Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #533278
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-09-21
Last occurrence
2022-09-21
Unique reports
1
Quality
-21

Statistics

Operating system Unique / Total count
Fedora 36 1 / 1
Operating system Count
Fedora 36 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
ktime_get
vmlinux 0x38
4
ktime_get
vmlinux 0x38
5
? ktime_get
vmlinux 0x38
6
? ktime_get
vmlinux 0x38
7
? ktime_get
vmlinux 0x38
8
ktime_get
vmlinux 0x38
BUG: Bad page map in process systemd-userwor  pte:8000000111f95025 pmd:330833067
page:00000000cfe86035 refcount:43 mapcount:-216 mapping:00000000940ac21d index:0x32e pfn:0x111f95
 do_exit+0x2b6/0xae0
memcg:ffff89d2066b8000
aops:btrfs_aops ino:2dce9 dentry name:"libcrypto.so.3.0.5"
 do_group_exit+0x2d/0x90
flags: 0x17ffffc0002036(referenced|uptodate|lru|active|private|node=0|zone=2|lastcpupid=0x1fffff)
 __x64_sys_exit_group+0x14/0x20
raw: 0017ffffc0002036 fffff0d68447e508 fffff0d68447e588 ffff89d204a5a4b8
raw: 000000000000032e 0000000000000001 0000002bffffff27 ffff89d2066b8000
 do_syscall_64+0x5b/0x80
page dumped because: bad pte
addr:00007f119a052000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff89d204a5a4b8 index:32e
 ? do_user_addr_fault+0x1e2/0x670
 ? exit_to_user_mode_prepare+0x18f/0x1f0
file:libcrypto.so.3.0.5 fault:filemap_fault mmap:btrfs_file_mmap read_folio:btrfs_read_folio
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fb60dd113f1
Code: Unable to access opcode bytes at RIP 0x7fb60dd113c7.
RSP: 002b:00007ffc6d789d88 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007fb60de289e0 RCX: 00007fb60dd113f1
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
RBP: 0000000000000000 R08: fffffffffffffea0 R09: 00007fb60de33b20
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb60de289e0
R13: 0000000000000000 R14: 00007fb60de2dee8 R15: 00007fb60de2df00
 </TASK>
CPU: 22 PID: 45925 Comm: systemd-userwor Tainted: G S  B             5.19.9-200.fc36.x86_64 #1
Hardware name: ATERMITER ZX-99EV3/ZX-99EV3, BIOS X99_5.11 12/19/2020
Call Trace: