------------[ cut here ]------------ ODEBUG: activate active (active state 0) object: ffff888055c54018 object type: rcu_head hint: 0x0 WARNING: CPU: 0 PID: 14622 at lib/debugobjects.c:612 debug_print_object+0x1a2/0x2b0 lib/debugobjects.c:612 Modules linked in: CPU: 0 UID: 0 PID: 14622 Comm: syz.2.2622 Not tainted 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:debug_print_object+0x1a2/0x2b0 lib/debugobjects.c:612 Code: fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 54 41 56 48 8b 14 dd e0 37 16 8c 4c 89 e6 48 c7 c7 60 2c 16 8c e8 cf 8e 8f fc 90 <0f> 0b 90 90 58 83 05 76 ca c0 0b 01 48 83 c4 18 5b 5d 41 5c 41 5d RSP: 0018:ffffc90000007ad8 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 0000000000000003 RCX: ffffffff817a3358 RDX: ffff88802c67a440 RSI: ffffffff817a3365 RDI: 0000000000000001 RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000001 R12: ffffffff8c163280 R13: ffffffff8baeb640 R14: 0000000000000000 R15: ffffc90000007b98 FS: 00007ff7a92bb6c0(0000) GS:ffff8881246bc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00002000000c3000 CR3: 0000000033a29000 CR4: 00000000003526f0 Call Trace: debug_object_activate+0x2bc/0x4c0 lib/debugobjects.c:842 debug_rcu_head_queue kernel/rcu/rcu.h:236 [inline] __call_rcu_common.constprop.0+0x35/0xa10 kernel/rcu/tree.c:3108 radix_tree_node_free lib/radix-tree.c:310 [inline] delete_node+0x1fc/0x8d0 lib/radix-tree.c:573 __radix_tree_delete+0x193/0x3d0 lib/radix-tree.c:1379 radix_tree_delete_item+0xea/0x230 lib/radix-tree.c:1430 afs_cell_destroy+0x1db/0x310 fs/afs/cell.c:523 rcu_do_batch kernel/rcu/tree.c:2605 [inline] rcu_core+0x799/0x1530 kernel/rcu/tree.c:2861 handle_softirqs+0x216/0x8e0 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:chacha_permute+0x50c/0x6d0 lib/crypto/chacha.c:60 Code: 41 31 d1 89 54 24 18 41 01 ef 44 31 f0 44 89 ca 44 8b 4c 24 08 c1 c0 0c 31 de c1 c2 0c c1 c6 08 45 31 f9 41 01 d0 89 74 24 28 <44> 01 d6 41 c1 c1 0c 44 89 44 24 0c 45 31 c5 44 8d 04 07 45 01 cb RSP: 0018:ffffc90003c0fb98 EFLAGS: 00000216 RAX: 00000000fd341385 RBX: 000000004e31c4c1 RCX: 00000000b1e10277 RDX: 000000003412c8ad RSI: 00000000a9218f6a RDI: 00000000337cec4a RBP: 000000006f2a197f R08: 000000005f30d724 R09: 0000000076cf7b88 R10: 000000009e6a00c8 R11: 0000000074180242 R12: 000000006e6961a3 R13: 00000000d3606b5e R14: 000000007cc12bf1 R15: 00000000ed407909 chacha_block_generic+0x129/0x330 lib/crypto/chacha.c:83 chacha20_block include/crypto/chacha.h:45 [inline] get_random_bytes_user+0x155/0x3c0 drivers/char/random.c:469 __do_sys_getrandom drivers/char/random.c:1416 [inline] __se_sys_getrandom drivers/char/random.c:1390 [inline] __x64_sys_getrandom+0x183/0x290 drivers/char/random.c:1390 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff7a838ebe9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff7a92bb038 EFLAGS: 00000246 ORIG_RAX: 000000000000013e RAX: ffffffffffffffda RBX: 00007ff7a85b5fa0 RCX: 00007ff7a838ebe9 RDX: 0000000000000000 RSI: 00000000ffffff9a RDI: 0000200000000240 RBP: 00007ff7a8411e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ff7a85b6038 R14: 00007ff7a85b5fa0 R15: 00007ffd17f93a18 ---------------- Code disassembly (best guess): 0: 41 31 d1 xor %edx,%r9d 3: 89 54 24 18 mov %edx,0x18(%rsp) 7: 41 01 ef add %ebp,%r15d a: 44 31 f0 xor %r14d,%eax d: 44 89 ca mov %r9d,%edx 10: 44 8b 4c 24 08 mov 0x8(%rsp),%r9d 15: c1 c0 0c rol $0xc,%eax 18: 31 de xor %ebx,%esi 1a: c1 c2 0c rol $0xc,%edx 1d: c1 c6 08 rol $0x8,%esi 20: 45 31 f9 xor %r15d,%r9d 23: 41 01 d0 add %edx,%r8d 26: 89 74 24 28 mov %esi,0x28(%rsp) * 2a: 44 01 d6 add %r10d,%esi <-- trapping instruction 2d: 41 c1 c1 0c rol $0xc,%r9d 31: 44 89 44 24 0c mov %r8d,0xc(%rsp) 36: 45 31 c5 xor %r8d,%r13d 39: 44 8d 04 07 lea (%rdi,%rax,1),%r8d 3d: 45 01 cb add %r9d,%r11d