Kerneloops

Similar reports
Problem #378
Component
kernel
Last affected version
0:4.18.0-513.5.1.el8_9
Executable
unknown
First occurrence
2026-04-06
Last occurrence
2026-04-06
Unique reports
1
Quality
-32
Associate bug
If you don't consider this report useful, you can archive it and it won't be displayed on reports dashboard.

Statistics

Operating system Unique / Total count
AlmaLinux 8.9 1 / 3
Operating system Count
AlmaLinux 8.9 3
Architecture Count
x86_64 3
Related packages Count
kernel-core 3
 0:4.18.0-513.5.1.el8_9 3

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

History

Daily:

Weekly:

Monthly:


Backtrace

Frame # Function Binary Source or offset Line
1
__warn
vmlinux 0x94
2
__warn
vmlinux 0x94
3
__warn
vmlinux 0x94
4
__warn
vmlinux 0x94
5
? __warn
vmlinux 0x94
6
__warn
vmlinux 0x94
7
__warn
vmlinux 0x94
8
__warn
vmlinux 0x94
9
__warn
vmlinux 0x94
10
__warn
vmlinux 0x94
11
__warn
vmlinux 0x94
12
? __warn
vmlinux 0x94
13
__warn
vmlinux 0x94
14
__warn
vmlinux 0x94
15
__warn
vmlinux 0x94
BUG: Bad page map in process IPC I/O Child  pte:02000000 pmd:7cf45067
addr:00000000ee251b09 vm_flags:08000070 anon_vma:0000000000000000 mapping:0000000054aa4642 index:6b
file:libpangoft2-1.0.so.0.4200.3 fault:ext4_filemap_fault [ext4] mmap:ext4_file_mmap [ext4] readpage:ext4_readpage [ext4]
CPU: 2 PID: 310972 Comm: IPC I/O Child Kdump: loaded Not tainted 4.18.0-513.5.1.el8_9.x86_64 #1
Hardware name: Hewlett-Packard HP Compaq 6200 Pro MT PC/1497, BIOS J01 v02.15 11/10/2011
Call Trace:
 dump_stack+0x41/0x60
 print_bad_pte.cold.111+0x63/0xa6
 unmap_page_range+0x98b/0xf40
 unmap_vmas+0xc0/0xe0
 ? lru_add_drain_cpu+0x88/0x130
 exit_mmap+0x9d/0x170
 mmput+0x58/0x130
 do_exit+0x2fb/0xb10
 do_group_exit+0x3a/0xa0
 get_signal+0x141/0x880
 do_signal+0x36/0x690
 ? wake_up_q+0x70/0x70
 exit_to_usermode_loop+0x89/0x100
 do_syscall_64+0x19c/0x1b0
 entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x7f56a5dee9bd
Code: Unable to access opcode bytes at RIP 0x7f56a5dee993.
RSP: 002b:00007f56a723bb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8
RAX: fffffffffffffffc RBX: 0000000000000000 RCX: 00007f56a5dee9bd
RDX: 0000000000000020 RSI: 00007f56a5338380 RDI: 000000000000000e
RBP: 00007f56a5338380 R08: 0000000000000000 R09: 00007f56a5372e58
R10: 00000000ffffffff R11: 0000000000000246 R12: 00007f56a5372d00
R13: 00007f56a53276c0 R14: 00000000ffffffff R15: 00007f56a53276cc