Hello,
syzbot found the following issue on:
HEAD commit: 779f9571ac3e Linux 6.1.164
git tree: linux-6.1.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=16f03722580000
kernel config:
https://syzkaller.appspot.com/x/.config?x=b1adc0bfde2d8a4a
dashboard link:
https://syzkaller.appspot.com/bug?extid=512f29e28a6f2f187bd0
compiler: Debian clang version 21.1.8 (++20251221033036+2078da43e25a-1~exp1~20251221153213.50), Debian LLD 21.1.8
userspace arch: arm64
Unfortunately, I don't have any reproducer for this issue yet.
Downloadable assets:
disk image:
https://storage.googleapis.com/syzbot-assets/85e761437fc4/disk-779f9571.raw.xz
vmlinux:
https://storage.googleapis.com/syzbot-assets/0f3aa7ae77ae/vmlinux-779f9571.xz
kernel image:
https://storage.googleapis.com/syzbot-assets/baba59a67bd9/Image-779f9571.gz.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+512f29...@syzkaller.appspotmail.com
------------[ cut here ]------------
memcpy: detected field-spanning write (size 32) of single field "&new->sel" at net/sched/cls_u32.c:854 (size 16)
WARNING: CPU: 1 PID: 4574 at net/sched/cls_u32.c:854 u32_init_knode net/sched/cls_u32.c:854 [inline]
WARNING: CPU: 1 PID: 4574 at net/sched/cls_u32.c:854 u32_change+0x1698/0x1f18 net/sched/cls_u32.c:920
Modules linked in:
CPU: 1 PID: 4574 Comm: syz.4.77 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025
pstate: 62400005 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
pc : u32_init_knode net/sched/cls_u32.c:854 [inline]
pc : u32_change+0x1698/0x1f18 net/sched/cls_u32.c:920
lr : u32_init_knode net/sched/cls_u32.c:854 [inline]
lr : u32_change+0x1698/0x1f18 net/sched/cls_u32.c:920
sp : ffff800020d26be0
x29: ffff800020d26d40 x28: ffff0000d2411e00 x27: 0000000000000000
x26: 1fffe0001a4823cd x25: ffff0000d2410a00 x24: ffff0000d2411a00
x23: 0000000000000010 x22: ffff7000041a4d8c x21: dfff800000000000
x20: ffff800020d27400 x19: ffff800017bd9000 x18: ffff800011b8bf60
x17: 1fffe00033eac97e x16: ffff8000082d9364 x15: 0000000040000000
x14: 0000000000000001 x13: 1fffe00033eaf030 x12: 0000000000ff0100
x11: ff0080000a8da424 x10: 0000000000000003 x9 : 69a76cf98f06be00
x8 : 69a76cf98f06be00 x7 : ffff80000825796c x6 : 0000000000000000
x5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000006 x1 : ffff800011b8da80 x0 : ffff80018a3ff000
Call trace:
u32_init_knode net/sched/cls_u32.c:854 [inline]
u32_change+0x1698/0x1f18 net/sched/cls_u32.c:920
tc_new_tfilter+0xc28/0x1370 net/sched/cls_api.c:2187
rtnetlink_rcv_msg+0x6d8/0xcdc net/core/rtnetlink.c:6141
netlink_rcv_skb+0x218/0x3e8 net/netlink/af_netlink.c:2511
rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6168
netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
netlink_unicast+0x60c/0x814 net/netlink/af_netlink.c:1344
netlink_sendmsg+0x6f4/0x9c0 net/netlink/af_netlink.c:1872
sock_sendmsg_nosec net/socket.c:718 [inline]
__sock_sendmsg net/socket.c:730 [inline]
____sys_sendmsg+0x5c8/0x938 net/socket.c:2518
___sys_sendmsg net/socket.c:2572 [inline]
__sys_sendmmsg+0x344/0x834 net/socket.c:2658
__do_sys_sendmmsg net/socket.c:2687 [inline]
__se_sys_sendmmsg net/socket.c:2684 [inline]
__arm64_sys_sendmmsg+0xa0/0xbc net/socket.c:2684
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2b4 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140
do_el0_svc+0x58/0x130 arch/arm64/kernel/syscall.c:204
el0_svc+0x58/0x128 arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
irq event stamp: 1252
hardirqs last enabled at (1251): [<ffff800008257a00>] raw_spin_rq_unlock_irq kernel/sched/sched.h:1374 [inline]
hardirqs last enabled at (1251): [<ffff800008257a00>] finish_lock_switch+0xb0/0x1c4 kernel/sched/core.c:5004
hardirqs last disabled at (1252): [<ffff800011a22ed4>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last enabled at (1244): [<ffff8000081ac37c>] softirq_handle_end kernel/softirq.c:439 [inline]
softirqs last enabled at (1244): [<ffff8000081ac37c>] handle_softirqs+0xaec/0xc60 kernel/softirq.c:624
softirqs last disabled at (1107): [<ffff800008020164>] __do_softirq+0x14/0x20 kernel/softirq.c:630
---[ end trace 0000000000000000 ]---
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup