------------[ cut here ]------------ memcpy: detected field-spanning write (size 32) of single field "&new->sel" at net/sched/cls_u32.c:855 (size 16) WARNING: net/sched/cls_u32.c:855 at u32_init_knode net/sched/cls_u32.c:855 [inline], CPU#0: syz.1.10675/9517 WARNING: net/sched/cls_u32.c:855 at u32_change+0x1da0/0x2720 net/sched/cls_u32.c:921, CPU#0: syz.1.10675/9517 Modules linked in: CPU: 0 UID: 0 PID: 9517 Comm: syz.1.10675 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:u32_init_knode net/sched/cls_u32.c:855 [inline] RIP: 0010:u32_change+0x1daf/0x2720 net/sched/cls_u32.c:921 Code: 3d 20 3a 44 06 01 75 33 e8 6e 68 0e f8 eb 50 e8 67 68 0e f8 48 8d 3d 30 66 69 06 b9 10 00 00 00 4c 89 f6 48 c7 c2 c0 58 e1 8c <67> 48 0f b9 3a e9 af ee ff ff e8 42 68 0e f8 eb 24 e8 3b 68 0e f8 RSP: 0018:ffffc9001aabefc0 EFLAGS: 00010283 RAX: ffffffff89b72349 RBX: ffff8880b31ef000 RCX: 0000000000000010 RDX: ffffffff8ce158c0 RSI: 0000000000000020 RDI: ffffffff90208980 RBP: ffffc9001aabf178 R08: 0000000000000dc0 R09: 00000000ffffffff R10: dffffc0000000000 R11: fffffbfff2022f77 R12: ffff8880b31eece8 R13: 0000000000000001 R14: 0000000000000020 R15: 0000000000000001 FS: 00007f00c9a966c0(0000) GS:ffff888125467000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f00c0000020 CR3: 00000000b05f6000 CR4: 00000000003526f0 Call Trace: tc_new_tfilter+0xe1c/0x1630 net/sched/cls_api.c:2423 rtnetlink_rcv_msg+0x7d5/0xbe0 net/core/rtnetlink.c:6958 netlink_rcv_skb+0x232/0x4b0 net/netlink/af_netlink.c:2550 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x80f/0x9b0 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x813/0xb40 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0xa68/0xad0 net/socket.c:2592 ___sys_sendmsg+0x2a5/0x360 net/socket.c:2646 __sys_sendmmsg+0x27c/0x4e0 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0xa0/0xc0 net/socket.c:2759 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f00c8b9c799 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f00c9a96028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f00c8e15fa0 RCX: 00007f00c8b9c799 RDX: 04000000000001f2 RSI: 0000200000000000 RDI: 0000000000000006 RBP: 00007f00c8c32bd9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f00c8e16038 R14: 00007f00c8e15fa0 R15: 00007ffd8bd428c8 ---------------- Code disassembly (best guess): 0: 3d 20 3a 44 06 cmp $0x6443a20,%eax 5: 01 75 33 add %esi,0x33(%rbp) 8: e8 6e 68 0e f8 call 0xf80e687b d: eb 50 jmp 0x5f f: e8 67 68 0e f8 call 0xf80e687b 14: 48 8d 3d 30 66 69 06 lea 0x6696630(%rip),%rdi # 0x669664b 1b: b9 10 00 00 00 mov $0x10,%ecx 20: 4c 89 f6 mov %r14,%rsi 23: 48 c7 c2 c0 58 e1 8c mov $0xffffffff8ce158c0,%rdx * 2a: 67 48 0f b9 3a ud1 (%edx),%rdi <-- trapping instruction 2f: e9 af ee ff ff jmp 0xffffeee3 34: e8 42 68 0e f8 call 0xf80e687b 39: eb 24 jmp 0x5f 3b: e8 3b 68 0e f8 call 0xf80e687b