CFI failure at __traceiter_kfree+0x34/0x50 include/trace/events/kmem.h:95 (target: tp_stub_func+0x0/0x10; expected type: 0x8682d211) invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 29152 Comm: syz.9.7591 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:__traceiter_kfree+0x34/0x50 include/trace/events/kmem.h:95 Code: 8b 3d 80 53 ca 05 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba ef 2d 7d 79 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f RSP: 0018:ffffc900001b0ba8 EFLAGS: 00010213 RAX: ffffffff81714610 RBX: 0000000000000000 RCX: dbcc7425b325d400 RDX: 0000000000000000 RSI: ffffffff840c4112 RDI: ffffc900055fd000 RBP: ffffc900001b0bc0 R08: 1ffff11023a9cab8 R09: 1ffff11023a9cab8 R10: 000000001ebd94fb R11: 1ffff1103ee271c2 R12: 1ffff11022467c70 R13: ffff88811233e4a0 R14: ffffffff840c4112 R15: ffff8881379e2540 FS: 00007f2c019f76c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7601d750e0 CR3: 000000013052d000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: trace_kfree include/trace/events/kmem.h:95 [inline] kfree+0xc9/0xf0 mm/slab_common.c:977 deferred_put_nlk_sk+0x42/0xe0 net/netlink/af_netlink.c:716 rcu_do_batch+0x515/0xb90 kernel/rcu/tree.c:2297 rcu_core+0x5a5/0xe70 kernel/rcu/tree.c:2557 rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2574 handle_softirqs+0x1d7/0x600 kernel/softirq.c:642 __do_softirq kernel/softirq.c:680 [inline] invoke_softirq kernel/softirq.c:497 [inline] __irq_exit_rcu+0x52/0xf0 kernel/softirq.c:729 irq_exit_rcu+0x9/0x10 kernel/softirq.c:741 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1118 [inline] sysvec_apic_timer_interrupt+0xa9/0xc0 arch/x86/kernel/apic/apic.c:1118 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:691 RIP: 0010:console_emit_next_record+0x9e3/0xbc0 kernel/printk/printk.c:2797 Code: de 48 81 e6 00 02 00 00 31 ff e8 98 4a 19 00 48 81 e3 00 02 00 00 75 07 e8 ca 45 19 00 eb 06 e8 c3 45 19 00 fb 0f b6 5c 24 07 <48> c7 84 24 80 00 00 00 0e 36 e0 45 4b c7 04 2e 00 00 00 00 4b c7 RSP: 0018:ffffc90005247260 EFLAGS: 00000283 RAX: ffffffff8156e3fd RBX: 0000000000000001 RCX: 0000000000080000 RDX: ffffc90009b29000 RSI: 00000000000078bb RDI: 00000000000078bc RBP: ffffc90005247470 R08: 0000000000000004 R09: 0000000000000003 R10: fffff52000a48e3c R11: 1ffff92000a48e3c R12: ffffc900052474bf R13: dffffc0000000000 R14: 1ffff92000a48e5c R15: 000000000000007d console_flush_all kernel/printk/printk.c:-1 [inline] console_unlock+0x23d/0x550 kernel/printk/printk.c:2917 vprintk_emit+0x14d/0x410 kernel/printk/printk.c:2308 vprintk_default+0x26/0x30 kernel/printk/printk.c:2323 vprintk+0x7a/0x80 kernel/printk/printk_safe.c:45 _printk+0xcc/0x118 kernel/printk/printk.c:2333 report_cfi_failure+0x6b/0x80 kernel/cfi.c:14 handle_cfi_failure+0x238/0x290 arch/x86/kernel/cfi.c:-1 handle_bug+0x4b/0x80 arch/x86/kernel/traps.c:325 exc_invalid_op+0x1b/0x50 arch/x86/kernel/traps.c:345 asm_exc_invalid_op+0x1b/0x20 arch/x86/include/asm/idtentry.h:606 RIP: 0010:__traceiter_kfree+0x34/0x50 include/trace/events/kmem.h:95 Code: 8b 3d 80 53 ca 05 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba ef 2d 7d 79 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f RSP: 0018:ffffc90005247a18 EFLAGS: 00010213 RAX: ffffffff81714610 RBX: 0000000000000000 RCX: dbcc7425b325d400 RDX: 0000000000000000 RSI: ffffffff83e0d891 RDI: ffffc900055fd000 RBP: ffffc90005247a30 R08: dffffc0000000000 R09: fffff52000a48ecd R10: 000000001ebd94fb R11: 1ffff92000a48ecc R12: ffffc90005247d00 R13: dffffc0000000000 R14: ffffffff83e0d891 R15: ffff8881379e2540 trace_kfree include/trace/events/kmem.h:95 [inline] kfree+0xc9/0xf0 mm/slab_common.c:977 ___sys_recvmsg+0x1c1/0x510 net/socket.c:2771 do_recvmmsg+0x359/0x7a0 net/socket.c:2864 __sys_recvmmsg net/socket.c:2943 [inline] __do_sys_recvmmsg net/socket.c:2966 [inline] __se_sys_recvmmsg net/socket.c:2959 [inline] __x64_sys_recvmmsg+0x18d/0x240 net/socket.c:2959 x64_sys_call+0x3e7/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:300 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f2c02f8f749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f2c019f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007f2c031e6090 RCX: 00007f2c02f8f749 RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000004 RBP: 00007f2c03013f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f2c031e6128 R14: 00007f2c031e6090 R15: 00007ffc5167d6b8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__traceiter_kfree+0x34/0x50 include/trace/events/kmem.h:95 Code: 8b 3d 80 53 ca 05 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba ef 2d 7d 79 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f RSP: 0018:ffffc900001b0ba8 EFLAGS: 00010213 RAX: ffffffff81714610 RBX: 0000000000000000 RCX: dbcc7425b325d400 RDX: 0000000000000000 RSI: ffffffff840c4112 RDI: ffffc900055fd000 RBP: ffffc900001b0bc0 R08: 1ffff11023a9cab8 R09: 1ffff11023a9cab8 R10: 000000001ebd94fb R11: 1ffff1103ee271c2 R12: 1ffff11022467c70 R13: ffff88811233e4a0 R14: ffffffff840c4112 R15: ffff8881379e2540 FS: 00007f2c019f76c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7601d750e0 CR3: 000000013052d000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 48 81 e6 00 02 00 00 and $0x200,%rsi 7: 31 ff xor %edi,%edi 9: e8 98 4a 19 00 call 0x194aa6 e: 48 81 e3 00 02 00 00 and $0x200,%rbx 15: 75 07 jne 0x1e 17: e8 ca 45 19 00 call 0x1945e6 1c: eb 06 jmp 0x24 1e: e8 c3 45 19 00 call 0x1945e6 23: fb sti 24: 0f b6 5c 24 07 movzbl 0x7(%rsp),%ebx * 29: 48 c7 84 24 80 00 00 movq $0x45e0360e,0x80(%rsp) <-- trapping instruction 30: 00 0e 36 e0 45 35: 4b c7 04 2e 00 00 00 movq $0x0,(%r14,%r13,1) 3c: 00 3d: 4b rex.WXB 3e: c7 .byte 0xc7