------------[ cut here ]------------
ODEBUG: activate active (active state 0) object: ffff888055c54018 object type: rcu_head hint: 0x0
WARNING: CPU: 0 PID: 14622 at lib/debugobjects.c:612 debug_print_object+0x1a2/0x2b0 lib/debugobjects.c:612
Modules linked in:
CPU: 0 UID: 0 PID: 14622 Comm: syz.2.2622 Not tainted 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:debug_print_object+0x1a2/0x2b0 lib/debugobjects.c:612
Code: fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 54 41 56 48 8b 14 dd e0 37 16 8c 4c 89 e6 48 c7 c7 60 2c 16 8c e8 cf 8e 8f fc 90 <0f> 0b 90 90 58 83 05 76 ca c0 0b 01 48 83 c4 18 5b 5d 41 5c 41 5d
RSP: 0018:ffffc90000007ad8 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000003 RCX: ffffffff817a3358
RDX: ffff88802c67a440 RSI: ffffffff817a3365 RDI: 0000000000000001
RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffffffff8c163280
R13: ffffffff8baeb640 R14: 0000000000000000 R15: ffffc90000007b98
FS: 00007ff7a92bb6c0(0000) GS:ffff8881246bc000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00002000000c3000 CR3: 0000000033a29000 CR4: 00000000003526f0
Call Trace:
debug_object_activate+0x2bc/0x4c0 lib/debugobjects.c:842
debug_rcu_head_queue kernel/rcu/rcu.h:236 [inline]
__call_rcu_common.constprop.0+0x35/0xa10 kernel/rcu/tree.c:3108
radix_tree_node_free lib/radix-tree.c:310 [inline]
delete_node+0x1fc/0x8d0 lib/radix-tree.c:573
__radix_tree_delete+0x193/0x3d0 lib/radix-tree.c:1379
radix_tree_delete_item+0xea/0x230 lib/radix-tree.c:1430
afs_cell_destroy+0x1db/0x310 fs/afs/cell.c:523
rcu_do_batch kernel/rcu/tree.c:2605 [inline]
rcu_core+0x799/0x1530 kernel/rcu/tree.c:2861
handle_softirqs+0x216/0x8e0 kernel/softirq.c:579
__do_softirq kernel/softirq.c:613 [inline]
invoke_softirq kernel/softirq.c:453 [inline]
__irq_exit_rcu+0x109/0x170 kernel/softirq.c:680
irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline]
sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1050
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:chacha_permute+0x50c/0x6d0 lib/crypto/chacha.c:60
Code: 41 31 d1 89 54 24 18 41 01 ef 44 31 f0 44 89 ca 44 8b 4c 24 08 c1 c0 0c 31 de c1 c2 0c c1 c6 08 45 31 f9 41 01 d0 89 74 24 28 <44> 01 d6 41 c1 c1 0c 44 89 44 24 0c 45 31 c5 44 8d 04 07 45 01 cb
RSP: 0018:ffffc90003c0fb98 EFLAGS: 00000216
RAX: 00000000fd341385 RBX: 000000004e31c4c1 RCX: 00000000b1e10277
RDX: 000000003412c8ad RSI: 00000000a9218f6a RDI: 00000000337cec4a
RBP: 000000006f2a197f R08: 000000005f30d724 R09: 0000000076cf7b88
R10: 000000009e6a00c8 R11: 0000000074180242 R12: 000000006e6961a3
R13: 00000000d3606b5e R14: 000000007cc12bf1 R15: 00000000ed407909
chacha_block_generic+0x129/0x330 lib/crypto/chacha.c:83
chacha20_block include/crypto/chacha.h:45 [inline]
get_random_bytes_user+0x155/0x3c0 drivers/char/random.c:469
__do_sys_getrandom drivers/char/random.c:1416 [inline]
__se_sys_getrandom drivers/char/random.c:1390 [inline]
__x64_sys_getrandom+0x183/0x290 drivers/char/random.c:1390
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff7a838ebe9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ff7a92bb038 EFLAGS: 00000246 ORIG_RAX: 000000000000013e
RAX: ffffffffffffffda RBX: 00007ff7a85b5fa0 RCX: 00007ff7a838ebe9
RDX: 0000000000000000 RSI: 00000000ffffff9a RDI: 0000200000000240
RBP: 00007ff7a8411e19 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ff7a85b6038 R14: 00007ff7a85b5fa0 R15: 00007ffd17f93a18
----------------
Code disassembly (best guess):
0: 41 31 d1 xor %edx,%r9d
3: 89 54 24 18 mov %edx,0x18(%rsp)
7: 41 01 ef add %ebp,%r15d
a: 44 31 f0 xor %r14d,%eax
d: 44 89 ca mov %r9d,%edx
10: 44 8b 4c 24 08 mov 0x8(%rsp),%r9d
15: c1 c0 0c rol $0xc,%eax
18: 31 de xor %ebx,%esi
1a: c1 c2 0c rol $0xc,%edx
1d: c1 c6 08 rol $0x8,%esi
20: 45 31 f9 xor %r15d,%r9d
23: 41 01 d0 add %edx,%r8d
26: 89 74 24 28 mov %esi,0x28(%rsp)
* 2a: 44 01 d6 add %r10d,%esi <-- trapping instruction
2d: 41 c1 c1 0c rol $0xc,%r9d
31: 44 89 44 24 0c mov %r8d,0xc(%rsp)
36: 45 31 c5 xor %r8d,%r13d
39: 44 8d 04 07 lea (%rdi,%rax,1),%r8d
3d: 45 01 cb add %r9d,%r11d