BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:417/tfrc_rx_hist_sample_rtt()
CPU: 0 PID: 3600 Comm: syz-executor267 Not tainted 6.1.29-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x38f/0x4a0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x6aa/0xf40 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids net/dccp/input.c:176 [inline]
dccp_rcv_established+0x1b3/0x310 net/dccp/input.c:374
dccp_v4_do_rcv+0xfb/0x1e0 net/dccp/ipv4.c:674
sk_backlog_rcv include/net/sock.h:1109 [inline]
__sk_receive_skb+0x41a/0x9d0 net/core/sock.c:565
ip_protocol_deliver_rcu+0x381/0x740 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x28c/0x4c0 net/ipv4/ip_input.c:233
NF_HOOK+0x364/0x410 include/linux/netfilter.h:302
NF_HOOK+0x364/0x410 include/linux/netfilter.h:302
__netif_receive_skb_one_core net/core/dev.c:5492 [inline]
__netif_receive_skb+0x1c6/0x530 net/core/dev.c:5606
process_backlog+0x347/0x700 net/core/dev.c:5934
__napi_poll+0xc7/0x470 net/core/dev.c:6501
napi_poll net/core/dev.c:6568 [inline]
net_rx_action+0x70f/0xeb0 net/core/dev.c:6679
__do_softirq+0x2e9/0xa4c kernel/softirq.c:571
do_softirq+0x162/0x240 kernel/softirq.c:472
__local_bh_enable_ip+0x1b1/0x1f0 kernel/softirq.c:396
rcu_read_unlock_bh include/linux/rcupdate.h:817 [inline]
ip_finish_output2+0xee4/0x1280 net/ipv4/ip_output.c:229
dst_output include/net/dst.h:444 [inline]
ip_local_out net/ipv4/ip_output.c:126 [inline]
__ip_queue_xmit+0x12df/0x1da0 net/ipv4/ip_output.c:532
dccp_transmit_skb+0xeb2/0x1600 net/dccp/output.c:138
dccp_xmit_packet+0x2ef/0x530 net/dccp/output.c:281
dccp_write_xmit+0x131/0x220 net/dccp/output.c:366
dccp_sendmsg+0x6a9/0xab0 net/dccp/proto.c:788
sock_sendmsg_nosec net/socket.c:716 [inline]
sock_sendmsg net/socket.c:736 [inline]
____sys_sendmsg+0x59e/0x8f0 net/socket.c:2482
___sys_sendmsg net/socket.c:2536 [inline]
__sys_sendmsg+0x2a9/0x390 net/socket.c:2565
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fa67e9d0019
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcb92e6ea8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fa67e9d0019
RDX: 000000000c004004 RSI: 0000000020004340 RDI: 0000000000000005
RBP: 0000000000000000 R08: 00007ffcb92e6ed0 R09: 00007ffcb92e6ed0
R10: 00007ffcb92e6ed0 R11: 0000000000000246 R12: 00007ffcb92e6ecc
R13: 585858582e72656c R14: 00007ffcb92e6ee0 R15: 0000000000000000
BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:417/tfrc_rx_hist_sample_rtt()
CPU: 0 PID: 3605 Comm: syz-executor267 Not tainted 6.1.29-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x38f/0x4a0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x6aa/0xf40 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids net/dccp/input.c:176 [inline]
dccp_rcv_established+0x1b3/0x310 net/dccp/input.c:374
dccp_v4_do_rcv+0xfb/0x1e0 net/dccp/ipv4.c:674
sk_backlog_rcv include/net/sock.h:1109 [inline]
__sk_receive_skb+0x41a/0x9d0 net/core/sock.c:565
ip_protocol_deliver_rcu+0x381/0x740 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x28c/0x4c0 net/ipv4/ip_input.c:233
NF_HOOK+0x364/0x410 include/linux/netfilter.h:302
NF_HOOK+0x364/0x410 include/linux/netfilter.h:302
__netif_receive_skb_one_core net/core/dev.c:5492 [inline]
__netif_receive_skb+0x1c6/0x530 net/core/dev.c:5606
process_backlog+0x347/0x700 net/core/dev.c:5934
__napi_poll+0xc7/0x470 net/core/dev.c:6501
napi_poll net/core/dev.c:6568 [inline]
net_rx_action+0x70f/0xeb0 net/core/dev.c:6679
__do_softirq+0x2e9/0xa4c kernel/softirq.c:571
do_softirq+0x162/0x240 kernel/softirq.c:472
__local_bh_enable_ip+0x1b1/0x1f0 kernel/softirq.c:396
rcu_read_unlock_bh include/linux/rcupdate.h:817 [inline]
ip_finish_output2+0xee4/0x1280 net/ipv4/ip_output.c:229
dst_output include/net/dst.h:444 [inline]
ip_local_out net/ipv4/ip_output.c:126 [inline]
__ip_queue_xmit+0x12df/0x1da0 net/ipv4/ip_output.c:532
dccp_transmit_skb+0xeb2/0x1600 net/dccp/output.c:138
dccp_xmit_packet+0x2ef/0x530 net/dccp/output.c:281
dccp_write_xmit+0x131/0x220 net/dccp/output.c:366
dccp_sendmsg+0x6a9/0xab0 net/dccp/proto.c:788
sock_sendmsg_nosec net/socket.c:716 [inline]
sock_sendmsg net/socket.c:736 [inline]
____sys_sendmsg+0x59e/0x8f0 net/socket.c:2482
___sys_sendmsg net/socket.c:2536 [inline]
__sys_sendmsg+0x2a9/0x390 net/socket.c:2565
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fa67e9d0019
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcb92e6ea8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fa67e9d0019
RDX: 000000000c004004 RSI: 0000000020004340 RDI: 0000000000000005
RBP: 0000000000000000 R08: 00007ffcb92e6ed0 R09: 00007ffcb92e6ed0
R10: 00007ffcb92e6ed0 R11: 0000000000000246 R12: 00007ffcb92e6ecc
R13: 585858582e72656c R14: 00007ffcb92e6ee0 R15: 0000000000000000