BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:417/tfrc_rx_hist_sample_rtt() CPU: 1 PID: 8509 Comm: udevd Not tainted 5.15.107-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 tfrc_rx_hist_sample_rtt+0x370/0x460 net/dccp/ccids/lib/packet_history.c:414 ccid3_hc_rx_packet_recv+0x636/0xd50 net/dccp/ccids/ccid3.c:760 ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline] dccp_deliver_input_to_ccids net/dccp/input.c:176 [inline] dccp_rcv_established+0x1b3/0x310 net/dccp/input.c:374 dccp_v4_do_rcv+0xcd/0x190 net/dccp/ipv4.c:669 sk_backlog_rcv include/net/sock.h:1057 [inline] __sk_receive_skb+0x416/0x9c0 net/core/sock.c:528 ip_protocol_deliver_rcu+0x381/0x730 net/ipv4/ip_input.c:204 ip_local_deliver_finish+0x1db/0x320 net/ipv4/ip_input.c:231 NF_HOOK+0x364/0x410 include/linux/netfilter.h:307 NF_HOOK+0x364/0x410 include/linux/netfilter.h:307 __netif_receive_skb_one_core net/core/dev.c:5458 [inline] __netif_receive_skb+0x1c6/0x530 net/core/dev.c:5572 process_backlog+0x363/0x7f0 net/core/dev.c:6449 __napi_poll+0xc7/0x440 net/core/dev.c:7008 napi_poll net/core/dev.c:7075 [inline] net_rx_action+0x617/0xda0 net/core/dev.c:7162 __do_softirq+0x3b3/0x93a kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x155/0x240 kernel/softirq.c:636 irq_exit_rcu+0x5/0x20 kernel/softirq.c:648 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:lock_acquire+0x252/0x4f0 kernel/locking/lockdep.c:5626 Code: 2b 00 74 08 4c 89 f7 e8 2c d8 66 00 f6 44 24 61 02 0f 85 84 01 00 00 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <4b> c7 44 25 00 00 00 00 00 43 c7 44 25 09 00 00 00 00 43 c7 44 25 RSP: 0018:ffffc9000be572e0 EFLAGS: 00000206 RAX: 0000000000000001 RBX: 1ffff920017cae68 RCX: 1ffff920017cae08 RDX: dffffc0000000000 RSI: ffffffff8a8b0380 RDI: ffffffff8ad85240 RBP: ffffc9000be57440 R08: dffffc0000000000 R09: fffffbfff1f76e15 R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff920017cae64 R13: dffffc0000000000 R14: ffffc9000be57340 R15: 0000000000000246 rcu_lock_acquire+0x2a/0x30 include/linux/rcupdate.h:269 rcu_read_lock include/linux/rcupdate.h:696 [inline] is_bpf_text_address+0x1d/0x260 kernel/bpf/core.c:717 kernel_text_address kernel/extable.c:151 [inline] __kernel_text_address+0x94/0x100 kernel/extable.c:105 unwind_get_return_address+0x49/0x80 arch/x86/kernel/unwind_orc.c:323 arch_stack_walk+0xf3/0x140 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x113/0x1c0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] ____kasan_kmalloc+0xba/0xf0 mm/kasan/common.c:513 kasan_kmalloc include/linux/kasan.h:264 [inline] __kmalloc+0x168/0x300 mm/slub.c:4407 kmalloc include/linux/slab.h:596 [inline] kzalloc include/linux/slab.h:721 [inline] tomoyo_encode2 security/tomoyo/realpath.c:45 [inline] tomoyo_encode+0x26b/0x530 security/tomoyo/realpath.c:80 tomoyo_realpath_from_path+0x5a2/0x5e0 security/tomoyo/realpath.c:288 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x273/0x6b0 security/tomoyo/file.c:822 security_inode_getattr+0xcf/0x120 security/security.c:1348 vfs_getattr+0x26/0x360 fs/stat.c:157 vfs_statx+0x18f/0x3b0 fs/stat.c:225 vfs_fstatat fs/stat.c:243 [inline] __do_sys_newfstatat fs/stat.c:411 [inline] __se_sys_newfstatat fs/stat.c:405 [inline] __x64_sys_newfstatat+0x12c/0x1b0 fs/stat.c:405 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f40e64c61da Code: 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 0b 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 69 fc 0c 00 f7 RSP: 002b:00007ffc23d95848 EFLAGS: 00000246 ORIG_RAX: 0000000000000106 RAX: ffffffffffffffda RBX: 000000000000000e RCX: 00007f40e64c61da RDX: 00007ffc23d95858 RSI: 00007ffc23d95927 RDI: 00000000ffffff9c RBP: 00007ffc23d96960 R08: 0000000000ffffff R09: 00007ffc23d96c40 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc23d96d88 R13: 0000000000000000 R14: 00007ffc23d96d88 R15: 0000560a7bec3910 ---------------- Code disassembly (best guess): 0: 2b 00 sub (%rax),%eax 2: 74 08 je 0xc 4: 4c 89 f7 mov %r14,%rdi 7: e8 2c d8 66 00 callq 0x66d838 c: f6 44 24 61 02 testb $0x2,0x61(%rsp) 11: 0f 85 84 01 00 00 jne 0x19b 17: 41 f7 c7 00 02 00 00 test $0x200,%r15d 1e: 74 01 je 0x21 20: fb sti 21: 48 c7 44 24 40 0e 36 movq $0x45e0360e,0x40(%rsp) 28: e0 45 * 2a: 4b c7 44 25 00 00 00 movq $0x0,0x0(%r13,%r12,1) <-- trapping instruction 31: 00 00 33: 43 c7 44 25 09 00 00 movl $0x0,0x9(%r13,%r12,1) 3a: 00 00 3c: 43 rex.XB 3d: c7 .byte 0xc7 3e: 44 rex.R 3f: 25 .byte 0x25