loop0: detected capacity change from 0 to 4096
ntfs3(loop0): Different NTFS sector size (2048) and media sector size (512).
BUG: unable to handle page fault for address: ffffff8e7c63e7a0
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD e738067 P4D e738067 PUD 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5814 Comm: syz.0.184 Not tainted 6.12.0-rc7-syzkaller-00012-g3022e9d00ebe #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:crypto_shash_update+0x75/0x90 crypto/shash.c:52
Code: 3c 20 00 74 08 48 89 df e8 68 2d 7c fd 48 8b 1b 48 83 c3 a0 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 4b 2d 7c fd <4c> 8b 1b 48 89 ef 4c 89 fe 44 89 f2 5b 41 5c 41 5e 41 5f 5d 41 ff
RSP: 0018:ffffc9000cc671b0 EFLAGS: 00010246
RAX: 1ffffff1cf8c7cf4 RBX: ffffff8e7c63e7a0 RCX: ffff88801f02a440
RDX: 0000000000000000 RSI: ffff88805f376000 RDI: ffffc9000cc672c0
RBP: ffffc9000cc672c0 R08: ffffffff847e3b52 R09: 1ffffffff2859b15
R10: dffffc0000000000 R11: fffffbfff2859b16 R12: dffffc0000000000
R13: ffff88805f376000 R14: 000000000000000a R15: ffff88805f376000
FS: 00005555905fd500(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffff8e7c63e7a0 CR3: 00000000130da000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
ima_calc_file_hash_tfm security/integrity/ima/ima_crypto.c:491 [inline]
ima_calc_file_shash security/integrity/ima/ima_crypto.c:511 [inline]
ima_calc_file_hash+0xb1c/0x1b30 security/integrity/ima/ima_crypto.c:568
ima_collect_measurement+0x520/0xb10 security/integrity/ima/ima_api.c:293
process_measurement+0x1351/0x1fb0 security/integrity/ima/ima_main.c:372
ima_bprm_check+0x129/0x2b0 security/integrity/ima/ima_main.c:547
security_bprm_check+0xd2/0x250 security/security.c:1297
search_binary_handler fs/exec.c:1740 [inline]
exec_binprm fs/exec.c:1794 [inline]
bprm_execve+0xa56/0x1770 fs/exec.c:1845
do_execveat_common+0x55f/0x6f0 fs/exec.c:1952
do_execveat fs/exec.c:2037 [inline]
__do_sys_execveat fs/exec.c:2111 [inline]
__se_sys_execveat fs/exec.c:2105 [inline]
__x64_sys_execveat+0xc4/0xe0 fs/exec.c:2105
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f981eb7e719
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcdccaf0d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
RAX: ffffffffffffffda RBX: 00007f981ed35f80 RCX: 00007f981eb7e719
RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c
RBP: 00007f981ebf1616 R08: 0000000000001000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f981ed35f80 R14: 00007f981ed35f80 R15: 00000000000000ff
</TASK>
Modules linked in:
CR2: ffffff8e7c63e7a0
---[ end trace 0000000000000000 ]---
RIP: 0010:crypto_shash_update+0x75/0x90 crypto/shash.c:52
Code: 3c 20 00 74 08 48 89 df e8 68 2d 7c fd 48 8b 1b 48 83 c3 a0 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 4b 2d 7c fd <4c> 8b 1b 48 89 ef 4c 89 fe 44 89 f2 5b 41 5c 41 5e 41 5f 5d 41 ff
RSP: 0018:ffffc9000cc671b0 EFLAGS: 00010246
RAX: 1ffffff1cf8c7cf4 RBX: ffffff8e7c63e7a0 RCX: ffff88801f02a440
RDX: 0000000000000000 RSI: ffff88805f376000 RDI: ffffc9000cc672c0
RBP: ffffc9000cc672c0 R08: ffffffff847e3b52 R09: 1ffffffff2859b15
R10: dffffc0000000000 R11: fffffbfff2859b16 R12: dffffc0000000000
R13: ffff88805f376000 R14: 000000000000000a R15: ffff88805f376000
FS: 00005555905fd500(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffff8e7c63e7a0 CR3: 00000000130da000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 3c 20 cmp $0x20,%al
2: 00 74 08 48 add %dh,0x48(%rax,%rcx,1)
6: 89 df mov %ebx,%edi
8: e8 68 2d 7c fd call 0xfd7c2d75
d: 48 8b 1b mov (%rbx),%rbx
10: 48 83 c3 a0 add $0xffffffffffffffa0,%rbx
14: 48 89 d8 mov %rbx,%rax
17: 48 c1 e8 03 shr $0x3,%rax
1b: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1)
20: 74 08 je 0x2a
22: 48 89 df mov %rbx,%rdi
25: e8 4b 2d 7c fd call 0xfd7c2d75
* 2a: 4c 8b 1b mov (%rbx),%r11 <-- trapping instruction
2d: 48 89 ef mov %rbp,%rdi
30: 4c 89 fe mov %r15,%rsi
33: 44 89 f2 mov %r14d,%edx
36: 5b pop %rbx
37: 41 5c pop %r12
39: 41 5e pop %r14
3b: 41 5f pop %r15
3d: 5d pop %rbp
3e: 41 rex.B
3f: ff .byte 0xff