================================================================== BUG: KASAN: stack-out-of-bounds in strlen lib/string.c:481 [inline] BUG: KASAN: stack-out-of-bounds in strlcpy+0x101/0x120 lib/string.c:141 Read of size 1 at addr ffff8801d3fc7b0c by task syz-executor0/12207 CPU: 1 PID: 12207 Comm: syz-executor0 Not tainted 4.9.127+ #43 ffff8801d3fc79e8 ffffffff81af11e9 ffffea00074ff1c0 ffff8801d3fc7b0c 0000000000000000 ffff8801d3fc7b0c 0000000000000024 ffff8801d3fc7a20 ffffffff814e13fd ffff8801d3fc7b0c 0000000000000001 0000000000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_address_description+0x6c/0x234 mm/kasan/report.c:256 [] kasan_report_error mm/kasan/report.c:355 [inline] [] kasan_report.cold.6+0x242/0x2fe mm/kasan/report.c:412 [] __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:430 [] strlen lib/string.c:481 [inline] [] strlcpy+0x101/0x120 lib/string.c:141 [] xt_copy_counters_from_user+0x152/0x300 net/netfilter/x_tables.c:880 [] do_add_counters+0x96/0x5b0 net/ipv4/netfilter/ip_tables.c:1188 [] compat_do_ipt_set_ctl+0xd6/0x140 net/ipv4/netfilter/ip_tables.c:1573 [] compat_nf_sockopt net/netfilter/nf_sockopt.c:143 [inline] [] compat_nf_setsockopt+0x8b/0x130 net/netfilter/nf_sockopt.c:155 [] compat_ip_setsockopt+0x97/0xd0 net/ipv4/ip_sockglue.c:1276 audit: type=1400 audit(1537175563.103:54): avc: denied { sys_chroot } for pid=12215 comm="syz-executor1" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [] inet_csk_compat_setsockopt+0x97/0x120 net/ipv4/inet_connection_sock.c:914 [] compat_tcp_setsockopt+0x3d/0x70 net/ipv4/tcp.c:2769 [] compat_sock_common_setsockopt+0xb4/0x150 net/core/sock.c:2717 [] C_SYSC_setsockopt net/compat.c:399 [inline] [] compat_SyS_setsockopt+0x169/0x540 net/compat.c:382 [] do_syscall_32_irqs_on arch/x86/entry/common.c:325 [inline] [] do_fast_syscall_32+0x2f1/0x860 arch/x86/entry/common.c:387 [] entry_SYSENTER_compat+0x90/0xa2 arch/x86/entry/entry_64_compat.S:137 The buggy address belongs to the page: page:ffffea00074ff1c0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x4000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801d3fc7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801d3fc7a80: 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 >ffff8801d3fc7b00: 00 04 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 ^ ffff8801d3fc7b80: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 ffff8801d3fc7c00: 00 00 00 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 ==================================================================