BUG: unable to handle page fault for address: fffff521017aed95
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 23ffed067 P4D 23ffed067 PUD 0
Oops: Oops: 0000 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 18941 Comm: syz.7.3156 Not tainted 6.16.0-rc7-syzkaller-00018-g01a412d06bc5 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:page_cache_ra_unbounded+0x3b2/0x7d0 mm/readahead.c:287
Code: 89 e0 48 c1 e8 03 42 80 3c 38 00 0f 85 9c 03 00 00 48 8d 7b 29 4d 8b 24 24 48 89 f8 48 89 fa 48 c1 e8 03 49 c1 ec 09 83 e2 07 <42> 0f b6 04 38 41 83 e4 01 38 d0 7f 08 84 c0 0f 85 64 03 00 00 48
RSP: 0018:ffffc9000bd76a38 EFLAGS: 00010202
RAX: 1ffff920017aed96 RBX: ffffc9000bd76c88 RCX: ffffffff81f4b2f7
RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffc9000bd76cb1
RBP: 0000000000000000 R08: 0000000000000000 R09: fffff94000253ce0
R10: ffffea000129e707 R11: 0000000000000001 R12: 00007ff800000000
R13: 0000000000000001 R14: ffff8880543b1a78 R15: dffffc00ffffffff
FS: 00007f362f0246c0(0000) GS:ffff888124727000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffff521017aed95 CR3: 0000000062c3f000 CR4: 0000000000350ef0
Call Trace:
<TASK>
do_page_cache_ra mm/readahead.c:327 [inline]
page_cache_ra_order+0x9c8/0xd00 mm/readahead.c:532
page_cache_sync_ra+0x4b4/0x9c0 mm/readahead.c:621
filemap_get_pages+0xb62/0x1c20 mm/filemap.c:2602
filemap_read+0x3d2/0xe40 mm/filemap.c:2711
generic_file_read_iter+0x344/0x450 mm/filemap.c:2903
ntfs_file_read_iter+0x10e/0x1c0 fs/ntfs3/file.c:842
__kernel_read+0x3f3/0xb60 fs/read_write.c:530
integrity_kernel_read+0x7e/0xb0 security/integrity/iint.c:28
ima_calc_file_hash_tfm+0x259/0x350 security/integrity/ima/ima_crypto.c:480
ima_calc_file_shash security/integrity/ima/ima_crypto.c:511 [inline]
ima_calc_file_hash+0x1ba/0x490 security/integrity/ima/ima_crypto.c:568
ima_collect_measurement+0x897/0xa40 security/integrity/ima/ima_api.c:293
process_measurement+0x11fa/0x23e0 security/integrity/ima/ima_main.c:385
ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:613
security_file_post_open+0x8e/0x210 security/security.c:3130
do_open fs/namei.c:3898 [inline]
path_openat+0x1404/0x2cb0 fs/namei.c:4055
do_filp_open+0x20b/0x470 fs/namei.c:4082
do_sys_openat2+0x11b/0x1d0 fs/open.c:1437
do_sys_open fs/open.c:1452 [inline]
__do_sys_openat fs/open.c:1468 [inline]
__se_sys_openat fs/open.c:1463 [inline]
__x64_sys_openat+0x174/0x210 fs/open.c:1463
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f362e18e9a9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f362f024038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007f362e3b6080 RCX: 00007f362e18e9a9
RDX: 0000000000143042 RSI: 0000200000000d80 RDI: ffffffffffffff9c
RBP: 00007f362e210d69 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000001 R14: 00007f362e3b6080 R15: 00007fffdf8e1d78
</TASK>
Modules linked in:
CR2: fffff521017aed95
---[ end trace 0000000000000000 ]---
RIP: 0010:page_cache_ra_unbounded+0x3b2/0x7d0 mm/readahead.c:287
Code: 89 e0 48 c1 e8 03 42 80 3c 38 00 0f 85 9c 03 00 00 48 8d 7b 29 4d 8b 24 24 48 89 f8 48 89 fa 48 c1 e8 03 49 c1 ec 09 83 e2 07 <42> 0f b6 04 38 41 83 e4 01 38 d0 7f 08 84 c0 0f 85 64 03 00 00 48
RSP: 0018:ffffc9000bd76a38 EFLAGS: 00010202
RAX: 1ffff920017aed96 RBX: ffffc9000bd76c88 RCX: ffffffff81f4b2f7
RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffc9000bd76cb1
RBP: 0000000000000000 R08: 0000000000000000 R09: fffff94000253ce0
R10: ffffea000129e707 R11: 0000000000000001 R12: 00007ff800000000
R13: 0000000000000001 R14: ffff8880543b1a78 R15: dffffc00ffffffff
FS: 00007f362f0246c0(0000) GS:ffff888124727000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffff521017aed95 CR3: 0000000062c3f000 CR4: 0000000000350ef0
----------------
Code disassembly (best guess):
0: 89 e0 mov %esp,%eax
2: 48 c1 e8 03 shr $0x3,%rax
6: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1)
b: 0f 85 9c 03 00 00 jne 0x3ad
11: 48 8d 7b 29 lea 0x29(%rbx),%rdi
15: 4d 8b 24 24 mov (%r12),%r12
19: 48 89 f8 mov %rdi,%rax
1c: 48 89 fa mov %rdi,%rdx
1f: 48 c1 e8 03 shr $0x3,%rax
23: 49 c1 ec 09 shr $0x9,%r12
27: 83 e2 07 and $0x7,%edx
* 2a: 42 0f b6 04 38 movzbl (%rax,%r15,1),%eax <-- trapping instruction
2f: 41 83 e4 01 and $0x1,%r12d
33: 38 d0 cmp %dl,%al
35: 7f 08 jg 0x3f
37: 84 c0 test %al,%al
39: 0f 85 64 03 00 00 jne 0x3a3
3f: 48 rex.W