netlink: 36 bytes leftover after parsing attributes in process `syz.3.287'. ------------[ cut here ]------------ memcpy: detected field-spanning write (size 32) of single field "&new->sel" at net/sched/cls_u32.c:855 (size 16) WARNING: net/sched/cls_u32.c:855 at u32_init_knode net/sched/cls_u32.c:855 [inline], CPU#1: syz.3.287/6660 WARNING: net/sched/cls_u32.c:855 at u32_change+0x1da0/0x2720 net/sched/cls_u32.c:921, CPU#1: syz.3.287/6660 Modules linked in: CPU: 1 UID: 0 PID: 6660 Comm: syz.3.287 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:u32_init_knode net/sched/cls_u32.c:855 [inline] RIP: 0010:u32_change+0x1daf/0x2720 net/sched/cls_u32.c:921 Code: 3d 1c 87 43 06 01 75 33 e8 ce ab 0d f8 eb 50 e8 c7 ab 0d f8 48 8d 3d 60 b7 68 06 b9 10 00 00 00 4c 89 f6 48 c7 c2 a0 80 e1 8c <67> 48 0f b9 3a e9 af ee ff ff e8 a2 ab 0d f8 eb 24 e8 9b ab 0d f8 RSP: 0000:ffffc9001d01ef80 EFLAGS: 00010287 RAX: ffffffff89b7f419 RBX: ffff8880709b5800 RCX: 0000000000000010 RDX: ffffffff8ce180a0 RSI: 0000000000000020 RDI: ffffffff9020ab80 RBP: ffffc9001d01f138 R08: 0000000000000dc0 R09: 00000000ffffffff R10: dffffc0000000000 R11: fffffbfff2023337 R12: ffff88804d1704e8 R13: 0000000000000001 R14: 0000000000000020 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888125560000(0063) knlGS:00000000f5436b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000f725c08e CR3: 000000001e6b8000 CR4: 00000000003526f0 Call Trace: tc_new_tfilter+0xff8/0x1780 net/sched/cls_api.c:2430 rtnetlink_rcv_msg+0x7d5/0xbe0 net/core/rtnetlink.c:6958 netlink_rcv_skb+0x232/0x4b0 net/netlink/af_netlink.c:2550 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x80f/0x9b0 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x813/0xb40 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x972/0x9f0 net/socket.c:2592 ___sys_sendmsg+0x2a5/0x360 net/socket.c:2646 __sys_sendmmsg+0x2e7/0x4e0 net/socket.c:2728 __compat_sys_sendmmsg net/compat.c:360 [inline] __do_compat_sys_sendmmsg net/compat.c:367 [inline] __se_compat_sys_sendmmsg net/compat.c:364 [inline] __ia32_compat_sys_sendmmsg+0xa2/0xc0 net/compat.c:364 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x20d/0x640 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e RIP: 0023:0xf7f78f6c Code: 90 85 d2 74 0a 89 ce 81 e6 ff 0f 00 00 89 32 85 c0 74 05 c1 e9 0c 89 08 31 c0 5e 5d c3 90 0f 1f 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 58 b8 RSP: 002b:00000000f543650c EFLAGS: 00000206 ORIG_RAX: 0000000000000159 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000080000000 RDX: 00000000000001f2 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 ---------------- Code disassembly (best guess): 0: 3d 1c 87 43 06 cmp $0x643871c,%eax 5: 01 75 33 add %esi,0x33(%rbp) 8: e8 ce ab 0d f8 call 0xf80dabdb d: eb 50 jmp 0x5f f: e8 c7 ab 0d f8 call 0xf80dabdb 14: 48 8d 3d 60 b7 68 06 lea 0x668b760(%rip),%rdi # 0x668b77b 1b: b9 10 00 00 00 mov $0x10,%ecx 20: 4c 89 f6 mov %r14,%rsi 23: 48 c7 c2 a0 80 e1 8c mov $0xffffffff8ce180a0,%rdx * 2a: 67 48 0f b9 3a ud1 (%edx),%rdi <-- trapping instruction 2f: e9 af ee ff ff jmp 0xffffeee3 34: e8 a2 ab 0d f8 call 0xf80dabdb 39: eb 24 jmp 0x5f 3b: e8 9b ab 0d f8 call 0xf80dabdb