BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:417/tfrc_rx_hist_sample_rtt()
CPU: 1 PID: 4521 Comm: udevd Not tainted 6.8.0-syzkaller-05204-g237bb5f7f7f5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x397/0x4b0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x69d/0xe60 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids net/dccp/input.c:176 [inline]
dccp_rcv_established+0x1bb/0x320 net/dccp/input.c:374
dccp_v4_do_rcv+0xff/0x1f0 net/dccp/ipv4.c:675
sk_backlog_rcv include/net/sock.h:1106 [inline]
__sk_receive_skb+0x823/0x8a0 net/core/sock.c:569
ip_protocol_deliver_rcu+0x2e0/0x430 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x33f/0x5f0 net/ipv4/ip_input.c:233
NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
__netif_receive_skb_one_core net/core/dev.c:5538 [inline]
__netif_receive_skb+0x2bf/0x6a0 net/core/dev.c:5652
process_backlog+0x39d/0x7a0 net/core/dev.c:5981
__napi_poll+0xcb/0x490 net/core/dev.c:6632
napi_poll net/core/dev.c:6701 [inline]
net_rx_action+0x7bb/0x1090 net/core/dev.c:6813
__do_softirq+0x2bc/0x943 kernel/softirq.c:554
invoke_softirq kernel/softirq.c:428 [inline]
__irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633
irq_exit_rcu+0x9/0x30 kernel/softirq.c:645
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:seqcount_lockdep_reader_access+0x1d6/0x220 include/linux/seqlock.h:75
Code: 62 e8 6e cb 7b ff 4d 85 f6 48 bb 00 00 00 00 00 fc ff df 75 07 e8 5a cb 7b ff eb 06 e8 53 cb 7b ff fb 48 c7 04 24 0e 36 e0 45 <4a> c7 04 23 00 00 00 00 66 42 c7 44 23 09 00 00 42 c6 44 23 0b 00
RSP: 0018:ffffc900030a7760 EFLAGS: 00000293
RAX: ffffffff8219251d RBX: dffffc0000000000 RCX: ffff88807dcada00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900030a7810 R08: ffffffff821924f8 R09: 1ffffffff2598ea7
R10: dffffc0000000000 R11: fffffbfff2598ea8 R12: 1ffff92000614eec
R13: ffffc900030a7780 R14: 0000000000000200 R15: 0000000000000046
read_seqbegin include/linux/seqlock.h:772 [inline]
read_seqbegin_or_lock include/linux/seqlock.h:1076 [inline]
prepend_path+0x2d6/0xbe0 fs/d_path.c:171
d_absolute_path+0x179/0x310 fs/d_path.c:234
tomoyo_get_absolute_path security/tomoyo/realpath.c:101 [inline]
tomoyo_realpath_from_path+0x2b4/0x5e0 security/tomoyo/realpath.c:271
tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
tomoyo_path_perm+0x2b7/0x740 security/tomoyo/file.c:822
security_inode_getattr+0xd8/0x130 security/security.c:2238
vfs_getattr+0x45/0x430 fs/stat.c:173
vfs_fstat fs/stat.c:198 [inline]
vfs_fstatat+0xd6/0x190 fs/stat.c:300
__do_sys_newfstatat fs/stat.c:468 [inline]
__se_sys_newfstatat fs/stat.c:462 [inline]
__x64_sys_newfstatat+0x117/0x190 fs/stat.c:462
do_syscall_64+0xfb/0x240
entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7fdfaaf735f4
Code: 64 c7 00 09 00 00 00 83 c8 ff c3 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 00 00 00 00 41 89 ca b8 06 01 00 00 0f 05 <45> 31 c0 3d 00 f0 ff ff 76 10 48 8b 15 03 a8 0d 00 f7 d8 41 83 c8
RSP: 002b:00007ffdb8aeed68 EFLAGS: 00000206 ORIG_RAX: 0000000000000106
RAX: ffffffffffffffda RBX: 00007fdfab04b460 RCX: 00007fdfaaf735f4
RDX: 00007ffdb8aeed70 RSI: 00007fdfab010130 RDI: 000000000000000c
RBP: 000055d363b614b0 R08: 0000000000000000 R09: 0000000000000001
R10: 0000000000001000 R11: 0000000000000206 R12: 0000000000000006
R13: 0000000000000006 R14: 000055d363b614b0 R15: 0000000000000000
----------------
Code disassembly (best guess), 1 bytes skipped:
0: e8 6e cb 7b ff call 0xff7bcb73
5: 4d 85 f6 test %r14,%r14
8: 48 bb 00 00 00 00 00 movabs $0xdffffc0000000000,%rbx
f: fc ff df
12: 75 07 jne 0x1b
14: e8 5a cb 7b ff call 0xff7bcb73
19: eb 06 jmp 0x21
1b: e8 53 cb 7b ff call 0xff7bcb73
20: fb sti
21: 48 c7 04 24 0e 36 e0 movq $0x45e0360e,(%rsp)
28: 45
* 29: 4a c7 04 23 00 00 00 movq $0x0,(%rbx,%r12,1) <-- trapping instruction
30: 00
31: 66 42 c7 44 23 09 00 movw $0x0,0x9(%rbx,%r12,1)
38: 00
39: 42 c6 44 23 0b 00 movb $0x0,0xb(%rbx,%r12,1)