BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:417/tfrc_rx_hist_sample_rtt()
CPU: 0 PID: 407 Comm: syz-executor.1 Not tainted 6.8.0-syzkaller-05204-g237bb5f7f7f5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x397/0x4b0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x69d/0xe60 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids net/dccp/input.c:176 [inline]
dccp_rcv_established+0x1bb/0x320 net/dccp/input.c:374
dccp_v4_do_rcv+0xff/0x1f0 net/dccp/ipv4.c:675
sk_backlog_rcv include/net/sock.h:1106 [inline]
__sk_receive_skb+0x823/0x8a0 net/core/sock.c:569
ip_protocol_deliver_rcu+0x2e0/0x430 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x33f/0x5f0 net/ipv4/ip_input.c:233
NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
__netif_receive_skb_one_core net/core/dev.c:5538 [inline]
__netif_receive_skb+0x2bf/0x6a0 net/core/dev.c:5652
process_backlog+0x39d/0x7a0 net/core/dev.c:5981
__napi_poll+0xcb/0x490 net/core/dev.c:6632
napi_poll net/core/dev.c:6701 [inline]
net_rx_action+0x7bb/0x1090 net/core/dev.c:6813
__do_softirq+0x2bc/0x943 kernel/softirq.c:554
invoke_softirq kernel/softirq.c:428 [inline]
__irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633
irq_exit_rcu+0x9/0x30 kernel/softirq.c:645
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lock_acquire+0x10a/0x530 kernel/locking/lockdep.c:5727
Code: c6 09 00 84 c0 0f 84 c2 02 00 00 48 c7 c0 9c e1 86 8f 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 ea 02 00 00 83 3d 32 47 15 0e 00 <0f> 84 42 01 00 00 65 8b 05 49 f0 90 7e 85 c0 0f 85 8f 01 00 00 65
RSP: 0018:ffffc9000bc3f460 EFLAGS: 00000202
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff81719a34
RDX: 0000000000000000 RSI: ffffffff8bfec640 RDI: ffffffff8bfec600
RBP: ffffc9000bc3f5b0 R08: ffffffff8f86ae6f R09: 1ffffffff1f0d5cd
R10: dffffc0000000000 R11: fffffbfff1f0d5ce R12: 1ffff92001787e94
R13: dffffc0000000000 R14: 0000000000000000 R15: dffffc0000000000
rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
rcu_read_lock include/linux/rcupdate.h:750 [inline]
page_ext_get+0x3d/0x2a0 mm/page_ext.c:508
page_table_check_clear+0x59/0x730 mm/page_table_check.c:72
zap_pte_range mm/memory.c:1452 [inline]
zap_pmd_range mm/memory.c:1597 [inline]
zap_pud_range mm/memory.c:1626 [inline]
zap_p4d_range mm/memory.c:1647 [inline]
unmap_page_range+0x1f7a/0x3610 mm/memory.c:1668
unmap_vmas+0x3cc/0x5f0 mm/memory.c:1758
exit_mmap+0x2c6/0xd40 mm/mmap.c:3287
__mmput+0x115/0x3c0 kernel/fork.c:1345
exit_mm+0x220/0x310 kernel/exit.c:569
do_exit+0x99e/0x27e0 kernel/exit.c:865
do_group_exit+0x207/0x2c0 kernel/exit.c:1027
__do_sys_exit_group kernel/exit.c:1038 [inline]
__se_sys_exit_group kernel/exit.c:1036 [inline]
__x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1036
do_syscall_64+0xfb/0x240
entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f7aa967dda9
Code: Unable to access opcode bytes at 0x7f7aa967dd7f.
RSP: 002b:00007ffdf2ba6c08 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f7aa967dda9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000000001164 R09: 0000000000000000
R10: 0000001b2d820000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001
----------------
Code disassembly (best guess), 1 bytes skipped:
0: 09 00 or %eax,(%rax)
2: 84 c0 test %al,%al
4: 0f 84 c2 02 00 00 je 0x2cc
a: 48 c7 c0 9c e1 86 8f mov $0xffffffff8f86e19c,%rax
11: 48 c1 e8 03 shr $0x3,%rax
15: 42 0f b6 04 28 movzbl (%rax,%r13,1),%eax
1a: 84 c0 test %al,%al
1c: 0f 85 ea 02 00 00 jne 0x30c
22: 83 3d 32 47 15 0e 00 cmpl $0x0,0xe154732(%rip) # 0xe15475b
* 29: 0f 84 42 01 00 00 je 0x171 <-- trapping instruction
2f: 65 8b 05 49 f0 90 7e mov %gs:0x7e90f049(%rip),%eax # 0x7e90f07f
36: 85 c0 test %eax,%eax
38: 0f 85 8f 01 00 00 jne 0x1cd
3e: 65 gs