================================================================== SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pig=27600 comm=syz-executor0 BUG: KASAN: stack-out-of-bounds in strlen lib/string.c:481 [inline] BUG: KASAN: stack-out-of-bounds in strlcpy+0x101/0x120 lib/string.c:141 Read of size 1 at addr ffff8801d556fb4c by task syz-executor1/27596 CPU: 1 PID: 27596 Comm: syz-executor1 Not tainted 4.9.124+ #37 ffff8801d556fa28 ffffffff81af4b39 ffffea0007555bc0 ffff8801d556fb4c 0000000000000000 ffff8801d556fb4c 0000000000000004 ffff8801d556fa60 ffffffff814f37d5 ffff8801d556fb4c 0000000000000001 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x6c/0x234 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [] __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:430 binder: BINDER_SET_CONTEXT_MGR already set binder: 27617:27620 ioctl 40046207 0 returned -16 binder_alloc: 10030: binder_alloc_buf, no vma binder: 27617:27620 transaction failed 29189/-3, size 40-8 line 3136 binder: BINDER_SET_CONTEXT_MGR already set binder: 27617:27621 ioctl 40046207 0 returned -16 [] strlen lib/string.c:481 [inline] [] strlcpy+0x101/0x120 lib/string.c:141 [] xt_copy_counters_from_user+0x152/0x300 net/netfilter/x_tables.c:880 [] do_add_counters+0x96/0x5c0 net/ipv6/netfilter/ip6_tables.c:1217 [] compat_do_ip6t_set_ctl+0xd6/0x140 net/ipv6/netfilter/ip6_tables.c:1592 [] compat_nf_sockopt net/netfilter/nf_sockopt.c:143 [inline] [] compat_nf_setsockopt+0x8b/0x130 net/netfilter/nf_sockopt.c:155 [] compat_ipv6_setsockopt+0x15d/0x1d0 net/ipv6/ipv6_sockglue.c:953 [] compat_udpv6_setsockopt+0x4a/0x90 net/ipv6/udp.c:1361 [] compat_sock_common_setsockopt+0xb4/0x150 net/core/sock.c:2717 [] C_SYSC_setsockopt net/compat.c:399 [inline] [] compat_SyS_setsockopt+0x169/0x540 net/compat.c:382 [] do_syscall_32_irqs_on arch/x86/entry/common.c:325 [inline] [] do_fast_syscall_32+0x2f1/0x860 arch/x86/entry/common.c:387 [] entry_SYSENTER_compat+0x90/0xa2 arch/x86/entry/entry_64_compat.S:137 The buggy address belongs to the page: page:ffffea0007555bc0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801d556fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801d556fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8801d556fb00: 00 f1 f1 f1 f1 00 00 00 00 04 f2 f2 f2 00 00 00 ^ ffff8801d556fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801d556fc00: 00 00 f1 f1 f1 f1 00 00 00 00 00 f2 f2 f2 00 00 ==================================================================