ntfs3: loop4: Different NTFS' sector size (2048) and media sector size (512)
BUG: unable to handle page fault for address: fffff5210091dccf
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 23ffed067 P4D 23ffed067 PUD 0
Oops: 0002 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 4863 Comm: syz.4.212 Not tainted 6.1.138-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
RIP: 0010:seqcount_lockdep_reader_access+0x17b/0x1c0 include/linux/seqlock.h:105
Code: 00 4d 85 e4 75 16 e8 e4 9d 0f 00 eb 15 e8 dd 9d 0f 00 e8 38 0b 9e 08 4d 85 e4 74 ea e8 ce 9d 0f 00 fb 48 c7 04 24 0e 36 e0 45 <4b> c7 04 3e 00 00 00 00 66 43 c7 44 3e 09 00 00 43 c6 44 3e 0b 00
RSP: 0018:ffffc900048ee680 EFLAGS: 00010293
RAX: ffffffff817135e2 RBX: 0000000000000000 RCX: ffff888079e19dc0
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900048ee728 R08: dffffc0000000000 R09: fffffbfff211705c
R10: fffffbfff211705c R11: 1ffffffff211705b R12: 0000000000000200
R13: dffffc0000000000 R14: 1ffff9200091dcd0 R15: dffffc00ffffffff
FS: 00007f5775c7c6c0(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffff5210091dccf CR3: 0000000025913000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
ktime_get_coarse_real_ts64+0x36/0x120 kernel/time/timekeeping.c:2261
current_time+0x86/0x2b0 fs/inode.c:2538
atime_needs_update+0x3fd/0x780 fs/inode.c:1996
touch_atime+0xcd/0x620 fs/inode.c:2013
file_accessed include/linux/fs.h:2600 [inline]
filemap_read+0x2d0b/0x2f80 mm/filemap.c:2836
generic_file_read_iter+0x115/0x670 mm/filemap.c:2914
__kernel_read+0x2dc/0x6b0 fs/read_write.c:428
integrity_kernel_read+0x86/0xd0 security/integrity/iint.c:228
ima_calc_file_hash_tfm security/integrity/ima/ima_crypto.c:485 [inline]
ima_calc_file_shash security/integrity/ima/ima_crypto.c:516 [inline]
ima_calc_file_hash+0x96b/0x17c0 security/integrity/ima/ima_crypto.c:573
ima_collect_measurement+0x4b3/0xac0 security/integrity/ima/ima_api.c:293
process_measurement+0xfae/0x1a10 security/integrity/ima/ima_main.c:351
ima_file_check+0xc2/0x100 security/integrity/ima/ima_main.c:534
do_open fs/namei.c:3628 [inline]
path_openat+0x2679/0x2e70 fs/namei.c:3783
do_filp_open+0x1c1/0x3c0 fs/namei.c:3810
do_sys_openat2+0x142/0x490 fs/open.c:1318
do_sys_open fs/open.c:1334 [inline]
__do_sys_open fs/open.c:1342 [inline]
__se_sys_open fs/open.c:1338 [inline]
__x64_sys_open+0x11b/0x140 fs/open.c:1338
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f5774d8e969
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f5775c7c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007f5774fb5fa0 RCX: 00007f5774d8e969
RDX: 1df2a23c5997fa5f RSI: 0000000000080242 RDI: 0000200000000580
RBP: 00007f5774e10ab1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f5774fb5fa0 R15: 00007ffc9c4bc068
</TASK>
Modules linked in:
CR2: fffff5210091dccf
---[ end trace 0000000000000000 ]---
RIP: 0010:seqcount_lockdep_reader_access+0x17b/0x1c0 include/linux/seqlock.h:105
Code: 00 4d 85 e4 75 16 e8 e4 9d 0f 00 eb 15 e8 dd 9d 0f 00 e8 38 0b 9e 08 4d 85 e4 74 ea e8 ce 9d 0f 00 fb 48 c7 04 24 0e 36 e0 45 <4b> c7 04 3e 00 00 00 00 66 43 c7 44 3e 09 00 00 43 c6 44 3e 0b 00
RSP: 0018:ffffc900048ee680 EFLAGS: 00010293
RAX: ffffffff817135e2 RBX: 0000000000000000 RCX: ffff888079e19dc0
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900048ee728 R08: dffffc0000000000 R09: fffffbfff211705c
R10: fffffbfff211705c R11: 1ffffffff211705b R12: 0000000000000200
R13: dffffc0000000000 R14: 1ffff9200091dcd0 R15: dffffc00ffffffff
FS: 00007f5775c7c6c0(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffff5210091dccf CR3: 0000000025913000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess), 1 bytes skipped:
0: 4d 85 e4 test %r12,%r12
3: 75 16 jne 0x1b
5: e8 e4 9d 0f 00 call 0xf9dee
a: eb 15 jmp 0x21
c: e8 dd 9d 0f 00 call 0xf9dee
11: e8 38 0b 9e 08 call 0x89e0b4e
16: 4d 85 e4 test %r12,%r12
19: 74 ea je 0x5
1b: e8 ce 9d 0f 00 call 0xf9dee
20: fb sti
21: 48 c7 04 24 0e 36 e0 movq $0x45e0360e,(%rsp)
28: 45
* 29: 4b c7 04 3e 00 00 00 movq $0x0,(%r14,%r15,1) <-- trapping instruction
30: 00
31: 66 43 c7 44 3e 09 00 movw $0x0,0x9(%r14,%r15,1)
38: 00
39: 43 c6 44 3e 0b 00 movb $0x0,0xb(%r14,%r15,1)