BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt()
CPU: 1 PID: 21 Comm: ksoftirqd/1 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176
dccp_rcv_established net/dccp/input.c:374 [inline]
dccp_rcv_established+0x107/0x160 net/dccp/input.c:364
dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666
sk_backlog_rcv include/net/sock.h:1100 [inline]
__sk_receive_skb+0x294/0x820 net/core/sock.c:565
dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889
ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254
dst_input include/net/dst.h:461 [inline]
ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564
__netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485
__netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599
process_backlog+0x3a0/0x7c0 net/core/dev.c:5927
__napi_poll+0xb3/0x6d0 net/core/dev.c:6511
napi_poll net/core/dev.c:6578 [inline]
net_rx_action+0x9c1/0xd90 net/core/dev.c:6689
__do_softirq+0x1d3/0x9c6 kernel/softirq.c:571
run_ksoftirqd kernel/softirq.c:934 [inline]
run_ksoftirqd+0x2d/0x60 kernel/softirq.c:926
smpboot_thread_fn+0x645/0x9c0 kernel/smpboot.c:164
kthread+0x2e4/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt()
CPU: 1 PID: 3647 Comm: syz-executor239 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176
dccp_rcv_established net/dccp/input.c:374 [inline]
dccp_rcv_established+0x107/0x160 net/dccp/input.c:364
dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666
sk_backlog_rcv include/net/sock.h:1100 [inline]
__sk_receive_skb+0x294/0x820 net/core/sock.c:565
dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889
ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254
dst_input include/net/dst.h:461 [inline]
ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564
__netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485
__netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599
process_backlog+0x3a0/0x7c0 net/core/dev.c:5927
__napi_poll+0xb3/0x6d0 net/core/dev.c:6511
napi_poll net/core/dev.c:6578 [inline]
net_rx_action+0x9c1/0xd90 net/core/dev.c:6689
__do_softirq+0x1d3/0x9c6 kernel/softirq.c:571
invoke_softirq kernel/softirq.c:445 [inline]
__irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:lock_acquire+0x1ef/0x570 kernel/locking/lockdep.c:5634
Code: f9 a2 7e 83 f8 01 0f 85 e8 02 00 00 9c 58 f6 c4 02 0f 85 fb 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24
RSP: 0018:ffffc9000398f8f8 EFLAGS: 00000206
RAX: dffffc0000000000 RBX: 1ffff92000731f21 RCX: ffffffff815f29ce
RDX: 1ffff11003c83c5e RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff908e5977
R10: fffffbfff211cb2e R11: 0000000000000000 R12: 0000000000000001
R13: 0000000000000000 R14: ffff88813fe33928 R15: 0000000000000000
__might_fault mm/memory.c:5577 [inline]
__might_fault+0x104/0x170 mm/memory.c:5570
_copy_from_user+0x25/0x170 lib/usercopy.c:13
copy_from_user include/linux/uaccess.h:152 [inline]
copy_msghdr_from_user+0x89/0x150 net/socket.c:2413
sendmsg_copy_msghdr net/socket.c:2513 [inline]
___sys_sendmsg+0xdd/0x1b0 net/socket.c:2532
__sys_sendmmsg+0x18b/0x460 net/socket.c:2622
__do_sys_sendmmsg net/socket.c:2651 [inline]
__se_sys_sendmmsg net/socket.c:2648 [inline]
__x64_sys_sendmmsg+0x99/0x100 net/socket.c:2648
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f51f9901dd9
================================
WARNING: inconsistent lock state
6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0 Not tainted
--------------------------------
inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage.
syz-executor239/3647 [HC0[0]:SC1[1]:HE0:SE0] takes:
ffffffff8c0bf338 (vmap_area_lock){+.?.}-{2:2}, at: spin_lock include/linux/spinlock.h:349 [inline]
ffffffff8c0bf338 (vmap_area_lock){+.?.}-{2:2}, at: find_vmap_area+0x1c/0x130 mm/vmalloc.c:1836
{SOFTIRQ-ON-W} state was registered at:
lock_acquire kernel/locking/lockdep.c:5666 [inline]
lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5631
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:349 [inline]
alloc_vmap_area+0xa0b/0x1d50 mm/vmalloc.c:1617
__get_vm_area_node+0x142/0x3f0 mm/vmalloc.c:2484
get_vm_area_caller+0x43/0x50 mm/vmalloc.c:2537
__ioremap_caller.constprop.0+0x292/0x600 arch/x86/mm/ioremap.c:280
acpi_os_ioremap include/acpi/acpi_io.h:13 [inline]
acpi_map drivers/acpi/osl.c:296 [inline]
acpi_os_map_iomem+0x463/0x550 drivers/acpi/osl.c:355
acpi_tb_acquire_table+0xd8/0x209 drivers/acpi/acpica/tbdata.c:142
acpi_tb_validate_table drivers/acpi/acpica/tbdata.c:317 [inline]
acpi_tb_validate_table+0x50/0x8c drivers/acpi/acpica/tbdata.c:308
acpi_tb_verify_temp_table+0x84/0x674 drivers/acpi/acpica/tbdata.c:504
acpi_reallocate_root_table+0x374/0x3e0 drivers/acpi/acpica/tbxface.c:180
acpi_early_init+0x13a/0x438 drivers/acpi/bus.c:1214
start_kernel+0x3cf/0x48f init/main.c:1099
secondary_startup_64_no_verify+0xce/0xdb
irq event stamp: 3147
hardirqs last enabled at (3146): [] __up_console_sem+0xae/0xc0 kernel/printk/printk.c:264
hardirqs last disabled at (3147): [] dump_stack_lvl+0x2e/0x134 lib/dump_stack.c:105
softirqs last enabled at (3106): [] dccp_sendmsg+0x697/0xca0 net/dccp/proto.c:785
softirqs last disabled at (3109): [] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last disabled at (3109): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(vmap_area_lock);
lock(vmap_area_lock);
*** DEADLOCK ***
5 locks held by syz-executor239/3647:
#0: ffff88813fe33928 (&mm->mmap_lock#2){++++}-{3:3}, at: __might_fault+0xa1/0x170 mm/memory.c:5576
#1: ffffffff8bf89400 (rcu_read_lock){....}-{1:2}, at: __skb_unlink include/linux/skbuff.h:2314 [inline]
#1: ffffffff8bf89400 (rcu_read_lock){....}-{1:2}, at: __skb_dequeue include/linux/skbuff.h:2329 [inline]
#1: ffffffff8bf89400 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x34b/0x7c0 net/core/dev.c:5925
#2: ffffffff8bf89400 (rcu_read_lock){....}-{1:2}, at: __skb_pull include/linux/skbuff.h:2599 [inline]
#2: ffffffff8bf89400 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x206/0x4c0 net/ipv4/ip_input.c:230
#3: ffff8880742380b0 (slock-AF_INET6/1){+.-.}-{2:2}, at: __sk_receive_skb+0x34f/0x820 net/core/sock.c:556
#4: ffff888074238130 (sk_lock-AF_INET6){+.+.}-{0:0}, at: dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889
stack backtrace:
CPU: 1 PID: 3647 Comm: syz-executor239 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_usage_bug kernel/locking/lockdep.c:3961 [inline]
valid_state kernel/locking/lockdep.c:3973 [inline]
mark_lock_irq kernel/locking/lockdep.c:4176 [inline]
mark_lock.part.0.cold+0x18/0xd8 kernel/locking/lockdep.c:4632
mark_lock kernel/locking/lockdep.c:4596 [inline]
mark_usage kernel/locking/lockdep.c:4527 [inline]
__lock_acquire+0x11d9/0x56d0 kernel/locking/lockdep.c:5007
lock_acquire kernel/locking/lockdep.c:5666 [inline]
lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5631
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:349 [inline]
find_vmap_area+0x1c/0x130 mm/vmalloc.c:1836
check_heap_object mm/usercopy.c:176 [inline]
__check_object_size mm/usercopy.c:250 [inline]
__check_object_size+0x1f8/0x700 mm/usercopy.c:212
check_object_size include/linux/thread_info.h:199 [inline]
__copy_from_user_inatomic include/linux/uaccess.h:62 [inline]
copy_from_user_nmi arch/x86/lib/usercopy.c:47 [inline]
copy_from_user_nmi+0xcb/0x130 arch/x86/lib/usercopy.c:31
copy_code arch/x86/kernel/dumpstack.c:91 [inline]
show_opcodes+0x59/0xb0 arch/x86/kernel/dumpstack.c:121
show_iret_regs+0xd/0x33 arch/x86/kernel/dumpstack.c:149
__show_regs+0x1e/0x60 arch/x86/kernel/process_64.c:74
show_trace_log_lvl+0x25b/0x2ba arch/x86/kernel/dumpstack.c:292
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176
dccp_rcv_established net/dccp/input.c:374 [inline]
dccp_rcv_established+0x107/0x160 net/dccp/input.c:364
dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666
sk_backlog_rcv include/net/sock.h:1100 [inline]
__sk_receive_skb+0x294/0x820 net/core/sock.c:565
dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889
ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254
dst_input include/net/dst.h:461 [inline]
ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564
__netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485
__netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599
process_backlog+0x3a0/0x7c0 net/core/dev.c:5927
__napi_poll+0xb3/0x6d0 net/core/dev.c:6511
napi_poll net/core/dev.c:6578 [inline]
net_rx_action+0x9c1/0xd90 net/core/dev.c:6689
__do_softirq+0x1d3/0x9c6 kernel/softirq.c:571
invoke_softirq kernel/softirq.c:445 [inline]
__irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:lock_acquire+0x1ef/0x570 kernel/locking/lockdep.c:5634
Code: f9 a2 7e 83 f8 01 0f 85 e8 02 00 00 9c 58 f6 c4 02 0f 85 fb 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24
RSP: 0018:ffffc9000398f8f8 EFLAGS: 00000206
RAX: dffffc0000000000 RBX: 1ffff92000731f21 RCX: ffffffff815f29ce
RDX: 1ffff11003c83c5e RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff908e5977
R10: fffffbfff211cb2e R11: 0000000000000000 R12: 0000000000000001
R13: 0000000000000000 R14: ffff88813fe33928 R15: 0000000000000000
__might_fault mm/memory.c:5577 [inline]
__might_fault+0x104/0x170 mm/memory.c:5570
_copy_from_user+0x25/0x170 lib/usercopy.c:13
copy_from_user include/linux/uaccess.h:152 [inline]
copy_msghdr_from_user+0x89/0x150 net/socket.c:2413
sendmsg_copy_msghdr net/socket.c:2513 [inline]
___sys_sendmsg+0xdd/0x1b0 net/socket.c:2532
__sys_sendmmsg+0x18b/0x460 net/socket.c:2622
__do_sys_sendmmsg net/socket.c:2651 [inline]
__se_sys_sendmmsg net/socket.c:2648 [inline]
__x64_sys_sendmmsg+0x99/0x100 net/socket.c:2648
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f51f9901dd9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc60ecc4b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f51f9901dd9
RDX: 000000000000ffc3 RSI: 0000000020001e80 RDI: 0000000000000006
RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc60ecc4d0
R13: 00000000000f4240 R14: 000000000000d650 R15: 00007ffc60ecc4c4
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc60ecc4b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f51f9901dd9
RDX: 000000000000ffc3 RSI: 0000000020001e80 RDI: 0000000000000006
RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc60ecc4d0
R13: 00000000000f4240 R14: 000000000000d650 R15: 00007ffc60ecc4c4
BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt()
CPU: 1 PID: 21 Comm: ksoftirqd/1 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176
dccp_rcv_established net/dccp/input.c:374 [inline]
dccp_rcv_established+0x107/0x160 net/dccp/input.c:364
dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666
sk_backlog_rcv include/net/sock.h:1100 [inline]
__sk_receive_skb+0x294/0x820 net/core/sock.c:565
dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889
ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254
dst_input include/net/dst.h:461 [inline]
ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564
__netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485
__netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599
process_backlog+0x3a0/0x7c0 net/core/dev.c:5927
__napi_poll+0xb3/0x6d0 net/core/dev.c:6511
napi_poll net/core/dev.c:6578 [inline]
net_rx_action+0x9c1/0xd90 net/core/dev.c:6689
__do_softirq+0x1d3/0x9c6 kernel/softirq.c:571
run_ksoftirqd kernel/softirq.c:934 [inline]
run_ksoftirqd+0x2d/0x60 kernel/softirq.c:926
smpboot_thread_fn+0x645/0x9c0 kernel/smpboot.c:164
kthread+0x2e4/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
Negotiation of local Allow Short Seqnos failed in state CHANGING at net/dccp/feat.c:1534/dccp_feat_activate_values()
Negotiation of local Allow Short Seqnos failed in state CHANGING at net/dccp/feat.c:1534/dccp_feat_activate_values()
BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt()
CPU: 1 PID: 3757 Comm: syz-executor239 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176
dccp_rcv_established net/dccp/input.c:374 [inline]
dccp_rcv_established+0x107/0x160 net/dccp/input.c:364
dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666
sk_backlog_rcv include/net/sock.h:1100 [inline]
__sk_receive_skb+0x294/0x820 net/core/sock.c:565
dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889
ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254
dst_input include/net/dst.h:461 [inline]
ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564
__netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485
__netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599
process_backlog+0x3a0/0x7c0 net/core/dev.c:5927
__napi_poll+0xb3/0x6d0 net/core/dev.c:6511
napi_poll net/core/dev.c:6578 [inline]
net_rx_action+0x9c1/0xd90 net/core/dev.c:6689
__do_softirq+0x1d3/0x9c6 kernel/softirq.c:571
invoke_softirq kernel/softirq.c:445 [inline]
__irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:preempt_count_add+0x3f/0x140 kernel/sched/core.c:5646
Code: 53 83 e0 07 89 fb 48 c1 e9 03 83 c0 03 0f b6 14 11 38 d0 7c 08 84 d2 0f 85 e1 00 00 00 8b 15 f8 89 c8 0f 65 01 1d 71 a0 af 7e <85> d2 75 11 65 8b 05 66 a0 af 7e 0f b6 c0 3d f4 00 00 00 7f 64 65
RSP: 0018:ffffc90003d0f268 EFLAGS: 00000282
RAX: 0000000000000003 RBX: 0000000000000001 RCX: 1ffffffff2236b18
RDX: 0000000000000000 RSI: ffffffff81c8481e RDI: 0000000000000001
RBP: ffffc90003d0f338 R08: ffffffff8e61b58e R09: ffffc90003d0f324
R10: fffff520007a1e69 R11: ffffc90003d0f410 R12: ffffc90003d0f3a8
R13: ffffc90003d0f2f0 R14: ffff88801c6b8000 R15: 0000000000000cc0
unwind_next_frame+0xaa/0x1cc0 arch/x86/kernel/unwind_orc.c:433
arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38
kasan_set_track mm/kasan/common.c:45 [inline]
set_alloc_info mm/kasan/common.c:437 [inline]
__kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:470
kasan_slab_alloc include/linux/kasan.h:224 [inline]
slab_post_alloc_hook mm/slab.h:727 [inline]
slab_alloc_node mm/slub.c:3243 [inline]
kmem_cache_alloc_node+0x2b1/0x3f0 mm/slub.c:3293
__alloc_skb+0x210/0x2f0 net/core/skbuff.c:422
alloc_skb include/linux/skbuff.h:1257 [inline]
alloc_skb_with_frags+0x93/0x6c0 net/core/skbuff.c:6021
sock_alloc_send_pskb+0x7a3/0x930 net/core/sock.c:2665
sock_alloc_send_skb include/net/sock.h:1866 [inline]
dccp_sendmsg+0x2b0/0xca0 net/dccp/proto.c:752
inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:819
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg+0xcf/0x120 net/socket.c:734
____sys_sendmsg+0x334/0x810 net/socket.c:2482
___sys_sendmsg+0x110/0x1b0 net/socket.c:2536
__sys_sendmmsg+0x18b/0x460 net/socket.c:2622
__do_sys_sendmmsg net/socket.c:2651 [inline]
__se_sys_sendmmsg net/socket.c:2648 [inline]
__x64_sys_sendmmsg+0x99/0x100 net/socket.c:2648
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f51f9901dd9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc60ecc4b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f51f9901dd9
RDX: 000000000000ffc3 RSI: 0000000020001e80 RDI: 0000000000000006
RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc60ecc4d0
R13: 00000000000f4240 R14: 000000000000eff4 R15: 00007ffc60ecc4c4
BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt()
CPU: 1 PID: 3816 Comm: syz-executor239 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176
dccp_rcv_established net/dccp/input.c:374 [inline]
dccp_rcv_established+0x107/0x160 net/dccp/input.c:364
dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666
sk_backlog_rcv include/net/sock.h:1100 [inline]
__sk_receive_skb+0x294/0x820 net/core/sock.c:565
dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889
ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254
dst_input include/net/dst.h:461 [inline]
ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564
__netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485
__netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599
process_backlog+0x3a0/0x7c0 net/core/dev.c:5927
__napi_poll+0xb3/0x6d0 net/core/dev.c:6511
napi_poll net/core/dev.c:6578 [inline]
net_rx_action+0x9c1/0xd90 net/core/dev.c:6689
__do_softirq+0x1d3/0x9c6 kernel/softirq.c:571
invoke_softirq kernel/softirq.c:445 [inline]
__irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:__orc_find+0x5b/0xf0 arch/x86/kernel/unwind_orc.c:50
Code: ff df 49 89 fe 48 89 fd eb 0c 48 8d 6b 04 49 89 de 49 39 ec 72 4d 4c 89 e0 48 29 e8 48 89 c2 48 c1 e8 3f 48 c1 fa 02 48 01 d0 <48> d1 f8 48 8d 5c 85 00 48 89 d8 48 c1 e8 03 42 0f b6 14 38 48 89
RSP: 0018:ffffc90003d0f238 EFLAGS: 00000202
RAX: 000000000000000b RBX: 0000000000000001 RCX: ffffffff87eda6e8
RDX: 000000000000000b RSI: ffffffff8edf57f8 RDI: ffffffff8e430c20
RBP: ffffffff8e430c20 R08: ffffffff8be023e0 R09: ffffc90003d0f324
R10: fffff520007a1e69 R11: 000000000008c07c R12: ffffffff8e430c4c
R13: ffffffff8e430c20 R14: ffffffff8e430c20 R15: dffffc0000000000
orc_find arch/x86/kernel/unwind_orc.c:178 [inline]
unwind_next_frame+0x2a3/0x1cc0 arch/x86/kernel/unwind_orc.c:448
arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38
kasan_set_track mm/kasan/common.c:45 [inline]
set_alloc_info mm/kasan/common.c:437 [inline]
__kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:470
kasan_slab_alloc include/linux/kasan.h:224 [inline]
slab_post_alloc_hook mm/slab.h:727 [inline]
slab_alloc_node mm/slub.c:3243 [inline]
kmem_cache_alloc_node+0x2b1/0x3f0 mm/slub.c:3293
__alloc_skb+0x210/0x2f0 net/core/skbuff.c:422
alloc_skb include/linux/skbuff.h:1257 [inline]
alloc_skb_with_frags+0x93/0x6c0 net/core/skbuff.c:6021
sock_alloc_send_pskb+0x7a3/0x930 net/core/sock.c:2665
sock_alloc_send_skb include/net/sock.h:1866 [inline]
dccp_sendmsg+0x2b0/0xca0 net/dccp/proto.c:752
inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:819
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg+0xcf/0x120 net/socket.c:734
____sys_sendmsg+0x334/0x810 net/socket.c:2482
___sys_sendmsg+0x110/0x1b0 net/socket.c:2536
__sys_sendmmsg+0x18b/0x460 net/socket.c:2622
__do_sys_sendmmsg net/socket.c:2651 [inline]
__se_sys_sendmmsg net/socket.c:2648 [inline]
__x64_sys_sendmmsg+0x99/0x100 net/socket.c:2648
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f51f9901dd9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc60ecc4b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f51f9901dd9
RDX: 000000000000ffc3 RSI: 0000000020001e80 RDI: 0000000000000006
RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc60ecc4d0
R13: 00000000000f4240 R14: 000000000000f75e R15: 00007ffc60ecc4c4
BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt()
CPU: 1 PID: 3840 Comm: syz-executor239 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414
ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760
ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176
dccp_rcv_established net/dccp/input.c:374 [inline]
dccp_rcv_established+0x107/0x160 net/dccp/input.c:364
dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666
sk_backlog_rcv include/net/sock.h:1100 [inline]
__sk_receive_skb+0x294/0x820 net/core/sock.c:565
dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889
ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254
dst_input include/net/dst.h:461 [inline]
ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444
NF_HOOK include/linux/netfilter.h:307 [inline]
NF_HOOK include/linux/netfilter.h:301 [inline]
ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564
__netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485
__netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599
process_backlog+0x3a0/0x7c0 net/core/dev.c:5927
__napi_poll+0xb3/0x6d0 net/core/dev.c:6511
napi_poll net/core/dev.c:6578 [inline]
net_rx_action+0x9c1/0xd90 net/core/dev.c:6689
__do_softirq+0x1d3/0x9c6 kernel/softirq.c:571
invoke_softirq kernel/softirq.c:445 [inline]
__irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106
----------------
Code disassembly (best guess):
0: f9 stc
1: a2 7e 83 f8 01 0f 85 movabs %al,0x2e8850f01f8837e
8: e8 02
a: 00 00 add %al,(%rax)
c: 9c pushfq
d: 58 pop %rax
e: f6 c4 02 test $0x2,%ah
11: 0f 85 fb 02 00 00 jne 0x312
17: 48 83 7c 24 08 00 cmpq $0x0,0x8(%rsp)
1d: 74 01 je 0x20
1f: fb sti
20: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
27: fc ff df
* 2a: 48 01 c3 add %rax,%rbx <-- trapping instruction
2d: 48 c7 03 00 00 00 00 movq $0x0,(%rbx)
34: 48 c7 43 08 00 00 00 movq $0x0,0x8(%rbx)
3b: 00
3c: 48 rex.W
3d: 8b .byte 0x8b
3e: 84 .byte 0x84
3f: 24 .byte 0x24