Operating system | Unique / Total count |
---|---|
Fedora 37 | 1 / 1 |
Operating system | Count |
---|---|
Fedora 37 | 1 |
Architecture | Count |
---|---|
x86_64 | 1 |
No reports in the last 20 days.
No reports in the last 20 weeks.
No reports in the last 20 days.
No reports in the last 20 weeks.
BUG: Bad page map in process systemd-userwor pte:578335025 pmd:52470d067 dump_stack_lvl+0x43/0x60 page:0000000066321e40 refcount:179 mapcount:-81 mapping:000000004ba62fa2 index:0x13 pfn:0x578335 print_bad_pte+0x1ad/0x270 memcg:ffff98698322f000 ? page_remove_rmap+0x1a4/0x470 aops:btrfs_aops ino:12093d dentry name:"ld-linux-x86-64.so.2" unmap_page_range+0xbae/0x1280 flags: 0x17ffffc0302056(referenced|uptodate|lru|workingset|private|unevictable|mlocked|node=0|zone=2|lastcpupid=0x1fffff) raw: 0017ffffc0302056 dead000000000100 dead000000000001 ffff986992bccc00 raw: 0000000000000013 0000000000000001 000000b3ffffffae ffff98698322f000 unmap_vmas+0xea/0x180 page dumped because: bad pte addr:00007f7edce61000 vm_flags:08000075 anon_vma:0000000000000000 mapping:ffff986992bccc00 index:13 exit_mmap+0xd4/0x2b0 __mmput+0x49/0x130 file:ld-linux-x86-64.so.2 fault:filemap_fault mmap:btrfs_file_mmap read_folio:btrfs_read_folio do_exit+0x2e3/0xb20 do_group_exit+0x2d/0x80 __x64_sys_exit_group+0x14/0x20 do_syscall_64+0x5b/0x80 ? do_user_addr_fault+0x1ef/0x710 ? exc_page_fault+0x70/0x170 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f9278ef9d81 Code: Unable to access opcode bytes at 0x7f9278ef9d57. RSP: 002b:00007ffecdff5918 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007f9278ff2a00 RCX: 00007f9278ef9d81 RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 RBP: 0000000000000000 R08: fffffffffffffea0 R09: 00007f9278ffdae0 R10: 00007ffecdff5620 R11: 0000000000000246 R12: 00007f9278ff2a00 R13: 0000000000000000 R14: 00007f9278ff82e8 R15: 00007f9278ff8300 </TASK> CPU: 4 PID: 160702 Comm: systemd-userwor Tainted: P S B OE 6.2.7-200.fc37.x86_64 #1 Hardware name: HUANANZHI /X99-F8 GAMING, BIOS 5.11 10/29/2022 Call Trace: