detected buffer overflow in strlen ------------[ cut here ]------------ kernel BUG at lib/string.c:1051! invalid opcode: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 8826 Comm: syz-executor7 Not tainted 4.14.0-rc1+ #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801c7bbc080 task.stack: ffff8801ce460000 RIP: 0010:fortify_panic+0x13/0x20 lib/string.c:1050 RSP: 0018:ffff8801ce4679b0 EFLAGS: 00010282 RAX: 0000000000000022 RBX: 1ffff10039c8cf3a RCX: 0000000000000000 RDX: 0000000000000022 RSI: ffffffff815899fe RDI: ffffed0039c8cf2a RBP: ffff8801ce4679b0 R08: ffffffff85b309f8 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000024 R13: dffffc0000000000 R14: 0000000000000030 R15: ffff8801ce467af8 FS: 0000000000000000(0000) GS:ffff8801db300000(0063) knlGS:00000000f7742b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000081226f4 CR3: 00000001ca570000 CR4: 00000000001426e0 DR0: 0000000020000000 DR1: 0000000020000008 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 00000000000b0602 Call Trace: strlen include/linux/string.h:265 [inline] strlcpy include/linux/string.h:288 [inline] xt_copy_counters_from_user+0x38d/0x3b0 net/netfilter/x_tables.c:895 do_add_counters+0x96/0x550 net/ipv6/netfilter/ip6_tables.c:1181 compat_do_ip6t_set_ctl+0xc5/0x150 net/ipv6/netfilter/ip6_tables.c:1556 compat_nf_sockopt net/netfilter/nf_sockopt.c:143 [inline] compat_nf_setsockopt+0x88/0x130 net/netfilter/nf_sockopt.c:155 compat_ipv6_setsockopt+0x13a/0x1e0 net/ipv6/ipv6_sockglue.c:954 inet_csk_compat_setsockopt+0x95/0x120 net/ipv4/inet_connection_sock.c:1043 compat_tcp_setsockopt+0x3d/0x70 net/ipv4/tcp.c:2810 compat_sock_common_setsockopt+0xb2/0x140 net/core/sock.c:2971 C_SYSC_setsockopt net/compat.c:396 [inline] compat_SyS_setsockopt+0x17c/0x410 net/compat.c:379 do_syscall_32_irqs_on arch/x86/entry/common.c:329 [inline] do_fast_syscall_32+0x3f2/0xeed arch/x86/entry/common.c:391 entry_SYSENTER_compat+0x51/0x60 arch/x86/entry/entry_64_compat.S:124 RIP: 0023:0xf7f46c79 RSP: 002b:00000000f774205c EFLAGS: 00000296 ORIG_RAX: 000000000000016e RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000000029 RDX: 0000000000000041 RSI: 0000000020000000 RDI: 0000000000000030 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Code: 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b 48 89 df e8 e2 94 d1 fc eb de 55 48 89 fe 48 c7 c7 80 06 4a 85 48 89 e5 e8 02 96 87 fc <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 57 41 56 RIP: fortify_panic+0x13/0x20 lib/string.c:1050 RSP: ffff8801ce4679b0 ---[ end trace ced1704c0fe43ca5 ]--- detected buffer overflow in strlen ------------[ cut here ]------------ kernel BUG at lib/string.c:1051! invalid opcode: 0000 [#2] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 8864 Comm: syz-executor7 Tainted: G D 4.14.0-rc1+ #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801c712a340 task.stack: ffff8801c7ae8000 RIP: 0010:fortify_panic+0x13/0x20 lib/string.c:1050 RSP: 0018:ffff8801c7aef9b0 EFLAGS: 00010282 RAX: 0000000000000022 RBX: 1ffff10038f5df3a RCX: 0000000000000000 RDX: 0000000000000022 RSI: ffffffff815899fe RDI: ffffed0038f5df2a RBP: ffff8801c7aef9b0 R08: ffffffff85b30b38 R09: 1ffff10038f5ded0 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000024 R13: dffffc0000000000 R14: 0000000000000030 R15: ffff8801c7aefaf8 FS: 0000000000000000(0000) GS:ffff8801db300000(0063) knlGS:00000000f76beb40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000008472798 CR3: 00000001ca570000 CR4: 00000000001426e0 DR0: 0000000020000000 DR1: 0000000020000008 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: strlen include/linux/string.h:265 [inline] strlcpy include/linux/string.h:288 [inline] xt_copy_counters_from_user+0x38d/0x3b0 net/netfilter/x_tables.c:895 do_add_counters+0x96/0x550 net/ipv6/netfilter/ip6_tables.c:1181 compat_do_ip6t_set_ctl+0xc5/0x150 net/ipv6/netfilter/ip6_tables.c:1556 compat_nf_sockopt net/netfilter/nf_sockopt.c:143 [inline] compat_nf_setsockopt+0x88/0x130 net/netfilter/nf_sockopt.c:155 compat_ipv6_setsockopt+0x13a/0x1e0 net/ipv6/ipv6_sockglue.c:954 inet_csk_compat_setsockopt+0x95/0x120 net/ipv4/inet_connection_sock.c:1043 compat_tcp_setsockopt+0x3d/0x70 net/ipv4/tcp.c:2810 compat_sock_common_setsockopt+0xb2/0x140 net/core/sock.c:2971 C_SYSC_setsockopt net/compat.c:396 [inline] compat_SyS_setsockopt+0x17c/0x410 net/compat.c:379 do_syscall_32_irqs_on arch/x86/entry/common.c:329 [inline] do_fast_syscall_32+0x3f2/0xeed arch/x86/entry/common.c:391 entry_SYSENTER_compat+0x51/0x60 arch/x86/entry/entry_64_compat.S:124 RIP: 0023:0xf7f46c79 RSP: 002b:00000000f76be05c EFLAGS: 00000296 ORIG_RAX: 000000000000016e RAX: ffffffffffffffda RBX: 0000000000000018 RCX: 0000000000000029 RDX: 0000000000000041 RSI: 0000000020000000 RDI: 0000000000000030 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Code: 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b 48 89 df e8 e2 94 d1 fc eb de 55 48 89 fe 48 c7 c7 80 06 4a 85 48 89 e5 e8 02 96 87 fc <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 57 41 56 RIP: fortify_panic+0x13/0x20 lib/string.c:1050 RSP: ffff8801c7aef9b0 ---[ end trace ced1704c0fe43ca6 ]---