BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:422/tfrc_rx_hist_sample_rtt() CPU: 1 PID: 10288 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 tfrc_rx_hist_sample_rtt.cold+0x57/0x5c net/dccp/ccids/lib/packet_history.c:422 ccid3_hc_rx_packet_recv+0x5be/0xe90 net/dccp/ccids/ccid3.c:767 ccid_hc_rx_packet_recv net/dccp/ccid.h:185 [inline] dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:180 dccp_rcv_established net/dccp/input.c:378 [inline] dccp_rcv_established+0x107/0x160 net/dccp/input.c:368 dccp_v4_do_rcv+0x136/0x1a0 net/dccp/ipv4.c:656 sk_backlog_rcv include/net/sock.h:952 [inline] __release_sock+0x134/0x3a0 net/core/sock.c:2362 release_sock+0x54/0x1b0 net/core/sock.c:2901 dccp_sendmsg+0x639/0xc90 net/dccp/proto.c:818 inet_sendmsg+0x132/0x5a0 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xc3/0x120 net/socket.c:661 ___sys_sendmsg+0x7bb/0x8e0 net/socket.c:2227 __sys_sendmsg net/socket.c:2265 [inline] __do_sys_sendmsg net/socket.c:2274 [inline] __se_sys_sendmsg net/socket.c:2272 [inline] __x64_sys_sendmsg+0x132/0x220 net/socket.c:2272 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f23c415f209 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f23c2ad4168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f23c4271f60 RCX: 00007f23c415f209 RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000008 RBP: 00007f23c41b9161 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcb3b9d65f R14: 00007f23c2ad4300 R15: 0000000000022000 hfsplus: part requires an argument hfsplus: unable to parse mount options IPVS: ftp: loaded support on port[0] = 21 dccp_close: ABORT with 189 bytes unread dccp_close: ABORT with 315 bytes unread dccp_close: ABORT with 3 bytes unread EXT4-fs (loop5): VFS: Can't find ext4 filesystem L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. EXT4-fs (loop5): VFS: Can't find ext4 filesystem EXT4-fs (loop5): VFS: Can't find ext4 filesystem netlink: 'syz-executor.5': attribute type 29 has an invalid length. vxfs: WRONG superblock magic 00000000 at 1 vxfs: WRONG superblock magic 00000000 at 8 vxfs: can't find superblock. vxfs: WRONG superblock magic 00000000 at 1 vxfs: WRONG superblock magic 00000000 at 8 vxfs: can't find superblock. IPVS: set_ctl: invalid protocol: 103 255.255.255.255:20000 vxfs: WRONG superblock magic 00000000 at 1 vxfs: WRONG superblock magic 00000000 at 8 vxfs: can't find superblock. netlink: 'syz-executor.5': attribute type 29 has an invalid length. netlink: 'syz-executor.5': attribute type 29 has an invalid length. IPVS: set_ctl: invalid protocol: 103 255.255.255.255:20000 netlink: 'syz-executor.1': attribute type 29 has an invalid length. kauditd_printk_skb: 27 callbacks suppressed audit: type=1800 audit(1659045067.902:39): pid=10716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13972 res=0 dccp_close: ABORT with 3 bytes unread netlink: 'syz-executor.5': attribute type 29 has an invalid length. audit: type=1800 audit(1659045067.982:40): pid=10724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13972 res=0 netlink: 'syz-executor.1': attribute type 29 has an invalid length. vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN audit: type=1800 audit(1659045068.402:41): pid=10774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13962 res=0 audit: type=1800 audit(1659045068.422:42): pid=10773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13962 res=0 netlink: 'syz-executor.5': attribute type 29 has an invalid length. audit: type=1800 audit(1659045068.832:43): pid=10813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13837 res=0 audit: type=1800 audit(1659045068.832:44): pid=10813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=13837 res=0 vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN xt_policy: input policy not valid in POSTROUTING and OUTPUT ====================================================== WARNING: the mand mount option is being deprecated and will be removed in v5.15! ====================================================== xt_policy: input policy not valid in POSTROUTING and OUTPUT vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 xt_policy: input policy not valid in POSTROUTING and OUTPUT xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. IPVS: ftp: loaded support on port[0] = 21 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. IPVS: ftp: loaded support on port[0] = 21 BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop5 BTRFS info (device loop5): disabling disk space caching BTRFS info (device loop5): has skinny extents