loop3: detected capacity change from 0 to 4096 ntfs3: loop3: Different NTFS' sector size (2048) and media sector size (512) BUG: unable to handle page fault for address: fffff52101938ccf #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 23ffed067 P4D 23ffed067 PUD 0 Oops: 0002 [#1] PREEMPT SMP KASAN CPU: 1 PID: 7749 Comm: syz.3.1021 Not tainted 6.1.139-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 RIP: 0010:seqcount_lockdep_reader_access+0x17b/0x1c0 include/linux/seqlock.h:105 Code: 00 4d 85 e4 75 16 e8 e4 9d 0f 00 eb 15 e8 dd 9d 0f 00 e8 98 e7 9d 08 4d 85 e4 74 ea e8 ce 9d 0f 00 fb 48 c7 04 24 0e 36 e0 45 <4b> c7 04 3e 00 00 00 00 66 43 c7 44 3e 09 00 00 43 c6 44 3e 0b 00 RSP: 0000:ffffc9000c9c6680 EFLAGS: 00010293 RAX: ffffffff81713942 RBX: 0000000000000000 RCX: ffff88802c233b80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc9000c9c6728 R08: dffffc0000000000 R09: fffffbfff211705c R10: fffffbfff211705c R11: 1ffffffff211705b R12: 0000000000000200 R13: dffffc0000000000 R14: 1ffff92001938cd0 R15: dffffc00ffffffff FS: 00007fa2993ee6c0(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffff52101938ccf CR3: 000000007773a000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ktime_get_coarse_real_ts64+0x36/0x120 kernel/time/timekeeping.c:2261 current_time+0x86/0x2b0 fs/inode.c:2538 atime_needs_update+0x3fd/0x780 fs/inode.c:1996 touch_atime+0xcd/0x620 fs/inode.c:2013 file_accessed include/linux/fs.h:2600 [inline] filemap_read+0x2d0b/0x2f80 mm/filemap.c:2836 generic_file_read_iter+0x115/0x670 mm/filemap.c:2914 __kernel_read+0x2dc/0x6b0 fs/read_write.c:428 integrity_kernel_read+0x86/0xd0 security/integrity/iint.c:228 ima_calc_file_hash_tfm security/integrity/ima/ima_crypto.c:485 [inline] ima_calc_file_shash security/integrity/ima/ima_crypto.c:516 [inline] ima_calc_file_hash+0x96b/0x17c0 security/integrity/ima/ima_crypto.c:573 ima_collect_measurement+0x4b3/0xac0 security/integrity/ima/ima_api.c:293 process_measurement+0xfae/0x1a10 security/integrity/ima/ima_main.c:351 ima_file_check+0xc2/0x100 security/integrity/ima/ima_main.c:534 do_open fs/namei.c:3628 [inline] path_openat+0x2679/0x2e70 fs/namei.c:3783 do_filp_open+0x1c1/0x3c0 fs/namei.c:3810 do_sys_openat2+0x142/0x490 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_open fs/open.c:1342 [inline] __se_sys_open fs/open.c:1338 [inline] __x64_sys_open+0x11b/0x140 fs/open.c:1338 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7fa29858e969 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa2993ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007fa2987b5fa0 RCX: 00007fa29858e969 RDX: 1df2a23c5997fa5f RSI: 0000000000080242 RDI: 0000200000000580 RBP: 00007fa298610ab1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fa2987b5fa0 R15: 00007ffee0bbff88 Modules linked in: CR2: fffff52101938ccf ---[ end trace 0000000000000000 ]--- RIP: 0010:seqcount_lockdep_reader_access+0x17b/0x1c0 include/linux/seqlock.h:105 Code: 00 4d 85 e4 75 16 e8 e4 9d 0f 00 eb 15 e8 dd 9d 0f 00 e8 98 e7 9d 08 4d 85 e4 74 ea e8 ce 9d 0f 00 fb 48 c7 04 24 0e 36 e0 45 <4b> c7 04 3e 00 00 00 00 66 43 c7 44 3e 09 00 00 43 c6 44 3e 0b 00 RSP: 0000:ffffc9000c9c6680 EFLAGS: 00010293 RAX: ffffffff81713942 RBX: 0000000000000000 RCX: ffff88802c233b80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc9000c9c6728 R08: dffffc0000000000 R09: fffffbfff211705c R10: fffffbfff211705c R11: 1ffffffff211705b R12: 0000000000000200 R13: dffffc0000000000 R14: 1ffff92001938cd0 R15: dffffc00ffffffff FS: 00007fa2993ee6c0(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffff52101938ccf CR3: 000000007773a000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 4d 85 e4 test %r12,%r12 3: 75 16 jne 0x1b 5: e8 e4 9d 0f 00 call 0xf9dee a: eb 15 jmp 0x21 c: e8 dd 9d 0f 00 call 0xf9dee 11: e8 98 e7 9d 08 call 0x89de7ae 16: 4d 85 e4 test %r12,%r12 19: 74 ea je 0x5 1b: e8 ce 9d 0f 00 call 0xf9dee 20: fb sti 21: 48 c7 04 24 0e 36 e0 movq $0x45e0360e,(%rsp) 28: 45 * 29: 4b c7 04 3e 00 00 00 movq $0x0,(%r14,%r15,1) <-- trapping instruction 30: 00 31: 66 43 c7 44 3e 09 00 movw $0x0,0x9(%r14,%r15,1) 38: 00 39: 43 c6 44 3e 0b 00 movb $0x0,0xb(%r14,%r15,1)