CFI failure at __traceiter_kfree+0x34/0x50 include/trace/events/kmem.h:95 (target: tp_stub_func+0x0/0x10; expected type: 0x8682d211)
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 29152 Comm: syz.9.7591 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
RIP: 0010:__traceiter_kfree+0x34/0x50 include/trace/events/kmem.h:95
Code: 8b 3d 80 53 ca 05 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba ef 2d 7d 79 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f
RSP: 0018:ffffc900001b0ba8 EFLAGS: 00010213
RAX: ffffffff81714610 RBX: 0000000000000000 RCX: dbcc7425b325d400
RDX: 0000000000000000 RSI: ffffffff840c4112 RDI: ffffc900055fd000
RBP: ffffc900001b0bc0 R08: 1ffff11023a9cab8 R09: 1ffff11023a9cab8
R10: 000000001ebd94fb R11: 1ffff1103ee271c2 R12: 1ffff11022467c70
R13: ffff88811233e4a0 R14: ffffffff840c4112 R15: ffff8881379e2540
FS: 00007f2c019f76c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7601d750e0 CR3: 000000013052d000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
trace_kfree include/trace/events/kmem.h:95 [inline]
kfree+0xc9/0xf0 mm/slab_common.c:977
deferred_put_nlk_sk+0x42/0xe0 net/netlink/af_netlink.c:716
rcu_do_batch+0x515/0xb90 kernel/rcu/tree.c:2297
rcu_core+0x5a5/0xe70 kernel/rcu/tree.c:2557
rcu_core_si+0x9/0x10 kernel/rcu/tree.c:2574
handle_softirqs+0x1d7/0x600 kernel/softirq.c:642
__do_softirq kernel/softirq.c:680 [inline]
invoke_softirq kernel/softirq.c:497 [inline]
__irq_exit_rcu+0x52/0xf0 kernel/softirq.c:729
irq_exit_rcu+0x9/0x10 kernel/softirq.c:741
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1118 [inline]
sysvec_apic_timer_interrupt+0xa9/0xc0 arch/x86/kernel/apic/apic.c:1118
asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:691
RIP: 0010:console_emit_next_record+0x9e3/0xbc0 kernel/printk/printk.c:2797
Code: de 48 81 e6 00 02 00 00 31 ff e8 98 4a 19 00 48 81 e3 00 02 00 00 75 07 e8 ca 45 19 00 eb 06 e8 c3 45 19 00 fb 0f b6 5c 24 07 <48> c7 84 24 80 00 00 00 0e 36 e0 45 4b c7 04 2e 00 00 00 00 4b c7
RSP: 0018:ffffc90005247260 EFLAGS: 00000283
RAX: ffffffff8156e3fd RBX: 0000000000000001 RCX: 0000000000080000
RDX: ffffc90009b29000 RSI: 00000000000078bb RDI: 00000000000078bc
RBP: ffffc90005247470 R08: 0000000000000004 R09: 0000000000000003
R10: fffff52000a48e3c R11: 1ffff92000a48e3c R12: ffffc900052474bf
R13: dffffc0000000000 R14: 1ffff92000a48e5c R15: 000000000000007d
console_flush_all kernel/printk/printk.c:-1 [inline]
console_unlock+0x23d/0x550 kernel/printk/printk.c:2917
vprintk_emit+0x14d/0x410 kernel/printk/printk.c:2308
vprintk_default+0x26/0x30 kernel/printk/printk.c:2323
vprintk+0x7a/0x80 kernel/printk/printk_safe.c:45
_printk+0xcc/0x118 kernel/printk/printk.c:2333
report_cfi_failure+0x6b/0x80 kernel/cfi.c:14
handle_cfi_failure+0x238/0x290 arch/x86/kernel/cfi.c:-1
handle_bug+0x4b/0x80 arch/x86/kernel/traps.c:325
exc_invalid_op+0x1b/0x50 arch/x86/kernel/traps.c:345
asm_exc_invalid_op+0x1b/0x20 arch/x86/include/asm/idtentry.h:606
RIP: 0010:__traceiter_kfree+0x34/0x50 include/trace/events/kmem.h:95
Code: 8b 3d 80 53 ca 05 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba ef 2d 7d 79 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f
RSP: 0018:ffffc90005247a18 EFLAGS: 00010213
RAX: ffffffff81714610 RBX: 0000000000000000 RCX: dbcc7425b325d400
RDX: 0000000000000000 RSI: ffffffff83e0d891 RDI: ffffc900055fd000
RBP: ffffc90005247a30 R08: dffffc0000000000 R09: fffff52000a48ecd
R10: 000000001ebd94fb R11: 1ffff92000a48ecc R12: ffffc90005247d00
R13: dffffc0000000000 R14: ffffffff83e0d891 R15: ffff8881379e2540
trace_kfree include/trace/events/kmem.h:95 [inline]
kfree+0xc9/0xf0 mm/slab_common.c:977
___sys_recvmsg+0x1c1/0x510 net/socket.c:2771
do_recvmmsg+0x359/0x7a0 net/socket.c:2864
__sys_recvmmsg net/socket.c:2943 [inline]
__do_sys_recvmmsg net/socket.c:2966 [inline]
__se_sys_recvmmsg net/socket.c:2959 [inline]
__x64_sys_recvmmsg+0x18d/0x240 net/socket.c:2959
x64_sys_call+0x3e7/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:300
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f2c02f8f749
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f2c019f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
RAX: ffffffffffffffda RBX: 00007f2c031e6090 RCX: 00007f2c02f8f749
RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000004
RBP: 00007f2c03013f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f2c031e6128 R14: 00007f2c031e6090 R15: 00007ffc5167d6b8
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:__traceiter_kfree+0x34/0x50 include/trace/events/kmem.h:95
Code: 8b 3d 80 53 ca 05 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba ef 2d 7d 79 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f
RSP: 0018:ffffc900001b0ba8 EFLAGS: 00010213
RAX: ffffffff81714610 RBX: 0000000000000000 RCX: dbcc7425b325d400
RDX: 0000000000000000 RSI: ffffffff840c4112 RDI: ffffc900055fd000
RBP: ffffc900001b0bc0 R08: 1ffff11023a9cab8 R09: 1ffff11023a9cab8
R10: 000000001ebd94fb R11: 1ffff1103ee271c2 R12: 1ffff11022467c70
R13: ffff88811233e4a0 R14: ffffffff840c4112 R15: ffff8881379e2540
FS: 00007f2c019f76c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7601d750e0 CR3: 000000013052d000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess), 1 bytes skipped:
0: 48 81 e6 00 02 00 00 and $0x200,%rsi
7: 31 ff xor %edi,%edi
9: e8 98 4a 19 00 call 0x194aa6
e: 48 81 e3 00 02 00 00 and $0x200,%rbx
15: 75 07 jne 0x1e
17: e8 ca 45 19 00 call 0x1945e6
1c: eb 06 jmp 0x24
1e: e8 c3 45 19 00 call 0x1945e6
23: fb sti
24: 0f b6 5c 24 07 movzbl 0x7(%rsp),%ebx
* 29: 48 c7 84 24 80 00 00 movq $0x45e0360e,0x80(%rsp) <-- trapping instruction
30: 00 0e 36 e0 45
35: 4b c7 04 2e 00 00 00 movq $0x0,(%r14,%r13,1)
3c: 00
3d: 4b rex.WXB
3e: c7 .byte 0xc7