netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. audit_printk_skb: 27 callbacks suppressed ================================================================== BUG: KASAN: stack-out-of-bounds in strlen lib/string.c:481 [inline] BUG: KASAN: stack-out-of-bounds in strlcpy+0x101/0x120 lib/string.c:141 Read of size 1 at addr ffff8801cf24fafc by task syz-executor2/29027 CPU: 0 PID: 29027 Comm: syz-executor2 Not tainted 4.4.154+ #33 0000000000000000 c934a429bb4e340d ffff8801cf24f9d8 ffffffff81a54fed ffffea00073c93c0 ffff8801cf24fafc 0000000000000000 ffff8801cf24fafc ffff8801cf24fbe0 ffff8801cf24fa10 ffffffff8146c219 ffff8801cf24fafc Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_address_description+0x6c/0x217 mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report.cold.6+0x175/0x2f7 mm/kasan/report.c:408 [] __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:426 [] strlen lib/string.c:481 [inline] [] strlcpy+0x101/0x120 lib/string.c:141 [] xt_copy_counters_from_user+0x13e/0x2e0 net/netfilter/x_tables.c:879 [] do_add_counters+0x96/0x5c0 net/ipv6/netfilter/ip6_tables.c:1343 [] compat_do_ip6t_set_ctl+0xd6/0x140 net/ipv6/netfilter/ip6_tables.c:1736 [] compat_nf_sockopt net/netfilter/nf_sockopt.c:143 [inline] [] compat_nf_setsockopt+0x8b/0x130 net/netfilter/nf_sockopt.c:155 [] compat_ipv6_setsockopt+0x15d/0x1d0 net/ipv6/ipv6_sockglue.c:940 [] inet_csk_compat_setsockopt+0x97/0x120 net/ipv4/inet_connection_sock.c:914 [] compat_tcp_setsockopt+0x3d/0x70 net/ipv4/tcp.c:2654 [] compat_sock_common_setsockopt+0xb4/0x150 net/core/sock.c:2670 [] C_SYSC_setsockopt net/compat.c:385 [inline] [] compat_SyS_setsockopt+0x169/0x6e0 net/compat.c:368 [] do_syscall_32_irqs_on arch/x86/entry/common.c:393 [inline] [] do_fast_syscall_32+0x31e/0x8b0 arch/x86/entry/common.c:460 [] sysenter_flags_fixed+0xd/0x1a The buggy address belongs to the page: page:ffffea00073c93c0 count:0 mapcount:0 mapping: (null) index:0x0 audit: type=1400 audit(1536418619.347:770): avc: denied { create } for pid=29022 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 audit: type=1400 audit(1536418619.357:771): avc: denied { create } for pid=29022 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 audit: type=1400 audit(1536418619.357:772): avc: denied { create } for pid=29045 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 audit: type=1400 audit(1536418619.357:773): avc: denied { create } for pid=29045 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801cf24f980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801cf24fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8801cf24fa80: 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 04 ^ ffff8801cf24fb00: f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801cf24fb80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 ================================================================== audit: type=1400 audit(1536418619.857:774): avc: denied { create } for pid=29064 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0