==================================================================
BUG: KASAN: stack-out-of-bounds in strlen lib/string.c:481 [inline]
BUG: KASAN: stack-out-of-bounds in strlcpy+0x101/0x120 lib/string.c:141
Read of size 1 at addr ffff8801d2857b3c by task syz-executor4/6564

CPU: 1 PID: 6564 Comm: syz-executor4 Not tainted 4.4.154+ #33
 0000000000000000 5149f3fb1399e46f ffff8801d2857a18 ffffffff81a54fed
 ffffea00074a15c0 ffff8801d2857b3c 0000000000000000 ffff8801d2857b3c
 ffff8801d2857c20 ffff8801d2857a50 ffffffff8146c219 ffff8801d2857b3c
Call Trace:
 [<ffffffff81a54fed>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81a54fed>] dump_stack+0xc1/0x124 lib/dump_stack.c:51
 [<ffffffff8146c219>] print_address_description+0x6c/0x217 mm/kasan/report.c:252
 [<ffffffff8146c539>] kasan_report_error mm/kasan/report.c:351 [inline]
 [<ffffffff8146c539>] kasan_report.cold.6+0x175/0x2f7 mm/kasan/report.c:408
 [<ffffffff814613e4>] __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:426
 [<ffffffff81a71291>] strlen lib/string.c:481 [inline]
 [<ffffffff81a71291>] strlcpy+0x101/0x120 lib/string.c:141
 [<ffffffff822eb94e>] xt_copy_counters_from_user+0x13e/0x2e0 net/netfilter/x_tables.c:879
 [<ffffffff82602a66>] do_add_counters+0x96/0x5c0 net/ipv6/netfilter/ip6_tables.c:1343
 [<ffffffff82608346>] compat_do_ip6t_set_ctl+0xd6/0x140 net/ipv6/netfilter/ip6_tables.c:1736
 [<ffffffff8227b2db>] compat_nf_sockopt net/netfilter/nf_sockopt.c:143 [inline]
 [<ffffffff8227b2db>] compat_nf_setsockopt+0x8b/0x130 net/netfilter/nf_sockopt.c:155
 [<ffffffff825798bd>] compat_ipv6_setsockopt+0x15d/0x1d0 net/ipv6/ipv6_sockglue.c:940
 [<ffffffff8258e5ca>] compat_udpv6_setsockopt+0x4a/0x90 net/ipv6/udp.c:1446
 [<ffffffff82161674>] compat_sock_common_setsockopt+0xb4/0x150 net/core/sock.c:2670
 [<ffffffff8222bfa9>] C_SYSC_setsockopt net/compat.c:385 [inline]
 [<ffffffff8222bfa9>] compat_SyS_setsockopt+0x169/0x6e0 net/compat.c:368
device lo entered promiscuous mode
 [<ffffffff81005ffe>] do_syscall_32_irqs_on arch/x86/entry/common.c:393 [inline]
 [<ffffffff81005ffe>] do_fast_syscall_32+0x31e/0x8b0 arch/x86/entry/common.c:460
 [<ffffffff82691c90>] sysenter_flags_fixed+0xd/0x1a

The buggy address belongs to the page:
page:ffffea00074a15c0 count:0 mapcount:0 mapping:          (null) index:0x0
flags: 0x4000000000000000()
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff8801d2857a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff8801d2857a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
>ffff8801d2857b00: f1 f1 f1 00 00 00 00 04 f2 f2 f2 00 00 00 00 00
                                        ^
 ffff8801d2857b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff8801d2857c00: f1 f1 f1 f1 00 00 00 00 00 f2 f2 f2 00 00 00 00
==================================================================
device lo left promiscuous mode