BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt() CPU: 1 PID: 21 Comm: ksoftirqd/1 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414 ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760 ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline] dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176 dccp_rcv_established net/dccp/input.c:374 [inline] dccp_rcv_established+0x107/0x160 net/dccp/input.c:364 dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666 sk_backlog_rcv include/net/sock.h:1100 [inline] __sk_receive_skb+0x294/0x820 net/core/sock.c:565 dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889 ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:461 [inline] ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485 __netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599 process_backlog+0x3a0/0x7c0 net/core/dev.c:5927 __napi_poll+0xb3/0x6d0 net/core/dev.c:6511 napi_poll net/core/dev.c:6578 [inline] net_rx_action+0x9c1/0xd90 net/core/dev.c:6689 __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571 run_ksoftirqd kernel/softirq.c:934 [inline] run_ksoftirqd+0x2d/0x60 kernel/softirq.c:926 smpboot_thread_fn+0x645/0x9c0 kernel/smpboot.c:164 kthread+0x2e4/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt() CPU: 1 PID: 3647 Comm: syz-executor239 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414 ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760 ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline] dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176 dccp_rcv_established net/dccp/input.c:374 [inline] dccp_rcv_established+0x107/0x160 net/dccp/input.c:364 dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666 sk_backlog_rcv include/net/sock.h:1100 [inline] __sk_receive_skb+0x294/0x820 net/core/sock.c:565 dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889 ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:461 [inline] ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485 __netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599 process_backlog+0x3a0/0x7c0 net/core/dev.c:5927 __napi_poll+0xb3/0x6d0 net/core/dev.c:6511 napi_poll net/core/dev.c:6578 [inline] net_rx_action+0x9c1/0xd90 net/core/dev.c:6689 __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:lock_acquire+0x1ef/0x570 kernel/locking/lockdep.c:5634 Code: f9 a2 7e 83 f8 01 0f 85 e8 02 00 00 9c 58 f6 c4 02 0f 85 fb 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 RSP: 0018:ffffc9000398f8f8 EFLAGS: 00000206 RAX: dffffc0000000000 RBX: 1ffff92000731f21 RCX: ffffffff815f29ce RDX: 1ffff11003c83c5e RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff908e5977 R10: fffffbfff211cb2e R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000000 R14: ffff88813fe33928 R15: 0000000000000000 __might_fault mm/memory.c:5577 [inline] __might_fault+0x104/0x170 mm/memory.c:5570 _copy_from_user+0x25/0x170 lib/usercopy.c:13 copy_from_user include/linux/uaccess.h:152 [inline] copy_msghdr_from_user+0x89/0x150 net/socket.c:2413 sendmsg_copy_msghdr net/socket.c:2513 [inline] ___sys_sendmsg+0xdd/0x1b0 net/socket.c:2532 __sys_sendmmsg+0x18b/0x460 net/socket.c:2622 __do_sys_sendmmsg net/socket.c:2651 [inline] __se_sys_sendmmsg net/socket.c:2648 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2648 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f51f9901dd9 ================================ WARNING: inconsistent lock state 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0 Not tainted -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. syz-executor239/3647 [HC0[0]:SC1[1]:HE0:SE0] takes: ffffffff8c0bf338 (vmap_area_lock){+.?.}-{2:2}, at: spin_lock include/linux/spinlock.h:349 [inline] ffffffff8c0bf338 (vmap_area_lock){+.?.}-{2:2}, at: find_vmap_area+0x1c/0x130 mm/vmalloc.c:1836 {SOFTIRQ-ON-W} state was registered at: lock_acquire kernel/locking/lockdep.c:5666 [inline] lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5631 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:349 [inline] alloc_vmap_area+0xa0b/0x1d50 mm/vmalloc.c:1617 __get_vm_area_node+0x142/0x3f0 mm/vmalloc.c:2484 get_vm_area_caller+0x43/0x50 mm/vmalloc.c:2537 __ioremap_caller.constprop.0+0x292/0x600 arch/x86/mm/ioremap.c:280 acpi_os_ioremap include/acpi/acpi_io.h:13 [inline] acpi_map drivers/acpi/osl.c:296 [inline] acpi_os_map_iomem+0x463/0x550 drivers/acpi/osl.c:355 acpi_tb_acquire_table+0xd8/0x209 drivers/acpi/acpica/tbdata.c:142 acpi_tb_validate_table drivers/acpi/acpica/tbdata.c:317 [inline] acpi_tb_validate_table+0x50/0x8c drivers/acpi/acpica/tbdata.c:308 acpi_tb_verify_temp_table+0x84/0x674 drivers/acpi/acpica/tbdata.c:504 acpi_reallocate_root_table+0x374/0x3e0 drivers/acpi/acpica/tbxface.c:180 acpi_early_init+0x13a/0x438 drivers/acpi/bus.c:1214 start_kernel+0x3cf/0x48f init/main.c:1099 secondary_startup_64_no_verify+0xce/0xdb irq event stamp: 3147 hardirqs last enabled at (3146): [] __up_console_sem+0xae/0xc0 kernel/printk/printk.c:264 hardirqs last disabled at (3147): [] dump_stack_lvl+0x2e/0x134 lib/dump_stack.c:105 softirqs last enabled at (3106): [] dccp_sendmsg+0x697/0xca0 net/dccp/proto.c:785 softirqs last disabled at (3109): [] invoke_softirq kernel/softirq.c:445 [inline] softirqs last disabled at (3109): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(vmap_area_lock); lock(vmap_area_lock); *** DEADLOCK *** 5 locks held by syz-executor239/3647: #0: ffff88813fe33928 (&mm->mmap_lock#2){++++}-{3:3}, at: __might_fault+0xa1/0x170 mm/memory.c:5576 #1: ffffffff8bf89400 (rcu_read_lock){....}-{1:2}, at: __skb_unlink include/linux/skbuff.h:2314 [inline] #1: ffffffff8bf89400 (rcu_read_lock){....}-{1:2}, at: __skb_dequeue include/linux/skbuff.h:2329 [inline] #1: ffffffff8bf89400 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x34b/0x7c0 net/core/dev.c:5925 #2: ffffffff8bf89400 (rcu_read_lock){....}-{1:2}, at: __skb_pull include/linux/skbuff.h:2599 [inline] #2: ffffffff8bf89400 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x206/0x4c0 net/ipv4/ip_input.c:230 #3: ffff8880742380b0 (slock-AF_INET6/1){+.-.}-{2:2}, at: __sk_receive_skb+0x34f/0x820 net/core/sock.c:556 #4: ffff888074238130 (sk_lock-AF_INET6){+.+.}-{0:0}, at: dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889 stack backtrace: CPU: 1 PID: 3647 Comm: syz-executor239 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_usage_bug kernel/locking/lockdep.c:3961 [inline] valid_state kernel/locking/lockdep.c:3973 [inline] mark_lock_irq kernel/locking/lockdep.c:4176 [inline] mark_lock.part.0.cold+0x18/0xd8 kernel/locking/lockdep.c:4632 mark_lock kernel/locking/lockdep.c:4596 [inline] mark_usage kernel/locking/lockdep.c:4527 [inline] __lock_acquire+0x11d9/0x56d0 kernel/locking/lockdep.c:5007 lock_acquire kernel/locking/lockdep.c:5666 [inline] lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5631 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:349 [inline] find_vmap_area+0x1c/0x130 mm/vmalloc.c:1836 check_heap_object mm/usercopy.c:176 [inline] __check_object_size mm/usercopy.c:250 [inline] __check_object_size+0x1f8/0x700 mm/usercopy.c:212 check_object_size include/linux/thread_info.h:199 [inline] __copy_from_user_inatomic include/linux/uaccess.h:62 [inline] copy_from_user_nmi arch/x86/lib/usercopy.c:47 [inline] copy_from_user_nmi+0xcb/0x130 arch/x86/lib/usercopy.c:31 copy_code arch/x86/kernel/dumpstack.c:91 [inline] show_opcodes+0x59/0xb0 arch/x86/kernel/dumpstack.c:121 show_iret_regs+0xd/0x33 arch/x86/kernel/dumpstack.c:149 __show_regs+0x1e/0x60 arch/x86/kernel/process_64.c:74 show_trace_log_lvl+0x25b/0x2ba arch/x86/kernel/dumpstack.c:292 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414 ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760 ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline] dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176 dccp_rcv_established net/dccp/input.c:374 [inline] dccp_rcv_established+0x107/0x160 net/dccp/input.c:364 dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666 sk_backlog_rcv include/net/sock.h:1100 [inline] __sk_receive_skb+0x294/0x820 net/core/sock.c:565 dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889 ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:461 [inline] ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485 __netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599 process_backlog+0x3a0/0x7c0 net/core/dev.c:5927 __napi_poll+0xb3/0x6d0 net/core/dev.c:6511 napi_poll net/core/dev.c:6578 [inline] net_rx_action+0x9c1/0xd90 net/core/dev.c:6689 __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:lock_acquire+0x1ef/0x570 kernel/locking/lockdep.c:5634 Code: f9 a2 7e 83 f8 01 0f 85 e8 02 00 00 9c 58 f6 c4 02 0f 85 fb 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 RSP: 0018:ffffc9000398f8f8 EFLAGS: 00000206 RAX: dffffc0000000000 RBX: 1ffff92000731f21 RCX: ffffffff815f29ce RDX: 1ffff11003c83c5e RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff908e5977 R10: fffffbfff211cb2e R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000000 R14: ffff88813fe33928 R15: 0000000000000000 __might_fault mm/memory.c:5577 [inline] __might_fault+0x104/0x170 mm/memory.c:5570 _copy_from_user+0x25/0x170 lib/usercopy.c:13 copy_from_user include/linux/uaccess.h:152 [inline] copy_msghdr_from_user+0x89/0x150 net/socket.c:2413 sendmsg_copy_msghdr net/socket.c:2513 [inline] ___sys_sendmsg+0xdd/0x1b0 net/socket.c:2532 __sys_sendmmsg+0x18b/0x460 net/socket.c:2622 __do_sys_sendmmsg net/socket.c:2651 [inline] __se_sys_sendmmsg net/socket.c:2648 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2648 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f51f9901dd9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffc60ecc4b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f51f9901dd9 RDX: 000000000000ffc3 RSI: 0000000020001e80 RDI: 0000000000000006 RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc60ecc4d0 R13: 00000000000f4240 R14: 000000000000d650 R15: 00007ffc60ecc4c4 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffc60ecc4b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f51f9901dd9 RDX: 000000000000ffc3 RSI: 0000000020001e80 RDI: 0000000000000006 RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc60ecc4d0 R13: 00000000000f4240 R14: 000000000000d650 R15: 00007ffc60ecc4c4 BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt() CPU: 1 PID: 21 Comm: ksoftirqd/1 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414 ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760 ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline] dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176 dccp_rcv_established net/dccp/input.c:374 [inline] dccp_rcv_established+0x107/0x160 net/dccp/input.c:364 dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666 sk_backlog_rcv include/net/sock.h:1100 [inline] __sk_receive_skb+0x294/0x820 net/core/sock.c:565 dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889 ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:461 [inline] ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485 __netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599 process_backlog+0x3a0/0x7c0 net/core/dev.c:5927 __napi_poll+0xb3/0x6d0 net/core/dev.c:6511 napi_poll net/core/dev.c:6578 [inline] net_rx_action+0x9c1/0xd90 net/core/dev.c:6689 __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571 run_ksoftirqd kernel/softirq.c:934 [inline] run_ksoftirqd+0x2d/0x60 kernel/softirq.c:926 smpboot_thread_fn+0x645/0x9c0 kernel/smpboot.c:164 kthread+0x2e4/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Negotiation of local Allow Short Seqnos failed in state CHANGING at net/dccp/feat.c:1534/dccp_feat_activate_values() Negotiation of local Allow Short Seqnos failed in state CHANGING at net/dccp/feat.c:1534/dccp_feat_activate_values() BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt() CPU: 1 PID: 3757 Comm: syz-executor239 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414 ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760 ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline] dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176 dccp_rcv_established net/dccp/input.c:374 [inline] dccp_rcv_established+0x107/0x160 net/dccp/input.c:364 dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666 sk_backlog_rcv include/net/sock.h:1100 [inline] __sk_receive_skb+0x294/0x820 net/core/sock.c:565 dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889 ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:461 [inline] ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485 __netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599 process_backlog+0x3a0/0x7c0 net/core/dev.c:5927 __napi_poll+0xb3/0x6d0 net/core/dev.c:6511 napi_poll net/core/dev.c:6578 [inline] net_rx_action+0x9c1/0xd90 net/core/dev.c:6689 __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:preempt_count_add+0x3f/0x140 kernel/sched/core.c:5646 Code: 53 83 e0 07 89 fb 48 c1 e9 03 83 c0 03 0f b6 14 11 38 d0 7c 08 84 d2 0f 85 e1 00 00 00 8b 15 f8 89 c8 0f 65 01 1d 71 a0 af 7e <85> d2 75 11 65 8b 05 66 a0 af 7e 0f b6 c0 3d f4 00 00 00 7f 64 65 RSP: 0018:ffffc90003d0f268 EFLAGS: 00000282 RAX: 0000000000000003 RBX: 0000000000000001 RCX: 1ffffffff2236b18 RDX: 0000000000000000 RSI: ffffffff81c8481e RDI: 0000000000000001 RBP: ffffc90003d0f338 R08: ffffffff8e61b58e R09: ffffc90003d0f324 R10: fffff520007a1e69 R11: ffffc90003d0f410 R12: ffffc90003d0f3a8 R13: ffffc90003d0f2f0 R14: ffff88801c6b8000 R15: 0000000000000cc0 unwind_next_frame+0xaa/0x1cc0 arch/x86/kernel/unwind_orc.c:433 arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:45 [inline] set_alloc_info mm/kasan/common.c:437 [inline] __kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:470 kasan_slab_alloc include/linux/kasan.h:224 [inline] slab_post_alloc_hook mm/slab.h:727 [inline] slab_alloc_node mm/slub.c:3243 [inline] kmem_cache_alloc_node+0x2b1/0x3f0 mm/slub.c:3293 __alloc_skb+0x210/0x2f0 net/core/skbuff.c:422 alloc_skb include/linux/skbuff.h:1257 [inline] alloc_skb_with_frags+0x93/0x6c0 net/core/skbuff.c:6021 sock_alloc_send_pskb+0x7a3/0x930 net/core/sock.c:2665 sock_alloc_send_skb include/net/sock.h:1866 [inline] dccp_sendmsg+0x2b0/0xca0 net/dccp/proto.c:752 inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:819 sock_sendmsg_nosec net/socket.c:714 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:734 ____sys_sendmsg+0x334/0x810 net/socket.c:2482 ___sys_sendmsg+0x110/0x1b0 net/socket.c:2536 __sys_sendmmsg+0x18b/0x460 net/socket.c:2622 __do_sys_sendmmsg net/socket.c:2651 [inline] __se_sys_sendmmsg net/socket.c:2648 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2648 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f51f9901dd9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffc60ecc4b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f51f9901dd9 RDX: 000000000000ffc3 RSI: 0000000020001e80 RDI: 0000000000000006 RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc60ecc4d0 R13: 00000000000f4240 R14: 000000000000eff4 R15: 00007ffc60ecc4c4 BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt() CPU: 1 PID: 3816 Comm: syz-executor239 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414 ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760 ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline] dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176 dccp_rcv_established net/dccp/input.c:374 [inline] dccp_rcv_established+0x107/0x160 net/dccp/input.c:364 dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666 sk_backlog_rcv include/net/sock.h:1100 [inline] __sk_receive_skb+0x294/0x820 net/core/sock.c:565 dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889 ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:461 [inline] ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485 __netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599 process_backlog+0x3a0/0x7c0 net/core/dev.c:5927 __napi_poll+0xb3/0x6d0 net/core/dev.c:6511 napi_poll net/core/dev.c:6578 [inline] net_rx_action+0x9c1/0xd90 net/core/dev.c:6689 __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:__orc_find+0x5b/0xf0 arch/x86/kernel/unwind_orc.c:50 Code: ff df 49 89 fe 48 89 fd eb 0c 48 8d 6b 04 49 89 de 49 39 ec 72 4d 4c 89 e0 48 29 e8 48 89 c2 48 c1 e8 3f 48 c1 fa 02 48 01 d0 <48> d1 f8 48 8d 5c 85 00 48 89 d8 48 c1 e8 03 42 0f b6 14 38 48 89 RSP: 0018:ffffc90003d0f238 EFLAGS: 00000202 RAX: 000000000000000b RBX: 0000000000000001 RCX: ffffffff87eda6e8 RDX: 000000000000000b RSI: ffffffff8edf57f8 RDI: ffffffff8e430c20 RBP: ffffffff8e430c20 R08: ffffffff8be023e0 R09: ffffc90003d0f324 R10: fffff520007a1e69 R11: 000000000008c07c R12: ffffffff8e430c4c R13: ffffffff8e430c20 R14: ffffffff8e430c20 R15: dffffc0000000000 orc_find arch/x86/kernel/unwind_orc.c:178 [inline] unwind_next_frame+0x2a3/0x1cc0 arch/x86/kernel/unwind_orc.c:448 arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:45 [inline] set_alloc_info mm/kasan/common.c:437 [inline] __kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:470 kasan_slab_alloc include/linux/kasan.h:224 [inline] slab_post_alloc_hook mm/slab.h:727 [inline] slab_alloc_node mm/slub.c:3243 [inline] kmem_cache_alloc_node+0x2b1/0x3f0 mm/slub.c:3293 __alloc_skb+0x210/0x2f0 net/core/skbuff.c:422 alloc_skb include/linux/skbuff.h:1257 [inline] alloc_skb_with_frags+0x93/0x6c0 net/core/skbuff.c:6021 sock_alloc_send_pskb+0x7a3/0x930 net/core/sock.c:2665 sock_alloc_send_skb include/net/sock.h:1866 [inline] dccp_sendmsg+0x2b0/0xca0 net/dccp/proto.c:752 inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:819 sock_sendmsg_nosec net/socket.c:714 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:734 ____sys_sendmsg+0x334/0x810 net/socket.c:2482 ___sys_sendmsg+0x110/0x1b0 net/socket.c:2536 __sys_sendmmsg+0x18b/0x460 net/socket.c:2622 __do_sys_sendmmsg net/socket.c:2651 [inline] __se_sys_sendmmsg net/socket.c:2648 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2648 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f51f9901dd9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffc60ecc4b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f51f9901dd9 RDX: 000000000000ffc3 RSI: 0000000020001e80 RDI: 0000000000000006 RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc60ecc4d0 R13: 00000000000f4240 R14: 000000000000f75e R15: 00007ffc60ecc4c4 BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt() CPU: 1 PID: 3840 Comm: syz-executor239 Not tainted 6.0.0-rc6-syzkaller-00009-g60891ec99e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 tfrc_rx_hist_sample_rtt+0x4ce/0x4e0 net/dccp/ccids/lib/packet_history.c:414 ccid3_hc_rx_packet_recv+0x603/0xf50 net/dccp/ccids/ccid3.c:760 ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline] dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176 dccp_rcv_established net/dccp/input.c:374 [inline] dccp_rcv_established+0x107/0x160 net/dccp/input.c:364 dccp_v4_do_rcv+0x164/0x1a0 net/dccp/ipv4.c:666 sk_backlog_rcv include/net/sock.h:1100 [inline] __sk_receive_skb+0x294/0x820 net/core/sock.c:565 dccp_v4_rcv+0xfb5/0x18a0 net/dccp/ipv4.c:889 ip_protocol_deliver_rcu+0x9b/0x7c0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x2e8/0x4c0 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_local_deliver+0x1aa/0x200 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:461 [inline] ip_rcv_finish+0x1cb/0x2f0 net/ipv4/ip_input.c:444 NF_HOOK include/linux/netfilter.h:307 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:564 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5485 __netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599 process_backlog+0x3a0/0x7c0 net/core/dev.c:5927 __napi_poll+0xb3/0x6d0 net/core/dev.c:6511 napi_poll net/core/dev.c:6578 [inline] net_rx_action+0x9c1/0xd90 net/core/dev.c:6689 __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1106 ---------------- Code disassembly (best guess): 0: f9 stc 1: a2 7e 83 f8 01 0f 85 movabs %al,0x2e8850f01f8837e 8: e8 02 a: 00 00 add %al,(%rax) c: 9c pushfq d: 58 pop %rax e: f6 c4 02 test $0x2,%ah 11: 0f 85 fb 02 00 00 jne 0x312 17: 48 83 7c 24 08 00 cmpq $0x0,0x8(%rsp) 1d: 74 01 je 0x20 1f: fb sti 20: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 27: fc ff df * 2a: 48 01 c3 add %rax,%rbx <-- trapping instruction 2d: 48 c7 03 00 00 00 00 movq $0x0,(%rbx) 34: 48 c7 43 08 00 00 00 movq $0x0,0x8(%rbx) 3b: 00 3c: 48 rex.W 3d: 8b .byte 0x8b 3e: 84 .byte 0x84 3f: 24 .byte 0x24