From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 223A0C433F5 for ; Fri, 19 Nov 2021 13:13:13 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id E9E0861A38 for ; Fri, 19 Nov 2021 13:13:12 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235401AbhKSNQN (ORCPT ); Fri, 19 Nov 2021 08:16:13 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41724 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235360AbhKSNQN (ORCPT ); Fri, 19 Nov 2021 08:16:13 -0500 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BA92BC061574 for ; Fri, 19 Nov 2021 05:13:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=b/jzKu9LnpgkuCSmJ0bK6GJkr9WzxJc7AoIuzoQM4Mg=; b=qa5H14Dzxh+pRAFiuJS3Rqhio1 2f4rN/aoYF0pl5OswqgF9V1k+uOjkvSvhuJFgs0q6f79KzZvuJN1BqhQEtYMXDfshbQaMB1/22wdc ParvJDQOn0oAbKTTLaAEwE4uebpKtiILYxBBwY5CNUUPrAdDMbrV7y1rG1UM+1JcFuRSs3BL8gKNW s4OdkzCOlzcJlbfIvadJWgmu5msbRP0RX0j7cr8v0K6dGRCes+nrApvkkyqwIl7Lh7hz5k44ducp2 ynNS1ILlfbY+ROOkmiIATzvPMsenSKGfcZZ/ztYFEV3YaFzA80FO7Fj5LDQbRGtwSdsBtqaI0bkCx LHmYxfkA==; Received: from willy by casper.infradead.org with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1mo3hS-009VgX-Q7; Fri, 19 Nov 2021 13:13:06 +0000 Date: Fri, 19 Nov 2021 13:13:06 +0000 From: Matthew Wilcox To: Uwe Sauter Cc: almaz.alexandrovich@paragon-software.com, ntfs3@lists.linux.dev, linux-fsdevel@vger.kernel.org Subject: Re: Bug using new ntfs3 file system driver (5.15.2 on Arch Linux) Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-fsdevel@vger.kernel.org On Fri, Nov 19, 2021 at 08:48:11AM +0100, Uwe Sauter wrote: > [ 1132.645038] BUG: unable to handle page fault for address: 0000000000400000 > [ 1132.645045] #PF: supervisor instruction fetch in kernel mode > [ 1132.645047] #PF: error_code(0x0010) - not-present page > [ 1132.645050] PGD 0 P4D 0 > [ 1132.645053] Oops: 0010 [#1] PREEMPT SMP PTI > [ 1132.645057] CPU: 7 PID: 429941 Comm: rsync Tainted: P OE > 5.15.2-arch1-1 #1 e3bfbeb633edc604ba956e06f24d5659e31c294f > [ 1132.645061] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./C226 WS, BIOS P3.40 06/25/2018 > [ 1132.645063] RIP: 0010:0x400000 Your computer was trying to execute instructions at 0x400000. This smells very much like a single bit flip; ie there was a function pointer which should have been NULL, but actually had one bit flip and so the CPU jumped to somewhere that doesn't have any memory backing it. Can you run memtest86, or whatever the current flavour of memory testing software is?