loop0: detected capacity change from 0 to 512 ------------[ cut here ]------------ strnlen: detected buffer overflow: 65 byte read of buffer size 64 WARNING: lib/string_helpers.c:1035 at __fortify_report+0x97/0xb0, CPU#0: syz-executor.0/4357 Modules linked in: CPU: 0 UID: 0 PID: 4357 Comm: syz-executor.0 Not tainted 6.18.0-rc4-next-20251107 #1 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__fortify_report+0x97/0xb0 Code: 85 49 c7 c5 e0 0b 03 85 4c 0f 45 e9 e8 c2 f4 1e ff 49 89 e8 4c 89 e2 4c 89 f6 4c 89 e9 48 c7 c7 60 0c 03 85 e8 9a 15 e4 fe 90 <0f> 0b 90 90 5b 5d 41 5c 41 5d 41 5e e9 a8 ac 73 02 e8 a3 9d 5c ff RSP: 0018:ffff888019b57a30 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffffc900007e5000 RDX: 0000000000040000 RSI: ffffffff8139f19e RDI: 0000000000000001 RBP: 0000000000000040 R08: 0000000000000001 R09: ffffed100336aefd R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000041 R13: ffffffff85030be0 R14: ffffffff850315a0 R15: ffff888049c2a000 FS: 00007f54e4001700(0000) GS:ffff8880e5398000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8dded24cf8 CR3: 0000000014380000 CR4: 0000000000350ef0 Call Trace: __fortify_panic+0x23/0x30 ext4_fill_super+0x368f/0xb910 get_tree_bdev_flags+0x38a/0x620 vfs_get_tree+0x93/0x340 path_mount+0x726/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x430 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f54e6a8d04a Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f54e4000fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 00007f54e6a8d04a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f54e4001000 RBP: 00007f54e4001040 R08: 00007f54e4001040 R09: 0000000020000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 R13: 0000000020000100 R14: 00007f54e4001000 R15: 0000000020000040 irq event stamp: 1549 hardirqs last enabled at (1557): [] __up_console_sem+0x78/0x80 hardirqs last disabled at (1566): [] __up_console_sem+0x5d/0x80 softirqs last enabled at (1094): [] handle_softirqs+0x50c/0x770 softirqs last disabled at (1089): [] __irq_exit_rcu+0xc4/0x100 ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ kernel BUG at lib/string_helpers.c:1043! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI CPU: 0 UID: 0 PID: 4357 Comm: syz-executor.0 Tainted: G W 6.18.0-rc4-next-20251107 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:__fortify_panic+0x24/0x30 Code: 90 90 90 90 90 90 f3 0f 1e fa 41 54 49 89 d4 55 48 89 f5 53 89 fb e8 6b f4 1e ff 0f b6 fb 4c 89 e2 48 89 ee e8 1d ff ff ff 90 <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffff888019b57a60 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 0000000000000002 RCX: ffffc900007e5000 RDX: 0000000000040000 RSI: ffffffff8139f19e RDI: 0000000000000001 RBP: 0000000000000040 R08: 0000000000000001 R09: ffffed100336aefd R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000041 R13: ffff888016160400 R14: ffff888016160400 R15: ffff888049c2a000 FS: 00007f54e4001700(0000) GS:ffff8880e5398000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8dded24cf8 CR3: 0000000014380000 CR4: 0000000000350ef0 Call Trace: ext4_fill_super+0x368f/0xb910 get_tree_bdev_flags+0x38a/0x620 vfs_get_tree+0x93/0x340 path_mount+0x726/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x430 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f54e6a8d04a Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f54e4000fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 00007f54e6a8d04a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f54e4001000 RBP: 00007f54e4001040 R08: 00007f54e4001040 R09: 0000000020000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 R13: 0000000020000100 R14: 00007f54e4001000 R15: 0000000020000040 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__fortify_panic+0x24/0x30 Code: 90 90 90 90 90 90 f3 0f 1e fa 41 54 49 89 d4 55 48 89 f5 53 89 fb e8 6b f4 1e ff 0f b6 fb 4c 89 e2 48 89 ee e8 1d ff ff ff 90 <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffff888019b57a60 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 0000000000000002 RCX: ffffc900007e5000 RDX: 0000000000040000 RSI: ffffffff8139f19e RDI: 0000000000000001 RBP: 0000000000000040 R08: 0000000000000001 R09: ffffed100336aefd R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000041 R13: ffff888016160400 R14: ffff888016160400 R15: ffff888049c2a000 FS: 00007f54e4001700(0000) GS:ffff8880e5398000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8dded24cf8 CR3: 0000000014380000 CR4: 0000000000350ef0 audit: type=1326 audit(1762747195.344:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4329 comm="syz-executor.4" exe="/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f86c996eb19 code=0x0 kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak)