8 e4 6b 69 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 RSP: 0018:ffffc90000de71b0 EFLAGS: 00010096 RAX: 1ffff1102102f356 RBX: ffff888108179aa8 RCX: ffff888125f46540 RDX: ffff888110889440 RSI: 0000000000000001 RDI: ffffc900012ab000 RBP: ffffc90000de71f0 R08: 0000000000000000 R09: fffffbfff0ee4b9e R10: 00000000b720eca3 R11: 1ffffffff0ee4b9d R12: 0000000000000001 R13: ffff888108179aa8 R14: dffffc0000000000 R15: ffffffff817125b0 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f903c034ab4 CR3: 0000000137c73000 CR4: 00000000003506a0 Call Trace: trace_sched_switch include/trace/events/sched.h:222 [inline] __schedule+0x1263/0x14e0 kernel/sched/core.c:6747 preempt_schedule_common+0x9b/0xf0 kernel/sched/core.c:6919 preempt_schedule+0xa7/0xb0 kernel/sched/core.c:6943 preempt_schedule_thunk+0x16/0x18 arch/x86/entry/thunk_64.S:34 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_unlock+0x5f/0x70 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] zap_pte_range mm/memory.c:1537 [inline] zap_pmd_range mm/memory.c:1596 [inline] zap_pud_range mm/memory.c:1625 [inline] zap_p4d_range mm/memory.c:1646 [inline] unmap_page_range+0x20da/0x2310 mm/memory.c:1667 unmap_single_vma mm/memory.c:1713 [inline] unmap_vmas+0x31c/0x430 mm/memory.c:1753 exit_mmap+0x268/0xb60 mm/mmap.c:3365 __mmput+0x93/0x320 kernel/fork.c:1300 mmput+0x4b/0x150 kernel/fork.c:1323 exit_mm kernel/exit.c:568 [inline] do_exit+0x981/0x2650 kernel/exit.c:873 do_group_exit+0x210/0x2d0 kernel/exit.c:1028 get_signal+0x13b5/0x1520 kernel/signal.c:2889 arch_do_signal_or_restart+0xb0/0x1030 arch/x86/kernel/signal.c:871 exit_to_user_mode_loop+0x7a/0xb0 kernel/entry/common.c:174 exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline] syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:303 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7fb0ab18ebe9 Code: Unable to access opcode bytes at 0x7fb0ab18ebbf. RSP: 002b:00007fb0ac05e038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: 0000000000010106 RBX: 00007fb0ab3c6090 RCX: 00007fb0ab18ebe9 RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003 RBP: 00007fb0ab211e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fb0ab3c6128 R14: 00007fb0ab3c6090 R15: 00007ffe79937cb8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 include/trace/events/sched.h:222 Code: 80 3c 30 00 74 05 e8 e4 6b 69 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 RSP: 0018:ffffc90000de71b0 EFLAGS: 00010096 RAX: 1ffff1102102f356 RBX: ffff888108179aa8 RCX: ffff888125f46540 RDX: ffff888110889440 RSI: 0000000000000001 RDI: ffffc900012ab000 RBP: ffffc90000de71f0 R08: 0000000000000000 R09: fffffbfff0ee4b9e R10: 00000000b720eca3 R11: 1ffffffff0ee4b9d R12: 0000000000000001 R13: ffff888108179aa8 R14: dffffc0000000000 R15: ffffffff817125b0 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f903c034ab4 CR3: 0000000137c73000 CR4: 00000000003506a0