BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:417/tfrc_rx_hist_sample_rtt() CPU: 1 PID: 4521 Comm: udevd Not tainted 6.8.0-syzkaller-05204-g237bb5f7f7f5 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 tfrc_rx_hist_sample_rtt+0x397/0x4b0 net/dccp/ccids/lib/packet_history.c:414 ccid3_hc_rx_packet_recv+0x69d/0xe60 net/dccp/ccids/ccid3.c:760 ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline] dccp_deliver_input_to_ccids net/dccp/input.c:176 [inline] dccp_rcv_established+0x1bb/0x320 net/dccp/input.c:374 dccp_v4_do_rcv+0xff/0x1f0 net/dccp/ipv4.c:675 sk_backlog_rcv include/net/sock.h:1106 [inline] __sk_receive_skb+0x823/0x8a0 net/core/sock.c:569 ip_protocol_deliver_rcu+0x2e0/0x430 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x33f/0x5f0 net/ipv4/ip_input.c:233 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x2bf/0x6a0 net/core/dev.c:5652 process_backlog+0x39d/0x7a0 net/core/dev.c:5981 __napi_poll+0xcb/0x490 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x7bb/0x1090 net/core/dev.c:6813 __do_softirq+0x2bc/0x943 kernel/softirq.c:554 invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633 irq_exit_rcu+0x9/0x30 kernel/softirq.c:645 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:seqcount_lockdep_reader_access+0x1d6/0x220 include/linux/seqlock.h:75 Code: 62 e8 6e cb 7b ff 4d 85 f6 48 bb 00 00 00 00 00 fc ff df 75 07 e8 5a cb 7b ff eb 06 e8 53 cb 7b ff fb 48 c7 04 24 0e 36 e0 45 <4a> c7 04 23 00 00 00 00 66 42 c7 44 23 09 00 00 42 c6 44 23 0b 00 RSP: 0018:ffffc900030a7760 EFLAGS: 00000293 RAX: ffffffff8219251d RBX: dffffc0000000000 RCX: ffff88807dcada00 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc900030a7810 R08: ffffffff821924f8 R09: 1ffffffff2598ea7 R10: dffffc0000000000 R11: fffffbfff2598ea8 R12: 1ffff92000614eec R13: ffffc900030a7780 R14: 0000000000000200 R15: 0000000000000046 read_seqbegin include/linux/seqlock.h:772 [inline] read_seqbegin_or_lock include/linux/seqlock.h:1076 [inline] prepend_path+0x2d6/0xbe0 fs/d_path.c:171 d_absolute_path+0x179/0x310 fs/d_path.c:234 tomoyo_get_absolute_path security/tomoyo/realpath.c:101 [inline] tomoyo_realpath_from_path+0x2b4/0x5e0 security/tomoyo/realpath.c:271 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x2b7/0x740 security/tomoyo/file.c:822 security_inode_getattr+0xd8/0x130 security/security.c:2238 vfs_getattr+0x45/0x430 fs/stat.c:173 vfs_fstat fs/stat.c:198 [inline] vfs_fstatat+0xd6/0x190 fs/stat.c:300 __do_sys_newfstatat fs/stat.c:468 [inline] __se_sys_newfstatat fs/stat.c:462 [inline] __x64_sys_newfstatat+0x117/0x190 fs/stat.c:462 do_syscall_64+0xfb/0x240 entry_SYSCALL_64_after_hwframe+0x6d/0x75 RIP: 0033:0x7fdfaaf735f4 Code: 64 c7 00 09 00 00 00 83 c8 ff c3 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 00 00 00 00 41 89 ca b8 06 01 00 00 0f 05 <45> 31 c0 3d 00 f0 ff ff 76 10 48 8b 15 03 a8 0d 00 f7 d8 41 83 c8 RSP: 002b:00007ffdb8aeed68 EFLAGS: 00000206 ORIG_RAX: 0000000000000106 RAX: ffffffffffffffda RBX: 00007fdfab04b460 RCX: 00007fdfaaf735f4 RDX: 00007ffdb8aeed70 RSI: 00007fdfab010130 RDI: 000000000000000c RBP: 000055d363b614b0 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000001000 R11: 0000000000000206 R12: 0000000000000006 R13: 0000000000000006 R14: 000055d363b614b0 R15: 0000000000000000 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: e8 6e cb 7b ff call 0xff7bcb73 5: 4d 85 f6 test %r14,%r14 8: 48 bb 00 00 00 00 00 movabs $0xdffffc0000000000,%rbx f: fc ff df 12: 75 07 jne 0x1b 14: e8 5a cb 7b ff call 0xff7bcb73 19: eb 06 jmp 0x21 1b: e8 53 cb 7b ff call 0xff7bcb73 20: fb sti 21: 48 c7 04 24 0e 36 e0 movq $0x45e0360e,(%rsp) 28: 45 * 29: 4a c7 04 23 00 00 00 movq $0x0,(%rbx,%r12,1) <-- trapping instruction 30: 00 31: 66 42 c7 44 23 09 00 movw $0x0,0x9(%rbx,%r12,1) 38: 00 39: 42 c6 44 23 0b 00 movb $0x0,0xb(%rbx,%r12,1)