CFI failure at __traceiter_sched_switch+0x9b/0xd0 include/trace/events/sched.h:222 (target: tp_stub_func+0x0/0x10; expected type: 0xee1f7a69) invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 22426 Comm: syz.9.17655 Not tainted 6.1.141-syzkaller-00041-gde932537be34 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 include/trace/events/sched.h:222 Code: 80 3c 30 00 74 05 e8 04 57 69 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 RSP: 0018:ffffc90000e565b0 EFLAGS: 00010096 RAX: 1ffff1102180764c RBX: ffff88810c03b258 RCX: ffff8881003a6540 RDX: ffff8881b0de6540 RSI: 0000000000000001 RDI: ffffc90000d8a000 RBP: ffffc90000e565f0 R08: 0000000000000000 R09: 0000000000000003 R10: 00000000b720eca3 R11: 1ffff920001cac54 R12: 0000000000000001 R13: ffff88810c03b258 R14: dffffc0000000000 R15: ffffffff817113c0 FS: 00007f7cfc7de6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000031 CR3: 00000001dfaca000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: trace_sched_switch include/trace/events/sched.h:222 [inline] __schedule+0x1263/0x14e0 kernel/sched/core.c:6747 preempt_schedule_irq+0x9b/0x110 kernel/sched/core.c:7062 raw_irqentry_exit_cond_resched+0x29/0x30 kernel/entry/common.c:396 irqentry_exit+0x37/0x40 kernel/entry/common.c:439 sysvec_apic_timer_interrupt+0x64/0xc0 arch/x86/kernel/apic/apic.c:1118 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:691 RIP: 0010:save_stack+0x25/0x1e0 mm/page_owner.c:130 Code: 80 00 00 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec 00 01 00 00 89 7c 24 1c 65 48 8b 04 25 28 00 00 00 <48> 89 84 24 e0 00 00 00 49 bc 00 00 00 00 00 fc ff df 48 c7 44 24 RSP: 0018:ffffc90000e568a0 EFLAGS: 00000286 RAX: 119648652d181900 RBX: 0000000000100cc0 RCX: 0000000000080000 RDX: ffffc9000a6bd000 RSI: 0000000000001fa0 RDI: 0000000000100cc0 RBP: ffffc90000e569c8 R08: dffffc0000000000 R09: ffffed1033e7de00 R10: fffff94000cf9f7f R11: 1ffffd4000cf9f7e R12: ffffea00067cfbf4 R13: 0000000000000001 R14: 0000000000000000 R15: ffffea00067cfbc0 __set_page_owner+0x1f/0x60 mm/page_owner.c:210 set_page_owner include/linux/page_owner.h:33 [inline] post_alloc_hook+0x1f5/0x210 mm/page_alloc.c:2637 prep_new_page+0x1c/0x110 mm/page_alloc.c:2644 get_page_from_freelist+0x2c7b/0x2cf0 mm/page_alloc.c:4539 __alloc_pages+0x19e/0x3a0 mm/page_alloc.c:5850 __alloc_pages_node include/linux/gfp.h:236 [inline] alloc_pages_node include/linux/gfp.h:259 [inline] alloc_pages include/linux/gfp.h:270 [inline] __get_free_pages+0xe/0x30 mm/page_alloc.c:5900 kasan_populate_vmalloc_pte+0x29/0x120 mm/kasan/shadow.c:271 apply_to_pte_range mm/memory.c:2687 [inline] apply_to_pmd_range mm/memory.c:2731 [inline] apply_to_pud_range mm/memory.c:2767 [inline] apply_to_p4d_range mm/memory.c:2803 [inline] __apply_to_page_range+0x8c1/0xc00 mm/memory.c:2839 apply_to_page_range+0x3b/0x50 mm/memory.c:2858 kasan_populate_vmalloc+0x60/0x70 mm/kasan/shadow.c:318 alloc_vmap_area+0x173e/0x1870 mm/vmalloc.c:1653 __get_vm_area_node+0x160/0x360 mm/vmalloc.c:2512 __vmalloc_node_range+0x326/0x13d0 mm/vmalloc.c:3206 kvmalloc_node+0xf5/0x480 mm/util.c:618 kvmalloc include/linux/slab.h:716 [inline] kvmalloc_array include/linux/slab.h:734 [inline] kvcalloc include/linux/slab.h:739 [inline] check_btf_line kernel/bpf/verifier.c:11400 [inline] check_btf_info kernel/bpf/verifier.c:11596 [inline] bpf_check+0xb29e/0x10d50 kernel/bpf/verifier.c:15547 bpf_prog_load+0x1071/0x15a0 kernel/bpf/syscall.c:2621 __sys_bpf+0x504/0x780 kernel/bpf/syscall.c:5002 __do_sys_bpf kernel/bpf/syscall.c:5106 [inline] __se_sys_bpf kernel/bpf/syscall.c:5104 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5104 x64_sys_call+0x488/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:322 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f7cfc98e9a9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f7cfc7de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f7cfcbb6080 RCX: 00007f7cfc98e9a9 RDX: 000000000000006d RSI: 00002000000000c0 RDI: 0000000000000005 RBP: 00007f7cfca10d69 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f7cfcbb6080 R15: 00007ffdc3ba70a8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 include/trace/events/sched.h:222 Code: 80 3c 30 00 74 05 e8 04 57 69 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 RSP: 0018:ffffc90000e565b0 EFLAGS: 00010096 RAX: 1ffff1102180764c RBX: ffff88810c03b258 RCX: ffff8881003a6540 RDX: ffff8881b0de6540 RSI: 0000000000000001 RDI: ffffc90000d8a000 RBP: ffffc90000e565f0 R08: 0000000000000000 R09: 0000000000000003 R10: 00000000b720eca3 R11: 1ffff920001cac54 R12: 0000000000000001 R13: ffff88810c03b258 R14: dffffc0000000000 R15: ffffffff817113c0 FS: 00007f7cfc7de6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000031 CR3: 00000001dfaca000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess): 0: 80 00 00 addb $0x0,(%rax) 3: 00 00 add %al,(%rax) 5: 55 push %rbp 6: 48 89 e5 mov %rsp,%rbp 9: 41 57 push %r15 b: 41 56 push %r14 d: 41 55 push %r13 f: 41 54 push %r12 11: 53 push %rbx 12: 48 83 e4 e0 and $0xffffffffffffffe0,%rsp 16: 48 81 ec 00 01 00 00 sub $0x100,%rsp 1d: 89 7c 24 1c mov %edi,0x1c(%rsp) 21: 65 48 8b 04 25 28 00 mov %gs:0x28,%rax 28: 00 00 * 2a: 48 89 84 24 e0 00 00 mov %rax,0xe0(%rsp) <-- trapping instruction 31: 00 32: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 39: fc ff df 3c: 48 rex.W 3d: c7 .byte 0xc7 3e: 44 rex.R 3f: 24 .byte 0x24