CFI failure at __traceiter_sched_switch+0x9b/0xd0 include/trace/events/sched.h:222 (target: tp_stub_func+0x0/0x10; expected type: 0xee1f7a69) invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 644 Comm: syz.4.79 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 include/trace/events/sched.h:222 Code: 80 3c 30 00 74 05 e8 f4 86 69 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 RSP: 0018:ffffc9001042efd0 EFLAGS: 00010096 RAX: 1ffff11022bb6156 RBX: ffff888115db0aa8 RCX: ffff88811c7dd100 RDX: ffff88811d2d8000 RSI: 0000000000000001 RDI: ffffc900103f5000 RBP: ffffc9001042f010 R08: 0000000000000000 R09: fffffbfff0ee4f16 R10: 00000000b720eca3 R11: 1ffffffff0ee4f15 R12: 0000000000000001 R13: ffff888115db0aa8 R14: dffffc0000000000 R15: ffffffff81714650 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffc8b8708b8 CR3: 000000011c2af000 CR4: 00000000003526a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: trace_sched_switch include/trace/events/sched.h:222 [inline] __schedule+0x1263/0x14e0 kernel/sched/core.c:6747 preempt_schedule_irq+0x9b/0x110 kernel/sched/core.c:7062 raw_irqentry_exit_cond_resched+0x29/0x30 kernel/entry/common.c:396 irqentry_exit+0x37/0x40 kernel/entry/common.c:439 sysvec_apic_timer_interrupt+0x64/0xc0 arch/x86/kernel/apic/apic.c:1118 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:691 RIP: 0010:on_stack arch/x86/include/asm/stacktrace.h:-1 [inline] RIP: 0010:update_stack_state+0x1df/0x480 arch/x86/kernel/unwind_frame.c:228 Code: 0f 85 8c 00 00 00 49 89 dc 44 8b 2b 45 85 ed 0f 95 c0 48 8b 55 b0 4c 39 fa 0f 93 c1 20 c1 4c 39 f2 0f 92 c0 20 c8 3c 01 75 17 <48> 8b 8d 78 ff ff ff 4c 39 f9 0f 97 c0 4c 39 f1 0f 96 c1 84 c8 75 RSP: 0018:ffffc9001042f2b8 EFLAGS: 00000246 RAX: 0000000000000001 RBX: ffffc9001042f408 RCX: 1ffff92002085e01 RDX: ffffc9001042fef8 RSI: 1ffff92002085e82 RDI: ffffc9001042f460 RBP: ffffc9001042f378 R08: ffffc9001042f4d0 R09: ffffc9001042f4c8 R10: 0000000000000010 R11: 1ffff92002085e81 R12: ffffc9001042f408 R13: 0000000000000001 R14: ffffc90010430000 R15: ffffc90010428000 unwind_next_frame+0x3d5/0x700 arch/x86/kernel/unwind_frame.c:315 arch_stack_walk+0x124/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x98/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 kasan_save_free_info+0x31/0x50 mm/kasan/generic.c:516 ____kasan_slab_free+0x132/0x180 mm/kasan/common.c:241 __kasan_slab_free+0x11/0x20 mm/kasan/common.c:249 kasan_slab_free include/linux/kasan.h:178 [inline] slab_free_hook mm/slub.c:1750 [inline] slab_free_freelist_hook+0xc2/0x190 mm/slub.c:1776 slab_free mm/slub.c:3712 [inline] __kmem_cache_free+0xb7/0x1b0 mm/slub.c:3728 kfree+0x6f/0xf0 mm/slab_common.c:990 bpf_release_orig_filter net/core/filter.c:1172 [inline] __bpf_prog_release net/core/filter.c:1182 [inline] bpf_prog_destroy+0x9f/0xe0 net/core/filter.c:1462 seccomp_filter_free kernel/seccomp.c:521 [inline] __put_seccomp_filter kernel/seccomp.c:541 [inline] __seccomp_filter_release+0x15f/0x1e0 kernel/seccomp.c:550 seccomp_filter_release+0x8b/0xb0 kernel/seccomp.c:571 release_task+0x10b7/0x1200 kernel/exit.c:279 exit_notify kernel/exit.c:766 [inline] do_exit+0x18af/0x2650 kernel/exit.c:898 do_group_exit+0x210/0x2d0 kernel/exit.c:1028 get_signal+0x13b5/0x1520 kernel/signal.c:2889 arch_do_signal_or_restart+0xb0/0x1030 arch/x86/kernel/signal.c:871 exit_to_user_mode_loop+0x7a/0xb0 kernel/entry/common.c:174 exit_to_user_mode_prepare+0x87/0xd0 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline] syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:303 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f658638f749 Code: Unable to access opcode bytes at 0x7f658638f71f. RSP: 002b:00007f65871f6038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 RAX: 0000000000000000 RBX: 00007f65865e6180 RCX: 00007f658638f749 RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000000 RBP: 00007f65871f6090 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007f65865e6218 R14: 00007f65865e6180 R15: 00007ffe73bec128 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__traceiter_sched_switch+0x9b/0xd0 include/trace/events/sched.h:222 Code: 80 3c 30 00 74 05 e8 f4 86 69 00 49 8b 7d 08 44 89 e6 48 8b 55 c8 48 8b 4d c0 44 8b 45 d4 41 ba 97 85 e0 11 45 03 57 fc 74 02 <0f> 0b 41 ff d7 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 RSP: 0018:ffffc9001042efd0 EFLAGS: 00010096 RAX: 1ffff11022bb6156 RBX: ffff888115db0aa8 RCX: ffff88811c7dd100 RDX: ffff88811d2d8000 RSI: 0000000000000001 RDI: ffffc900103f5000 RBP: ffffc9001042f010 R08: 0000000000000000 R09: fffffbfff0ee4f16 R10: 00000000b720eca3 R11: 1ffffffff0ee4f15 R12: 0000000000000001 R13: ffff888115db0aa8 R14: dffffc0000000000 R15: ffffffff81714650 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffc8b8708b8 CR3: 000000011c2af000 CR4: 00000000003526a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 0f 85 8c 00 00 00 jne 0x92 6: 49 89 dc mov %rbx,%r12 9: 44 8b 2b mov (%rbx),%r13d c: 45 85 ed test %r13d,%r13d f: 0f 95 c0 setne %al 12: 48 8b 55 b0 mov -0x50(%rbp),%rdx 16: 4c 39 fa cmp %r15,%rdx 19: 0f 93 c1 setae %cl 1c: 20 c1 and %al,%cl 1e: 4c 39 f2 cmp %r14,%rdx 21: 0f 92 c0 setb %al 24: 20 c8 and %cl,%al 26: 3c 01 cmp $0x1,%al 28: 75 17 jne 0x41 * 2a: 48 8b 8d 78 ff ff ff mov -0x88(%rbp),%rcx <-- trapping instruction 31: 4c 39 f9 cmp %r15,%rcx 34: 0f 97 c0 seta %al 37: 4c 39 f1 cmp %r14,%rcx 3a: 0f 96 c1 setbe %cl 3d: 84 c8 test %cl,%al 3f: 75 .byte 0x75