random: sshd: uninitialized urandom read (32 bytes read, 34 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 34 bits of entropy available) random: nonblocking pool is initialized IPVS: Creating netns size=2552 id=1 ================================================================== BUG: KASAN: stack-out-of-bounds in strlen lib/string.c:481 [inline] BUG: KASAN: stack-out-of-bounds in strlcpy+0x101/0x120 lib/string.c:141 Read of size 1 at addr ffff8801c761f9cc by task syz-executor0/3772 CPU: 1 PID: 3772 Comm: syz-executor0 Not tainted 4.4.125-g38f41ec #21 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 81199a04c3c6c0f6 ffff8801c761f8a8 ffffffff81d067bd ffffea00071d87c0 ffff8801c761f9cc 0000000000000000 ffff8801c761f9cc ffff8801c761fab0 ffff8801c761f8e0 ffffffff814fea83 ffff8801c761f9cc Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_address_description+0x73/0x260 mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report+0x285/0x370 mm/kasan/report.c:408 [] __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:426 [] strlen lib/string.c:481 [inline] [] strlcpy+0x101/0x120 lib/string.c:141 [] xt_copy_counters_from_user+0x152/0x2c0 net/netfilter/x_tables.c:849 [] do_add_counters+0x96/0x590 net/ipv6/netfilter/ip6_tables.c:1342 [] compat_do_arpt_set_ctl+0x1be/0x6b0 net/ipv4/netfilter/arp_tables.c:1462 [] compat_nf_sockopt net/netfilter/nf_sockopt.c:143 [inline] [] compat_nf_setsockopt+0x88/0x130 net/netfilter/nf_sockopt.c:155 [] compat_ip_setsockopt+0x8b/0xd0 net/ipv4/ip_sockglue.c:1251 [] inet_csk_compat_setsockopt+0x95/0x120 net/ipv4/inet_connection_sock.c:914 [] compat_tcp_setsockopt+0x3d/0x70 net/ipv4/tcp.c:2652 [] compat_sock_common_setsockopt+0xb2/0x140 net/core/sock.c:2670 [] C_SYSC_setsockopt net/compat.c:384 [inline] [] compat_SyS_setsockopt+0x149/0x290 net/compat.c:367 [] do_syscall_32_irqs_on arch/x86/entry/common.c:392 [inline] [] do_fast_syscall_32+0x321/0x8a0 arch/x86/entry/common.c:459 [] sysenter_flags_fixed+0xd/0x17 The buggy address belongs to the page: page:ffffea00071d87c0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x8000000000000000() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801c761f880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801c761f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8801c761f980: 00 f1 f1 f1 f1 00 00 00 00 04 f2 f2 f2 00 00 00 ^ ffff8801c761fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801c761fa80: 00 00 f1 f1 f1 f1 00 00 00 00 00 f2 f2 f2 00 00 ==================================================================