[ 0.000000] microcode: updated early: 0x0 -> 0x49, date = 2021-08-11 [ 0.000000] Linux version 6.5.4-arch2-1 (linux@archlinux) (gcc (GCC) 13.2.1 20230801, GNU ld (GNU Binutils) 2.41.0) #1 SMP PREEMPT_DYNAMIC Thu, 21 Sep 2023 11:06:39 +0000 [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz-linux root=UUID=420ed14e-3a19-4d25-b611-4a178d8558f5 rw loglevel=3 quiet [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000003efff] usable [ 0.000000] BIOS-e820: [mem 0x000000000003f000-0x000000000003ffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000040000-0x000000000009ffff] usable [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000782bbfff] usable [ 0.000000] BIOS-e820: [mem 0x00000000782bc000-0x0000000079014fff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000079015000-0x0000000079590fff] usable [ 0.000000] BIOS-e820: [mem 0x0000000079591000-0x0000000079f07fff] ACPI NVS [ 0.000000] BIOS-e820: [mem 0x0000000079f08000-0x000000007bcd8fff] reserved [ 0.000000] BIOS-e820: [mem 0x000000007bcd9000-0x000000007bd20fff] type 20 [ 0.000000] BIOS-e820: [mem 0x000000007bd21000-0x000000007bd21fff] usable [ 0.000000] BIOS-e820: [mem 0x000000007bd22000-0x000000007bda7fff] reserved [ 0.000000] BIOS-e820: [mem 0x000000007bda8000-0x000000007bffffff] usable [ 0.000000] BIOS-e820: [mem 0x000000007c000000-0x000000008fffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed44fff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000107fffffff] usable [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] efi: EFI v2.4 by American Megatrends [ 0.000000] efi: ESRT=0x7bcd5498 ACPI=0x799d9000 ACPI 2.0=0x799d9000 SMBIOS=0x7bb9c000 SMBIOS 3.0=0x7bb9b000 [ 0.000000] efi: Remove mem32: MMIO range=[0x80000000-0x8fffffff] (256MB) from e820 map [ 0.000000] e820: remove [mem 0x80000000-0x8fffffff] reserved [ 0.000000] efi: Not removing mem33: MMIO range=[0xfed1c000-0xfed44fff] (164KB) from e820 map [ 0.000000] efi: Remove mem34: MMIO range=[0xff000000-0xffffffff] (16MB) from e820 map [ 0.000000] e820: remove [mem 0xff000000-0xffffffff] reserved [ 0.000000] SMBIOS 3.0.0 present. [ 0.000000] DMI: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [ 0.000000] tsc: Fast TSC calibration using PIT [ 0.000000] tsc: Detected 2294.484 MHz processor [ 0.000968] e820: update [mem 0x00000000-0x00000fff] usable ==> reserved [ 0.000972] e820: remove [mem 0x000a0000-0x000fffff] usable [ 0.000980] last_pfn = 0x1080000 max_arch_pfn = 0x400000000 [ 0.000986] MTRR map: 6 entries (4 fixed + 2 variable; max 24), built from 10 variable MTRRs [ 0.000988] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.001482] last_pfn = 0x7c000 max_arch_pfn = 0x400000000 [ 0.011334] esrt: Reserving ESRT space from 0x000000007bcd5498 to 0x000000007bcd54d0. [ 0.011343] Using GB pages for direct mapping [ 0.011940] Secure boot disabled [ 0.011940] RAMDISK: [mem 0x32157000-0x350a2fff] [ 0.011946] ACPI: Early table checksum verification disabled [ 0.011950] ACPI: RSDP 0x00000000799D9000 000024 (v02 ALASKA) [ 0.011955] ACPI: XSDT 0x00000000799D90A0 0000BC (v01 ALASKA A M I 01072009 AMI 00010013) [ 0.011962] ACPI: FACP 0x0000000079A0C780 00010C (v05 ALASKA A M I 01072009 AMI 00010013) [ 0.011969] ACPI: DSDT 0x00000000799D91F0 03358B (v02 ALASKA A M I 01072009 INTL 20091013) [ 0.011973] ACPI: FACS 0x0000000079F06F80 000040 [ 0.011976] ACPI: APIC 0x0000000079A0C890 000454 (v03 ALASKA A M I 01072009 AMI 00010013) [ 0.011980] ACPI: FPDT 0x0000000079A0CCE8 000044 (v01 ALASKA A M I 01072009 AMI 00010013) [ 0.011983] ACPI: FIDT 0x0000000079A0CD30 00009C (v01 ALASKA A M I 01072009 AMI 00010013) [ 0.011987] ACPI: MCFG 0x0000000079A0CDD0 00003C (v01 ALASKA A M I 01072009 MSFT 00000097) [ 0.011991] ACPI: UEFI 0x0000000079A0CE10 000042 (v01 ALASKA A M I 01072009 00000000) [ 0.011995] ACPI: HPET 0x0000000079A0CE58 000038 (v01 ALASKA A M I 00000001 INTL 20091013) [ 0.011999] ACPI: MSCT 0x0000000079A0CE90 000090 (v01 ALASKA A M I 00000001 INTL 20091013) [ 0.012002] ACPI: SLIT 0x0000000079A0CF20 000030 (v01 ALASKA A M I 00000001 INTL 20091013) [ 0.012006] ACPI: SRAT 0x0000000079A0CF50 001158 (v03 ALASKA A M I 00000001 INTL 20091013) [ 0.012009] ACPI: WDDT 0x0000000079A0E0A8 000040 (v01 ALASKA A M I 00000000 INTL 20091013) [ 0.012013] ACPI: SSDT 0x0000000079A0E0E8 01706B (v02 ALASKA PmMgt 00000001 INTL 20120913) [ 0.012016] ACPI: NITR 0x0000000079A25158 000071 (v02 ALASKA A M I 00000001 INTL 20091013) [ 0.012020] ACPI: VFCT 0x0000000079A251D0 00E884 (v01 ALASKA A M I 00000001 AMD 31504F47) [ 0.012023] ACPI: BGRT 0x0000000079A33A58 000038 (v01 ALASKA A M I 01072009 AMI 00010013) [ 0.012027] ACPI: SSDT 0x0000000079A33A90 002652 (v02 ALASKA SpsNm 00000002 INTL 20120913) [ 0.012031] ACPI: SSDT 0x0000000079A360E8 000064 (v02 ALASKA SpsNvs 00000002 INTL 20120913) [ 0.012034] ACPI: PRAD 0x0000000079A36150 000102 (v02 ALASKA A M I 00000002 INTL 20120913) [ 0.012038] ACPI: DMAR 0x0000000079A36258 0000F0 (v01 ALASKA A M I 00000001 INTL 20091013) [ 0.012041] ACPI: Reserving FACP table memory at [mem 0x79a0c780-0x79a0c88b] [ 0.012043] ACPI: Reserving DSDT table memory at [mem 0x799d91f0-0x79a0c77a] [ 0.012044] ACPI: Reserving FACS table memory at [mem 0x79f06f80-0x79f06fbf] [ 0.012045] ACPI: Reserving APIC table memory at [mem 0x79a0c890-0x79a0cce3] [ 0.012046] ACPI: Reserving FPDT table memory at [mem 0x79a0cce8-0x79a0cd2b] [ 0.012047] ACPI: Reserving FIDT table memory at [mem 0x79a0cd30-0x79a0cdcb] [ 0.012048] ACPI: Reserving MCFG table memory at [mem 0x79a0cdd0-0x79a0ce0b] [ 0.012049] ACPI: Reserving UEFI table memory at [mem 0x79a0ce10-0x79a0ce51] [ 0.012049] ACPI: Reserving HPET table memory at [mem 0x79a0ce58-0x79a0ce8f] [ 0.012050] ACPI: Reserving MSCT table memory at [mem 0x79a0ce90-0x79a0cf1f] [ 0.012051] ACPI: Reserving SLIT table memory at [mem 0x79a0cf20-0x79a0cf4f] [ 0.012052] ACPI: Reserving SRAT table memory at [mem 0x79a0cf50-0x79a0e0a7] [ 0.012053] ACPI: Reserving WDDT table memory at [mem 0x79a0e0a8-0x79a0e0e7] [ 0.012054] ACPI: Reserving SSDT table memory at [mem 0x79a0e0e8-0x79a25152] [ 0.012055] ACPI: Reserving NITR table memory at [mem 0x79a25158-0x79a251c8] [ 0.012056] ACPI: Reserving VFCT table memory at [mem 0x79a251d0-0x79a33a53] [ 0.012057] ACPI: Reserving BGRT table memory at [mem 0x79a33a58-0x79a33a8f] [ 0.012058] ACPI: Reserving SSDT table memory at [mem 0x79a33a90-0x79a360e1] [ 0.012059] ACPI: Reserving SSDT table memory at [mem 0x79a360e8-0x79a3614b] [ 0.012060] ACPI: Reserving PRAD table memory at [mem 0x79a36150-0x79a36251] [ 0.012061] ACPI: Reserving DMAR table memory at [mem 0x79a36258-0x79a36347] [ 0.012087] SRAT: PXM 0 -> APIC 0x00 -> Node 0 [ 0.012089] SRAT: PXM 0 -> APIC 0x02 -> Node 0 [ 0.012090] SRAT: PXM 0 -> APIC 0x04 -> Node 0 [ 0.012091] SRAT: PXM 0 -> APIC 0x06 -> Node 0 [ 0.012092] SRAT: PXM 0 -> APIC 0x08 -> Node 0 [ 0.012093] SRAT: PXM 0 -> APIC 0x10 -> Node 0 [ 0.012094] SRAT: PXM 0 -> APIC 0x12 -> Node 0 [ 0.012095] SRAT: PXM 0 -> APIC 0x14 -> Node 0 [ 0.012096] SRAT: PXM 0 -> APIC 0x16 -> Node 0 [ 0.012097] SRAT: PXM 0 -> APIC 0x20 -> Node 0 [ 0.012098] SRAT: PXM 0 -> APIC 0x22 -> Node 0 [ 0.012099] SRAT: PXM 0 -> APIC 0x24 -> Node 0 [ 0.012100] SRAT: PXM 0 -> APIC 0x26 -> Node 0 [ 0.012100] SRAT: PXM 0 -> APIC 0x28 -> Node 0 [ 0.012101] SRAT: PXM 0 -> APIC 0x30 -> Node 0 [ 0.012102] SRAT: PXM 0 -> APIC 0x32 -> Node 0 [ 0.012103] SRAT: PXM 0 -> APIC 0x34 -> Node 0 [ 0.012104] SRAT: PXM 0 -> APIC 0x36 -> Node 0 [ 0.012105] SRAT: PXM 1 -> APIC 0x40 -> Node 1 [ 0.012106] SRAT: PXM 1 -> APIC 0x42 -> Node 1 [ 0.012107] SRAT: PXM 1 -> APIC 0x44 -> Node 1 [ 0.012107] SRAT: PXM 1 -> APIC 0x46 -> Node 1 [ 0.012108] SRAT: PXM 1 -> APIC 0x48 -> Node 1 [ 0.012109] SRAT: PXM 1 -> APIC 0x50 -> Node 1 [ 0.012110] SRAT: PXM 1 -> APIC 0x52 -> Node 1 [ 0.012111] SRAT: PXM 1 -> APIC 0x54 -> Node 1 [ 0.012112] SRAT: PXM 1 -> APIC 0x56 -> Node 1 [ 0.012112] SRAT: PXM 1 -> APIC 0x60 -> Node 1 [ 0.012113] SRAT: PXM 1 -> APIC 0x62 -> Node 1 [ 0.012114] SRAT: PXM 1 -> APIC 0x64 -> Node 1 [ 0.012115] SRAT: PXM 1 -> APIC 0x66 -> Node 1 [ 0.012116] SRAT: PXM 1 -> APIC 0x68 -> Node 1 [ 0.012117] SRAT: PXM 1 -> APIC 0x70 -> Node 1 [ 0.012117] SRAT: PXM 1 -> APIC 0x72 -> Node 1 [ 0.012118] SRAT: PXM 1 -> APIC 0x74 -> Node 1 [ 0.012119] SRAT: PXM 1 -> APIC 0x76 -> Node 1 [ 0.012120] SRAT: PXM 0 -> APIC 0x01 -> Node 0 [ 0.012121] SRAT: PXM 0 -> APIC 0x03 -> Node 0 [ 0.012122] SRAT: PXM 0 -> APIC 0x05 -> Node 0 [ 0.012123] SRAT: PXM 0 -> APIC 0x07 -> Node 0 [ 0.012123] SRAT: PXM 0 -> APIC 0x09 -> Node 0 [ 0.012124] SRAT: PXM 0 -> APIC 0x11 -> Node 0 [ 0.012125] SRAT: PXM 0 -> APIC 0x13 -> Node 0 [ 0.012126] SRAT: PXM 0 -> APIC 0x15 -> Node 0 [ 0.012127] SRAT: PXM 0 -> APIC 0x17 -> Node 0 [ 0.012128] SRAT: PXM 0 -> APIC 0x21 -> Node 0 [ 0.012128] SRAT: PXM 0 -> APIC 0x23 -> Node 0 [ 0.012129] SRAT: PXM 0 -> APIC 0x25 -> Node 0 [ 0.012130] SRAT: PXM 0 -> APIC 0x27 -> Node 0 [ 0.012131] SRAT: PXM 0 -> APIC 0x29 -> Node 0 [ 0.012132] SRAT: PXM 0 -> APIC 0x31 -> Node 0 [ 0.012133] SRAT: PXM 0 -> APIC 0x33 -> Node 0 [ 0.012134] SRAT: PXM 0 -> APIC 0x35 -> Node 0 [ 0.012135] SRAT: PXM 0 -> APIC 0x37 -> Node 0 [ 0.012135] SRAT: PXM 1 -> APIC 0x41 -> Node 1 [ 0.012136] SRAT: PXM 1 -> APIC 0x43 -> Node 1 [ 0.012137] SRAT: PXM 1 -> APIC 0x45 -> Node 1 [ 0.012138] SRAT: PXM 1 -> APIC 0x47 -> Node 1 [ 0.012139] SRAT: PXM 1 -> APIC 0x49 -> Node 1 [ 0.012140] SRAT: PXM 1 -> APIC 0x51 -> Node 1 [ 0.012141] SRAT: PXM 1 -> APIC 0x53 -> Node 1 [ 0.012142] SRAT: PXM 1 -> APIC 0x55 -> Node 1 [ 0.012143] SRAT: PXM 1 -> APIC 0x57 -> Node 1 [ 0.012144] SRAT: PXM 1 -> APIC 0x61 -> Node 1 [ 0.012144] SRAT: PXM 1 -> APIC 0x63 -> Node 1 [ 0.012145] SRAT: PXM 1 -> APIC 0x65 -> Node 1 [ 0.012146] SRAT: PXM 1 -> APIC 0x67 -> Node 1 [ 0.012147] SRAT: PXM 1 -> APIC 0x69 -> Node 1 [ 0.012148] SRAT: PXM 1 -> APIC 0x71 -> Node 1 [ 0.012148] SRAT: PXM 1 -> APIC 0x73 -> Node 1 [ 0.012149] SRAT: PXM 1 -> APIC 0x75 -> Node 1 [ 0.012150] SRAT: PXM 1 -> APIC 0x77 -> Node 1 [ 0.012158] ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] [ 0.012161] ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x87fffffff] [ 0.012162] ACPI: SRAT: Node 1 PXM 1 [mem 0x880000000-0x107fffffff] [ 0.012167] NUMA: Initialized distance table, cnt=2 [ 0.012169] NUMA: Node 0 [mem 0x00000000-0x7fffffff] + [mem 0x100000000-0x87fffffff] -> [mem 0x00000000-0x87fffffff] [ 0.012174] NODE_DATA(0) allocated [mem 0x87fffb000-0x87fffffff] [ 0.012178] NODE_DATA(1) allocated [mem 0x107fffa000-0x107fffefff] [ 0.012262] Zone ranges: [ 0.012263] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.012266] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.012268] Normal [mem 0x0000000100000000-0x000000107fffffff] [ 0.012270] Device empty [ 0.012271] Movable zone start for each node [ 0.012272] Early memory node ranges [ 0.012272] node 0: [mem 0x0000000000001000-0x000000000003efff] [ 0.012274] node 0: [mem 0x0000000000040000-0x000000000009ffff] [ 0.012275] node 0: [mem 0x0000000000100000-0x00000000782bbfff] [ 0.012277] node 0: [mem 0x0000000079015000-0x0000000079590fff] [ 0.012278] node 0: [mem 0x000000007bd21000-0x000000007bd21fff] [ 0.012279] node 0: [mem 0x000000007bda8000-0x000000007bffffff] [ 0.012280] node 0: [mem 0x0000000100000000-0x000000087fffffff] [ 0.012284] node 1: [mem 0x0000000880000000-0x000000107fffffff] [ 0.012288] Initmem setup node 0 [mem 0x0000000000001000-0x000000087fffffff] [ 0.012292] Initmem setup node 1 [mem 0x0000000880000000-0x000000107fffffff] [ 0.012295] On node 0, zone DMA: 1 pages in unavailable ranges [ 0.012297] On node 0, zone DMA: 1 pages in unavailable ranges [ 0.012328] On node 0, zone DMA: 96 pages in unavailable ranges [ 0.016167] On node 0, zone DMA32: 3417 pages in unavailable ranges [ 0.016266] On node 0, zone DMA32: 10128 pages in unavailable ranges [ 0.016273] On node 0, zone DMA32: 134 pages in unavailable ranges [ 0.078590] On node 0, zone Normal: 16384 pages in unavailable ranges [ 0.166336] ACPI: PM-Timer IO Port: 0x408 [ 0.166356] ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) [ 0.166358] ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) [ 0.166359] ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) [ 0.166360] ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) [ 0.166361] ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) [ 0.166362] ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) [ 0.166364] ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) [ 0.166365] ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) [ 0.166366] ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) [ 0.166367] ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) [ 0.166368] ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) [ 0.166369] ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) [ 0.166370] ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) [ 0.166370] ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) [ 0.166371] ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) [ 0.166372] ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) [ 0.166373] ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) [ 0.166374] ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) [ 0.166375] ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) [ 0.166376] ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) [ 0.166377] ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) [ 0.166377] ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) [ 0.166378] ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) [ 0.166379] ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) [ 0.166380] ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) [ 0.166381] ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) [ 0.166382] ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) [ 0.166383] ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) [ 0.166384] ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) [ 0.166385] ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) [ 0.166385] ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) [ 0.166386] ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) [ 0.166387] ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) [ 0.166388] ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) [ 0.166389] ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) [ 0.166390] ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) [ 0.166391] ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) [ 0.166392] ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) [ 0.166393] ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) [ 0.166393] ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) [ 0.166394] ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) [ 0.166395] ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) [ 0.166396] ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) [ 0.166397] ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) [ 0.166398] ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) [ 0.166399] ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) [ 0.166400] ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) [ 0.166402] ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) [ 0.166403] ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) [ 0.166404] ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) [ 0.166405] ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) [ 0.166406] ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) [ 0.166406] ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) [ 0.166407] ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) [ 0.166408] ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) [ 0.166409] ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) [ 0.166410] ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) [ 0.166411] ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) [ 0.166412] ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) [ 0.166413] ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) [ 0.166414] ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) [ 0.166414] ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) [ 0.166415] ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) [ 0.166416] ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) [ 0.166417] ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) [ 0.166418] ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) [ 0.166419] ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) [ 0.166420] ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) [ 0.166421] ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) [ 0.166421] ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) [ 0.166422] ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) [ 0.166423] ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) [ 0.166434] IOAPIC[0]: apic_id 1, version 32, address 0xfec00000, GSI 0-23 [ 0.166439] IOAPIC[1]: apic_id 2, version 32, address 0xfec01000, GSI 24-47 [ 0.166444] IOAPIC[2]: apic_id 3, version 32, address 0xfec40000, GSI 48-71 [ 0.166447] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) [ 0.166449] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.166455] ACPI: Using ACPI (MADT) for SMP configuration information [ 0.166456] ACPI: HPET id: 0x8086a701 base: 0xfed00000 [ 0.166466] e820: update [mem 0x7669d000-0x767fcfff] usable ==> reserved [ 0.166479] TSC deadline timer available [ 0.166481] smpboot: Allowing 72 CPUs, 0 hotplug CPUs [ 0.166501] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.166503] PM: hibernation: Registered nosave memory: [mem 0x0003f000-0x0003ffff] [ 0.166505] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000fffff] [ 0.166508] PM: hibernation: Registered nosave memory: [mem 0x7669d000-0x767fcfff] [ 0.166509] PM: hibernation: Registered nosave memory: [mem 0x782bc000-0x79014fff] [ 0.166512] PM: hibernation: Registered nosave memory: [mem 0x79591000-0x79f07fff] [ 0.166513] PM: hibernation: Registered nosave memory: [mem 0x79f08000-0x7bcd8fff] [ 0.166513] PM: hibernation: Registered nosave memory: [mem 0x7bcd9000-0x7bd20fff] [ 0.166515] PM: hibernation: Registered nosave memory: [mem 0x7bd22000-0x7bda7fff] [ 0.166517] PM: hibernation: Registered nosave memory: [mem 0x7c000000-0x7fffffff] [ 0.166519] PM: hibernation: Registered nosave memory: [mem 0x80000000-0xfed1bfff] [ 0.166519] PM: hibernation: Registered nosave memory: [mem 0xfed1c000-0xfed44fff] [ 0.166520] PM: hibernation: Registered nosave memory: [mem 0xfed45000-0xffffffff] [ 0.166523] [mem 0x80000000-0xfed1bfff] available for PCI devices [ 0.166524] Booting paravirtualized kernel on bare hardware [ 0.166527] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 6370452778343963 ns [ 0.173099] setup_percpu: NR_CPUS:320 nr_cpumask_bits:72 nr_cpu_ids:72 nr_node_ids:2 [ 0.177830] percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 [ 0.177839] pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 [ 0.177842] pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 [ 0.177853] pcpu-alloc: [0] 16 17 36 37 38 39 40 41 [0] 42 43 44 45 46 47 48 49 [ 0.177864] pcpu-alloc: [0] 50 51 52 53 -- -- -- -- [1] 18 19 20 21 22 23 24 25 [ 0.177875] pcpu-alloc: [1] 26 27 28 29 30 31 32 33 [1] 34 35 54 55 56 57 58 59 [ 0.177885] pcpu-alloc: [1] 60 61 62 63 64 65 66 67 [1] 68 69 70 71 -- -- -- -- [ 0.177917] Kernel command line: BOOT_IMAGE=/vmlinuz-linux root=UUID=420ed14e-3a19-4d25-b611-4a178d8558f5 rw loglevel=3 quiet [ 0.177991] Unknown kernel command line parameters "BOOT_IMAGE=/vmlinuz-linux", will be passed to user space. [ 0.178015] random: crng init done [ 0.178016] printk: log_buf_len individual max cpu contribution: 4096 bytes [ 0.178017] printk: log_buf_len total cpu_extra contributions: 290816 bytes [ 0.178018] printk: log_buf_len min size: 131072 bytes [ 0.178607] printk: log_buf_len: 524288 bytes [ 0.178608] printk: early log buf free: 111376(84%) [ 0.179939] Fallback order for Node 0: 0 1 [ 0.179943] Fallback order for Node 1: 1 0 [ 0.179952] Built 2 zonelists, mobility grouping on. Total pages: 16485219 [ 0.179954] Policy zone: Normal [ 0.180311] mem auto-init: stack:all(zero), heap alloc:on, heap free:off [ 0.180321] software IO TLB: area num 128. [ 0.402670] Memory: 65689904K/66988220K available (16384K kernel code, 2122K rwdata, 12948K rodata, 3384K init, 3916K bss, 1298056K reserved, 0K cma-reserved) [ 0.403405] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=72, Nodes=2 [ 0.403442] Kernel/User page tables isolation: enabled [ 0.403541] ftrace: allocating 48453 entries in 190 pages [ 0.413595] ftrace: allocated 190 pages with 6 groups [ 0.413851] Dynamic Preempt: full [ 0.414109] rcu: Preemptible hierarchical RCU implementation. [ 0.414110] rcu: RCU restricting CPUs from NR_CPUS=320 to nr_cpu_ids=72. [ 0.414112] rcu: RCU priority boosting: priority 1 delay 500 ms. [ 0.414113] Trampoline variant of Tasks RCU enabled. [ 0.414114] Rude variant of Tasks RCU enabled. [ 0.414115] Tracing variant of Tasks RCU enabled. [ 0.414116] rcu: RCU calculated value of scheduler-enlistment delay is 30 jiffies. [ 0.414117] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=72 [ 0.417521] NR_IRQS: 20736, nr_irqs: 1816, preallocated irqs: 16 [ 0.417805] rcu: srcu_init: Setting srcu_struct sizes based on contention. [ 0.417959] kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) [ 0.418204] Console: colour dummy device 80x25 [ 0.418207] printk: console [tty0] enabled [ 0.418438] mempolicy: Enabling automatic NUMA balancing. Configure with numa_balancing= or the kernel.numa_balancing sysctl [ 0.418442] ACPI: Core revision 20230331 [ 0.418760] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns [ 0.418774] APIC: Switch to symmetric I/O mode setup [ 0.418776] DMAR: Host address width 46 [ 0.418777] DMAR: DRHD base: 0x000000fbffc000 flags: 0x0 [ 0.418784] DMAR: dmar0: reg_base_addr fbffc000 ver 1:0 cap d2078c106f0466 ecap f020df [ 0.418787] DMAR: DRHD base: 0x000000c7ffc000 flags: 0x1 [ 0.418792] DMAR: dmar1: reg_base_addr c7ffc000 ver 1:0 cap d2078c106f0466 ecap f020df [ 0.418794] DMAR: RMRR base: 0x0000007bbaf000 end: 0x0000007bbbefff [ 0.418796] DMAR: ATSR flags: 0x0 [ 0.418798] DMAR: RHSA base: 0x000000c7ffc000 proximity domain: 0x0 [ 0.418799] DMAR: RHSA base: 0x000000fbffc000 proximity domain: 0x1 [ 0.418802] DMAR-IR: IOAPIC id 3 under DRHD base 0xfbffc000 IOMMU 0 [ 0.418804] DMAR-IR: IOAPIC id 1 under DRHD base 0xc7ffc000 IOMMU 1 [ 0.418805] DMAR-IR: IOAPIC id 2 under DRHD base 0xc7ffc000 IOMMU 1 [ 0.418806] DMAR-IR: HPET id 0 under DRHD base 0xc7ffc000 [ 0.418808] DMAR-IR: x2apic is disabled because BIOS sets x2apic opt out bit. [ 0.418809] DMAR-IR: Use 'intremap=no_x2apic_optout' to override the BIOS setting. [ 0.419571] DMAR-IR: Enabled IRQ remapping in xapic mode [ 0.419573] x2apic: IRQ remapping doesn't support X2APIC mode [ 0.419577] Switched APIC routing to physical flat. [ 0.420224] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 [ 0.435451] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2112da5ebe6, max_idle_ns: 440795272912 ns [ 0.435457] Calibrating delay loop (skipped), value calculated using timer frequency.. 4590.17 BogoMIPS (lpj=7648280) [ 0.435486] CPU0: Thermal monitoring enabled (TM1) [ 0.435569] process: using mwait in idle threads [ 0.435573] Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 [ 0.435574] Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 [ 0.435578] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 0.435580] Spectre V2 : Mitigation: Retpolines [ 0.435581] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch [ 0.435582] Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT [ 0.435583] Spectre V2 : Enabling Restricted Speculation for firmware calls [ 0.435585] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier [ 0.435586] Spectre V2 : User space: Mitigation: STIBP via prctl [ 0.435588] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl [ 0.435596] MDS: Mitigation: Clear CPU buffers [ 0.435597] MMIO Stale Data: Mitigation: Clear CPU buffers [ 0.435601] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.435603] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.435604] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.435605] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.435607] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. [ 0.456739] Freeing SMP alternatives memory: 40K [ 0.456742] pid_max: default: 73728 minimum: 576 [ 0.458893] LSM: initializing lsm=capability,landlock,lockdown,yama,bpf,integrity [ 0.458928] landlock: Up and running. [ 0.458930] Yama: becoming mindful. [ 0.458936] LSM support for eBPF active [ 0.472737] Dentry cache hash table entries: 8388608 (order: 14, 67108864 bytes, vmalloc hugepage) [ 0.479499] Inode-cache hash table entries: 4194304 (order: 13, 33554432 bytes, vmalloc hugepage) [ 0.479768] Mount-cache hash table entries: 131072 (order: 8, 1048576 bytes, vmalloc) [ 0.479994] Mountpoint-cache hash table entries: 131072 (order: 8, 1048576 bytes, vmalloc) [ 0.480981] smpboot: CPU0: Intel(R) Xeon(R) CPU E5-2696 v3 @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x2) [ 0.481312] RCU Tasks: Setting shift to 7 and lim to 1 rcu_task_cb_adjust=1. [ 0.481355] RCU Tasks Rude: Setting shift to 7 and lim to 1 rcu_task_cb_adjust=1. [ 0.481386] RCU Tasks Trace: Setting shift to 7 and lim to 1 rcu_task_cb_adjust=1. [ 0.481419] Performance Events: PEBS fmt2+, Haswell events, 16-deep LBR, full-width counters, Intel PMU driver. [ 0.481473] ... version: 3 [ 0.481474] ... bit width: 48 [ 0.481475] ... generic registers: 4 [ 0.481476] ... value mask: 0000ffffffffffff [ 0.481477] ... max period: 00007fffffffffff [ 0.481478] ... fixed-purpose events: 3 [ 0.481479] ... event mask: 000000070000000f [ 0.481653] signal: max sigframe size: 1776 [ 0.481673] Estimated ratio of average max frequency by base frequency (times 1024): 1691 [ 0.481708] rcu: Hierarchical SRCU implementation. [ 0.481710] rcu: Max phase no-delay instances is 1000. [ 0.485731] NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. [ 0.486720] smp: Bringing up secondary CPUs ... [ 0.486877] smpboot: x86: Booting SMP configuration: [ 0.486878] .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15 #16 #17 [ 0.492578] .... node #1, CPUs: #18 #19 #20 #21 #22 #23 #24 #25 #26 #27 #28 #29 #30 #31 #32 #33 #34 #35 [ 0.004277] smpboot: CPU 18 Converting physical 0 to logical die 1 [ 0.505636] .... node #0, CPUs: #36 #37 #38 #39 #40 #41 #42 #43 #44 #45 #46 #47 #48 #49 #50 #51 #52 #53 [ 0.513744] .... node #1, CPUs: #54 #55 #56 #57 #58 #59 #60 #61 #62 #63 #64 #65 #66 #67 #68 #69 #70 #71 [ 0.520366] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [ 0.520366] MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. [ 0.525552] smp: Brought up 2 nodes, 72 CPUs [ 0.525552] smpboot: Max logical packages: 2 [ 0.525552] smpboot: Total of 72 processors activated (330537.60 BogoMIPS) [ 0.533657] devtmpfs: initialized [ 0.533657] x86/mm: Memory block size: 2048MB [ 0.533657] ACPI: PM: Registering ACPI NVS region [mem 0x79591000-0x79f07fff] (9924608 bytes) [ 0.533657] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 6370867519511994 ns [ 0.533657] futex hash table entries: 32768 (order: 9, 2097152 bytes, vmalloc) [ 0.533657] pinctrl core: initialized pinctrl subsystem [ 0.535561] PM: RTC time: 03:31:45, date: 2023-09-25 [ 0.537135] NET: Registered PF_NETLINK/PF_ROUTE protocol family [ 0.538128] DMA: preallocated 4096 KiB GFP_KERNEL pool for atomic allocations [ 0.538919] DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations [ 0.539709] DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations [ 0.539742] audit: initializing netlink subsys (disabled) [ 0.539753] audit: type=2000 audit(1695612705.119:1): state=initialized audit_enabled=0 res=1 [ 0.539753] thermal_sys: Registered thermal governor 'fair_share' [ 0.539753] thermal_sys: Registered thermal governor 'bang_bang' [ 0.539753] thermal_sys: Registered thermal governor 'step_wise' [ 0.539753] thermal_sys: Registered thermal governor 'user_space' [ 0.539753] thermal_sys: Registered thermal governor 'power_allocator' [ 0.539753] cpuidle: using governor ladder [ 0.539753] cpuidle: using governor menu [ 0.539753] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [ 0.539753] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0x80000000-0x8fffffff] (base 0x80000000) [ 0.539753] PCI: not using MMCONFIG [ 0.539753] PCI: Using configuration type 1 for base access [ 0.539753] core: PMU erratum BJ122, BV98, HSD29 worked around, HT is on [ 0.542256] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. [ 0.542415] HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages [ 0.542415] HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page [ 0.542415] HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages [ 0.542415] HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page [ 0.542434] ACPI: Added _OSI(Module Device) [ 0.542434] ACPI: Added _OSI(Processor Device) [ 0.542434] ACPI: Added _OSI(3.0 _SCP Extensions) [ 0.542434] ACPI: Added _OSI(Processor Aggregator Device) [ 0.606471] ACPI: 4 ACPI AML tables successfully acquired and loaded [ 0.610857] ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored [ 0.665253] ACPI: Interpreter enabled [ 0.665272] ACPI: PM: (supports S0 S4 S5) [ 0.665274] ACPI: Using IOAPIC for interrupt routing [ 0.668013] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0x80000000-0x8fffffff] (base 0x80000000) [ 0.675731] [Firmware Info]: PCI: MMCONFIG at [mem 0x80000000-0x8fffffff] not reserved in ACPI motherboard resources [ 0.675734] PCI: MMCONFIG at [mem 0x80000000-0x8fffffff] reserved as EfiMemoryMappedIO [ 0.675749] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 0.675751] PCI: Using E820 reservations for host bridge windows [ 0.676781] ACPI: Enabled 5 GPEs in block 00 to 3F [ 0.731995] ACPI: PCI Root Bridge [UNC1] (domain 0000 [bus ff]) [ 0.732003] acpi PNP0A03:02: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] [ 0.734426] acpi PNP0A03:02: _OSC: platform does not support [SHPCHotplug LTR DPC] [ 0.735825] acpi PNP0A03:02: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] [ 0.735876] PCI host bridge to bus 0000:ff [ 0.735878] pci_bus 0000:ff: Unknown NUMA node; performance will be reduced [ 0.735880] pci_bus 0000:ff: root bus resource [bus ff] [ 0.735896] pci 0000:ff:08.0: [8086:2f80] type 00 class 0x088000 [ 0.735990] pci 0000:ff:08.2: [8086:2f32] type 00 class 0x110100 [ 0.736068] pci 0000:ff:08.3: [8086:2f83] type 00 class 0x088000 [ 0.736147] pci 0000:ff:09.0: [8086:2f90] type 00 class 0x088000 [ 0.736221] pci 0000:ff:09.2: [8086:2f33] type 00 class 0x110100 [ 0.736295] pci 0000:ff:09.3: [8086:2f93] type 00 class 0x088000 [ 0.736373] pci 0000:ff:0b.0: [8086:2f81] type 00 class 0x088000 [ 0.736451] pci 0000:ff:0b.1: [8086:2f36] type 00 class 0x110100 [ 0.736523] pci 0000:ff:0b.2: [8086:2f37] type 00 class 0x110100 [ 0.736596] pci 0000:ff:0c.0: [8086:2fe0] type 00 class 0x088000 [ 0.736667] pci 0000:ff:0c.1: [8086:2fe1] type 00 class 0x088000 [ 0.736738] pci 0000:ff:0c.2: [8086:2fe2] type 00 class 0x088000 [ 0.736810] pci 0000:ff:0c.3: [8086:2fe3] type 00 class 0x088000 [ 0.736881] pci 0000:ff:0c.4: [8086:2fe4] type 00 class 0x088000 [ 0.736952] pci 0000:ff:0c.5: [8086:2fe5] type 00 class 0x088000 [ 0.737030] pci 0000:ff:0c.6: [8086:2fe6] type 00 class 0x088000 [ 0.737101] pci 0000:ff:0c.7: [8086:2fe7] type 00 class 0x088000 [ 0.737173] pci 0000:ff:0d.0: [8086:2fe8] type 00 class 0x088000 [ 0.737244] pci 0000:ff:0d.1: [8086:2fe9] type 00 class 0x088000 [ 0.737316] pci 0000:ff:0d.2: [8086:2fea] type 00 class 0x088000 [ 0.737387] pci 0000:ff:0d.3: [8086:2feb] type 00 class 0x088000 [ 0.737458] pci 0000:ff:0d.4: [8086:2fec] type 00 class 0x088000 [ 0.737529] pci 0000:ff:0d.5: [8086:2fed] type 00 class 0x088000 [ 0.737612] pci 0000:ff:0d.6: [8086:2fee] type 00 class 0x088000 [ 0.737683] pci 0000:ff:0d.7: [8086:2fef] type 00 class 0x088000 [ 0.737755] pci 0000:ff:0e.0: [8086:2ff0] type 00 class 0x088000 [ 0.737826] pci 0000:ff:0e.1: [8086:2ff1] type 00 class 0x088000 [ 0.737903] pci 0000:ff:0f.0: [8086:2ff8] type 00 class 0x088000 [ 0.737976] pci 0000:ff:0f.1: [8086:2ff9] type 00 class 0x088000 [ 0.738047] pci 0000:ff:0f.2: [8086:2ffa] type 00 class 0x088000 [ 0.738118] pci 0000:ff:0f.3: [8086:2ffb] type 00 class 0x088000 [ 0.738197] pci 0000:ff:0f.4: [8086:2ffc] type 00 class 0x088000 [ 0.738269] pci 0000:ff:0f.5: [8086:2ffd] type 00 class 0x088000 [ 0.738341] pci 0000:ff:0f.6: [8086:2ffe] type 00 class 0x088000 [ 0.738414] pci 0000:ff:10.0: [8086:2f1d] type 00 class 0x088000 [ 0.738485] pci 0000:ff:10.1: [8086:2f34] type 00 class 0x110100 [ 0.738559] pci 0000:ff:10.5: [8086:2f1e] type 00 class 0x088000 [ 0.738630] pci 0000:ff:10.6: [8086:2f7d] type 00 class 0x110100 [ 0.738702] pci 0000:ff:10.7: [8086:2f1f] type 00 class 0x088000 [ 0.738782] pci 0000:ff:12.0: [8086:2fa0] type 00 class 0x088000 [ 0.738859] pci 0000:ff:12.1: [8086:2f30] type 00 class 0x110100 [ 0.738935] pci 0000:ff:12.4: [8086:2f60] type 00 class 0x088000 [ 0.739008] pci 0000:ff:12.5: [8086:2f38] type 00 class 0x110100 [ 0.739084] pci 0000:ff:13.0: [8086:2fa8] type 00 class 0x088000 [ 0.739161] pci 0000:ff:13.1: [8086:2f71] type 00 class 0x088000 [ 0.739237] pci 0000:ff:13.2: [8086:2faa] type 00 class 0x088000 [ 0.739317] pci 0000:ff:13.3: [8086:2fab] type 00 class 0x088000 [ 0.739401] pci 0000:ff:13.6: [8086:2fae] type 00 class 0x088000 [ 0.739475] pci 0000:ff:13.7: [8086:2faf] type 00 class 0x088000 [ 0.739551] pci 0000:ff:14.0: [8086:2fb0] type 00 class 0x088000 [ 0.739627] pci 0000:ff:14.1: [8086:2fb1] type 00 class 0x088000 [ 0.739704] pci 0000:ff:14.2: [8086:2fb2] type 00 class 0x088000 [ 0.739781] pci 0000:ff:14.3: [8086:2fb3] type 00 class 0x088000 [ 0.739857] pci 0000:ff:14.4: [8086:2fbc] type 00 class 0x088000 [ 0.739931] pci 0000:ff:14.5: [8086:2fbd] type 00 class 0x088000 [ 0.740012] pci 0000:ff:14.6: [8086:2fbe] type 00 class 0x088000 [ 0.740086] pci 0000:ff:14.7: [8086:2fbf] type 00 class 0x088000 [ 0.740161] pci 0000:ff:16.0: [8086:2f68] type 00 class 0x088000 [ 0.740238] pci 0000:ff:16.1: [8086:2f79] type 00 class 0x088000 [ 0.740317] pci 0000:ff:16.2: [8086:2f6a] type 00 class 0x088000 [ 0.740397] pci 0000:ff:16.3: [8086:2f6b] type 00 class 0x088000 [ 0.740475] pci 0000:ff:16.6: [8086:2f6e] type 00 class 0x088000 [ 0.740550] pci 0000:ff:16.7: [8086:2f6f] type 00 class 0x088000 [ 0.740631] pci 0000:ff:17.0: [8086:2fd0] type 00 class 0x088000 [ 0.740709] pci 0000:ff:17.1: [8086:2fd1] type 00 class 0x088000 [ 0.740786] pci 0000:ff:17.2: [8086:2fd2] type 00 class 0x088000 [ 0.740864] pci 0000:ff:17.3: [8086:2fd3] type 00 class 0x088000 [ 0.740940] pci 0000:ff:17.4: [8086:2fb8] type 00 class 0x088000 [ 0.741015] pci 0000:ff:17.5: [8086:2fb9] type 00 class 0x088000 [ 0.741089] pci 0000:ff:17.6: [8086:2fba] type 00 class 0x088000 [ 0.741164] pci 0000:ff:17.7: [8086:2fbb] type 00 class 0x088000 [ 0.741257] pci 0000:ff:1e.0: [8086:2f98] type 00 class 0x088000 [ 0.741330] pci 0000:ff:1e.1: [8086:2f99] type 00 class 0x088000 [ 0.741403] pci 0000:ff:1e.2: [8086:2f9a] type 00 class 0x088000 [ 0.741477] pci 0000:ff:1e.3: [8086:2fc0] type 00 class 0x088000 [ 0.741514] pci 0000:ff:1e.4: [8086:2f9c] type 00 class 0x088000 [ 0.741593] pci 0000:ff:1f.0: [8086:2f88] type 00 class 0x088000 [ 0.741667] pci 0000:ff:1f.2: [8086:2f8a] type 00 class 0x088000 [ 0.741843] ACPI: PCI Root Bridge [UNC0] (domain 0000 [bus 7f]) [ 0.741848] acpi PNP0A03:03: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] [ 0.742575] acpi PNP0A03:03: _OSC: platform does not support [SHPCHotplug LTR DPC] [ 0.743984] acpi PNP0A03:03: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] [ 0.744032] PCI host bridge to bus 0000:7f [ 0.744034] pci_bus 0000:7f: Unknown NUMA node; performance will be reduced [ 0.744036] pci_bus 0000:7f: root bus resource [bus 7f] [ 0.744048] pci 0000:7f:08.0: [8086:2f80] type 00 class 0x088000 [ 0.744138] pci 0000:7f:08.2: [8086:2f32] type 00 class 0x110100 [ 0.744217] pci 0000:7f:08.3: [8086:2f83] type 00 class 0x088000 [ 0.744309] pci 0000:7f:09.0: [8086:2f90] type 00 class 0x088000 [ 0.744385] pci 0000:7f:09.2: [8086:2f33] type 00 class 0x110100 [ 0.744461] pci 0000:7f:09.3: [8086:2f93] type 00 class 0x088000 [ 0.744542] pci 0000:7f:0b.0: [8086:2f81] type 00 class 0x088000 [ 0.744615] pci 0000:7f:0b.1: [8086:2f36] type 00 class 0x110100 [ 0.744689] pci 0000:7f:0b.2: [8086:2f37] type 00 class 0x110100 [ 0.744772] pci 0000:7f:0c.0: [8086:2fe0] type 00 class 0x088000 [ 0.744849] pci 0000:7f:0c.1: [8086:2fe1] type 00 class 0x088000 [ 0.744923] pci 0000:7f:0c.2: [8086:2fe2] type 00 class 0x088000 [ 0.744996] pci 0000:7f:0c.3: [8086:2fe3] type 00 class 0x088000 [ 0.745070] pci 0000:7f:0c.4: [8086:2fe4] type 00 class 0x088000 [ 0.745144] pci 0000:7f:0c.5: [8086:2fe5] type 00 class 0x088000 [ 0.745217] pci 0000:7f:0c.6: [8086:2fe6] type 00 class 0x088000 [ 0.745291] pci 0000:7f:0c.7: [8086:2fe7] type 00 class 0x088000 [ 0.745371] pci 0000:7f:0d.0: [8086:2fe8] type 00 class 0x088000 [ 0.745446] pci 0000:7f:0d.1: [8086:2fe9] type 00 class 0x088000 [ 0.745523] pci 0000:7f:0d.2: [8086:2fea] type 00 class 0x088000 [ 0.745597] pci 0000:7f:0d.3: [8086:2feb] type 00 class 0x088000 [ 0.745672] pci 0000:7f:0d.4: [8086:2fec] type 00 class 0x088000 [ 0.745746] pci 0000:7f:0d.5: [8086:2fed] type 00 class 0x088000 [ 0.745820] pci 0000:7f:0d.6: [8086:2fee] type 00 class 0x088000 [ 0.745893] pci 0000:7f:0d.7: [8086:2fef] type 00 class 0x088000 [ 0.745975] pci 0000:7f:0e.0: [8086:2ff0] type 00 class 0x088000 [ 0.746049] pci 0000:7f:0e.1: [8086:2ff1] type 00 class 0x088000 [ 0.746127] pci 0000:7f:0f.0: [8086:2ff8] type 00 class 0x088000 [ 0.746201] pci 0000:7f:0f.1: [8086:2ff9] type 00 class 0x088000 [ 0.746275] pci 0000:7f:0f.2: [8086:2ffa] type 00 class 0x088000 [ 0.746348] pci 0000:7f:0f.3: [8086:2ffb] type 00 class 0x088000 [ 0.746425] pci 0000:7f:0f.4: [8086:2ffc] type 00 class 0x088000 [ 0.746500] pci 0000:7f:0f.5: [8086:2ffd] type 00 class 0x088000 [ 0.746582] pci 0000:7f:0f.6: [8086:2ffe] type 00 class 0x088000 [ 0.746657] pci 0000:7f:10.0: [8086:2f1d] type 00 class 0x088000 [ 0.746731] pci 0000:7f:10.1: [8086:2f34] type 00 class 0x110100 [ 0.746807] pci 0000:7f:10.5: [8086:2f1e] type 00 class 0x088000 [ 0.746881] pci 0000:7f:10.6: [8086:2f7d] type 00 class 0x110100 [ 0.746955] pci 0000:7f:10.7: [8086:2f1f] type 00 class 0x088000 [ 0.747030] pci 0000:7f:12.0: [8086:2fa0] type 00 class 0x088000 [ 0.747106] pci 0000:7f:12.1: [8086:2f30] type 00 class 0x110100 [ 0.747191] pci 0000:7f:12.4: [8086:2f60] type 00 class 0x088000 [ 0.747271] pci 0000:7f:12.5: [8086:2f38] type 00 class 0x110100 [ 0.747350] pci 0000:7f:13.0: [8086:2fa8] type 00 class 0x088000 [ 0.747429] pci 0000:7f:13.1: [8086:2f71] type 00 class 0x088000 [ 0.747509] pci 0000:7f:13.2: [8086:2faa] type 00 class 0x088000 [ 0.747589] pci 0000:7f:13.3: [8086:2fab] type 00 class 0x088000 [ 0.747670] pci 0000:7f:13.6: [8086:2fae] type 00 class 0x088000 [ 0.747746] pci 0000:7f:13.7: [8086:2faf] type 00 class 0x088000 [ 0.747830] pci 0000:7f:14.0: [8086:2fb0] type 00 class 0x088000 [ 0.747910] pci 0000:7f:14.1: [8086:2fb1] type 00 class 0x088000 [ 0.747990] pci 0000:7f:14.2: [8086:2fb2] type 00 class 0x088000 [ 0.748073] pci 0000:7f:14.3: [8086:2fb3] type 00 class 0x088000 [ 0.748153] pci 0000:7f:14.4: [8086:2fbc] type 00 class 0x088000 [ 0.748229] pci 0000:7f:14.5: [8086:2fbd] type 00 class 0x088000 [ 0.748306] pci 0000:7f:14.6: [8086:2fbe] type 00 class 0x088000 [ 0.748384] pci 0000:7f:14.7: [8086:2fbf] type 00 class 0x088000 [ 0.748469] pci 0000:7f:16.0: [8086:2f68] type 00 class 0x088000 [ 0.748550] pci 0000:7f:16.1: [8086:2f79] type 00 class 0x088000 [ 0.748630] pci 0000:7f:16.2: [8086:2f6a] type 00 class 0x088000 [ 0.748711] pci 0000:7f:16.3: [8086:2f6b] type 00 class 0x088000 [ 0.748795] pci 0000:7f:16.6: [8086:2f6e] type 00 class 0x088000 [ 0.748874] pci 0000:7f:16.7: [8086:2f6f] type 00 class 0x088000 [ 0.748951] pci 0000:7f:17.0: [8086:2fd0] type 00 class 0x088000 [ 0.749033] pci 0000:7f:17.1: [8086:2fd1] type 00 class 0x088000 [ 0.749121] pci 0000:7f:17.2: [8086:2fd2] type 00 class 0x088000 [ 0.749202] pci 0000:7f:17.3: [8086:2fd3] type 00 class 0x088000 [ 0.749282] pci 0000:7f:17.4: [8086:2fb8] type 00 class 0x088000 [ 0.749360] pci 0000:7f:17.5: [8086:2fb9] type 00 class 0x088000 [ 0.749437] pci 0000:7f:17.6: [8086:2fba] type 00 class 0x088000 [ 0.749513] pci 0000:7f:17.7: [8086:2fbb] type 00 class 0x088000 [ 0.749601] pci 0000:7f:1e.0: [8086:2f98] type 00 class 0x088000 [ 0.749677] pci 0000:7f:1e.1: [8086:2f99] type 00 class 0x088000 [ 0.749759] pci 0000:7f:1e.2: [8086:2f9a] type 00 class 0x088000 [ 0.749840] pci 0000:7f:1e.3: [8086:2fc0] type 00 class 0x088000 [ 0.749878] pci 0000:7f:1e.4: [8086:2f9c] type 00 class 0x088000 [ 0.749960] pci 0000:7f:1f.0: [8086:2f88] type 00 class 0x088000 [ 0.750038] pci 0000:7f:1f.2: [8086:2f8a] type 00 class 0x088000 [ 0.773968] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7e]) [ 0.773974] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] [ 0.774445] acpi PNP0A08:00: _OSC: platform does not support [SHPCHotplug LTR DPC] [ 0.775356] acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] [ 0.776064] PCI host bridge to bus 0000:00 [ 0.776067] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 0.776070] pci_bus 0000:00: root bus resource [io 0x1000-0x7fff window] [ 0.776071] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 0.776073] pci_bus 0000:00: root bus resource [mem 0x90000000-0xc7ffbfff window] [ 0.776075] pci_bus 0000:00: root bus resource [mem 0x380000000000-0x383fffffffff window] [ 0.776077] pci_bus 0000:00: root bus resource [bus 00-7e] [ 0.776107] pci 0000:00:00.0: [8086:2f00] type 00 class 0x060000 [ 0.776289] pci 0000:00:01.0: [8086:2f02] type 01 class 0x060400 [ 0.776379] pci 0000:00:01.0: PME# supported from D0 D3hot D3cold [ 0.776665] pci 0000:00:03.0: [8086:2f08] type 01 class 0x060400 [ 0.776756] pci 0000:00:03.0: PME# supported from D0 D3hot D3cold [ 0.777028] pci 0000:00:05.0: [8086:2f28] type 00 class 0x088000 [ 0.777153] pci 0000:00:05.1: [8086:2f29] type 00 class 0x088000 [ 0.777316] pci 0000:00:05.2: [8086:2f2a] type 00 class 0x088000 [ 0.777428] pci 0000:00:05.4: [8086:2f2c] type 00 class 0x080020 [ 0.777447] pci 0000:00:05.4: reg 0x10: [mem 0xc7f03000-0xc7f03fff] [ 0.777593] pci 0000:00:11.0: [8086:8d7c] type 00 class 0xff0000 [ 0.777807] pci 0000:00:14.0: [8086:8d31] type 00 class 0x0c0330 [ 0.777839] pci 0000:00:14.0: reg 0x10: [mem 0x383ffff00000-0x383ffff0ffff 64bit] [ 0.777931] pci 0000:00:14.0: PME# supported from D3hot D3cold [ 0.778052] pci 0000:00:1a.0: [8086:8d2d] type 00 class 0x0c0320 [ 0.778079] pci 0000:00:1a.0: reg 0x10: [mem 0xc7f01000-0xc7f013ff] [ 0.778209] pci 0000:00:1a.0: PME# supported from D0 D3hot D3cold [ 0.778305] pci 0000:00:1b.0: [8086:8d20] type 00 class 0x040300 [ 0.778331] pci 0000:00:1b.0: reg 0x10: [mem 0x383ffff10000-0x383ffff13fff 64bit] [ 0.778417] pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold [ 0.778531] pci 0000:00:1c.0: [8086:8d10] type 01 class 0x060400 [ 0.778643] pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold [ 0.778760] pci 0000:00:1c.4: [8086:8d18] type 01 class 0x060400 [ 0.778876] pci 0000:00:1c.4: PME# supported from D0 D3hot D3cold [ 0.779128] pci 0000:00:1c.7: [8086:8d1e] type 01 class 0x060400 [ 0.779244] pci 0000:00:1c.7: PME# supported from D0 D3hot D3cold [ 0.779360] pci 0000:00:1d.0: [8086:8d26] type 00 class 0x0c0320 [ 0.779387] pci 0000:00:1d.0: reg 0x10: [mem 0xc7f00000-0xc7f003ff] [ 0.779516] pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold [ 0.779616] pci 0000:00:1f.0: [8086:8d44] type 00 class 0x060100 [ 0.779859] pci 0000:00:1f.3: [8086:8d22] type 00 class 0x0c0500 [ 0.779885] pci 0000:00:1f.3: reg 0x10: [mem 0x383ffff15000-0x383ffff150ff 64bit] [ 0.779911] pci 0000:00:1f.3: reg 0x20: [io 0x0580-0x059f] [ 0.780224] pci 0000:01:00.0: [126f:2262] type 00 class 0x010802 [ 0.780254] pci 0000:01:00.0: reg 0x10: [mem 0xc7e00000-0xc7e03fff 64bit] [ 0.780506] pci 0000:00:01.0: PCI bridge to [bus 01] [ 0.780511] pci 0000:00:01.0: bridge window [mem 0xc7e00000-0xc7efffff] [ 0.780738] pci 0000:02:00.0: [1002:6fdf] type 00 class 0x030000 [ 0.780766] pci 0000:02:00.0: reg 0x10: [mem 0x383fe0000000-0x383fefffffff 64bit pref] [ 0.780786] pci 0000:02:00.0: reg 0x18: [mem 0x383ff0000000-0x383ff01fffff 64bit pref] [ 0.780800] pci 0000:02:00.0: reg 0x20: [io 0x6000-0x60ff] [ 0.780813] pci 0000:02:00.0: reg 0x24: [mem 0xc7d00000-0xc7d3ffff] [ 0.780827] pci 0000:02:00.0: reg 0x30: [mem 0xc7d40000-0xc7d5ffff pref] [ 0.780832] pci 0000:02:00.0: enabling Extended Tags [ 0.780860] pci 0000:02:00.0: BAR 0: assigned to efifb [ 0.780903] pci 0000:02:00.0: supports D1 D2 [ 0.780904] pci 0000:02:00.0: PME# supported from D1 D2 D3hot D3cold [ 0.781064] pci 0000:02:00.1: [1002:aaf0] type 00 class 0x040300 [ 0.781087] pci 0000:02:00.1: reg 0x10: [mem 0xc7d60000-0xc7d63fff 64bit] [ 0.781127] pci 0000:02:00.1: enabling Extended Tags [ 0.781179] pci 0000:02:00.1: supports D1 D2 [ 0.781274] pci 0000:00:03.0: ASPM: current common clock configuration is inconsistent, reconfiguring [ 0.781302] pci 0000:00:03.0: PCI bridge to [bus 02] [ 0.781305] pci 0000:00:03.0: bridge window [io 0x6000-0x6fff] [ 0.781308] pci 0000:00:03.0: bridge window [mem 0xc7d00000-0xc7dfffff] [ 0.781311] pci 0000:00:03.0: bridge window [mem 0x383fe0000000-0x383ff01fffff 64bit pref] [ 0.781353] pci 0000:00:1c.0: PCI bridge to [bus 03] [ 0.781438] pci 0000:04:00.0: [8086:15f3] type 00 class 0x020000 [ 0.781470] pci 0000:04:00.0: reg 0x10: [mem 0xc7b00000-0xc7bfffff] [ 0.781524] pci 0000:04:00.0: reg 0x1c: [mem 0xc7c00000-0xc7c03fff] [ 0.781578] pci 0000:04:00.0: reg 0x30: [mem 0xc7a00000-0xc7afffff pref] [ 0.781678] pci 0000:04:00.0: PME# supported from D0 D3hot D3cold [ 0.781883] pci 0000:00:1c.4: PCI bridge to [bus 04] [ 0.781888] pci 0000:00:1c.4: bridge window [mem 0xc7a00000-0xc7cfffff] [ 0.781971] pci 0000:05:00.0: [8086:15f3] type 00 class 0x020000 [ 0.782003] pci 0000:05:00.0: reg 0x10: [mem 0xc7800000-0xc78fffff] [ 0.782057] pci 0000:05:00.0: reg 0x1c: [mem 0xc7900000-0xc7903fff] [ 0.782111] pci 0000:05:00.0: reg 0x30: [mem 0xc7700000-0xc77fffff pref] [ 0.782212] pci 0000:05:00.0: PME# supported from D0 D3hot D3cold [ 0.782417] pci 0000:00:1c.7: PCI bridge to [bus 05] [ 0.782422] pci 0000:00:1c.7: bridge window [mem 0xc7700000-0xc79fffff] [ 0.782473] pci_bus 0000:00: on NUMA node 0 [ 0.783402] ACPI: PCI Root Bridge [PCI1] (domain 0000 [bus 80-fe]) [ 0.783408] acpi PNP0A08:01: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] [ 0.783874] acpi PNP0A08:01: _OSC: platform does not support [SHPCHotplug LTR DPC] [ 0.784767] acpi PNP0A08:01: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] [ 0.785112] PCI host bridge to bus 0000:80 [ 0.785114] pci_bus 0000:80: root bus resource [io 0x8000-0xffff window] [ 0.785117] pci_bus 0000:80: root bus resource [mem 0xc8000000-0xfbffbfff window] [ 0.785119] pci_bus 0000:80: root bus resource [mem 0x384000000000-0x387fffffffff window] [ 0.785121] pci_bus 0000:80: root bus resource [bus 80-fe] [ 0.785144] pci 0000:80:01.0: [8086:2f02] type 01 class 0x060400 [ 0.785229] pci 0000:80:01.0: PME# supported from D0 D3hot D3cold [ 0.785513] pci 0000:80:05.0: [8086:2f28] type 00 class 0x088000 [ 0.785629] pci 0000:80:05.1: [8086:2f29] type 00 class 0x088000 [ 0.785778] pci 0000:80:05.2: [8086:2f2a] type 00 class 0x088000 [ 0.785881] pci 0000:80:05.4: [8086:2f2c] type 00 class 0x080020 [ 0.785900] pci 0000:80:05.4: reg 0x10: [mem 0xfbf00000-0xfbf00fff] [ 0.786251] pci 0000:81:00.0: [1e4b:1202] type 00 class 0x010802 [ 0.786278] pci 0000:81:00.0: reg 0x10: [mem 0xfbe00000-0xfbe03fff 64bit] [ 0.786387] pci 0000:81:00.0: PME# supported from D0 D3hot D3cold [ 0.786519] pci 0000:80:01.0: PCI bridge to [bus 81] [ 0.786523] pci 0000:80:01.0: bridge window [mem 0xfbe00000-0xfbefffff] [ 0.786539] pci_bus 0000:80: on NUMA node 1 [ 0.786982] ACPI: PCI: Interrupt link LNKA configured for IRQ 0 [ 0.786985] ACPI: PCI: Interrupt link LNKA disabled [ 0.787050] ACPI: PCI: Interrupt link LNKB configured for IRQ 0 [ 0.787051] ACPI: PCI: Interrupt link LNKB disabled [ 0.787115] ACPI: PCI: Interrupt link LNKC configured for IRQ 0 [ 0.787116] ACPI: PCI: Interrupt link LNKC disabled [ 0.787180] ACPI: PCI: Interrupt link LNKD configured for IRQ 0 [ 0.787181] ACPI: PCI: Interrupt link LNKD disabled [ 0.787248] ACPI: PCI: Interrupt link LNKE configured for IRQ 0 [ 0.787249] ACPI: PCI: Interrupt link LNKE disabled [ 0.787313] ACPI: PCI: Interrupt link LNKF configured for IRQ 0 [ 0.787314] ACPI: PCI: Interrupt link LNKF disabled [ 0.787378] ACPI: PCI: Interrupt link LNKG configured for IRQ 0 [ 0.787379] ACPI: PCI: Interrupt link LNKG disabled [ 0.787442] ACPI: PCI: Interrupt link LNKH configured for IRQ 0 [ 0.787443] ACPI: PCI: Interrupt link LNKH disabled [ 0.788825] iommu: Default domain type: Translated [ 0.788825] iommu: DMA domain TLB invalidation policy: lazy mode [ 0.789036] SCSI subsystem initialized [ 0.789063] libata version 3.00 loaded. [ 0.789063] ACPI: bus type USB registered [ 0.789063] usbcore: registered new interface driver usbfs [ 0.789063] usbcore: registered new interface driver hub [ 0.789063] usbcore: registered new device driver usb [ 0.789063] pps_core: LinuxPPS API ver. 1 registered [ 0.789063] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 0.789063] PTP clock support registered [ 0.789063] EDAC MC: Ver: 3.0.0 [ 0.789114] efivars: Registered efivars operations [ 0.789114] NetLabel: Initializing [ 0.789114] NetLabel: domain hash size = 128 [ 0.789114] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 0.789114] NetLabel: unlabeled traffic allowed by default [ 0.789114] mctp: management component transport protocol core [ 0.789114] NET: Registered PF_MCTP protocol family [ 0.789114] PCI: Using ACPI for IRQ routing [ 0.793239] PCI: pci_cache_line_size set to 64 bytes [ 0.793419] e820: reserve RAM buffer [mem 0x0003f000-0x0003ffff] [ 0.793421] e820: reserve RAM buffer [mem 0x7669d000-0x77ffffff] [ 0.793423] e820: reserve RAM buffer [mem 0x782bc000-0x7bffffff] [ 0.793424] e820: reserve RAM buffer [mem 0x79591000-0x7bffffff] [ 0.793426] e820: reserve RAM buffer [mem 0x7bd22000-0x7bffffff] [ 0.795497] pci 0000:02:00.0: vgaarb: setting as boot VGA device [ 0.795499] pci 0000:02:00.0: vgaarb: bridge control possible [ 0.795500] pci 0000:02:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none [ 0.795503] vgaarb: loaded [ 0.796961] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 [ 0.796970] hpet0: 8 comparators, 64-bit 14.318180 MHz counter [ 0.799971] clocksource: Switched to clocksource tsc-early [ 0.800295] VFS: Disk quotas dquot_6.6.0 [ 0.800335] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 0.800442] pnp: PnP ACPI init [ 0.801001] system 00:01: [io 0x0500-0x057f] has been reserved [ 0.801005] system 00:01: [io 0x0400-0x047f] has been reserved [ 0.801007] system 00:01: [io 0x0580-0x059f] has been reserved [ 0.801009] system 00:01: [io 0x0600-0x061f] has been reserved [ 0.801011] system 00:01: [io 0x0880-0x0883] has been reserved [ 0.801012] system 00:01: [io 0x0800-0x081f] has been reserved [ 0.801016] system 00:01: [mem 0xfed1c000-0xfed3ffff] has been reserved [ 0.801018] system 00:01: [mem 0xfed45000-0xfed8bfff] has been reserved [ 0.801020] system 00:01: [mem 0xff000000-0xffffffff] has been reserved [ 0.801022] system 00:01: [mem 0xfee00000-0xfeefffff] has been reserved [ 0.801024] system 00:01: [mem 0xfed12000-0xfed1200f] has been reserved [ 0.801026] system 00:01: [mem 0xfed12010-0xfed1201f] has been reserved [ 0.801028] system 00:01: [mem 0xfed1b000-0xfed1bfff] has been reserved [ 0.801315] system 00:02: [io 0x0a00-0x0a0f] has been reserved [ 0.801318] system 00:02: [io 0x0a10-0x0a1f] has been reserved [ 0.801319] system 00:02: [io 0x0a20-0x0a2f] has been reserved [ 0.801321] system 00:02: [io 0x0a30-0x0a3f] has been reserved [ 0.801643] pnp 00:03: [dma 0 disabled] [ 0.802121] pnp: PnP ACPI: found 4 devices [ 0.807371] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 0.807835] NET: Registered PF_INET protocol family [ 0.808322] IP idents hash table entries: 262144 (order: 9, 2097152 bytes, vmalloc) [ 0.812308] tcp_listen_portaddr_hash hash table entries: 32768 (order: 7, 524288 bytes, vmalloc) [ 0.812414] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, vmalloc) [ 0.813228] TCP established hash table entries: 524288 (order: 10, 4194304 bytes, vmalloc hugepage) [ 0.814091] TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, vmalloc) [ 0.814427] TCP: Hash tables configured (established 524288 bind 65536) [ 0.815051] MPTCP token hash table entries: 65536 (order: 8, 1572864 bytes, vmalloc) [ 0.815394] UDP hash table entries: 32768 (order: 8, 1048576 bytes, vmalloc) [ 0.815733] UDP-Lite hash table entries: 32768 (order: 8, 1048576 bytes, vmalloc) [ 0.815983] NET: Registered PF_UNIX/PF_LOCAL protocol family [ 0.815991] NET: Registered PF_XDP protocol family [ 0.816047] pci 0000:00:01.0: PCI bridge to [bus 01] [ 0.816057] pci 0000:00:01.0: bridge window [mem 0xc7e00000-0xc7efffff] [ 0.816073] pci 0000:00:03.0: PCI bridge to [bus 02] [ 0.816075] pci 0000:00:03.0: bridge window [io 0x6000-0x6fff] [ 0.816083] pci 0000:00:03.0: bridge window [mem 0xc7d00000-0xc7dfffff] [ 0.816090] pci 0000:00:03.0: bridge window [mem 0x383fe0000000-0x383ff01fffff 64bit pref] [ 0.816101] pci 0000:00:1c.0: PCI bridge to [bus 03] [ 0.816126] pci 0000:00:1c.4: PCI bridge to [bus 04] [ 0.816135] pci 0000:00:1c.4: bridge window [mem 0xc7a00000-0xc7cfffff] [ 0.816153] pci 0000:00:1c.7: PCI bridge to [bus 05] [ 0.816162] pci 0000:00:1c.7: bridge window [mem 0xc7700000-0xc79fffff] [ 0.816179] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] [ 0.816182] pci_bus 0000:00: resource 5 [io 0x1000-0x7fff window] [ 0.816183] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] [ 0.816185] pci_bus 0000:00: resource 7 [mem 0x90000000-0xc7ffbfff window] [ 0.816186] pci_bus 0000:00: resource 8 [mem 0x380000000000-0x383fffffffff window] [ 0.816188] pci_bus 0000:01: resource 1 [mem 0xc7e00000-0xc7efffff] [ 0.816190] pci_bus 0000:02: resource 0 [io 0x6000-0x6fff] [ 0.816191] pci_bus 0000:02: resource 1 [mem 0xc7d00000-0xc7dfffff] [ 0.816192] pci_bus 0000:02: resource 2 [mem 0x383fe0000000-0x383ff01fffff 64bit pref] [ 0.816194] pci_bus 0000:04: resource 1 [mem 0xc7a00000-0xc7cfffff] [ 0.816196] pci_bus 0000:05: resource 1 [mem 0xc7700000-0xc79fffff] [ 0.816380] pci 0000:80:01.0: PCI bridge to [bus 81] [ 0.816389] pci 0000:80:01.0: bridge window [mem 0xfbe00000-0xfbefffff] [ 0.816404] pci_bus 0000:80: resource 4 [io 0x8000-0xffff window] [ 0.816406] pci_bus 0000:80: resource 5 [mem 0xc8000000-0xfbffbfff window] [ 0.816407] pci_bus 0000:80: resource 6 [mem 0x384000000000-0x387fffffffff window] [ 0.816409] pci_bus 0000:81: resource 1 [mem 0xfbe00000-0xfbefffff] [ 0.816749] pci 0000:00:05.0: disabled boot interrupts on device [8086:2f28] [ 0.837759] pci 0000:00:1a.0: quirk_usb_early_handoff+0x0/0x7d0 took 20266 usecs [ 0.857753] pci 0000:00:1d.0: quirk_usb_early_handoff+0x0/0x7d0 took 19491 usecs [ 0.857780] pci 0000:01:00.0: CLS mismatch (64 != 32), using 64 bytes [ 0.857874] pci 0000:02:00.1: D0 power state depends on 0000:02:00.0 [ 0.857935] pci 0000:80:05.0: disabled boot interrupts on device [8086:2f28] [ 0.858001] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 0.858002] software IO TLB: mapped [mem 0x000000007041a000-0x000000007441a000] (64MB) [ 0.858004] Trying to unpack rootfs image as initramfs... [ 0.864717] Initialise system trusted keyrings [ 0.864729] Key type blacklist registered [ 0.864840] workingset: timestamp_bits=41 max_order=24 bucket_order=0 [ 0.864858] zbud: loaded [ 0.865207] integrity: Platform Keyring initialized [ 0.865210] integrity: Machine keyring initialized [ 0.875162] Key type asymmetric registered [ 0.875164] Asymmetric key parser 'x509' registered [ 0.875194] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 242) [ 0.875284] io scheduler mq-deadline registered [ 0.875286] io scheduler kyber registered [ 0.875301] io scheduler bfq registered [ 0.876370] pcieport 0000:00:01.0: PME: Signaling with IRQ 25 [ 0.876472] pcieport 0000:00:01.0: AER: enabled with IRQ 25 [ 0.876778] pcieport 0000:00:03.0: PME: Signaling with IRQ 27 [ 0.876866] pcieport 0000:00:03.0: AER: enabled with IRQ 27 [ 0.877098] pcieport 0000:00:1c.0: PME: Signaling with IRQ 28 [ 0.877320] pcieport 0000:00:1c.4: PME: Signaling with IRQ 29 [ 0.877543] pcieport 0000:00:1c.7: PME: Signaling with IRQ 30 [ 0.877913] pcieport 0000:80:01.0: PME: Signaling with IRQ 32 [ 0.878028] pcieport 0000:80:01.0: AER: enabled with IRQ 32 [ 0.878252] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 [ 0.878372] Monitor-Mwait will be used to enter C-1 state [ 0.878399] Monitor-Mwait will be used to enter C-2 state [ 0.878404] ACPI: \_SB_.SCK0.CP00: Found 2 idle states [ 0.881929] input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 [ 0.881964] ACPI: button: Power Button [PWRB] [ 0.881995] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input1 [ 0.894334] ACPI: button: Power Button [PWRF] [ 0.909266] Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled [ 0.909449] 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A [ 0.910762] serial8250: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A [ 0.913010] Non-volatile memory driver v1.3 [ 0.913012] Linux agpgart interface v0.103 [ 0.913088] AMD-Vi: AMD IOMMUv2 functionality not available on this system - This is not a bug. [ 0.913163] ACPI: bus type drm_connector registered [ 0.914115] [drm] Initialized simpledrm 1.0.0 20200625 for simple-framebuffer.0 on minor 0 [ 0.914642] fbcon: Deferring console take-over [ 0.914645] simple-framebuffer simple-framebuffer.0: [drm] fb0: simpledrmdrmfb frame buffer device [ 0.920328] usbcore: registered new interface driver usbserial_generic [ 0.920334] usbserial: USB Serial support registered for generic [ 0.920416] rtc_cmos 00:00: RTC can wake from S4 [ 0.920499] ehci-pci 0000:00:1a.0: EHCI Host Controller [ 0.920507] ehci-pci 0000:00:1a.0: new USB bus registered, assigned bus number 1 [ 0.920522] ehci-pci 0000:00:1a.0: debug port 2 [ 0.920696] rtc_cmos 00:00: registered as rtc0 [ 0.920763] rtc_cmos 00:00: setting system clock to 2023-09-25T03:31:45 UTC (1695612705) [ 0.920791] rtc_cmos 00:00: alarms up to one month, y3k, 114 bytes nvram [ 0.924450] ehci-pci 0000:00:1a.0: irq 18, io mem 0xc7f01000 [ 0.926395] intel_pstate: Intel P-state driver initializing [ 0.937638] ehci-pci 0000:00:1a.0: USB 2.0 started, EHCI 1.00 [ 0.937679] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.05 [ 0.937682] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 0.937683] usb usb1: Product: EHCI Host Controller [ 0.937684] usb usb1: Manufacturer: Linux 6.5.4-arch2-1 ehci_hcd [ 0.937685] usb usb1: SerialNumber: 0000:00:1a.0 [ 0.937809] hub 1-0:1.0: USB hub found [ 0.937814] hub 1-0:1.0: 2 ports detected [ 0.938101] ehci-pci 0000:00:1d.0: EHCI Host Controller [ 0.938111] ehci-pci 0000:00:1d.0: new USB bus registered, assigned bus number 2 [ 0.938126] ehci-pci 0000:00:1d.0: debug port 2 [ 0.939693] ledtrig-cpu: registered to indicate activity on CPUs [ 0.940142] hid: raw HID events driver (C) Jiri Kosina [ 0.940399] drop_monitor: Initializing network drop monitor service [ 0.942059] ehci-pci 0000:00:1d.0: irq 18, io mem 0xc7f00000 [ 0.954325] ehci-pci 0000:00:1d.0: USB 2.0 started, EHCI 1.00 [ 0.954398] usb usb2: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.05 [ 0.954403] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 0.954407] usb usb2: Product: EHCI Host Controller [ 0.954409] usb usb2: Manufacturer: Linux 6.5.4-arch2-1 ehci_hcd [ 0.954412] usb usb2: SerialNumber: 0000:00:1d.0 [ 0.954600] hub 2-0:1.0: USB hub found [ 0.954612] hub 2-0:1.0: 2 ports detected [ 0.954985] Initializing XFRM netlink socket [ 0.955072] NET: Registered PF_INET6 protocol family [ 1.014168] Freeing initrd memory: 48432K [ 1.022619] Segment Routing with IPv6 [ 1.022623] RPL Segment Routing with IPv6 [ 1.022644] In-situ OAM (IOAM) with IPv6 [ 1.022698] NET: Registered PF_PACKET protocol family [ 1.030826] microcode: Microcode Update Driver: v2.2. [ 1.032534] resctrl: L3 allocation detected [ 1.032537] resctrl: L3 monitoring detected [ 1.032546] IPI shorthand broadcast: enabled [ 1.036228] sched_clock: Marking stable (1033336554, 943872)->(1166780055, -132499629) [ 1.036777] registered taskstats version 1 [ 1.042046] Loading compiled-in X.509 certificates [ 1.049045] Loaded X.509 cert 'Build time autogenerated kernel key: dc63cef71149f72b576d30435df266ae491b4743' [ 1.079637] zswap: loaded using pool zstd/zsmalloc [ 1.082918] Key type .fscrypt registered [ 1.082921] Key type fscrypt-provisioning registered [ 1.083805] PM: Magic number: 7:690:513 [ 1.187653] usb 1-1: new high-speed USB device number 2 using ehci-pci [ 1.191075] RAS: Correctable Errors collector initialized. [ 1.191225] clk: Disabling unused clocks [ 1.193647] Freeing unused decrypted memory: 2036K [ 1.195248] Freeing unused kernel image (initmem) memory: 3384K [ 1.204328] usb 2-1: new high-speed USB device number 2 using ehci-pci [ 1.217669] Write protecting the kernel read-only data: 30720k [ 1.218718] Freeing unused kernel image (rodata/data gap) memory: 1388K [ 1.308168] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 1.308174] rodata_test: all tests were successful [ 1.308176] x86/mm: Checking user space page tables [ 1.334660] usb 1-1: New USB device found, idVendor=8087, idProduct=800a, bcdDevice= 0.05 [ 1.334667] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1.335006] hub 1-1:1.0: USB hub found [ 1.335157] hub 1-1:1.0: 6 ports detected [ 1.349514] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 1.349519] Run /init as init process [ 1.349521] with arguments: [ 1.349522] /init [ 1.349523] with environment: [ 1.349524] HOME=/ [ 1.349524] TERM=linux [ 1.349525] BOOT_IMAGE=/vmlinuz-linux [ 1.351286] usb 2-1: New USB device found, idVendor=8087, idProduct=8002, bcdDevice= 0.05 [ 1.351294] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1.351626] hub 2-1:1.0: USB hub found [ 1.351785] hub 2-1:1.0: 8 ports detected [ 1.363473] systemd[1]: systemd 254.4-2-arch running in system mode (+PAM +AUDIT -SELINUX -APPARMOR -IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified) [ 1.363479] systemd[1]: Detected architecture x86-64. [ 1.363481] systemd[1]: Running in initrd. [ 1.363653] systemd[1]: Initializing machine ID from random generator. [ 1.416989] systemd[1]: Queued start job for default target Initrd Default Target. [ 1.441495] systemd[1]: Reached target Path Units. [ 1.441544] systemd[1]: Reached target Slice Units. [ 1.441554] systemd[1]: Reached target Swaps. [ 1.441563] systemd[1]: Reached target Timer Units. [ 1.441663] systemd[1]: Listening on Journal Socket (/dev/log). [ 1.441758] systemd[1]: Listening on Journal Socket. [ 1.441863] systemd[1]: Listening on udev Control Socket. [ 1.441940] systemd[1]: Listening on udev Kernel Socket. [ 1.441953] systemd[1]: Reached target Socket Units. [ 1.442864] systemd[1]: Starting Create List of Static Device Nodes... [ 1.442915] systemd[1]: Check battery level during early boot was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/class/power_supply). [ 1.444461] systemd[1]: Starting Journal Service... [ 1.445232] systemd[1]: Starting Load Kernel Modules... [ 1.445259] systemd[1]: TPM2 PCR Barrier (initrd) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). [ 1.445964] systemd[1]: Starting Create Static Device Nodes in /dev... [ 1.446742] systemd[1]: Starting Coldplug All udev Devices... [ 1.447208] systemd[1]: Finished Create List of Static Device Nodes. [ 1.453102] systemd[1]: Finished Create Static Device Nodes in /dev. [ 1.453171] systemd[1]: Reached target Preparation for Local File Systems. [ 1.453183] systemd[1]: Reached target Local File Systems. [ 1.454173] systemd[1]: Starting Rule-based Manager for Device Events and Files... [ 1.454826] systemd-journald[585]: Collecting audit messages is disabled. [ 1.466330] systemd[1]: Started Rule-based Manager for Device Events and Files. [ 1.503708] systemd[1]: Started Journal Service. [ 1.884330] tsc: Refined TSC clocksource calibration: 2294.685 MHz [ 1.884366] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x21139843abd, max_idle_ns: 440795210670 ns [ 1.884524] clocksource: Switched to clocksource tsc [ 3.498088] xhci_hcd 0000:00:14.0: xHCI Host Controller [ 3.498104] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 3 [ 3.499193] xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000000009810 [ 3.499401] xhci_hcd 0000:00:14.0: xHCI Host Controller [ 3.499403] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 4 [ 3.499406] xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed [ 3.499438] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.05 [ 3.499440] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 3.499442] usb usb3: Product: xHCI Host Controller [ 3.499443] usb usb3: Manufacturer: Linux 6.5.4-arch2-1 xhci-hcd [ 3.499444] usb usb3: SerialNumber: 0000:00:14.0 [ 3.499584] hub 3-0:1.0: USB hub found [ 3.499603] hub 3-0:1.0: 15 ports detected [ 3.500175] [drm] amdgpu kernel modesetting enabled. [ 3.500450] amdgpu: CRAT table disabled by module option [ 3.500453] amdgpu: Virtual CRAT table created for CPU [ 3.500472] amdgpu: Topology: Add CPU node [ 3.502213] usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.05 [ 3.502216] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 3.502217] usb usb4: Product: xHCI Host Controller [ 3.502218] usb usb4: Manufacturer: Linux 6.5.4-arch2-1 xhci-hcd [ 3.502219] usb usb4: SerialNumber: 0000:00:14.0 [ 3.502345] amdgpu 0000:02:00.0: enabling device (0106 -> 0107) [ 3.502380] [drm] initializing kernel modesetting (POLARIS10 0x1002:0x6FDF 0x1002:0x0B31 0xEF). [ 3.502391] [drm] register mmio base: 0xC7D00000 [ 3.502392] [drm] register mmio size: 262144 [ 3.502467] [drm] add ip block number 0 [ 3.502469] [drm] add ip block number 1 [ 3.502470] [drm] add ip block number 2 [ 3.502472] [drm] add ip block number 3 [ 3.502473] [drm] add ip block number 4 [ 3.502474] [drm] add ip block number 5 [ 3.502475] [drm] add ip block number 6 [ 3.502476] [drm] add ip block number 7 [ 3.502477] [drm] add ip block number 8 [ 3.502523] amdgpu 0000:02:00.0: amdgpu: Fetched VBIOS from VFCT [ 3.502526] amdgpu: ATOM BIOS: xxx-xxx-xxx [ 3.502541] [drm] UVD is enabled in VM mode [ 3.502542] [drm] UVD ENC is enabled in VM mode [ 3.502543] [drm] VCE enabled in VM mode [ 3.502616] hub 4-0:1.0: USB hub found [ 3.502629] hub 4-0:1.0: 6 ports detected [ 3.518096] nvme nvme0: pci function 0000:01:00.0 [ 3.518119] nvme nvme1: pci function 0000:81:00.0 [ 3.522473] nvme nvme0: missing or invalid SUBNQN field. [ 3.528137] nvme nvme1: missing or invalid SUBNQN field. [ 3.530458] nvme nvme0: 15/0/0 default/read/poll queues [ 3.537134] nvme0n1: p1 [ 3.542279] nvme nvme1: allocated 32 MiB host memory buffer. [ 3.544483] amdgpu 0000:02:00.0: vgaarb: deactivate vga console [ 3.544487] amdgpu 0000:02:00.0: amdgpu: Trusted Memory Zone (TMZ) feature not supported [ 3.544549] [drm] vm size is 256 GB, 2 levels, block size is 10-bit, fragment size is 9-bit [ 3.544827] amdgpu 0000:02:00.0: BAR 2: releasing [mem 0x383ff0000000-0x383ff01fffff 64bit pref] [ 3.544830] amdgpu 0000:02:00.0: BAR 0: releasing [mem 0x383fe0000000-0x383fefffffff 64bit pref] [ 3.544839] pcieport 0000:00:03.0: BAR 15: releasing [mem 0x383fe0000000-0x383ff01fffff 64bit pref] [ 3.544846] pcieport 0000:00:03.0: BAR 15: assigned [mem 0x380000000000-0x3802ffffffff 64bit pref] [ 3.544848] amdgpu 0000:02:00.0: BAR 0: assigned [mem 0x380000000000-0x3801ffffffff 64bit pref] [ 3.544858] amdgpu 0000:02:00.0: BAR 2: assigned [mem 0x380200000000-0x3802001fffff 64bit pref] [ 3.544867] pcieport 0000:00:03.0: PCI bridge to [bus 02] [ 3.544869] pcieport 0000:00:03.0: bridge window [io 0x6000-0x6fff] [ 3.544875] pcieport 0000:00:03.0: bridge window [mem 0xc7d00000-0xc7dfffff] [ 3.544879] pcieport 0000:00:03.0: bridge window [mem 0x380000000000-0x3802ffffffff 64bit pref] [ 3.544891] amdgpu 0000:02:00.0: amdgpu: VRAM: 8192M 0x000000F400000000 - 0x000000F5FFFFFFFF (8192M used) [ 3.544893] amdgpu 0000:02:00.0: amdgpu: GART: 256M 0x000000FF00000000 - 0x000000FF0FFFFFFF [ 3.544898] [drm] Detected VRAM RAM=8192M, BAR=8192M [ 3.544899] [drm] RAM width 256bits GDDR5 [ 3.545023] [drm] amdgpu: 8192M of VRAM memory ready [ 3.545026] [drm] amdgpu: 32133M of GTT memory ready. [ 3.545035] [drm] GART: num cpu pages 65536, num gpu pages 65536 [ 3.545763] [drm] PCIE GART of 256M enabled (table at 0x000000F400380000). [ 3.546190] [drm] Chained IB support enabled! [ 3.548733] nvme nvme1: 8/0/0 default/read/poll queues [ 3.550580] amdgpu: hwmgr_sw_init smu backed is polaris10_smu [ 3.552544] nvme nvme1: Ignoring bogus Namespace Identifiers [ 3.552848] [drm] Found UVD firmware Version: 1.130 Family ID: 16 [ 3.554552] nvme1n1: p1 p2 p3 p4 p5 p6 [ 3.555370] [drm] Found VCE firmware Version: 53.26 Binary ID: 3 [ 3.573171] raid6: skipped pq benchmark and selected avx2x4 [ 3.573175] raid6: using avx2x2 recovery algorithm [ 3.577315] xor: automatically using best checksumming function avx [ 3.626313] [drm] Display Core v3.2.241 initialized on DCE 11.2 [ 3.712151] Btrfs loaded, zoned=yes, fsverity=yes [ 3.716995] BTRFS: device label Home devid 1 transid 2694199 /dev/nvme0n1p1 scanned by (udev-worker) (648) [ 3.719693] BTRFS: device label Arch devid 1 transid 414603 /dev/nvme1n1p4 scanned by (udev-worker) (669) [ 3.719862] BTRFS: device fsid 06d68064-30da-42fc-8850-dafad25c4792 devid 1 transid 103957 /dev/nvme1n1p6 scanned by (udev-worker) (677) [ 3.750979] usb 3-9: new high-speed USB device number 2 using xhci_hcd [ 3.826933] BTRFS info (device nvme1n1p4): using crc32c (crc32c-intel) checksum algorithm [ 3.826939] BTRFS info (device nvme1n1p4): using free space tree [ 3.847303] BTRFS info (device nvme1n1p4): enabling ssd optimizations [ 3.847321] BTRFS info (device nvme1n1p4): auto enabling async discard [ 3.892580] usb 3-9: New USB device found, idVendor=2109, idProduct=2813, bcdDevice=90.11 [ 3.892589] usb 3-9: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [ 3.892593] usb 3-9: Product: USB2.0 Hub [ 3.892596] usb 3-9: Manufacturer: VIA Labs, Inc. [ 3.893802] hub 3-9:1.0: USB hub found [ 3.894401] hub 3-9:1.0: 4 ports detected [ 3.935799] [drm] UVD and UVD ENC initialized successfully. [ 4.036727] [drm] VCE initialized successfully. [ 4.046579] kfd kfd: amdgpu: Allocated 3969056 bytes on gart [ 4.046587] kfd kfd: amdgpu: Total number of KFD nodes to be created: 1 [ 4.046743] amdgpu: Virtual CRAT table created for GPU [ 4.046834] amdgpu: Topology: Add dGPU node [0x6fdf:0x1002] [ 4.046836] kfd kfd: amdgpu: added device 1002:6fdf [ 4.046845] amdgpu 0000:02:00.0: amdgpu: SE 4, SH per SE 1, CU per SH 9, active_cu_number 32 [ 4.049432] amdgpu 0000:02:00.0: amdgpu: Using BACO for runtime pm [ 4.049814] [drm] Initialized amdgpu 3.54.0 20150101 for 0000:02:00.0 on minor 1 [ 4.055691] usb 4-5: new SuperSpeed USB device number 2 using xhci_hcd [ 4.073121] fbcon: amdgpudrmfb (fb0) is primary device [ 4.073123] fbcon: Deferring console take-over [ 4.073125] amdgpu 0000:02:00.0: [drm] fb0: amdgpudrmfb frame buffer device [ 4.156603] usb 4-5: New USB device found, idVendor=2109, idProduct=0813, bcdDevice=90.11 [ 4.156613] usb 4-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [ 4.156618] usb 4-5: Product: USB3.0 Hub [ 4.156621] usb 4-5: Manufacturer: VIA Labs, Inc. [ 4.158274] hub 4-5:1.0: USB hub found [ 4.158376] hub 4-5:1.0: 4 ports detected [ 4.240970] usb 3-9.1: new full-speed USB device number 3 using xhci_hcd [ 4.341898] usb 3-9.1: New USB device found, idVendor=04d9, idProduct=8008, bcdDevice= 2.09 [ 4.341901] usb 3-9.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4.341902] usb 3-9.1: Product: USB-HID Keyboard [ 4.341903] usb 3-9.1: Manufacturer: HOLTEK [ 4.341904] usb 3-9.1: SerialNumber: AP0000000003 [ 4.437664] usb 3-9.2: new full-speed USB device number 4 using xhci_hcd [ 4.509251] input: HOLTEK USB-HID Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-9/3-9.1/3-9.1:1.0/0003:04D9:8008.0001/input/input2 [ 4.542800] usb 3-9.2: New USB device found, idVendor=046d, idProduct=c08b, bcdDevice=27.03 [ 4.542809] usb 3-9.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4.542813] usb 3-9.2: Product: G502 HERO Gaming Mouse [ 4.542816] usb 3-9.2: Manufacturer: Logitech [ 4.542818] usb 3-9.2: SerialNumber: 016939523931 [ 4.548578] input: Logitech G502 HERO Gaming Mouse as /devices/pci0000:00/0000:00:14.0/usb3/3-9/3-9.2/3-9.2:1.0/0003:046D:C08B.0002/input/input3 [ 4.564495] hid-generic 0003:04D9:8008.0001: input,hidraw0: USB HID v1.11 Keyboard [HOLTEK USB-HID Keyboard] on usb-0000:00:14.0-9.1/input0 [ 4.564774] hid-generic 0003:046D:C08B.0002: input,hidraw1: USB HID v1.11 Mouse [Logitech G502 HERO Gaming Mouse] on usb-0000:00:14.0-9.2/input0 [ 4.565381] hid-generic 0003:04D9:8008.0003: hiddev96,hidraw2: USB HID v1.11 Device [HOLTEK USB-HID Keyboard] on usb-0000:00:14.0-9.1/input1 [ 4.566683] input: Logitech G502 HERO Gaming Mouse Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-9/3-9.2/3-9.2:1.1/0003:046D:C08B.0004/input/input4 [ 4.566694] input: HOLTEK USB-HID Keyboard Mouse as /devices/pci0000:00/0000:00:14.0/usb3/3-9/3-9.1/3-9.1:1.2/0003:04D9:8008.0005/input/input5 [ 4.621087] hid-generic 0003:046D:C08B.0004: input,hiddev97,hidraw3: USB HID v1.11 Keyboard [Logitech G502 HERO Gaming Mouse] on usb-0000:00:14.0-9.2/input1 [ 4.621129] input: HOLTEK USB-HID Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb3/3-9/3-9.1/3-9.1:1.2/0003:04D9:8008.0005/input/input6 [ 4.677798] input: HOLTEK USB-HID Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb3/3-9/3-9.1/3-9.1:1.2/0003:04D9:8008.0005/input/input7 [ 4.677879] input: HOLTEK USB-HID Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-9/3-9.1/3-9.1:1.2/0003:04D9:8008.0005/input/input10 [ 4.677964] input: HOLTEK USB-HID Keyboard as /devices/pci0000:00/0000:00:14.0/usb3/3-9/3-9.1/3-9.1:1.2/0003:04D9:8008.0005/input/input11 [ 4.678091] hid-generic 0003:04D9:8008.0005: input,hiddev98,hidraw4: USB HID v1.11 Mouse [HOLTEK USB-HID Keyboard] on usb-0000:00:14.0-9.1/input2 [ 4.678959] hid-generic 0003:04D9:8008.0006: hiddev99,hidraw5: USB HID v1.11 Device [HOLTEK USB-HID Keyboard] on usb-0000:00:14.0-9.1/input3 [ 4.679007] usbcore: registered new interface driver usbhid [ 4.679011] usbhid: USB HID core driver [ 4.953784] systemd-journald[585]: Received SIGTERM from PID 1 (systemd). [ 5.029318] systemd[1]: systemd 254.4-2-arch running in system mode (+PAM +AUDIT -SELINUX -APPARMOR -IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified) [ 5.029324] systemd[1]: Detected architecture x86-64. [ 5.030004] systemd[1]: Hostname set to . [ 5.162735] systemd[1]: bpf-lsm: LSM BPF program attached [ 5.364934] systemd[1]: initrd-switch-root.service: Deactivated successfully. [ 5.387890] systemd[1]: Stopped Switch Root. [ 5.388651] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 5.389317] systemd[1]: Created slice Virtual Machine and Container Slice. [ 5.389850] systemd[1]: Created slice Slice /system/getty. [ 5.390367] systemd[1]: Created slice Slice /system/modprobe. [ 5.390916] systemd[1]: Created slice Slice /system/systemd-fsck. [ 5.391435] systemd[1]: Created slice User and Session Slice. [ 5.391512] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [ 5.391566] systemd[1]: Started Forward Password Requests to Wall Directory Watch. [ 5.391752] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. [ 5.391795] systemd[1]: Reached target Local Encrypted Volumes. [ 5.391810] systemd[1]: Reached target Login Prompts. [ 5.391826] systemd[1]: Stopped target Switch Root. [ 5.391841] systemd[1]: Stopped target Initrd File Systems. [ 5.391849] systemd[1]: Stopped target Initrd Root File System. [ 5.391862] systemd[1]: Reached target Local Integrity Protected Volumes. [ 5.391885] systemd[1]: Reached target Path Units. [ 5.391897] systemd[1]: Reached target Remote File Systems. [ 5.391909] systemd[1]: Reached target Slice Units. [ 5.391934] systemd[1]: Reached target Local Verity Protected Volumes. [ 5.392006] systemd[1]: Listening on Device-mapper event daemon FIFOs. [ 5.392691] systemd[1]: Listening on LVM2 poll daemon socket. [ 5.393629] systemd[1]: Listening on Process Core Dump Socket. [ 5.394046] systemd[1]: Listening on Userspace Out-Of-Memory (OOM) Killer Socket. [ 5.394391] systemd[1]: Listening on udev Control Socket. [ 5.394501] systemd[1]: Listening on udev Kernel Socket. [ 5.427963] systemd[1]: Mounting Huge Pages File System... [ 5.429261] systemd[1]: Mounting POSIX Message Queue File System... [ 5.430268] systemd[1]: Mounting Kernel Debug File System... [ 5.431286] systemd[1]: Mounting Kernel Trace File System... [ 5.432555] systemd[1]: Starting Create List of Static Device Nodes... [ 5.433653] systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... [ 5.434636] systemd[1]: Starting Load Kernel Module configfs... [ 5.435591] systemd[1]: Starting Load Kernel Module dm_mod... [ 5.436653] systemd[1]: Starting Load Kernel Module drm... [ 5.437673] systemd[1]: Starting Load Kernel Module fuse... [ 5.438743] systemd[1]: Starting Load Kernel Module loop... [ 5.438813] systemd[1]: systemd-fsck-root.service: Deactivated successfully. [ 5.448955] device-mapper: uevent: version 1.0.3 [ 5.449000] loop: module loaded [ 5.449034] device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@redhat.com [ 5.451809] fuse: init (API version 7.38) [ 5.491111] systemd[1]: Stopped File System Check on Root Device. [ 5.492534] systemd[1]: Starting Load Kernel Modules... [ 5.492572] systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). [ 5.493624] systemd[1]: Starting Remount Root and Kernel File Systems... [ 5.494643] systemd[1]: Starting Coldplug All udev Devices... [ 5.495819] systemd[1]: Mounted Huge Pages File System. [ 5.495909] systemd[1]: Mounted POSIX Message Queue File System. [ 5.495992] systemd[1]: Mounted Kernel Debug File System. [ 5.496074] systemd[1]: Mounted Kernel Trace File System. [ 5.531223] systemd[1]: Finished Create List of Static Device Nodes. [ 5.531683] systemd[1]: modprobe@configfs.service: Deactivated successfully. [ 5.532499] i2c_dev: i2c /dev entries driver [ 5.542398] mc: Linux media interface: v0.10 [ 5.556129] videodev: Linux video capture interface: v2.00 [ 5.557520] v4l2loopback: loading out-of-tree module taints kernel. [ 5.557526] v4l2loopback: module verification failed: signature and/or required key missing - tainting kernel [ 5.558211] v4l2loopback driver version 0.12.7 loaded [ 5.563924] Guest personality initialized and is inactive [ 5.563960] VMCI host device registered (name=vmci, major=10, minor=123) [ 5.563962] Initialized host personality [ 5.569829] /dev/vmmon[844]: Module vmmon: registered as misc device [ 5.569832] /dev/vmmon[844]: Using tsc_khz as TSC frequency: 2294685 [ 5.569833] /dev/vmmon[844]: Module vmmon: initialized [ 5.571138] systemd[1]: Finished Load Kernel Module configfs. [ 5.607835] systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. [ 5.608335] systemd[1]: modprobe@dm_mod.service: Deactivated successfully. [ 5.641236] systemd[1]: Finished Load Kernel Module dm_mod. [ 5.641825] systemd[1]: modprobe@drm.service: Deactivated successfully. [ 5.677829] systemd[1]: Finished Load Kernel Module drm. [ 5.678094] systemd[1]: modprobe@fuse.service: Deactivated successfully. [ 5.701203] systemd[1]: Finished Load Kernel Module fuse. [ 5.701730] systemd[1]: modprobe@loop.service: Deactivated successfully. [ 5.721231] systemd[1]: Finished Load Kernel Module loop. [ 5.751285] systemd[1]: Finished Load Kernel Modules. [ 5.771295] systemd[1]: Finished Remount Root and Kernel File Systems. [ 5.791269] systemd[1]: Finished Coldplug All udev Devices. [ 5.824529] systemd[1]: Mounting FUSE Control File System... [ 5.825632] systemd[1]: Mounting Kernel Configuration File System... [ 5.829007] systemd[1]: Rebuild Hardware Database was skipped because no trigger condition checks were met. [ 5.830059] systemd[1]: Starting Load/Save OS Random Seed... [ 5.830123] systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. [ 5.831261] systemd[1]: Starting Apply Kernel Variables... [ 5.832371] systemd[1]: Starting Create Static Device Nodes in /dev gracefully... [ 5.833113] systemd[1]: Mounted FUSE Control File System. [ 5.833223] systemd[1]: Mounted Kernel Configuration File System. [ 5.884565] systemd[1]: Finished Load/Save OS Random Seed. [ 5.914629] systemd[1]: Finished Apply Kernel Variables. [ 5.964652] systemd[1]: Finished Create Static Device Nodes in /dev gracefully. [ 6.004728] systemd[1]: Starting Create System Users... [ 6.034616] systemd[1]: Finished Create System Users. [ 6.037340] systemd[1]: Starting Create Static Device Nodes in /dev... [ 6.121274] systemd[1]: Finished Create Static Device Nodes in /dev. [ 6.121458] systemd[1]: Reached target Preparation for Local File Systems. [ 6.121499] systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). [ 6.121518] systemd[1]: Entropy Daemon based on the HAVEGE algorithm was skipped because of an unmet condition check (ConditionKernelVersion=<5.6). [ 6.144590] systemd[1]: Starting Journal Service... [ 6.146283] systemd[1]: Starting Rule-based Manager for Device Events and Files... [ 6.162732] systemd-journald[867]: Collecting audit messages is disabled. [ 6.172333] systemd[1]: Started Journal Service. [ 6.240451] systemd-journald[867]: Received client request to flush runtime journal. [ 6.262980] systemd-journald[867]: /var/log/journal/8fa9301ad63a4d3f81f6919a6fc6c58b/system.journal: Journal file uses a different sequence number ID, rotating. [ 6.262984] systemd-journald[867]: Rotating system journal. [ 6.335426] mousedev: PS/2 mouse device common for all mice [ 6.383105] Intel(R) 2.5G Ethernet Linux Driver [ 6.383111] Copyright(c) 2018 Intel Corporation. [ 6.383334] igc 0000:04:00.0: PCIe PTM not supported by PCIe bus/controller [ 6.384691] input: PC Speaker as /devices/platform/pcspkr/input/input12 [ 6.394330] i801_smbus 0000:00:1f.3: enabling device (0000 -> 0003) [ 6.394508] i801_smbus 0000:00:1f.3: SMBus using PCI interrupt [ 6.396313] i2c i2c-8: 4/24 memory slots populated (from DMI) [ 6.396317] i2c i2c-8: Systems with more than 4 memory slots not supported yet, not instantiating SPD [ 6.431310] pps pps0: new PPS source ptp0 [ 6.431346] igc 0000:04:00.0 (unnamed net_device) (uninitialized): PHC added [ 6.455851] igc 0000:04:00.0: 4.000 Gb/s available PCIe bandwidth (5.0 GT/s PCIe x1 link) [ 6.455855] igc 0000:04:00.0 eth0: MAC: 00:e0:1b:67:a2:94 [ 6.455978] igc 0000:05:00.0: PCIe PTM not supported by PCIe bus/controller [ 6.464812] RAPL PMU: API unit is 2^-32 Joules, 2 fixed counters, 655360 ms ovfl timer [ 6.464816] RAPL PMU: hw unit of domain package 2^-14 Joules [ 6.464817] RAPL PMU: hw unit of domain dram 2^-16 Joules [ 6.497871] pps pps1: new PPS source ptp1 [ 6.497899] igc 0000:05:00.0 (unnamed net_device) (uninitialized): PHC added [ 6.504402] iTCO_vendor_support: vendor-support=0 [ 6.511097] cryptd: max_cpu_qlen set to 1000 [ 6.522651] iTCO_wdt iTCO_wdt.1.auto: Found a Wellsburg TCO device (Version=2, TCOBASE=0x0460) [ 6.522659] igc 0000:05:00.0: 4.000 Gb/s available PCIe bandwidth (5.0 GT/s PCIe x1 link) [ 6.522664] igc 0000:05:00.0 eth1: MAC: 00:e0:1b:67:a2:95 [ 6.522789] iTCO_wdt iTCO_wdt.1.auto: initialized. heartbeat=30 sec (nowayout=0) [ 6.527033] AVX2 version of gcm_enc/dec engaged. [ 6.527172] AES CTR mode by8 optimization enabled [ 6.536398] igc 0000:04:00.0 enp4s0: renamed from eth0 [ 6.559017] snd_hda_intel 0000:00:1b.0: enabling device (0000 -> 0002) [ 6.559404] snd_hda_intel 0000:02:00.1: enabling device (0100 -> 0102) [ 6.559653] snd_hda_intel 0000:02:00.1: Force to non-snoop mode [ 6.578517] snd_hda_intel 0000:02:00.1: bound 0000:02:00.0 (ops amdgpu_dm_audio_component_bind_ops [amdgpu]) [ 6.581481] input: HDA ATI HDMI HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:03.0/0000:02:00.1/sound/card1/input13 [ 6.581554] input: HDA ATI HDMI HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:03.0/0000:02:00.1/sound/card1/input14 [ 6.581617] input: HDA ATI HDMI HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:03.0/0000:02:00.1/sound/card1/input15 [ 6.581681] input: HDA ATI HDMI HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:03.0/0000:02:00.1/sound/card1/input16 [ 6.581726] igc 0000:05:00.0 enp5s0: renamed from eth1 [ 6.581747] input: HDA ATI HDMI HDMI/DP,pcm=10 as /devices/pci0000:00/0000:00:03.0/0000:02:00.1/sound/card1/input17 [ 6.581833] input: HDA ATI HDMI HDMI/DP,pcm=11 as /devices/pci0000:00/0000:00:03.0/0000:02:00.1/sound/card1/input18 [ 6.615073] snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC897: line_outs=1 (0x14/0x0/0x0/0x0/0x0) type:line [ 6.615082] snd_hda_codec_realtek hdaudioC0D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) [ 6.615085] snd_hda_codec_realtek hdaudioC0D0: hp_outs=1 (0x1b/0x0/0x0/0x0/0x0) [ 6.615088] snd_hda_codec_realtek hdaudioC0D0: mono: mono_out=0x0 [ 6.615090] snd_hda_codec_realtek hdaudioC0D0: dig-out=0x1e/0x0 [ 6.615092] snd_hda_codec_realtek hdaudioC0D0: inputs: [ 6.615094] snd_hda_codec_realtek hdaudioC0D0: Front Mic=0x19 [ 6.615096] snd_hda_codec_realtek hdaudioC0D0: Rear Mic=0x18 [ 6.615098] snd_hda_codec_realtek hdaudioC0D0: Line=0x1a [ 6.626738] BTRFS info (device nvme0n1p1): using crc32c (crc32c-intel) checksum algorithm [ 6.626745] BTRFS info (device nvme0n1p1): enabling ssd optimizations [ 6.626749] BTRFS info (device nvme0n1p1): using free space tree [ 6.626773] BTRFS info (device nvme1n1p6): using crc32c (crc32c-intel) checksum algorithm [ 6.626781] BTRFS info (device nvme1n1p6): enabling ssd optimizations [ 6.626786] BTRFS info (device nvme1n1p6): using free space tree [ 6.632480] input: HDA Intel PCH Front Mic as /devices/pci0000:00/0000:00:1b.0/sound/card0/input19 [ 6.632518] input: HDA Intel PCH Rear Mic as /devices/pci0000:00/0000:00:1b.0/sound/card0/input20 [ 6.632559] input: HDA Intel PCH Line as /devices/pci0000:00/0000:00:1b.0/sound/card0/input21 [ 6.632599] input: HDA Intel PCH Line Out as /devices/pci0000:00/0000:00:1b.0/sound/card0/input22 [ 6.632647] input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1b.0/sound/card0/input23 [ 6.636444] Adding 67108860k swap on /dev/nvme1n1p5. Priority:-2 extents:1 across:67108860k SSFS [ 6.732255] BTRFS info (device nvme1n1p6): auto enabling async discard [ 6.774926] EDAC sbridge: Seeking for: PCI ID 8086:2fa0 [ 6.774946] EDAC sbridge: Seeking for: PCI ID 8086:2fa0 [ 6.774966] EDAC sbridge: Seeking for: PCI ID 8086:2fa0 [ 6.774982] EDAC sbridge: Seeking for: PCI ID 8086:2f60 [ 6.774987] EDAC sbridge: Seeking for: PCI ID 8086:2f60 [ 6.774994] EDAC sbridge: Seeking for: PCI ID 8086:2f60 [ 6.774999] EDAC sbridge: Seeking for: PCI ID 8086:2fa8 [ 6.775004] EDAC sbridge: Seeking for: PCI ID 8086:2fa8 [ 6.775011] EDAC sbridge: Seeking for: PCI ID 8086:2fa8 [ 6.775016] EDAC sbridge: Seeking for: PCI ID 8086:2f71 [ 6.775021] EDAC sbridge: Seeking for: PCI ID 8086:2f71 [ 6.775028] EDAC sbridge: Seeking for: PCI ID 8086:2f71 [ 6.775033] EDAC sbridge: Seeking for: PCI ID 8086:2faa [ 6.775038] EDAC sbridge: Seeking for: PCI ID 8086:2faa [ 6.775045] EDAC sbridge: Seeking for: PCI ID 8086:2faa [ 6.775050] EDAC sbridge: Seeking for: PCI ID 8086:2fab [ 6.775055] EDAC sbridge: Seeking for: PCI ID 8086:2fab [ 6.775062] EDAC sbridge: Seeking for: PCI ID 8086:2fab [ 6.775066] EDAC sbridge: Seeking for: PCI ID 8086:2fac [ 6.775078] EDAC sbridge: Seeking for: PCI ID 8086:2fad [ 6.775089] EDAC sbridge: Seeking for: PCI ID 8086:2f68 [ 6.775095] EDAC sbridge: Seeking for: PCI ID 8086:2f68 [ 6.775101] EDAC sbridge: Seeking for: PCI ID 8086:2f68 [ 6.775106] EDAC sbridge: Seeking for: PCI ID 8086:2f79 [ 6.775112] EDAC sbridge: Seeking for: PCI ID 8086:2f79 [ 6.775118] EDAC sbridge: Seeking for: PCI ID 8086:2f79 [ 6.775122] EDAC sbridge: Seeking for: PCI ID 8086:2f6a [ 6.775128] EDAC sbridge: Seeking for: PCI ID 8086:2f6a [ 6.775135] EDAC sbridge: Seeking for: PCI ID 8086:2f6a [ 6.775139] EDAC sbridge: Seeking for: PCI ID 8086:2f6b [ 6.775145] EDAC sbridge: Seeking for: PCI ID 8086:2f6b [ 6.775152] EDAC sbridge: Seeking for: PCI ID 8086:2f6b [ 6.775156] EDAC sbridge: Seeking for: PCI ID 8086:2f6c [ 6.775167] EDAC sbridge: Seeking for: PCI ID 8086:2f6d [ 6.775179] EDAC sbridge: Seeking for: PCI ID 8086:2ffc [ 6.775183] EDAC sbridge: Seeking for: PCI ID 8086:2ffc [ 6.775190] EDAC sbridge: Seeking for: PCI ID 8086:2ffc [ 6.775196] EDAC sbridge: Seeking for: PCI ID 8086:2ffd [ 6.775200] EDAC sbridge: Seeking for: PCI ID 8086:2ffd [ 6.775207] EDAC sbridge: Seeking for: PCI ID 8086:2ffd [ 6.775213] EDAC sbridge: Seeking for: PCI ID 8086:2fbd [ 6.775218] EDAC sbridge: Seeking for: PCI ID 8086:2fbd [ 6.775225] EDAC sbridge: Seeking for: PCI ID 8086:2fbd [ 6.775230] EDAC sbridge: Seeking for: PCI ID 8086:2fbf [ 6.775235] EDAC sbridge: Seeking for: PCI ID 8086:2fbf [ 6.775242] EDAC sbridge: Seeking for: PCI ID 8086:2fbf [ 6.775246] EDAC sbridge: Seeking for: PCI ID 8086:2fb9 [ 6.775253] EDAC sbridge: Seeking for: PCI ID 8086:2fb9 [ 6.775260] EDAC sbridge: Seeking for: PCI ID 8086:2fb9 [ 6.775263] EDAC sbridge: Seeking for: PCI ID 8086:2fbb [ 6.775270] EDAC sbridge: Seeking for: PCI ID 8086:2fbb [ 6.775277] EDAC sbridge: Seeking for: PCI ID 8086:2fbb [ 6.775372] EDAC MC0: Giving out device to module sb_edac controller Haswell SrcID#1_Ha#0: DEV 0000:ff:12.0 (INTERRUPT) [ 6.775443] EDAC MC1: Giving out device to module sb_edac controller Haswell SrcID#0_Ha#0: DEV 0000:7f:12.0 (INTERRUPT) [ 6.775521] EDAC MC2: Giving out device to module sb_edac controller Haswell SrcID#1_Ha#1: DEV 0000:ff:12.4 (INTERRUPT) [ 6.775596] EDAC MC3: Giving out device to module sb_edac controller Haswell SrcID#0_Ha#1: DEV 0000:7f:12.4 (INTERRUPT) [ 6.775598] EDAC sbridge: Ver: 1.1.2 [ 6.791808] intel_rapl_common: Found RAPL domain package [ 6.791816] intel_rapl_common: Found RAPL domain dram [ 6.792381] intel_rapl_common: Found RAPL domain package [ 6.792388] intel_rapl_common: Found RAPL domain dram [ 6.940154] BTRFS info (device nvme0n1p1): auto enabling async discard [ 7.895559] systemd-journald[867]: /var/log/journal/8fa9301ad63a4d3f81f6919a6fc6c58b/user-1000.journal: Journal file uses a different sequence number ID, rotating. [ 7.900771] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 9.125186] gnome-shell[1510]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 9.707143] rfkill: input handler disabled [ 10.144699] igc 0000:04:00.0 enp4s0: NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX [ 10.558340] userif-1: sent link up event. [ 11.578339] userif-1: sent link up event. [ 12.861393] igc 0000:04:00.0 enp4s0: NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX [ 13.274966] userif-1: sent link up event. [ 15.018947] userif-1: sent link up event. [ 15.620962] userif-1: sent link up event. [ 16.241134] rfkill: input handler enabled [ 8287.030351] Bluetooth: Core ver 2.22 [ 8287.030374] NET: Registered PF_BLUETOOTH protocol family [ 8287.030375] Bluetooth: HCI device and connection manager initialized [ 8287.030381] Bluetooth: HCI socket layer initialized [ 8287.030382] Bluetooth: L2CAP socket layer initialized [ 8287.030385] Bluetooth: SCO socket layer initialized [13298.819694] /dev/vmmon[410020]: PTSC: initialized at 2294685000 Hz using TSC, TSCs are synchronized. [13298.928062] /dev/vmmon[410020]: Monitor IPI vector: 0 [13298.928065] /dev/vmmon[410020]: HV IPI vector: 0 [13304.147328] igc 0000:04:00.0 enp4s0: entered promiscuous mode [13304.147471] bridge-enp4s0: enabled promiscuous mode [13373.211113] NET: Registered PF_VSOCK protocol family [14785.305464] igc 0000:04:00.0 enp4s0: left promiscuous mode [14785.305669] bridge-enp4s0: disabled promiscuous mode [14834.301084] igc 0000:04:00.0 enp4s0: entered promiscuous mode [14834.301215] bridge-enp4s0: enabled promiscuous mode [15265.257625] igc 0000:04:00.0 enp4s0: left promiscuous mode [15265.257817] bridge-enp4s0: disabled promiscuous mode [15286.902745] igc 0000:04:00.0 enp4s0: entered promiscuous mode [15286.902894] bridge-enp4s0: enabled promiscuous mode [15459.556770] nvim[444370]: segfault at 24a0 ip 00000000000024a0 sp 00007ffd29654c48 error 14 in nvim[55906d458000+74000] likely on CPU 33 (core 25, socket 1) [15459.556787] Code: Unable to access opcode bytes at 0x2476. [15522.063982] igc 0000:04:00.0 enp4s0: left promiscuous mode [15522.064154] bridge-enp4s0: disabled promiscuous mode [15736.002020] amdgpu 0000:02:00.0: amdgpu: Disabling VM faults because of PRT request! [15860.643008] igc 0000:04:00.0 enp4s0: entered promiscuous mode [15860.643150] bridge-enp4s0: enabled promiscuous mode [16311.083151] igc 0000:04:00.0 enp4s0: left promiscuous mode [16311.083366] bridge-enp4s0: disabled promiscuous mode [16331.099078] igc 0000:04:00.0 enp4s0: entered promiscuous mode [16331.099236] bridge-enp4s0: enabled promiscuous mode [21615.114743] userif-1: sent link up event. [23920.069693] igc 0000:04:00.0 enp4s0: left promiscuous mode [23920.069907] bridge-enp4s0: disabled promiscuous mode [25235.310574] userif-1: sent link up event. [25236.867071] userif-1: sent link up event. [27647.670202] igc 0000:04:00.0 enp4s0: entered promiscuous mode [27647.670350] bridge-enp4s0: enabled promiscuous mode [31768.358182] igc 0000:04:00.0 enp4s0: left promiscuous mode [31768.358364] bridge-enp4s0: disabled promiscuous mode [32676.173673] pcieport 0000:00:01.0: AER: Corrected error received: 0000:01:00.0 [32676.173682] nvme 0000:01:00.0: PCIe Bus Error: severity=Corrected, type=Physical Layer, (Receiver ID) [32676.173684] nvme 0000:01:00.0: device [126f:2262] error status/mask=00000001/0000e000 [32676.173686] nvme 0000:01:00.0: [ 0] RxErr (First) [34172.215315] igc 0000:04:00.0 enp4s0: entered promiscuous mode [34172.215436] bridge-enp4s0: enabled promiscuous mode [38832.892334] igc 0000:04:00.0 enp4s0: left promiscuous mode [38832.892554] bridge-enp4s0: disabled promiscuous mode [39582.629809] igc 0000:04:00.0 enp4s0: entered promiscuous mode [39582.629952] bridge-enp4s0: enabled promiscuous mode [41177.199448] userif-1: sent link up event. [42230.039505] igc 0000:04:00.0 enp4s0: left promiscuous mode [42230.039709] bridge-enp4s0: disabled promiscuous mode [61214.280032] userif-1: sent link up event. [80861.375517] userif-1: sent link up event. [86543.362531] igc 0000:04:00.0 enp4s0: entered promiscuous mode [86543.362673] bridge-enp4s0: enabled promiscuous mode [94189.163563] igc 0000:04:00.0 enp4s0: left promiscuous mode [94189.163767] bridge-enp4s0: disabled promiscuous mode [94259.136958] igc 0000:04:00.0 enp4s0: entered promiscuous mode [94259.137096] bridge-enp4s0: enabled promiscuous mode [95286.515987] igc 0000:04:00.0 enp4s0: left promiscuous mode [95286.516175] bridge-enp4s0: disabled promiscuous mode [100262.583890] userif-1: sent link up event. [111168.024510] RemmRDP:cpu1ide[3754252]: segfault at 40 ip 00007f4f6f6dd031 sp 00007f4f537fd400 error 4 in libfreerdp-client2.so.2.11.2[7f4f6f69c000+77000] likely on CPU 28 (core 17, socket 1) [111168.024538] Code: fe ff ff 66 0f 1f 44 00 00 f3 0f 1e fa 55 48 89 e5 41 57 41 56 41 89 f6 41 55 41 54 53 48 83 ec 18 48 8b 07 48 89 55 c8 31 ff <48> 8b 40 40 4c 8b 60 18 8d 04 b6 8d 34 c5 10 00 00 00 4d 8b 7c 24 [120511.546607] userif-1: sent link up event. [140710.634219] userif-1: sent link up event. [161941.727482] userif-1: sent link up event. [166556.929186] userif-1: sent link up event. [166559.661471] userif-1: sent link up event. [177850.039441] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:147f96067 [177850.039454] page:000000007415dd6c refcount:22 mapcount:-237 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.039460] memcg:ffff9289345d4000 [177850.039463] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.039592] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.039597] page_type: 0xffffff12(buddy|0x6d) [177850.039602] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.039605] raw: 0000000000001075 0000000000000001 00000016ffffff12 ffff9289345d4000 [177850.039607] page dumped because: bad pte [177850.039608] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.039612] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.039846] CPU: 40 PID: 2060138 Comm: ld.lld Tainted: G OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.039851] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.039853] Call Trace: [177850.039857] [177850.039864] dump_stack_lvl+0x47/0x60 [177850.039871] print_bad_pte+0x1bc/0x280 [177850.039879] ? page_remove_rmap+0x8d/0x260 [177850.039885] unmap_page_range+0xa96/0x1150 [177850.039894] unmap_vmas+0xf8/0x190 [177850.039900] exit_mmap+0xe4/0x310 [177850.039909] __mmput+0x3e/0x130 [177850.039916] do_exit+0x31c/0xb20 [177850.039920] ? futex_wait_queue+0x63/0x90 [177850.039927] do_group_exit+0x31/0x80 [177850.039932] get_signal+0x9a5/0x9e0 [177850.039941] arch_do_signal_or_restart+0x3e/0x270 [177850.039947] exit_to_user_mode_prepare+0x185/0x1e0 [177850.039955] syscall_exit_to_user_mode+0x1b/0x40 [177850.039962] do_syscall_64+0x6c/0x90 [177850.039969] ? do_futex+0x128/0x190 [177850.039973] ? __x64_sys_futex+0x129/0x1e0 [177850.039977] ? switch_fpu_return+0x50/0xe0 [177850.039986] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.039991] ? do_syscall_64+0x6c/0x90 [177850.039996] ? exc_page_fault+0x7f/0x180 [177850.040002] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.040009] RIP: 0033:0x7f1851e164ae [177850.040056] Code: Unable to access opcode bytes at 0x7f1851e16484. [177850.040058] RSP: 002b:00007f18227fbd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.040063] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f1851e164ae [177850.040066] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000005818134 [177850.040068] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.040070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.040072] R13: 00000000058180e0 R14: 0000000000000000 R15: 0000000005818134 [177850.040078] [177850.040112] Disabling lock debugging due to kernel taint [177850.041416] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:132506067 [177850.041426] page:000000007415dd6c refcount:22 mapcount:-238 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.041431] memcg:ffff9289345d4000 [177850.041434] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.041546] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.041551] page_type: 0xffffff11(buddy|0x6e) [177850.041555] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.041558] raw: 0000000000001075 0000000000000001 00000016ffffff11 ffff9289345d4000 [177850.041559] page dumped because: bad pte [177850.041560] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.041563] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.041744] CPU: 21 PID: 2060056 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.041749] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.041751] Call Trace: [177850.041753] [177850.041758] dump_stack_lvl+0x47/0x60 [177850.041766] print_bad_pte+0x1bc/0x280 [177850.041773] ? page_remove_rmap+0x8d/0x260 [177850.041781] unmap_page_range+0xa96/0x1150 [177850.041789] unmap_vmas+0xf8/0x190 [177850.041795] exit_mmap+0xe4/0x310 [177850.041804] __mmput+0x3e/0x130 [177850.041811] do_exit+0x31c/0xb20 [177850.041817] ? futex_wait_queue+0x63/0x90 [177850.041824] do_group_exit+0x31/0x80 [177850.041827] get_signal+0x9a5/0x9e0 [177850.041836] arch_do_signal_or_restart+0x3e/0x270 [177850.041844] exit_to_user_mode_prepare+0x185/0x1e0 [177850.041851] syscall_exit_to_user_mode+0x1b/0x40 [177850.041859] do_syscall_64+0x6c/0x90 [177850.041864] ? do_syscall_64+0x6c/0x90 [177850.041868] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.041871] ? do_syscall_64+0x6c/0x90 [177850.041875] ? do_syscall_64+0x6c/0x90 [177850.041879] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.041886] RIP: 0033:0x7fe3b61944ae [177850.041932] Code: Unable to access opcode bytes at 0x7fe3b6194484. [177850.041934] RSP: 002b:00007fe3a2fe4d30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.041939] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fe3b61944ae [177850.041942] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000004b74094 [177850.041944] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.041945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.041948] R13: 0000000004b74040 R14: 0000000000000000 R15: 0000000004b74094 [177850.041952] [177850.047554] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:116d51067 [177850.047566] page:000000007415dd6c refcount:21 mapcount:-238 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.047573] memcg:ffff9289345d4000 [177850.047575] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.047700] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.047706] page_type: 0xffffff11(buddy|0x6e) [177850.047711] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.047714] raw: 0000000000001075 0000000000000001 00000015ffffff11 ffff9289345d4000 [177850.047715] page dumped because: bad pte [177850.047717] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.047721] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.047955] CPU: 40 PID: 2060189 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.047960] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.047963] Call Trace: [177850.047968] [177850.047974] dump_stack_lvl+0x47/0x60 [177850.047983] print_bad_pte+0x1bc/0x280 [177850.047990] ? page_remove_rmap+0x8d/0x260 [177850.047997] unmap_page_range+0xa96/0x1150 [177850.048008] unmap_vmas+0xf8/0x190 [177850.048014] exit_mmap+0xe4/0x310 [177850.048023] __mmput+0x3e/0x130 [177850.048030] do_exit+0x31c/0xb20 [177850.048035] ? up_read+0x4f/0x60 [177850.048040] ? do_vmi_align_munmap+0x456/0x4e0 [177850.048045] do_group_exit+0x31/0x80 [177850.048049] get_signal+0x9a5/0x9e0 [177850.048056] arch_do_signal_or_restart+0x3e/0x270 [177850.048063] exit_to_user_mode_prepare+0x185/0x1e0 [177850.048069] syscall_exit_to_user_mode+0x1b/0x40 [177850.048078] do_syscall_64+0x6c/0x90 [177850.048085] ? switch_fpu_return+0x50/0xe0 [177850.048092] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.048098] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.048103] ? do_syscall_64+0x6c/0x90 [177850.048107] ? do_futex+0xc6/0x190 [177850.048112] ? __x64_sys_futex+0x129/0x1e0 [177850.048117] ? switch_fpu_return+0x50/0xe0 [177850.048121] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.048126] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.048131] ? do_syscall_64+0x6c/0x90 [177850.048136] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.048142] RIP: 0033:0x7fd6791661bb [177850.048183] Code: Unable to access opcode bytes at 0x7fd679166191. [177850.048186] RSP: 002b:00007fd672ffcde8 EFLAGS: 00000206 ORIG_RAX: 000000000000000b [177850.048191] RAX: 0000000000000000 RBX: 00007fd5a0000000 RCX: 00007fd6791661bb [177850.048194] RDX: 0000000000000000 RSI: 0000000004000000 RDI: 00007fd5a4000000 [177850.048197] RBP: 0000000000021000 R08: 00000000ffffffff R09: 0000000000000000 [177850.048200] R10: 0000000000000022 R11: 0000000000000206 R12: 0000000004000000 [177850.048202] R13: 0000000000001000 R14: 00007fd5a4000000 R15: 0000000000000000 [177850.048207] [177850.051490] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:387dec067 [177850.051503] page:000000007415dd6c refcount:20 mapcount:-239 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.051510] memcg:ffff9289345d4000 [177850.051513] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.051653] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.051658] page_type: 0xffffff10(buddy|0x6f) [177850.051663] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.051666] raw: 0000000000001075 0000000000000001 00000014ffffff10 ffff9289345d4000 [177850.051668] page dumped because: bad pte [177850.051670] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.051675] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.051898] CPU: 40 PID: 2060480 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.051903] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.051905] Call Trace: [177850.051909] [177850.051914] dump_stack_lvl+0x47/0x60 [177850.051921] print_bad_pte+0x1bc/0x280 [177850.051926] ? page_remove_rmap+0x8d/0x260 [177850.051932] unmap_page_range+0xa96/0x1150 [177850.051941] unmap_vmas+0xf8/0x190 [177850.051947] exit_mmap+0xe4/0x310 [177850.051955] __mmput+0x3e/0x130 [177850.051962] do_exit+0x31c/0xb20 [177850.051966] ? futex_wait_queue+0x63/0x90 [177850.051973] do_group_exit+0x31/0x80 [177850.051977] get_signal+0x9a5/0x9e0 [177850.051985] arch_do_signal_or_restart+0x3e/0x270 [177850.051991] exit_to_user_mode_prepare+0x185/0x1e0 [177850.052000] syscall_exit_to_user_mode+0x1b/0x40 [177850.052008] do_syscall_64+0x6c/0x90 [177850.052012] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.052017] ? do_syscall_64+0x6c/0x90 [177850.052020] ? do_syscall_64+0x6c/0x90 [177850.052024] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.052028] ? do_syscall_64+0x6c/0x90 [177850.052032] ? do_syscall_64+0x6c/0x90 [177850.052035] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.052039] ? do_syscall_64+0x6c/0x90 [177850.052043] ? do_user_addr_fault+0x179/0x640 [177850.052049] ? exc_page_fault+0x7f/0x180 [177850.052054] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.052059] RIP: 0033:0x7f651b2154ae [177850.052109] Code: Unable to access opcode bytes at 0x7f651b215484. [177850.052111] RSP: 002b:00007f65057f1d30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.052116] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f651b2154ae [177850.052118] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000003ea7d14 [177850.052121] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.052123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.052125] R13: 0000000003ea7cc0 R14: 0000000000000000 R15: 0000000003ea7d14 [177850.052129] [177850.071531] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:3c7a3d067 [177850.071541] page:000000007415dd6c refcount:20 mapcount:-239 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.071546] memcg:ffff9289345d4000 [177850.071549] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.071681] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.071686] page_type: 0xffffff10(buddy|0x6f) [177850.071690] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.071693] raw: 0000000000001075 0000000000000001 00000014ffffff10 ffff9289345d4000 [177850.071694] page dumped because: bad pte [177850.071696] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.071701] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.071882] CPU: 57 PID: 2060230 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.071886] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.071888] Call Trace: [177850.071893] [177850.071900] dump_stack_lvl+0x47/0x60 [177850.071909] print_bad_pte+0x1bc/0x280 [177850.071916] ? page_remove_rmap+0x8d/0x260 [177850.071923] unmap_page_range+0xa96/0x1150 [177850.071932] unmap_vmas+0xf8/0x190 [177850.071937] exit_mmap+0xe4/0x310 [177850.071946] __mmput+0x3e/0x130 [177850.071955] do_exit+0x31c/0xb20 [177850.071960] ? futex_wait_queue+0x63/0x90 [177850.071968] do_group_exit+0x31/0x80 [177850.071972] get_signal+0x9a5/0x9e0 [177850.071982] arch_do_signal_or_restart+0x3e/0x270 [177850.071990] exit_to_user_mode_prepare+0x185/0x1e0 [177850.071999] syscall_exit_to_user_mode+0x1b/0x40 [177850.072008] do_syscall_64+0x6c/0x90 [177850.072013] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.072017] ? do_syscall_64+0x6c/0x90 [177850.072020] ? exc_page_fault+0x7f/0x180 [177850.072025] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.072033] RIP: 0033:0x7fc4906494ae [177850.072077] Code: Unable to access opcode bytes at 0x7fc490649484. [177850.072079] RSP: 002b:00007fc47cff8d30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.072084] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fc4906494ae [177850.072087] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000004b54540 [177850.072089] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.072091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.072093] R13: 0000000004b544f0 R14: 0000000000000000 R15: 0000000004b54540 [177850.072097] [177850.087141] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:915509067 [177850.087151] page:000000007415dd6c refcount:20 mapcount:-239 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.087157] memcg:ffff9289345d4000 [177850.087159] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.087280] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.087285] page_type: 0xffffff10(buddy|0x6f) [177850.087289] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.087292] raw: 0000000000001075 0000000000000001 00000014ffffff10 ffff9289345d4000 [177850.087293] page dumped because: bad pte [177850.087294] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.087297] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.087473] CPU: 29 PID: 2060530 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.087478] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.087480] Call Trace: [177850.087484] [177850.087493] dump_stack_lvl+0x47/0x60 [177850.087500] print_bad_pte+0x1bc/0x280 [177850.087507] ? page_remove_rmap+0x8d/0x260 [177850.087513] unmap_page_range+0xa96/0x1150 [177850.087521] unmap_vmas+0xf8/0x190 [177850.087525] exit_mmap+0xe4/0x310 [177850.087532] __mmput+0x3e/0x130 [177850.087540] do_exit+0x31c/0xb20 [177850.087545] ? futex_wait_queue+0x63/0x90 [177850.087552] do_group_exit+0x31/0x80 [177850.087555] get_signal+0x9a5/0x9e0 [177850.087563] arch_do_signal_or_restart+0x3e/0x270 [177850.087570] exit_to_user_mode_prepare+0x185/0x1e0 [177850.087577] syscall_exit_to_user_mode+0x1b/0x40 [177850.087585] do_syscall_64+0x6c/0x90 [177850.087596] ? exc_page_fault+0x7f/0x180 [177850.087601] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.087608] RIP: 0033:0x7f4bc41414ae [177850.087655] Code: Unable to access opcode bytes at 0x7f4bc4141484. [177850.087657] RSP: 002b:00007f4bbaffcd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.087662] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f4bc41414ae [177850.087664] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 00000000057cd510 [177850.087666] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.087668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.087669] R13: 00000000057cd4c0 R14: 0000000000000000 R15: 00000000057cd510 [177850.087673] [177850.180610] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:3cc1e0067 [177850.180624] page:000000007415dd6c refcount:19 mapcount:-240 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.180631] memcg:ffff9289345d4000 [177850.180635] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.180768] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.180773] page_type: 0xffffff0f(buddy|0x70) [177850.180779] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.180782] raw: 0000000000001075 0000000000000001 00000013ffffff0f ffff9289345d4000 [177850.180785] page dumped because: bad pte [177850.180786] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.180792] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.181042] CPU: 8 PID: 2060657 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.181048] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.181051] Call Trace: [177850.181055] [177850.181062] dump_stack_lvl+0x47/0x60 [177850.181071] print_bad_pte+0x1bc/0x280 [177850.181078] ? page_remove_rmap+0x8d/0x260 [177850.181086] unmap_page_range+0xa96/0x1150 [177850.181102] unmap_vmas+0xf8/0x190 [177850.181109] exit_mmap+0xe4/0x310 [177850.181119] __mmput+0x3e/0x130 [177850.181127] do_exit+0x31c/0xb20 [177850.181132] ? futex_wait_queue+0x63/0x90 [177850.181139] do_group_exit+0x31/0x80 [177850.181144] get_signal+0x9a5/0x9e0 [177850.181154] arch_do_signal_or_restart+0x3e/0x270 [177850.181163] exit_to_user_mode_prepare+0x185/0x1e0 [177850.181170] syscall_exit_to_user_mode+0x1b/0x40 [177850.181179] do_syscall_64+0x6c/0x90 [177850.181185] ? do_futex+0x128/0x190 [177850.181189] ? __x64_sys_futex+0x129/0x1e0 [177850.181194] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.181200] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.181205] ? do_syscall_64+0x6c/0x90 [177850.181210] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.181215] ? do_syscall_64+0x6c/0x90 [177850.181220] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.181225] ? do_syscall_64+0x6c/0x90 [177850.181230] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.181238] RIP: 0033:0x7f4fe2f084ae [177850.181280] Code: Unable to access opcode bytes at 0x7f4fe2f08484. [177850.181283] RSP: 002b:00007f4fc27dbd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.181288] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f4fe2f084ae [177850.181290] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000005a3a060 [177850.181293] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.181296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.181298] R13: 0000000005a3a010 R14: 0000000000000000 R15: 0000000005a3a060 [177850.181304] [177850.232036] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:40c925067 [177850.232048] page:000000007415dd6c refcount:19 mapcount:-240 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.232055] memcg:ffff9289345d4000 [177850.232057] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.232197] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.232202] page_type: 0xffffff0f(buddy|0x70) [177850.232207] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.232210] raw: 0000000000001075 0000000000000001 00000013ffffff0f ffff9289345d4000 [177850.232212] page dumped because: bad pte [177850.232214] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.232218] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.232463] CPU: 0 PID: 2060293 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.232469] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.232471] Call Trace: [177850.232475] [177850.232482] dump_stack_lvl+0x47/0x60 [177850.232490] print_bad_pte+0x1bc/0x280 [177850.232497] ? page_remove_rmap+0x8d/0x260 [177850.232505] unmap_page_range+0xa96/0x1150 [177850.232514] unmap_vmas+0xf8/0x190 [177850.232521] exit_mmap+0xe4/0x310 [177850.232530] __mmput+0x3e/0x130 [177850.232537] do_exit+0x31c/0xb20 [177850.232543] ? futex_wait_queue+0x63/0x90 [177850.232550] do_group_exit+0x31/0x80 [177850.232554] get_signal+0x9a5/0x9e0 [177850.232563] arch_do_signal_or_restart+0x3e/0x270 [177850.232571] exit_to_user_mode_prepare+0x185/0x1e0 [177850.232579] syscall_exit_to_user_mode+0x1b/0x40 [177850.232587] do_syscall_64+0x6c/0x90 [177850.232593] ? do_futex+0x128/0x190 [177850.232597] ? __x64_sys_futex+0x129/0x1e0 [177850.232602] ? sched_clock_cpu+0xf/0x190 [177850.232608] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.232613] ? do_syscall_64+0x6c/0x90 [177850.232618] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.232624] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.232630] RIP: 0033:0x7f27932714ae [177850.232678] Code: Unable to access opcode bytes at 0x7f2793271484. [177850.232681] RSP: 002b:00007f279113cd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.232686] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f27932714ae [177850.232689] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000005262104 [177850.232692] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.232695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.232697] R13: 00000000052620b0 R14: 0000000000000000 R15: 0000000005262104 [177850.232702] [177850.305601] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:10c333067 [177850.305613] page:000000007415dd6c refcount:23 mapcount:-236 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.305620] memcg:ffff9289345d4000 [177850.305623] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.305752] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.305758] page_type: 0xffffff13(buddy|0x6c) [177850.305763] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.305767] raw: 0000000000001075 0000000000000001 00000017ffffff13 ffff9289345d4000 [177850.305768] page dumped because: bad pte [177850.305770] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.305775] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.306017] CPU: 44 PID: 2061142 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.306023] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.306025] Call Trace: [177850.306029] [177850.306036] dump_stack_lvl+0x47/0x60 [177850.306044] print_bad_pte+0x1bc/0x280 [177850.306051] ? page_remove_rmap+0x8d/0x260 [177850.306058] unmap_page_range+0xa96/0x1150 [177850.306068] unmap_vmas+0xf8/0x190 [177850.306074] exit_mmap+0xe4/0x310 [177850.306083] __mmput+0x3e/0x130 [177850.306091] do_exit+0x31c/0xb20 [177850.306096] ? futex_wait_queue+0x63/0x90 [177850.306103] do_group_exit+0x31/0x80 [177850.306108] get_signal+0x9a5/0x9e0 [177850.306117] arch_do_signal_or_restart+0x3e/0x270 [177850.306126] exit_to_user_mode_prepare+0x185/0x1e0 [177850.306133] syscall_exit_to_user_mode+0x1b/0x40 [177850.306141] do_syscall_64+0x6c/0x90 [177850.306147] ? do_syscall_64+0x6c/0x90 [177850.306152] ? switch_fpu_return+0x50/0xe0 [177850.306159] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.306164] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.306170] RIP: 0033:0x7f93954374ae [177850.306217] Code: Unable to access opcode bytes at 0x7f9395437484. [177850.306219] RSP: 002b:00007f9373ffed30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.306224] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f93954374ae [177850.306229] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000003ae51c4 [177850.306232] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.306234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.306237] R13: 0000000003ae5170 R14: 0000000000000000 R15: 0000000003ae51c4 [177850.306242] [177850.314084] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:119e43067 [177850.314100] page:000000007415dd6c refcount:22 mapcount:-237 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.314107] memcg:ffff9289345d4000 [177850.314111] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.314261] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.314267] page_type: 0xffffff12(buddy|0x6d) [177850.314273] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.314277] raw: 0000000000001075 0000000000000001 00000016ffffff12 ffff9289345d4000 [177850.314279] page dumped because: bad pte [177850.314281] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.314286] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.314559] CPU: 51 PID: 2061100 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.314565] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.314569] Call Trace: [177850.314574] [177850.314582] dump_stack_lvl+0x47/0x60 [177850.314591] print_bad_pte+0x1bc/0x280 [177850.314599] ? page_remove_rmap+0x8d/0x260 [177850.314607] unmap_page_range+0xa96/0x1150 [177850.314620] unmap_vmas+0xf8/0x190 [177850.314627] exit_mmap+0xe4/0x310 [177850.314637] __mmput+0x3e/0x130 [177850.314646] do_exit+0x31c/0xb20 [177850.314652] ? futex_wait_queue+0x63/0x90 [177850.314660] do_group_exit+0x31/0x80 [177850.314665] get_signal+0x9a5/0x9e0 [177850.314675] arch_do_signal_or_restart+0x3e/0x270 [177850.314684] exit_to_user_mode_prepare+0x185/0x1e0 [177850.314692] syscall_exit_to_user_mode+0x1b/0x40 [177850.314700] do_syscall_64+0x6c/0x90 [177850.314707] ? do_syscall_64+0x6c/0x90 [177850.314711] ? exc_page_fault+0x7f/0x180 [177850.314717] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.314724] RIP: 0033:0x7f556b7e64ae [177850.314773] Code: Unable to access opcode bytes at 0x7f556b7e6484. [177850.314776] RSP: 002b:00007f5507ffed30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.314781] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f556b7e64ae [177850.314784] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000004fc6004 [177850.314788] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.314791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.314795] R13: 0000000004fc5fb0 R14: 0000000000000000 R15: 0000000004fc6004 [177850.314801] [177850.330386] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:122222067 [177850.330397] page:000000007415dd6c refcount:21 mapcount:-238 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.330403] memcg:ffff9289345d4000 [177850.330405] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.330529] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.330533] page_type: 0xffffff11(buddy|0x6e) [177850.330538] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.330540] raw: 0000000000001075 0000000000000001 00000015ffffff11 ffff9289345d4000 [177850.330542] page dumped because: bad pte [177850.330543] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.330546] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.330726] CPU: 54 PID: 2060891 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.330730] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.330733] Call Trace: [177850.330737] [177850.330743] dump_stack_lvl+0x47/0x60 [177850.330751] print_bad_pte+0x1bc/0x280 [177850.330759] ? page_remove_rmap+0x8d/0x260 [177850.330766] unmap_page_range+0xa96/0x1150 [177850.330774] unmap_vmas+0xf8/0x190 [177850.330779] exit_mmap+0xe4/0x310 [177850.330787] __mmput+0x3e/0x130 [177850.330796] do_exit+0x31c/0xb20 [177850.330800] ? futex_wait_queue+0x63/0x90 [177850.330808] do_group_exit+0x31/0x80 [177850.330811] get_signal+0x9a5/0x9e0 [177850.330820] arch_do_signal_or_restart+0x3e/0x270 [177850.330828] exit_to_user_mode_prepare+0x185/0x1e0 [177850.330835] syscall_exit_to_user_mode+0x1b/0x40 [177850.330842] do_syscall_64+0x6c/0x90 [177850.330849] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.330853] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.330859] RIP: 0033:0x7fe44a3284ae [177850.330904] Code: Unable to access opcode bytes at 0x7fe44a328484. [177850.330906] RSP: 002b:00007fe42dffad30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.330910] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fe44a3284ae [177850.330913] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000003b07604 [177850.330915] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.330917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.330918] R13: 0000000003b075b0 R14: 0000000000000000 R15: 0000000003b07604 [177850.330922] [177850.346443] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:89af92067 [177850.346454] page:000000007415dd6c refcount:21 mapcount:-238 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.346461] memcg:ffff9289345d4000 [177850.346464] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.346623] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.346629] page_type: 0xffffff11(buddy|0x6e) [177850.346634] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.346638] raw: 0000000000001075 0000000000000001 00000015ffffff11 ffff9289345d4000 [177850.346639] page dumped because: bad pte [177850.346673] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.346678] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.346940] CPU: 51 PID: 2061257 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.346945] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.346948] Call Trace: [177850.346952] [177850.346959] dump_stack_lvl+0x47/0x60 [177850.346968] print_bad_pte+0x1bc/0x280 [177850.346975] ? page_remove_rmap+0x8d/0x260 [177850.346983] unmap_page_range+0xa96/0x1150 [177850.346994] unmap_vmas+0xf8/0x190 [177850.347002] exit_mmap+0xe4/0x310 [177850.347012] __mmput+0x3e/0x130 [177850.347020] do_exit+0x31c/0xb20 [177850.347025] ? futex_wait_queue+0x63/0x90 [177850.347033] do_group_exit+0x31/0x80 [177850.347038] get_signal+0x9a5/0x9e0 [177850.347047] arch_do_signal_or_restart+0x3e/0x270 [177850.347055] exit_to_user_mode_prepare+0x185/0x1e0 [177850.347062] syscall_exit_to_user_mode+0x1b/0x40 [177850.347070] do_syscall_64+0x6c/0x90 [177850.347077] ? do_syscall_64+0x6c/0x90 [177850.347081] ? do_syscall_64+0x6c/0x90 [177850.347086] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.347093] RIP: 0033:0x7f694f4f24ae [177850.347151] Code: Unable to access opcode bytes at 0x7f694f4f2484. [177850.347153] RSP: 002b:00007f68aa7ebd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.347160] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f694f4f24ae [177850.347163] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 00000000043ad000 [177850.347166] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.347169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.347172] R13: 00000000043acfb0 R14: 0000000000000000 R15: 00000000043ad000 [177850.347178] [177850.367609] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:8a84e0067 [177850.367621] page:000000007415dd6c refcount:22 mapcount:-237 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.367628] memcg:ffff9289345d4000 [177850.367631] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.367746] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.367755] page_type: 0xffffff12(buddy|0x6d) [177850.367759] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.367762] raw: 0000000000001075 0000000000000001 00000016ffffff12 ffff9289345d4000 [177850.367763] page dumped because: bad pte [177850.367764] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.367768] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.367949] CPU: 54 PID: 2061535 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.367954] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.367956] Call Trace: [177850.367961] [177850.367967] dump_stack_lvl+0x47/0x60 [177850.367974] print_bad_pte+0x1bc/0x280 [177850.367981] ? page_remove_rmap+0x8d/0x260 [177850.367988] unmap_page_range+0xa96/0x1150 [177850.367996] unmap_vmas+0xf8/0x190 [177850.368001] exit_mmap+0xe4/0x310 [177850.368010] __mmput+0x3e/0x130 [177850.368018] do_exit+0x31c/0xb20 [177850.368024] do_group_exit+0x31/0x80 [177850.368027] get_signal+0x9a5/0x9e0 [177850.368036] arch_do_signal_or_restart+0x3e/0x270 [177850.368043] exit_to_user_mode_prepare+0x185/0x1e0 [177850.368050] syscall_exit_to_user_mode+0x1b/0x40 [177850.368059] ret_from_fork_asm+0x1b/0x30 [177850.368067] [177850.368223] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:fd7a32067 [177850.368228] page:000000007415dd6c refcount:22 mapcount:-238 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.368232] memcg:ffff9289345d4000 [177850.368234] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.368326] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.368329] page_type: 0xffffff11(buddy|0x6e) [177850.368332] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.368334] raw: 0000000000001075 0000000000000001 00000016ffffff11 ffff9289345d4000 [177850.368336] page dumped because: bad pte [177850.368337] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.368340] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.368504] CPU: 69 PID: 2061475 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.368507] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.368509] Call Trace: [177850.368511] [177850.368513] dump_stack_lvl+0x47/0x60 [177850.368518] print_bad_pte+0x1bc/0x280 [177850.368522] ? page_remove_rmap+0x8d/0x260 [177850.368525] unmap_page_range+0xa96/0x1150 [177850.368531] unmap_vmas+0xf8/0x190 [177850.368535] exit_mmap+0xe4/0x310 [177850.368541] __mmput+0x3e/0x130 [177850.368546] do_exit+0x31c/0xb20 [177850.368549] do_group_exit+0x31/0x80 [177850.368551] get_signal+0x9a5/0x9e0 [177850.368557] arch_do_signal_or_restart+0x3e/0x270 [177850.368562] exit_to_user_mode_prepare+0x185/0x1e0 [177850.368568] syscall_exit_to_user_mode+0x1b/0x40 [177850.368572] ret_from_fork_asm+0x1b/0x30 [177850.368578] [177850.412611] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:15a91e067 [177850.412625] page:000000007415dd6c refcount:20 mapcount:-239 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.412631] memcg:ffff9289345d4000 [177850.412634] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.412752] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.412757] page_type: 0xffffff10(buddy|0x6f) [177850.412762] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.412764] raw: 0000000000001075 0000000000000001 00000014ffffff10 ffff9289345d4000 [177850.412765] page dumped because: bad pte [177850.412766] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.412770] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.412942] CPU: 71 PID: 2061337 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.412947] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.412949] Call Trace: [177850.412954] [177850.412960] dump_stack_lvl+0x47/0x60 [177850.412968] print_bad_pte+0x1bc/0x280 [177850.412975] ? page_remove_rmap+0x8d/0x260 [177850.412982] unmap_page_range+0xa96/0x1150 [177850.412991] unmap_vmas+0xf8/0x190 [177850.412995] exit_mmap+0xe4/0x310 [177850.413004] __mmput+0x3e/0x130 [177850.413013] do_exit+0x31c/0xb20 [177850.413019] ? futex_wait_queue+0x63/0x90 [177850.413026] do_group_exit+0x31/0x80 [177850.413029] get_signal+0x9a5/0x9e0 [177850.413038] arch_do_signal_or_restart+0x3e/0x270 [177850.413045] exit_to_user_mode_prepare+0x185/0x1e0 [177850.413052] syscall_exit_to_user_mode+0x1b/0x40 [177850.413067] do_syscall_64+0x6c/0x90 [177850.413074] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.413077] ? do_syscall_64+0x6c/0x90 [177850.413080] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.413084] ? do_syscall_64+0x6c/0x90 [177850.413087] ? __count_memcg_events+0x42/0x90 [177850.413096] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.413100] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.413107] RIP: 0033:0x7f161b5eb4ae [177850.413150] Code: Unable to access opcode bytes at 0x7f161b5eb484. [177850.413152] RSP: 002b:00007f15defdcd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.413157] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f161b5eb4ae [177850.413159] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000008d52690 [177850.413161] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.413162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.413164] R13: 0000000008d52640 R14: 0000000000000000 R15: 0000000008d52690 [177850.413168] [177850.432410] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:927ce3067 [177850.432423] page:000000007415dd6c refcount:19 mapcount:-240 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.432429] memcg:ffff9289345d4000 [177850.432443] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.432575] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.432581] page_type: 0xffffff0f(buddy|0x70) [177850.432586] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.432589] raw: 0000000000001075 0000000000000001 00000013ffffff0f ffff9289345d4000 [177850.432590] page dumped because: bad pte [177850.432592] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.432596] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.432838] CPU: 43 PID: 2061695 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.432842] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.432845] Call Trace: [177850.432849] [177850.432855] dump_stack_lvl+0x47/0x60 [177850.432862] print_bad_pte+0x1bc/0x280 [177850.432869] ? page_remove_rmap+0x8d/0x260 [177850.432875] unmap_page_range+0xa96/0x1150 [177850.432884] unmap_vmas+0xf8/0x190 [177850.432890] exit_mmap+0xe4/0x310 [177850.432898] __mmput+0x3e/0x130 [177850.432905] do_exit+0x31c/0xb20 [177850.432909] ? futex_wait_queue+0x63/0x90 [177850.432916] do_group_exit+0x31/0x80 [177850.432919] get_signal+0x9a5/0x9e0 [177850.432927] arch_do_signal_or_restart+0x3e/0x270 [177850.432934] exit_to_user_mode_prepare+0x185/0x1e0 [177850.432940] syscall_exit_to_user_mode+0x1b/0x40 [177850.432948] do_syscall_64+0x6c/0x90 [177850.432954] ? exc_page_fault+0x7f/0x180 [177850.432959] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.432964] RIP: 0033:0x7fb77bd794ae [177850.433005] Code: Unable to access opcode bytes at 0x7fb77bd79484. [177850.433007] RSP: 002b:00007fb7467ebd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.433012] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb77bd794ae [177850.433015] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000005a002d0 [177850.433017] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.433019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.433022] R13: 0000000005a00280 R14: 0000000000000000 R15: 0000000005a002d0 [177850.433028] [177850.440658] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:237404067 [177850.440669] page:000000007415dd6c refcount:18 mapcount:-241 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.440676] memcg:ffff9289345d4000 [177850.440680] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.440816] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.440821] page_type: 0xffffff0e(buddy|0x71) [177850.440826] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.440830] raw: 0000000000001075 0000000000000001 00000012ffffff0e ffff9289345d4000 [177850.440832] page dumped because: bad pte [177850.440834] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.440839] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.441088] CPU: 43 PID: 2060803 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.441093] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.441096] Call Trace: [177850.441100] [177850.441108] dump_stack_lvl+0x47/0x60 [177850.441115] print_bad_pte+0x1bc/0x280 [177850.441122] ? page_remove_rmap+0x8d/0x260 [177850.441130] unmap_page_range+0xa96/0x1150 [177850.441141] unmap_vmas+0xf8/0x190 [177850.441148] exit_mmap+0xe4/0x310 [177850.441157] __mmput+0x3e/0x130 [177850.441167] do_exit+0x31c/0xb20 [177850.441172] ? futex_wait_queue+0x63/0x90 [177850.441180] do_group_exit+0x31/0x80 [177850.441184] get_signal+0x9a5/0x9e0 [177850.441194] arch_do_signal_or_restart+0x3e/0x270 [177850.441202] exit_to_user_mode_prepare+0x185/0x1e0 [177850.441210] syscall_exit_to_user_mode+0x1b/0x40 [177850.441218] do_syscall_64+0x6c/0x90 [177850.441225] ? do_futex+0x128/0x190 [177850.441230] ? __x64_sys_futex+0x129/0x1e0 [177850.441234] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.441239] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.441245] ? do_syscall_64+0x6c/0x90 [177850.441250] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.441255] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.441261] RIP: 0033:0x7f59292a74ae [177850.441320] Code: Unable to access opcode bytes at 0x7f59292a7484. [177850.441322] RSP: 002b:00007f591d7f9d30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.441328] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f59292a74ae [177850.441331] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 00000000055dbed0 [177850.441333] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.441337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.441340] R13: 00000000055dbe80 R14: 0000000000000000 R15: 00000000055dbed0 [177850.441345] [177850.481013] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:8a59e9067 [177850.481026] page:000000007415dd6c refcount:17 mapcount:-242 mapping:00000000b0c37ca6 index:0x1075 pfn:0xedacc4 [177850.481032] memcg:ffff9289345d4000 [177850.481036] aops:btrfs_aops [btrfs] ino:fb2b838 dentry name:"lld" [177850.481171] flags: 0xaffff9800002056(referenced|uptodate|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.481176] page_type: 0xffffff0d(buddy|0x72) [177850.481182] raw: 0affff9800002056 ffffe7623b6b3148 ffffe7623b6b3088 ffff928202a9fc10 [177850.481185] raw: 0000000000001075 0000000000000001 00000011ffffff0d ffff9289345d4000 [177850.481187] page dumped because: bad pte [177850.481189] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.481194] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.481448] CPU: 11 PID: 2061821 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.481455] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.481457] Call Trace: [177850.481462] [177850.481469] dump_stack_lvl+0x47/0x60 [177850.481478] print_bad_pte+0x1bc/0x280 [177850.481484] ? page_remove_rmap+0x8d/0x260 [177850.481492] unmap_page_range+0xa96/0x1150 [177850.481503] unmap_vmas+0xf8/0x190 [177850.481510] exit_mmap+0xe4/0x310 [177850.481520] __mmput+0x3e/0x130 [177850.481527] do_exit+0x31c/0xb20 [177850.481533] ? futex_wait_queue+0x63/0x90 [177850.481540] do_group_exit+0x31/0x80 [177850.481545] get_signal+0x9a5/0x9e0 [177850.481554] arch_do_signal_or_restart+0x3e/0x270 [177850.481562] exit_to_user_mode_prepare+0x185/0x1e0 [177850.481570] syscall_exit_to_user_mode+0x1b/0x40 [177850.481579] do_syscall_64+0x6c/0x90 [177850.481586] ? irqtime_account_irq+0x40/0xc0 [177850.481592] ? __do_softirq+0x186/0x2c8 [177850.481600] ? __irq_exit_rcu+0x4b/0xc0 [177850.481606] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.481613] RIP: 0033:0x7f20ba9db4ae [177850.481655] Code: Unable to access opcode bytes at 0x7f20ba9db484. [177850.481658] RSP: 002b:00007f20497d1d30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.481663] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f20ba9db4ae [177850.481667] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 00000000050e3120 [177850.481670] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.481674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.481677] R13: 00000000050e30d0 R14: 0000000000000000 R15: 00000000050e3120 [177850.481682] [177850.620777] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:963235067 [177850.620791] page:000000007415dd6c refcount:2 mapcount:-113 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177850.620798] memcg:ffff9289345d4000 [177850.620801] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177850.620931] flags: 0xaffff780000205e(referenced|uptodate|dirty|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.620936] page_type: 0xffffff8e() [177850.620940] raw: 0affff780000205e ffffe7623b6b3148 ffffe7623b6b2a88 ffff92836aad07e0 [177850.620943] raw: 000000000000047d 0000000000000001 00000002ffffff8e ffff9289345d4000 [177850.620945] page dumped because: bad pte [177850.620946] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.620950] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.621129] CPU: 57 PID: 2062157 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.621134] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.621136] Call Trace: [177850.621141] [177850.621147] dump_stack_lvl+0x47/0x60 [177850.621155] print_bad_pte+0x1bc/0x280 [177850.621161] ? page_remove_rmap+0x8d/0x260 [177850.621168] unmap_page_range+0xa96/0x1150 [177850.621176] unmap_vmas+0xf8/0x190 [177850.621180] exit_mmap+0xe4/0x310 [177850.621189] __mmput+0x3e/0x130 [177850.621196] do_exit+0x31c/0xb20 [177850.621201] ? futex_wait_queue+0x63/0x90 [177850.621208] do_group_exit+0x31/0x80 [177850.621212] get_signal+0x9a5/0x9e0 [177850.621220] arch_do_signal_or_restart+0x3e/0x270 [177850.621227] exit_to_user_mode_prepare+0x185/0x1e0 [177850.621233] syscall_exit_to_user_mode+0x1b/0x40 [177850.621242] do_syscall_64+0x6c/0x90 [177850.621248] ? do_syscall_64+0x6c/0x90 [177850.621251] ? do_syscall_64+0x6c/0x90 [177850.621254] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.621261] RIP: 0033:0x7f17173d54ae [177850.621302] Code: Unable to access opcode bytes at 0x7f17173d5484. [177850.621303] RSP: 002b:00007f170f7fdd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.621307] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f17173d54ae [177850.621310] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 000000000520d550 [177850.621312] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.621314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.621315] R13: 000000000520d500 R14: 0000000000000000 R15: 000000000520d550 [177850.621320] [177850.637758] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:387e15067 [177850.637768] page:000000007415dd6c refcount:1 mapcount:-114 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177850.637776] memcg:ffff9289345d4000 [177850.637779] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177850.637906] flags: 0xaffff780000205e(referenced|uptodate|dirty|lru|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.637912] page_type: 0xffffff8d() [177850.637917] raw: 0affff780000205e ffffe7623b6b3148 ffffe7623b6b2a88 ffff92836aad07e0 [177850.637920] raw: 000000000000047d 0000000000000001 00000001ffffff8d ffff9289345d4000 [177850.637921] page dumped because: bad pte [177850.637923] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.637928] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.638176] CPU: 38 PID: 2062017 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.638181] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.638183] Call Trace: [177850.638187] [177850.638195] dump_stack_lvl+0x47/0x60 [177850.638203] print_bad_pte+0x1bc/0x280 [177850.638209] ? page_remove_rmap+0x8d/0x260 [177850.638216] unmap_page_range+0xa96/0x1150 [177850.638227] unmap_vmas+0xf8/0x190 [177850.638233] exit_mmap+0xe4/0x310 [177850.638243] __mmput+0x3e/0x130 [177850.638251] do_exit+0x31c/0xb20 [177850.638256] ? futex_wait_queue+0x63/0x90 [177850.638263] do_group_exit+0x31/0x80 [177850.638268] get_signal+0x9a5/0x9e0 [177850.638277] arch_do_signal_or_restart+0x3e/0x270 [177850.638286] exit_to_user_mode_prepare+0x185/0x1e0 [177850.638294] syscall_exit_to_user_mode+0x1b/0x40 [177850.638302] do_syscall_64+0x6c/0x90 [177850.638308] ? do_syscall_64+0x6c/0x90 [177850.638313] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.638319] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.638325] ? do_syscall_64+0x6c/0x90 [177850.638328] ? do_syscall_64+0x6c/0x90 [177850.638334] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.638339] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.638345] RIP: 0033:0x7f52e24984ae [177850.638402] Code: Unable to access opcode bytes at 0x7f52e2498484. [177850.638405] RSP: 002b:00007f52ce7fbd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.638411] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f52e24984ae [177850.638413] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000008d7f204 [177850.638417] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.638420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.638423] R13: 0000000008d7f1b0 R14: 0000000000000000 R15: 0000000008d7f204 [177850.638429] [177850.641559] BUG: Bad page state in process ld.lld pfn:edacc4 [177850.641567] page:000000007415dd6c refcount:0 mapcount:-114 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177850.641574] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177850.641705] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.641710] page_type: 0xffffff8d() [177850.641714] raw: 0affff180000204e ffffb37c2b46f980 ffffb37c2b46f980 ffff92836aad07e0 [177850.641717] raw: 000000000000047d 0000000000000001 00000000ffffff8d 0000000000000000 [177850.641718] page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set [177850.641720] Modules linked in: vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock bluetooth ecdh_generic crc16 snd_seq_dummy snd_hrtimer snd_seq snd_seq_device rfkill vmnet(OE) vfat fat intel_rapl_msr intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm snd_hda_codec_realtek snd_hda_codec_generic irqbypass ledtrig_audio snd_hda_codec_hdmi crct10dif_pclmul crc32_pclmul polyval_clmulni snd_hda_intel polyval_generic snd_intel_dspcfg gf128mul snd_intel_sdw_acpi ghash_clmulni_intel sha512_ssse3 snd_hda_codec aesni_intel iTCO_wdt crypto_simd snd_hda_core intel_pmc_bxt cryptd snd_hwdep iTCO_vendor_support rapl snd_pcm intel_cstate snd_timer intel_uncore i2c_i801 pcspkr snd igc mxm_wmi i2c_smbus lpc_ich soundcore joydev mousedev mac_hid vmmon(OE) vmw_vmci v4l2loopback(OE) videodev mc dm_multipath i2c_dev sg crypto_user fuse loop dm_mod ip_tables x_tables usbhid i915 intel_gtt btrfs blake2b_generic libcrc32c crc32c_generic xor raid6_pq nvme nvme_core xhci_pci [177850.641831] crc32c_intel nvme_common xhci_pci_renesas amdgpu i2c_algo_bit drm_ttm_helper ttm video wmi drm_suballoc_helper amdxcp drm_buddy gpu_sched drm_display_helper cec [177850.641852] CPU: 37 PID: 2062017 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.641858] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.641861] Call Trace: [177850.641865] [177850.641870] dump_stack_lvl+0x47/0x60 [177850.641879] bad_page+0x71/0x100 [177850.641887] free_unref_page_prepare+0x238/0x400 [177850.641891] ? release_pages+0x177/0x510 [177850.641898] free_unref_page_list+0x7c/0x390 [177850.641902] ? __mem_cgroup_uncharge_list+0x81/0xb0 [177850.641909] release_pages+0x177/0x510 [177850.641915] tlb_batch_pages_flush+0x3d/0x70 [177850.641922] unmap_page_range+0xcad/0x1150 [177850.641933] unmap_vmas+0xf8/0x190 [177850.641939] exit_mmap+0xe4/0x310 [177850.641948] __mmput+0x3e/0x130 [177850.641955] do_exit+0x31c/0xb20 [177850.641960] ? futex_wait_queue+0x63/0x90 [177850.641966] do_group_exit+0x31/0x80 [177850.641971] get_signal+0x9a5/0x9e0 [177850.641979] arch_do_signal_or_restart+0x3e/0x270 [177850.641986] exit_to_user_mode_prepare+0x185/0x1e0 [177850.641993] syscall_exit_to_user_mode+0x1b/0x40 [177850.642000] do_syscall_64+0x6c/0x90 [177850.642007] ? do_syscall_64+0x6c/0x90 [177850.642012] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.642017] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.642022] ? do_syscall_64+0x6c/0x90 [177850.642027] ? do_syscall_64+0x6c/0x90 [177850.642033] ? exit_to_user_mode_prepare+0x132/0x1e0 [177850.642038] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.642044] RIP: 0033:0x7f52e24984ae [177850.642087] Code: Unable to access opcode bytes at 0x7f52e2498484. [177850.642089] RSP: 002b:00007f52ce7fbd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.642094] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f52e24984ae [177850.642097] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000008d7f204 [177850.642100] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.642102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.642105] R13: 0000000008d7f1b0 R14: 0000000000000000 R15: 0000000008d7f204 [177850.642110] [177850.643335] BUG: Bad page state in process ld.lld pfn:edacc5 [177850.643341] page:000000006f99d478 refcount:0 mapcount:14 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177850.643346] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177850.643449] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.643453] page_type: 0xd() [177850.643456] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177850.643458] raw: 000000000000047e 0000000000000001 000000000000000d 0000000000000000 [177850.643460] page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set [177850.643461] Modules linked in: vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock bluetooth ecdh_generic crc16 snd_seq_dummy snd_hrtimer snd_seq snd_seq_device rfkill vmnet(OE) vfat fat intel_rapl_msr intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm snd_hda_codec_realtek snd_hda_codec_generic irqbypass ledtrig_audio snd_hda_codec_hdmi crct10dif_pclmul crc32_pclmul polyval_clmulni snd_hda_intel polyval_generic snd_intel_dspcfg gf128mul snd_intel_sdw_acpi ghash_clmulni_intel sha512_ssse3 snd_hda_codec aesni_intel iTCO_wdt crypto_simd snd_hda_core intel_pmc_bxt cryptd snd_hwdep iTCO_vendor_support rapl snd_pcm intel_cstate snd_timer intel_uncore i2c_i801 pcspkr snd igc mxm_wmi i2c_smbus lpc_ich soundcore joydev mousedev mac_hid vmmon(OE) vmw_vmci v4l2loopback(OE) videodev mc dm_multipath i2c_dev sg crypto_user fuse loop dm_mod ip_tables x_tables usbhid i915 intel_gtt btrfs blake2b_generic libcrc32c crc32c_generic xor raid6_pq nvme nvme_core xhci_pci [177850.643543] crc32c_intel nvme_common xhci_pci_renesas amdgpu i2c_algo_bit drm_ttm_helper ttm video wmi drm_suballoc_helper amdxcp drm_buddy gpu_sched drm_display_helper cec [177850.643560] CPU: 19 PID: 2062252 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.643564] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.643566] Call Trace: [177850.643570] [177850.643575] dump_stack_lvl+0x47/0x60 [177850.643582] bad_page+0x71/0x100 [177850.643589] ? lru_gen_del_folio.constprop.0+0x13d/0x1c0 [177850.643594] free_unref_page_prepare+0x238/0x400 [177850.643597] ? __count_memcg_events+0x42/0x90 [177850.643605] free_unref_page+0x30/0x120 [177850.643609] filemap_fault+0x781/0x9f0 [177850.643616] ? filemap_map_pages+0x271/0x550 [177850.643620] __do_fault+0x33/0x130 [177850.643626] do_fault+0x248/0x3d0 [177850.643630] __handle_mm_fault+0x65b/0xbb0 [177850.643636] handle_mm_fault+0x155/0x350 [177850.643639] do_user_addr_fault+0x203/0x640 [177850.643646] exc_page_fault+0x7f/0x180 [177850.643653] asm_exc_page_fault+0x26/0x30 [177850.643659] RIP: 0033:0x203f567 [177850.643690] Code: 8d 7c 24 08 4c 89 ff 48 89 ee 31 d2 e8 52 95 1b 00 f6 44 24 10 01 0f 85 cc 00 00 00 8b 44 24 08 48 83 f8 03 0f 87 a4 00 00 00 24 c5 a0 6b 27 01 41 80 66 10 fe 0f 28 44 24 60 41 0f 11 06 45 [177850.643693] RSP: 002b:00007ffc1cd98c00 EFLAGS: 00010246 [177850.643696] RAX: 0000000000000003 RBX: 00007ffc1cd98c28 RCX: 0000000000000003 [177850.643698] RDX: 0000000000000000 RSI: 0000000400000003 RDI: 0000000000003b24 [177850.643700] RBP: 00007ffc1cd98d58 R08: 00007ffc1cd98d78 R09: 0000000000000007 [177850.643702] R10: 0000000000000004 R11: 00007f3e3408d808 R12: 00007ffc1cd98c38 [177850.643704] R13: 00007ffc1cd98cc0 R14: 00007ffc1cd98cd0 R15: 00007ffc1cd98c08 [177850.643709] [177850.652643] ld.lld[2062238]: segfault at 0 ip 0000000000000000 sp 00007ffc19257230 error 14 in lld[200000+16e1000] likely on CPU 38 (core 2, socket 0) [177850.652668] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [177850.708417] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:89fe17067 [177850.708428] page:000000007415dd6c refcount:0 mapcount:-1 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177850.708434] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177850.708546] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.708551] page_type: 0xfffffffe() [177850.708555] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177850.708557] raw: 000000000000047d 0000000000000001 00000000fffffffe 0000000000000000 [177850.708558] page dumped because: bad pte [177850.708560] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.708563] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.708743] CPU: 33 PID: 2061114 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.708748] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.708750] Call Trace: [177850.708754] [177850.708759] dump_stack_lvl+0x47/0x60 [177850.708767] print_bad_pte+0x1bc/0x280 [177850.708773] ? page_remove_rmap+0x8d/0x260 [177850.708780] unmap_page_range+0xa96/0x1150 [177850.708788] unmap_vmas+0xf8/0x190 [177850.708793] exit_mmap+0xe4/0x310 [177850.708800] __mmput+0x3e/0x130 [177850.708808] do_exit+0x31c/0xb20 [177850.708813] do_group_exit+0x31/0x80 [177850.708816] __x64_sys_exit_group+0x18/0x20 [177850.708819] do_syscall_64+0x60/0x90 [177850.708825] ? do_user_addr_fault+0x225/0x640 [177850.708831] ? exc_page_fault+0x7f/0x180 [177850.708838] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.708844] RIP: 0033:0x7f9c4144fe2d [177850.708890] Code: Unable to access opcode bytes at 0x7f9c4144fe03. [177850.708892] RSP: 002b:00007ffc5b3191e8 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7 [177850.708897] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c4144fe2d [177850.708899] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177850.708901] RBP: 0000000000000001 R08: 00000000054d5010 R09: 0000000000000000 [177850.708902] R10: 00007f9c4138c5c0 R11: 0000000000000206 R12: 0000000000000000 [177850.708904] R13: 00007ffc5b319800 R14: 0000000003830fa0 R15: 0000000003830f38 [177850.708908] [177850.708911] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:89fe17067 [177850.708914] page:000000006f99d478 refcount:0 mapcount:-1 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177850.708917] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177850.709004] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.709007] page_type: 0xfffffffe() [177850.709009] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177850.709011] raw: 000000000000047e 0000000000000001 00000000fffffffe 0000000000000000 [177850.709012] page dumped because: bad pte [177850.709013] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177850.709016] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.709188] CPU: 33 PID: 2061114 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.709192] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.709193] Call Trace: [177850.709194] [177850.709196] dump_stack_lvl+0x47/0x60 [177850.709200] print_bad_pte+0x1bc/0x280 [177850.709203] ? page_remove_rmap+0x8d/0x260 [177850.709207] unmap_page_range+0xa96/0x1150 [177850.709213] unmap_vmas+0xf8/0x190 [177850.709218] exit_mmap+0xe4/0x310 [177850.709225] __mmput+0x3e/0x130 [177850.709232] do_exit+0x31c/0xb20 [177850.709236] do_group_exit+0x31/0x80 [177850.709239] __x64_sys_exit_group+0x18/0x20 [177850.709241] do_syscall_64+0x60/0x90 [177850.709246] ? do_user_addr_fault+0x225/0x640 [177850.709250] ? exc_page_fault+0x7f/0x180 [177850.709255] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.709258] RIP: 0033:0x7f9c4144fe2d [177850.709269] Code: Unable to access opcode bytes at 0x7f9c4144fe03. [177850.709271] RSP: 002b:00007ffc5b3191e8 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7 [177850.709274] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c4144fe2d [177850.709276] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177850.709278] RBP: 0000000000000001 R08: 00000000054d5010 R09: 0000000000000000 [177850.709280] R10: 00007f9c4138c5c0 R11: 0000000000000206 R12: 0000000000000000 [177850.709282] R13: 00007ffc5b319800 R14: 0000000003830fa0 R15: 0000000003830f38 [177850.709286] [177850.790552] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:8d0546067 [177850.790563] page:000000007415dd6c refcount:-1 mapcount:-2 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177850.790570] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177850.790719] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.790725] page_type: 0xfffffffd() [177850.790730] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177850.790734] raw: 000000000000047d 0000000000000001 fffffffffffffffd 0000000000000000 [177850.790736] page dumped because: bad pte [177850.790737] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.790742] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.790998] CPU: 51 PID: 2062797 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.791004] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.791006] Call Trace: [177850.791011] [177850.791017] dump_stack_lvl+0x47/0x60 [177850.791026] print_bad_pte+0x1bc/0x280 [177850.791033] ? page_remove_rmap+0x8d/0x260 [177850.791041] unmap_page_range+0xa96/0x1150 [177850.791053] unmap_vmas+0xf8/0x190 [177850.791060] exit_mmap+0xe4/0x310 [177850.791069] __mmput+0x3e/0x130 [177850.791078] do_exit+0x31c/0xb20 [177850.791083] ? futex_wait_queue+0x63/0x90 [177850.791091] do_group_exit+0x31/0x80 [177850.791094] get_signal+0x9a5/0x9e0 [177850.791104] arch_do_signal_or_restart+0x3e/0x270 [177850.791111] exit_to_user_mode_prepare+0x185/0x1e0 [177850.791119] syscall_exit_to_user_mode+0x1b/0x40 [177850.791128] do_syscall_64+0x6c/0x90 [177850.791136] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.791142] ? do_syscall_64+0x6c/0x90 [177850.791146] ? irqtime_account_irq+0x40/0xc0 [177850.791153] ? __irq_exit_rcu+0x4b/0xc0 [177850.791159] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.791166] RIP: 0033:0x7fd0de9d14ae [177850.791209] Code: Unable to access opcode bytes at 0x7fd0de9d1484. [177850.791211] RSP: 002b:00007fd0c2ffcd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.791216] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fd0de9d14ae [177850.791219] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000008a89484 [177850.791222] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.791225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.791227] R13: 0000000008a89430 R14: 0000000000000000 R15: 0000000008a89484 [177850.791233] [177850.791237] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:8d0546067 [177850.791241] page:000000006f99d478 refcount:0 mapcount:-2 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177850.791247] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177850.791365] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.791369] page_type: 0xfffffffd() [177850.791374] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177850.791377] raw: 000000000000047e 0000000000000001 fffffffffffffffd 0000000000000000 [177850.791379] page dumped because: bad pte [177850.791380] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177850.791385] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.791633] CPU: 51 PID: 2062797 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.791638] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.791640] Call Trace: [177850.791643] [177850.791645] dump_stack_lvl+0x47/0x60 [177850.791651] print_bad_pte+0x1bc/0x280 [177850.791656] ? page_remove_rmap+0x8d/0x260 [177850.791662] unmap_page_range+0xa96/0x1150 [177850.791671] unmap_vmas+0xf8/0x190 [177850.791677] exit_mmap+0xe4/0x310 [177850.791687] __mmput+0x3e/0x130 [177850.791693] do_exit+0x31c/0xb20 [177850.791699] ? futex_wait_queue+0x63/0x90 [177850.791705] do_group_exit+0x31/0x80 [177850.791710] get_signal+0x9a5/0x9e0 [177850.791718] arch_do_signal_or_restart+0x3e/0x270 [177850.791724] exit_to_user_mode_prepare+0x185/0x1e0 [177850.791731] syscall_exit_to_user_mode+0x1b/0x40 [177850.791737] do_syscall_64+0x6c/0x90 [177850.791743] ? syscall_exit_to_user_mode+0x2b/0x40 [177850.791748] ? do_syscall_64+0x6c/0x90 [177850.791753] ? irqtime_account_irq+0x40/0xc0 [177850.791758] ? __irq_exit_rcu+0x4b/0xc0 [177850.791763] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177850.791773] RIP: 0033:0x7fd0de9d14ae [177850.791786] Code: Unable to access opcode bytes at 0x7fd0de9d1484. [177850.791788] RSP: 002b:00007fd0c2ffcd30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177850.791792] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fd0de9d14ae [177850.791795] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000008a89484 [177850.791798] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177850.791800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177850.791802] R13: 0000000008a89430 R14: 0000000000000000 R15: 0000000008a89484 [177850.791807] [177850.894810] traps: ld.lld[2055329] general protection fault ip:21ef9cf sp:7fff898cf7c0 error:0 in lld[18e1000+1f49000] [177850.898488] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:13a1e7067 [177850.898496] page:000000007415dd6c refcount:-2 mapcount:-3 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177850.898503] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177850.898610] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.898615] page_type: 0xfffffffc() [177850.898619] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177850.898621] raw: 000000000000047d 0000000000000001 fffffffefffffffc 0000000000000000 [177850.898623] page dumped because: bad pte [177850.898623] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177850.898626] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.898807] CPU: 61 PID: 2062238 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.898810] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.898812] Call Trace: [177850.898816] [177850.898822] dump_stack_lvl+0x47/0x60 [177850.898830] print_bad_pte+0x1bc/0x280 [177850.898835] ? page_remove_rmap+0x8d/0x260 [177850.898841] unmap_page_range+0xa96/0x1150 [177850.898849] unmap_vmas+0xf8/0x190 [177850.898853] exit_mmap+0xe4/0x310 [177850.898861] __mmput+0x3e/0x130 [177850.898868] do_exit+0x31c/0xb20 [177850.898873] do_group_exit+0x31/0x80 [177850.898875] get_signal+0x9a5/0x9e0 [177850.898883] arch_do_signal_or_restart+0x3e/0x270 [177850.898889] exit_to_user_mode_prepare+0x185/0x1e0 [177850.898896] irqentry_exit_to_user_mode+0x9/0x30 [177850.898900] asm_exc_page_fault+0x26/0x30 [177850.898906] RIP: 0033:0x0 [177850.898953] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [177850.898955] RSP: 002b:00007ffc19257230 EFLAGS: 00010246 [177850.898958] RAX: 0000000000000003 RBX: 00007ffc19257258 RCX: 0000000000000003 [177850.898961] RDX: 0000000000000000 RSI: 0000000400000003 RDI: 000000000000eab8 [177850.898962] RBP: 00007ffc19257388 R08: 00007ffc192573a8 R09: 0000000000000007 [177850.898964] R10: 0000000004d52a70 R11: 00007f77712606e0 R12: 00007ffc19257268 [177850.898966] R13: 00007ffc192572f0 R14: 00007ffc19257300 R15: 00007ffc19257238 [177850.898970] [177850.898972] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:13a1e7067 [177850.898974] page:000000006f99d478 refcount:0 mapcount:-3 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177850.898977] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177850.899057] flags: 0xaffff180000204f(locked|referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177850.899059] page_type: 0xfffffffc() [177850.899064] raw: 0affff18000020ce dead000000000100 dead000000000122 ffff92836aad07e0 [177850.899068] raw: 000000000000047e 0000000000000001 00000000fffffffc 0000000000000000 [177850.899069] page dumped because: bad pte [177850.899070] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177850.899072] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177850.899246] CPU: 61 PID: 2062238 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177850.899249] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177850.899250] Call Trace: [177850.899251] [177850.899252] dump_stack_lvl+0x47/0x60 [177850.899256] print_bad_pte+0x1bc/0x280 [177850.899259] ? page_remove_rmap+0x8d/0x260 [177850.899263] unmap_page_range+0xa96/0x1150 [177850.899268] unmap_vmas+0xf8/0x190 [177850.899272] exit_mmap+0xe4/0x310 [177850.899277] __mmput+0x3e/0x130 [177850.899281] do_exit+0x31c/0xb20 [177850.899283] do_group_exit+0x31/0x80 [177850.899286] get_signal+0x9a5/0x9e0 [177850.899290] arch_do_signal_or_restart+0x3e/0x270 [177850.899294] exit_to_user_mode_prepare+0x185/0x1e0 [177850.899298] irqentry_exit_to_user_mode+0x9/0x30 [177850.899300] asm_exc_page_fault+0x26/0x30 [177850.899303] RIP: 0033:0x0 [177850.899309] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [177850.899311] RSP: 002b:00007ffc19257230 EFLAGS: 00010246 [177850.899313] RAX: 0000000000000003 RBX: 00007ffc19257258 RCX: 0000000000000003 [177850.899315] RDX: 0000000000000000 RSI: 0000000400000003 RDI: 000000000000eab8 [177850.899316] RBP: 00007ffc19257388 R08: 00007ffc192573a8 R09: 0000000000000007 [177850.899317] R10: 0000000004d52a70 R11: 00007f77712606e0 R12: 00007ffc19257268 [177850.899319] R13: 00007ffc192572f0 R14: 00007ffc19257300 R15: 00007ffc19257238 [177850.899321] [177850.901212] ld.lld[2055207]: segfault at 0 ip 0000000000000000 sp 00007ffda3c33780 error 14 in lld[200000+16e1000] likely on CPU 57 (core 3, socket 1) [177850.901232] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [177851.035310] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:92cc4d067 [177851.035322] page:000000007415dd6c refcount:-3 mapcount:-4 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177851.035328] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.035437] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.035443] page_type: 0xfffffffb() [177851.035448] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177851.035451] raw: 000000000000047d 0000000000000001 fffffffdfffffffb 0000000000000000 [177851.035452] page dumped because: bad pte [177851.035453] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177851.035455] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.035620] CPU: 26 PID: 2063034 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.035624] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.035627] Call Trace: [177851.035633] [177851.035640] dump_stack_lvl+0x47/0x60 [177851.035648] print_bad_pte+0x1bc/0x280 [177851.035655] ? page_remove_rmap+0x8d/0x260 [177851.035664] unmap_page_range+0xa96/0x1150 [177851.035677] unmap_vmas+0xf8/0x190 [177851.035682] exit_mmap+0xe4/0x310 [177851.035691] __mmput+0x3e/0x130 [177851.035700] do_exit+0x31c/0xb20 [177851.035704] ? futex_wait_queue+0x63/0x90 [177851.035713] do_group_exit+0x31/0x80 [177851.035717] get_signal+0x9a5/0x9e0 [177851.035725] arch_do_signal_or_restart+0x3e/0x270 [177851.035731] exit_to_user_mode_prepare+0x185/0x1e0 [177851.035737] syscall_exit_to_user_mode+0x1b/0x40 [177851.035746] do_syscall_64+0x6c/0x90 [177851.035751] ? syscall_exit_to_user_mode+0x2b/0x40 [177851.035754] ? do_syscall_64+0x6c/0x90 [177851.035759] ? exc_page_fault+0x7f/0x180 [177851.035767] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.035773] RIP: 0033:0x7f5316e154ae [177851.035807] Code: Unable to access opcode bytes at 0x7f5316e15484. [177851.035809] RSP: 002b:00007f52e17f9d30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177851.035815] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f5316e154ae [177851.035817] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000004d22b60 [177851.035819] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177851.035821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177851.035823] R13: 0000000004d22b10 R14: 0000000000000000 R15: 0000000004d22b60 [177851.035827] [177851.035831] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:92cc4d067 [177851.035833] page:000000006f99d478 refcount:0 mapcount:-4 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177851.035837] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.035914] flags: 0xaffff18000020ce(waiters|referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.035917] page_type: 0xfffffffb() [177851.035920] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177851.035922] raw: 000000000000047e 0000000000000001 00000000fffffffb 0000000000000000 [177851.035924] page dumped because: bad pte [177851.035929] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177851.035936] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.036102] CPU: 26 PID: 2063034 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.036105] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.036106] Call Trace: [177851.036108] [177851.036109] dump_stack_lvl+0x47/0x60 [177851.036113] print_bad_pte+0x1bc/0x280 [177851.036116] ? page_remove_rmap+0x8d/0x260 [177851.036119] unmap_page_range+0xa96/0x1150 [177851.036125] unmap_vmas+0xf8/0x190 [177851.036129] exit_mmap+0xe4/0x310 [177851.036134] __mmput+0x3e/0x130 [177851.036140] do_exit+0x31c/0xb20 [177851.036142] ? futex_wait_queue+0x63/0x90 [177851.036147] do_group_exit+0x31/0x80 [177851.036149] get_signal+0x9a5/0x9e0 [177851.036154] arch_do_signal_or_restart+0x3e/0x270 [177851.036157] exit_to_user_mode_prepare+0x185/0x1e0 [177851.036163] syscall_exit_to_user_mode+0x1b/0x40 [177851.036167] do_syscall_64+0x6c/0x90 [177851.036173] ? syscall_exit_to_user_mode+0x2b/0x40 [177851.036176] ? do_syscall_64+0x6c/0x90 [177851.036179] ? exc_page_fault+0x7f/0x180 [177851.036184] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.036187] RIP: 0033:0x7f5316e154ae [177851.036196] Code: Unable to access opcode bytes at 0x7f5316e15484. [177851.036197] RSP: 002b:00007f52e17f9d30 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [177851.036201] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f5316e154ae [177851.036203] RDX: 0000000000000000 RSI: 0000000000000189 RDI: 0000000004d22b60 [177851.036205] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000ffffffff [177851.036207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [177851.036209] R13: 0000000004d22b10 R14: 0000000000000000 R15: 0000000004d22b60 [177851.036213] [177851.097552] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:8d058b067 [177851.097561] page:000000007415dd6c refcount:-4 mapcount:-5 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177851.097566] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.097658] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.097662] page_type: 0xfffffffa() [177851.097666] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177851.097668] raw: 000000000000047d 0000000000000001 fffffffcfffffffa 0000000000000000 [177851.097670] page dumped because: bad pte [177851.097670] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177851.097673] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.097848] CPU: 14 PID: 2056869 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.097852] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.097853] Call Trace: [177851.097856] [177851.097861] dump_stack_lvl+0x47/0x60 [177851.097867] print_bad_pte+0x1bc/0x280 [177851.097872] ? page_remove_rmap+0x8d/0x260 [177851.097878] unmap_page_range+0xa96/0x1150 [177851.097884] unmap_vmas+0xf8/0x190 [177851.097889] exit_mmap+0xe4/0x310 [177851.097895] __mmput+0x3e/0x130 [177851.097901] do_exit+0x31c/0xb20 [177851.097905] do_group_exit+0x31/0x80 [177851.097908] __x64_sys_exit_group+0x18/0x20 [177851.097911] do_syscall_64+0x60/0x90 [177851.097916] ? do_user_addr_fault+0x225/0x640 [177851.097922] ? exc_page_fault+0x7f/0x180 [177851.097927] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.097932] RIP: 0033:0x7fce290f3e2d [177851.097966] Code: Unable to access opcode bytes at 0x7fce290f3e03. [177851.097968] RSP: 002b:00007fffba97fec8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [177851.097971] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fce290f3e2d [177851.097973] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177851.097975] RBP: 0000000000000001 R08: 0000000004544010 R09: 0000000000000000 [177851.097976] R10: 00007fce290305c0 R11: 0000000000000202 R12: 0000000000000000 [177851.097978] R13: 00007fffba980408 R14: 0000000003830fa0 R15: 0000000003830f38 [177851.097981] [177851.097983] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:8d058b067 [177851.097986] page:000000006f99d478 refcount:0 mapcount:-5 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177851.097989] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.098063] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.098066] page_type: 0xfffffffa() [177851.098069] raw: 0affff18000020ce dead000000000100 dead000000000122 ffff92836aad07e0 [177851.098071] raw: 000000000000047e 0000000000000001 fffffffffffffffa 0000000000000000 [177851.098072] page dumped because: bad pte [177851.098073] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177851.098075] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.098247] CPU: 14 PID: 2056869 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.098250] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.098251] Call Trace: [177851.098252] [177851.098253] dump_stack_lvl+0x47/0x60 [177851.098257] print_bad_pte+0x1bc/0x280 [177851.098261] ? page_remove_rmap+0x8d/0x260 [177851.098265] unmap_page_range+0xa96/0x1150 [177851.098270] unmap_vmas+0xf8/0x190 [177851.098275] exit_mmap+0xe4/0x310 [177851.098280] __mmput+0x3e/0x130 [177851.098284] do_exit+0x31c/0xb20 [177851.098287] do_group_exit+0x31/0x80 [177851.098290] __x64_sys_exit_group+0x18/0x20 [177851.098293] do_syscall_64+0x60/0x90 [177851.098297] ? do_user_addr_fault+0x225/0x640 [177851.098301] ? exc_page_fault+0x7f/0x180 [177851.098305] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.098309] RIP: 0033:0x7fce290f3e2d [177851.098317] Code: Unable to access opcode bytes at 0x7fce290f3e03. [177851.098318] RSP: 002b:00007fffba97fec8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [177851.098321] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fce290f3e2d [177851.098323] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177851.098324] RBP: 0000000000000001 R08: 0000000004544010 R09: 0000000000000000 [177851.098326] R10: 00007fce290305c0 R11: 0000000000000202 R12: 0000000000000000 [177851.098327] R13: 00007fffba980408 R14: 0000000003830fa0 R15: 0000000003830f38 [177851.098331] [177851.399854] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:1664dd067 [177851.399863] page:000000007415dd6c refcount:-5 mapcount:-6 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177851.399868] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.399959] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.399963] page_type: 0xfffffff9() [177851.399966] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177851.399968] raw: 000000000000047d 0000000000000001 fffffffbfffffff9 0000000000000000 [177851.399969] page dumped because: bad pte [177851.399970] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177851.399973] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.400166] CPU: 17 PID: 2060170 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.400171] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.400173] Call Trace: [177851.400176] [177851.400180] dump_stack_lvl+0x47/0x60 [177851.400187] print_bad_pte+0x1bc/0x280 [177851.400192] ? page_remove_rmap+0x8d/0x260 [177851.400197] unmap_page_range+0xa96/0x1150 [177851.400204] unmap_vmas+0xf8/0x190 [177851.400208] exit_mmap+0xe4/0x310 [177851.400214] __mmput+0x3e/0x130 [177851.400221] do_exit+0x31c/0xb20 [177851.400225] do_group_exit+0x31/0x80 [177851.400228] __x64_sys_exit_group+0x18/0x20 [177851.400230] do_syscall_64+0x60/0x90 [177851.400236] ? do_user_addr_fault+0x225/0x640 [177851.400241] ? exc_page_fault+0x7f/0x180 [177851.400246] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.400251] RIP: 0033:0x7f46d38e6e2d [177851.400286] Code: Unable to access opcode bytes at 0x7f46d38e6e03. [177851.400287] RSP: 002b:00007ffee0cb1e08 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [177851.400291] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f46d38e6e2d [177851.400293] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177851.400294] RBP: 0000000000000001 R08: 00000000000000b0 R09: 0000000000000000 [177851.400296] R10: 00007f46d38235c0 R11: 0000000000000202 R12: 0000000000000000 [177851.400297] R13: 00007ffee0cb2390 R14: 0000000003830fa0 R15: 0000000003830f38 [177851.400300] [177851.400302] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:1664dd067 [177851.400304] page:000000006f99d478 refcount:0 mapcount:-6 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177851.400307] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.400383] flags: 0xaffff18000020ce(waiters|referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.400386] page_type: 0xfffffff9() [177851.400389] raw: 0affff18000020cf dead000000000100 dead000000000122 ffff92836aad07e0 [177851.400391] raw: 000000000000047e 0000000000000001 fffffffffffffff9 0000000000000000 [177851.400392] page dumped because: bad pte [177851.400393] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177851.400395] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.400573] CPU: 17 PID: 2060170 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.400577] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.400578] Call Trace: [177851.400579] [177851.400581] dump_stack_lvl+0x47/0x60 [177851.400585] print_bad_pte+0x1bc/0x280 [177851.400588] ? page_remove_rmap+0x8d/0x260 [177851.400593] unmap_page_range+0xa96/0x1150 [177851.400598] unmap_vmas+0xf8/0x190 [177851.400603] exit_mmap+0xe4/0x310 [177851.400609] __mmput+0x3e/0x130 [177851.400613] do_exit+0x31c/0xb20 [177851.400616] do_group_exit+0x31/0x80 [177851.400619] __x64_sys_exit_group+0x18/0x20 [177851.400621] do_syscall_64+0x60/0x90 [177851.400625] ? do_user_addr_fault+0x225/0x640 [177851.400630] ? exc_page_fault+0x7f/0x180 [177851.400634] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.400637] RIP: 0033:0x7f46d38e6e2d [177851.400645] Code: Unable to access opcode bytes at 0x7f46d38e6e03. [177851.400646] RSP: 002b:00007ffee0cb1e08 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [177851.400649] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f46d38e6e2d [177851.400652] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177851.400653] RBP: 0000000000000001 R08: 00000000000000b0 R09: 0000000000000000 [177851.400655] R10: 00007f46d38235c0 R11: 0000000000000202 R12: 0000000000000000 [177851.400657] R13: 00007ffee0cb2390 R14: 0000000003830fa0 R15: 0000000003830f38 [177851.400660] [177851.512894] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:396a06067 [177851.512906] page:000000007415dd6c refcount:-6 mapcount:-7 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177851.512912] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.513028] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.513033] page_type: 0xfffffff8() [177851.513036] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177851.513039] raw: 000000000000047d 0000000000000001 fffffffafffffff8 0000000000000000 [177851.513040] page dumped because: bad pte [177851.513041] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177851.513044] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.513223] CPU: 57 PID: 2061231 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.513228] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.513230] Call Trace: [177851.513235] [177851.513239] dump_stack_lvl+0x47/0x60 [177851.513248] print_bad_pte+0x1bc/0x280 [177851.513255] ? page_remove_rmap+0x8d/0x260 [177851.513261] unmap_page_range+0xa96/0x1150 [177851.513268] unmap_vmas+0xf8/0x190 [177851.513273] exit_mmap+0xe4/0x310 [177851.513281] __mmput+0x3e/0x130 [177851.513289] do_exit+0x31c/0xb20 [177851.513294] do_group_exit+0x31/0x80 [177851.513298] __x64_sys_exit_group+0x18/0x20 [177851.513300] do_syscall_64+0x60/0x90 [177851.513307] ? do_user_addr_fault+0x225/0x640 [177851.513318] ? exc_page_fault+0x7f/0x180 [177851.513325] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.513330] RIP: 0033:0x7fa368dd8e2d [177851.513362] Code: Unable to access opcode bytes at 0x7fa368dd8e03. [177851.513363] RSP: 002b:00007ffc8fab4678 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7 [177851.513367] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa368dd8e2d [177851.513369] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177851.513371] RBP: 0000000000000001 R08: 0000000005460010 R09: 0000000000000000 [177851.513373] R10: 00007fa368d155c0 R11: 0000000000000206 R12: 0000000000000000 [177851.513375] R13: 00007ffc8fab4b88 R14: 0000000003830fa0 R15: 0000000003830f38 [177851.513378] [177851.513398] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:396a06067 [177851.513402] page:000000006f99d478 refcount:0 mapcount:-7 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177851.513405] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.513486] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.513489] page_type: 0xfffffff8() [177851.513492] raw: 0affff18000020ce dead000000000100 dead000000000122 ffff92836aad07e0 [177851.513495] raw: 000000000000047e 0000000000000001 fffffffffffffff8 0000000000000000 [177851.513496] page dumped because: bad pte [177851.513497] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177851.513500] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.513686] CPU: 57 PID: 2061231 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.513689] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.513690] Call Trace: [177851.513692] [177851.513694] dump_stack_lvl+0x47/0x60 [177851.513698] print_bad_pte+0x1bc/0x280 [177851.513701] ? page_remove_rmap+0x8d/0x260 [177851.513705] unmap_page_range+0xa96/0x1150 [177851.513711] unmap_vmas+0xf8/0x190 [177851.513715] exit_mmap+0xe4/0x310 [177851.513721] __mmput+0x3e/0x130 [177851.513725] do_exit+0x31c/0xb20 [177851.513728] do_group_exit+0x31/0x80 [177851.513731] __x64_sys_exit_group+0x18/0x20 [177851.513733] do_syscall_64+0x60/0x90 [177851.513737] ? do_user_addr_fault+0x225/0x640 [177851.513741] ? exc_page_fault+0x7f/0x180 [177851.513745] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.513748] RIP: 0033:0x7fa368dd8e2d [177851.513758] Code: Unable to access opcode bytes at 0x7fa368dd8e03. [177851.513760] RSP: 002b:00007ffc8fab4678 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7 [177851.513763] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa368dd8e2d [177851.513765] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177851.513767] RBP: 0000000000000001 R08: 0000000005460010 R09: 0000000000000000 [177851.513769] R10: 00007fa368d155c0 R11: 0000000000000206 R12: 0000000000000000 [177851.513771] R13: 00007ffc8fab4b88 R14: 0000000003830fa0 R15: 0000000003830f38 [177851.513775] [177851.529366] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:994015067 [177851.529374] page:000000007415dd6c refcount:-7 mapcount:-8 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177851.529379] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.529475] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.529479] page_type: 0xfffffff7() [177851.529482] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177851.529484] raw: 000000000000047d 0000000000000001 fffffff9fffffff7 0000000000000000 [177851.529485] page dumped because: bad pte [177851.529486] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177851.529489] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.529665] CPU: 42 PID: 2061113 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.529668] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.529670] Call Trace: [177851.529673] [177851.529676] dump_stack_lvl+0x47/0x60 [177851.529683] print_bad_pte+0x1bc/0x280 [177851.529688] ? page_remove_rmap+0x8d/0x260 [177851.529693] unmap_page_range+0xa96/0x1150 [177851.529700] unmap_vmas+0xf8/0x190 [177851.529705] exit_mmap+0xe4/0x310 [177851.529711] __mmput+0x3e/0x130 [177851.529717] do_exit+0x31c/0xb20 [177851.529720] ? count_memcg_events.constprop.0+0x1a/0x30 [177851.529723] ? handle_mm_fault+0x9e/0x350 [177851.529728] do_group_exit+0x31/0x80 [177851.529730] __x64_sys_exit_group+0x18/0x20 [177851.529733] do_syscall_64+0x60/0x90 [177851.529739] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.529744] RIP: 0033:0x7fd5cb51ce2d [177851.529775] Code: Unable to access opcode bytes at 0x7fd5cb51ce03. [177851.529776] RSP: 002b:00007ffde86be088 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7 [177851.529780] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd5cb51ce2d [177851.529782] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177851.529783] RBP: 0000000000000001 R08: 00000000057e9010 R09: 0000000000000000 [177851.529785] R10: 00007fd5cb4595c0 R11: 0000000000000206 R12: 0000000000000000 [177851.529786] R13: 00007ffde86be5b0 R14: 0000000003830fa0 R15: 0000000003830f38 [177851.529790] [177851.529792] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:994015067 [177851.529794] page:000000006f99d478 refcount:-1 mapcount:-8 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177851.529797] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.529872] flags: 0xaffff18000020ce(waiters|referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.529874] page_type: 0xfffffff7() [177851.529877] raw: 0affff18000020cf dead000000000100 dead000000000122 ffff92836aad07e0 [177851.529879] raw: 000000000000047e 0000000000000001 fffffffffffffff7 0000000000000000 [177851.529880] page dumped because: bad pte [177851.529881] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177851.529884] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.530074] CPU: 42 PID: 2061113 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.530078] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.530079] Call Trace: [177851.530081] [177851.530082] dump_stack_lvl+0x47/0x60 [177851.530087] print_bad_pte+0x1bc/0x280 [177851.530090] ? page_remove_rmap+0x8d/0x260 [177851.530094] unmap_page_range+0xa96/0x1150 [177851.530099] unmap_vmas+0xf8/0x190 [177851.530103] exit_mmap+0xe4/0x310 [177851.530108] __mmput+0x3e/0x130 [177851.530112] do_exit+0x31c/0xb20 [177851.530114] ? count_memcg_events.constprop.0+0x1a/0x30 [177851.530117] ? handle_mm_fault+0x9e/0x350 [177851.530121] do_group_exit+0x31/0x80 [177851.530124] __x64_sys_exit_group+0x18/0x20 [177851.530126] do_syscall_64+0x60/0x90 [177851.530130] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.530134] RIP: 0033:0x7fd5cb51ce2d [177851.530141] Code: Unable to access opcode bytes at 0x7fd5cb51ce03. [177851.530142] RSP: 002b:00007ffde86be088 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7 [177851.530145] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd5cb51ce2d [177851.530147] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177851.530149] RBP: 0000000000000001 R08: 00000000057e9010 R09: 0000000000000000 [177851.530150] R10: 00007fd5cb4595c0 R11: 0000000000000206 R12: 0000000000000000 [177851.530152] R13: 00007ffde86be5b0 R14: 0000000003830fa0 R15: 0000000003830f38 [177851.530154] [177851.623873] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:125f89067 [177851.623881] page:000000007415dd6c refcount:-8 mapcount:-9 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177851.623886] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.623989] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177851.623993] page_type: 0xfffffff6() [177851.623996] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177851.623998] raw: 000000000000047d 0000000000000001 fffffff8fffffff6 0000000000000000 [177851.623999] page dumped because: bad pte [177851.624000] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177851.624003] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.624179] CPU: 9 PID: 2061278 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.624183] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.624185] Call Trace: [177851.624190] [177851.624192] dump_stack_lvl+0x47/0x60 [177851.624199] print_bad_pte+0x1bc/0x280 [177851.624204] ? page_remove_rmap+0x8d/0x260 [177851.624209] unmap_page_range+0xa96/0x1150 [177851.624216] unmap_vmas+0xf8/0x190 [177851.624221] exit_mmap+0xe4/0x310 [177851.624227] __mmput+0x3e/0x130 [177851.624233] do_exit+0x31c/0xb20 [177851.624237] do_group_exit+0x31/0x80 [177851.624240] __x64_sys_exit_group+0x18/0x20 [177851.624243] do_syscall_64+0x60/0x90 [177851.624248] ? __count_memcg_events+0x42/0x90 [177851.624254] ? count_memcg_events.constprop.0+0x1a/0x30 [177851.624256] ? handle_mm_fault+0x9e/0x350 [177851.624261] ? do_user_addr_fault+0x225/0x640 [177851.624266] ? exc_page_fault+0x7f/0x180 [177851.624271] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.624276] RIP: 0033:0x7f1c50a9de2d [177851.624308] Code: Unable to access opcode bytes at 0x7f1c50a9de03. [177851.624310] RSP: 002b:00007ffcf91ca858 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [177851.624313] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1c50a9de2d [177851.624315] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177851.624317] RBP: 0000000000000001 R08: 00000000041cd010 R09: 0000000000000000 [177851.624318] R10: 00007f1c509da5c0 R11: 0000000000000202 R12: 0000000000000000 [177851.624320] R13: 00007ffcf91cadc8 R14: 0000000003830fa0 R15: 0000000003830f38 [177851.624323] [177851.624325] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:125f89067 [177851.624328] page:000000006f99d478 refcount:-2 mapcount:-9 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177851.624332] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177851.624407] flags: 0xaffff18000020cf(locked|waiters|referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid= [177851.624411] page_type: 0xfffffff6() [177851.624413] raw: 0affff18000020ce dead000000000100 dead000000000122 ffff92836aad07e0 [177851.624416] raw: 000000000000047e 0000000000000001 fffffffefffffff6 0000000000000000 [177851.624417] page dumped because: bad pte [177851.624418] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177851.624421] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177851.624592] CPU: 9 PID: 2061278 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177851.624595] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177851.624596] Call Trace: [177851.624597] [177851.624598] dump_stack_lvl+0x47/0x60 [177851.624602] print_bad_pte+0x1bc/0x280 [177851.624606] ? page_remove_rmap+0x8d/0x260 [177851.624610] unmap_page_range+0xa96/0x1150 [177851.624615] unmap_vmas+0xf8/0x190 [177851.624619] exit_mmap+0xe4/0x310 [177851.624625] __mmput+0x3e/0x130 [177851.624629] do_exit+0x31c/0xb20 [177851.624632] do_group_exit+0x31/0x80 [177851.624635] __x64_sys_exit_group+0x18/0x20 [177851.624638] do_syscall_64+0x60/0x90 [177851.624641] ? __count_memcg_events+0x42/0x90 [177851.624645] ? count_memcg_events.constprop.0+0x1a/0x30 [177851.624648] ? handle_mm_fault+0x9e/0x350 [177851.624653] ? do_user_addr_fault+0x225/0x640 [177851.624657] ? exc_page_fault+0x7f/0x180 [177851.624661] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177851.624664] RIP: 0033:0x7f1c50a9de2d [177851.624672] Code: Unable to access opcode bytes at 0x7f1c50a9de03. [177851.624674] RSP: 002b:00007ffcf91ca858 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [177851.624677] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1c50a9de2d [177851.624678] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177851.624680] RBP: 0000000000000001 R08: 00000000041cd010 R09: 0000000000000000 [177851.624682] R10: 00007f1c509da5c0 R11: 0000000000000202 R12: 0000000000000000 [177851.624683] R13: 00007ffcf91cadc8 R14: 0000000003830fa0 R15: 0000000003830f38 [177851.624687] [177852.691890] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:396671067 [177852.691901] page:000000007415dd6c refcount:-9 mapcount:-10 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177852.691909] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177852.692039] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177852.692044] page_type: 0xfffffff5() [177852.692049] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177852.692052] raw: 000000000000047d 0000000000000001 fffffff7fffffff5 0000000000000000 [177852.692055] page dumped because: bad pte [177852.692057] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177852.692062] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177852.692281] CPU: 39 PID: 2055786 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177852.692287] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177852.692288] Call Trace: [177852.692292] [177852.692299] dump_stack_lvl+0x47/0x60 [177852.692307] print_bad_pte+0x1bc/0x280 [177852.692314] ? page_remove_rmap+0x8d/0x260 [177852.692320] unmap_page_range+0xa96/0x1150 [177852.692329] unmap_vmas+0xf8/0x190 [177852.692336] exit_mmap+0xe4/0x310 [177852.692345] __mmput+0x3e/0x130 [177852.692352] do_exit+0x31c/0xb20 [177852.692357] do_group_exit+0x31/0x80 [177852.692361] __x64_sys_exit_group+0x18/0x20 [177852.692364] do_syscall_64+0x60/0x90 [177852.692370] ? do_user_addr_fault+0x225/0x640 [177852.692377] ? exc_page_fault+0x7f/0x180 [177852.692384] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177852.692390] RIP: 0033:0x7f902c58de2d [177852.692431] Code: Unable to access opcode bytes at 0x7f902c58de03. [177852.692434] RSP: 002b:00007ffe8ee402f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [177852.692439] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f902c58de2d [177852.692441] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177852.692443] RBP: 0000000000000001 R08: 00000000044b7010 R09: 0000000000000000 [177852.692446] R10: 00007f902c4ca5c0 R11: 0000000000000202 R12: 0000000000000000 [177852.692449] R13: 00007ffe8ee40590 R14: 0000000003830fa0 R15: 0000000003830f38 [177852.692453] [177852.692459] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:396671067 [177852.692462] page:000000006f99d478 refcount:-4 mapcount:-10 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177852.692467] aops:btrfs_aops [btrfs] ino:1f6d7e19 dentry name:"libc_malloc_debug.so" [177852.692569] flags: 0xaffff18000020ce(waiters|referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177852.692573] page_type: 0xfffffff5() [177852.692577] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177852.692580] raw: 000000000000047e 0000000000000001 fffffffcfffffff5 0000000000000000 [177852.692581] page dumped because: bad pte [177852.692583] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177852.692587] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177852.692799] CPU: 39 PID: 2055786 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177852.692803] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177852.692805] Call Trace: [177852.692807] [177852.692809] dump_stack_lvl+0x47/0x60 [177852.692814] print_bad_pte+0x1bc/0x280 [177852.692818] ? page_remove_rmap+0x8d/0x260 [177852.692823] unmap_page_range+0xa96/0x1150 [177852.692830] unmap_vmas+0xf8/0x190 [177852.692836] exit_mmap+0xe4/0x310 [177852.692842] __mmput+0x3e/0x130 [177852.692847] do_exit+0x31c/0xb20 [177852.692851] do_group_exit+0x31/0x80 [177852.692854] __x64_sys_exit_group+0x18/0x20 [177852.692857] do_syscall_64+0x60/0x90 [177852.692862] ? do_user_addr_fault+0x225/0x640 [177852.692867] ? exc_page_fault+0x7f/0x180 [177852.692873] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177852.692878] RIP: 0033:0x7f902c58de2d [177852.692887] Code: Unable to access opcode bytes at 0x7f902c58de03. [177852.692889] RSP: 002b:00007ffe8ee402f8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [177852.692893] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f902c58de2d [177852.692895] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177852.692898] RBP: 0000000000000001 R08: 00000000044b7010 R09: 0000000000000000 [177852.692900] R10: 00007f902c4ca5c0 R11: 0000000000000202 R12: 0000000000000000 [177852.692902] R13: 00007ffe8ee40590 R14: 0000000003830fa0 R15: 0000000003830f38 [177852.692907] [177853.011596] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:3f7269067 [177853.011606] page:000000007415dd6c refcount:-10 mapcount:-11 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177853.011613] aops:btrfs_aops [btrfs] ino:1f6d7e19 [177853.011748] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177853.011753] page_type: 0xfffffff4() [177853.011758] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177853.011762] raw: 000000000000047d 0000000000000001 fffffff6fffffff4 0000000000000000 [177853.011764] page dumped because: bad pte [177853.011766] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177853.011770] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177853.012026] CPU: 10 PID: 2055329 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177853.012032] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177853.012034] Call Trace: [177853.012039] [177853.012044] dump_stack_lvl+0x47/0x60 [177853.012051] print_bad_pte+0x1bc/0x280 [177853.012057] ? page_remove_rmap+0x8d/0x260 [177853.012065] unmap_page_range+0xa96/0x1150 [177853.012075] unmap_vmas+0xf8/0x190 [177853.012082] exit_mmap+0xe4/0x310 [177853.012091] __mmput+0x3e/0x130 [177853.012099] do_exit+0x31c/0xb20 [177853.012105] do_group_exit+0x31/0x80 [177853.012109] get_signal+0x9a5/0x9e0 [177853.012118] arch_do_signal_or_restart+0x3e/0x270 [177853.012126] exit_to_user_mode_prepare+0x185/0x1e0 [177853.012133] irqentry_exit_to_user_mode+0x9/0x30 [177853.012138] asm_exc_general_protection+0x26/0x30 [177853.012144] RIP: 0033:0x21ef9cf [177853.012177] Code: Unable to access opcode bytes at 0x21ef9a5. [177853.012179] RSP: 002b:00007fff898cf7c0 EFLAGS: 00010297 [177853.012184] RAX: 0000000000000000 RBX: 0000000006c90190 RCX: 0000000000000000 [177853.012187] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [177853.012189] RBP: 0000000000000001 R08: 0000000006c8c660 R09: 00007fff898cfaf0 [177853.012191] R10: 0000000006c8c640 R11: 00007fff898cfae0 R12: 0000000006c8c620 [177853.012194] R13: 0000000006c8c640 R14: 0000000000000000 R15: 0000000000000000 [177853.012198] [177853.012210] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:3f7269067 [177853.012214] page:000000006f99d478 refcount:-5 mapcount:-11 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177853.012219] aops:btrfs_aops [btrfs] ino:1f6d7e19 [177853.012341] flags: 0xaffff18000020cf(locked|waiters|referenced|uptodate|dirty|workingset|private|node=1|zone=2|last [177853.012347] page_type: 0xfffffff4() [177853.012353] raw: 0affff180000204f dead000000000100 dead000000000122 ffff92836aad07e0 [177853.012358] raw: 000000000000047e 0000000000000001 fffffffafffffff4 0000000000000000 [177853.012360] page dumped because: bad pte [177853.012362] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177853.012366] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177853.012608] CPU: 10 PID: 2055329 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177853.012614] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177853.012615] Call Trace: [177853.012617] [177853.012620] dump_stack_lvl+0x47/0x60 [177853.012626] print_bad_pte+0x1bc/0x280 [177853.012631] ? page_remove_rmap+0x8d/0x260 [177853.012636] unmap_page_range+0xa96/0x1150 [177853.012643] unmap_vmas+0xf8/0x190 [177853.012650] exit_mmap+0xe4/0x310 [177853.012658] __mmput+0x3e/0x130 [177853.012663] do_exit+0x31c/0xb20 [177853.012667] do_group_exit+0x31/0x80 [177853.012671] get_signal+0x9a5/0x9e0 [177853.012678] arch_do_signal_or_restart+0x3e/0x270 [177853.012684] exit_to_user_mode_prepare+0x185/0x1e0 [177853.012689] irqentry_exit_to_user_mode+0x9/0x30 [177853.012694] asm_exc_general_protection+0x26/0x30 [177853.012698] RIP: 0033:0x21ef9cf [177853.012711] Code: Unable to access opcode bytes at 0x21ef9a5. [177853.012713] RSP: 002b:00007fff898cf7c0 EFLAGS: 00010297 [177853.012717] RAX: 0000000000000000 RBX: 0000000006c90190 RCX: 0000000000000000 [177853.012720] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [177853.012721] RBP: 0000000000000001 R08: 0000000006c8c660 R09: 00007fff898cfaf0 [177853.012723] R10: 0000000006c8c640 R11: 00007fff898cfae0 R12: 0000000006c8c620 [177853.012726] R13: 0000000006c8c640 R14: 0000000000000000 R15: 0000000000000000 [177853.012731] [177853.028610] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:38fff4067 [177853.028617] page:000000007415dd6c refcount:-11 mapcount:-12 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177853.028622] aops:btrfs_aops [btrfs] ino:1f6d7e19 [177853.028717] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177853.028722] page_type: 0xfffffff3() [177853.028728] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177853.028731] raw: 000000000000047d 0000000000000001 fffffff5fffffff3 0000000000000000 [177853.028732] page dumped because: bad pte [177853.028733] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177853.028736] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177853.028906] CPU: 57 PID: 2055207 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177853.028910] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177853.028912] Call Trace: [177853.028916] [177853.028920] dump_stack_lvl+0x47/0x60 [177853.028927] print_bad_pte+0x1bc/0x280 [177853.028933] ? page_remove_rmap+0x8d/0x260 [177853.028938] unmap_page_range+0xa96/0x1150 [177853.028945] unmap_vmas+0xf8/0x190 [177853.028949] exit_mmap+0xe4/0x310 [177853.028956] __mmput+0x3e/0x130 [177853.028963] do_exit+0x31c/0xb20 [177853.028967] do_group_exit+0x31/0x80 [177853.028970] get_signal+0x9a5/0x9e0 [177853.028978] arch_do_signal_or_restart+0x3e/0x270 [177853.028984] exit_to_user_mode_prepare+0x185/0x1e0 [177853.028990] irqentry_exit_to_user_mode+0x9/0x30 [177853.028994] asm_exc_page_fault+0x26/0x30 [177853.029000] RIP: 0033:0x0 [177853.029030] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [177853.029032] RSP: 002b:00007ffda3c33780 EFLAGS: 00010293 [177853.029036] RAX: 0000000000000020 RBX: 00000000000000c0 RCX: 0000000000000005 [177853.029037] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000021 [177853.029039] RBP: 0000000000000021 R08: 0000000007049580 R09: 00007ffda3c33ab0 [177853.029041] R10: 0000000007049560 R11: 00007ffda3c33aa0 R12: 0000000007049540 [177853.029043] R13: 0000000007049560 R14: 0000000010e3bad0 R15: 0000000010e3bad0 [177853.029046] [177853.029048] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:38fff4067 [177853.029051] page:000000006f99d478 refcount:-8 mapcount:-12 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177853.029055] aops:btrfs_aops [btrfs] ino:1f6d7e19 [177853.029129] flags: 0xaffff180000204f(locked|referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0 [177853.029132] page_type: 0xfffffff3() [177853.029135] raw: 0affff18000020ce dead000000000100 dead000000000122 ffff92836aad07e0 [177853.029138] raw: 000000000000047e 0000000000000001 fffffffafffffff3 0000000000000000 [177853.029138] page dumped because: bad pte [177853.029139] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177853.029141] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177853.029307] CPU: 57 PID: 2055207 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177853.029310] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177853.029311] Call Trace: [177853.029313] [177853.029314] dump_stack_lvl+0x47/0x60 [177853.029319] print_bad_pte+0x1bc/0x280 [177853.029322] ? page_remove_rmap+0x8d/0x260 [177853.029326] unmap_page_range+0xa96/0x1150 [177853.029331] unmap_vmas+0xf8/0x190 [177853.029335] exit_mmap+0xe4/0x310 [177853.029341] __mmput+0x3e/0x130 [177853.029345] do_exit+0x31c/0xb20 [177853.029348] do_group_exit+0x31/0x80 [177853.029350] get_signal+0x9a5/0x9e0 [177853.029355] arch_do_signal_or_restart+0x3e/0x270 [177853.029359] exit_to_user_mode_prepare+0x185/0x1e0 [177853.029363] irqentry_exit_to_user_mode+0x9/0x30 [177853.029366] asm_exc_page_fault+0x26/0x30 [177853.029369] RIP: 0033:0x0 [177853.029377] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [177853.029378] RSP: 002b:00007ffda3c33780 EFLAGS: 00010293 [177853.029380] RAX: 0000000000000020 RBX: 00000000000000c0 RCX: 0000000000000005 [177853.029382] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000021 [177853.029384] RBP: 0000000000000021 R08: 0000000007049580 R09: 00007ffda3c33ab0 [177853.029386] R10: 0000000007049560 R11: 00007ffda3c33aa0 R12: 0000000007049540 [177853.029387] R13: 0000000007049560 R14: 0000000010e3bad0 R15: 0000000010e3bad0 [177853.029391] [177858.723275] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:1420aa067 [177858.723283] page:000000007415dd6c refcount:-12 mapcount:-13 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177858.723288] aops:btrfs_aops [btrfs] ino:1f6d7e19 [177858.723406] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177858.723411] page_type: 0xfffffff2() [177858.723415] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177858.723417] raw: 000000000000047d 0000000000000001 fffffff4fffffff2 0000000000000000 [177858.723418] page dumped because: bad pte [177858.723419] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177858.723423] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177858.723578] CPU: 56 PID: 2067993 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177858.723582] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177858.723584] Call Trace: [177858.723588] [177858.723592] dump_stack_lvl+0x47/0x60 [177858.723599] print_bad_pte+0x1bc/0x280 [177858.723604] ? page_remove_rmap+0x8d/0x260 [177858.723609] unmap_page_range+0xa96/0x1150 [177858.723615] unmap_vmas+0xf8/0x190 [177858.723620] exit_mmap+0xe4/0x310 [177858.723627] __mmput+0x3e/0x130 [177858.723633] do_exit+0x31c/0xb20 [177858.723637] do_group_exit+0x31/0x80 [177858.723640] get_signal+0x9a5/0x9e0 [177858.723666] arch_do_signal_or_restart+0x3e/0x270 [177858.723671] exit_to_user_mode_prepare+0x185/0x1e0 [177858.723678] syscall_exit_to_user_mode+0x1b/0x40 [177858.723684] do_syscall_64+0x6c/0x90 [177858.723688] ? syscall_exit_to_user_mode+0x2b/0x40 [177858.723691] ? do_syscall_64+0x6c/0x90 [177858.723694] ? syscall_exit_to_user_mode+0x2b/0x40 [177858.723697] ? do_syscall_64+0x6c/0x90 [177858.723700] ? do_futex+0x128/0x190 [177858.723704] ? __x64_sys_futex+0x129/0x1e0 [177858.723708] ? native_flush_tlb_local+0x34/0x40 [177858.723712] ? flush_tlb_func+0xd9/0x1f0 [177858.723716] ? switch_fpu_return+0x50/0xe0 [177858.723721] ? sched_clock+0x10/0x30 [177858.723723] ? sched_clock_cpu+0xf/0x190 [177858.723727] ? irqtime_account_irq+0x40/0xc0 [177858.723731] ? __irq_exit_rcu+0x4b/0xc0 [177858.723735] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177858.723740] RIP: 0033:0x7ff5353785cb [177858.723770] Code: Unable to access opcode bytes at 0x7ff5353785a1. [177858.723771] RSP: 002b:00007ff4fe7fbed8 EFLAGS: 00000206 ORIG_RAX: 000000000000001c [177858.723774] RAX: 0000000000000000 RBX: 00007ff4fe7fccdc RCX: 00007ff5353785cb [177858.723776] RDX: 0000000000000004 RSI: 00000000007fb000 RDI: 00007ff4fdffc000 [177858.723778] RBP: 00007ff4fdffc000 R08: 00007ff4fe7fc6c0 R09: 0000000000000007 [177858.723779] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000801000 [177858.723782] R13: 0000000000000000 R14: 00007ff521ffac80 R15: 00007ff4fdffc000 [177858.723785] [177858.723815] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:1420aa067 [177858.723818] page:000000006f99d478 refcount:-6 mapcount:-13 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177858.723820] aops:btrfs_aops [btrfs] ino:1f6d7e19 [177858.723888] flags: 0xaffff18000020ce(waiters|referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid= [177858.723892] page_type: 0xfffffff2() [177858.723894] raw: 0affff18000020ce dead000000000100 dead000000000122 ffff92836aad07e0 [177858.723897] raw: 000000000000047e 0000000000000001 fffffffafffffff2 0000000000000000 [177858.723898] page dumped because: bad pte [177858.723899] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177858.723901] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177858.724055] CPU: 56 PID: 2067993 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177858.724057] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177858.724059] Call Trace: [177858.724060] [177858.724073] dump_stack_lvl+0x47/0x60 [177858.724077] print_bad_pte+0x1bc/0x280 [177858.724080] ? page_remove_rmap+0x8d/0x260 [177858.724084] unmap_page_range+0xa96/0x1150 [177858.724088] unmap_vmas+0xf8/0x190 [177858.724092] exit_mmap+0xe4/0x310 [177858.724109] __mmput+0x3e/0x130 [177858.724112] do_exit+0x31c/0xb20 [177858.724115] do_group_exit+0x31/0x80 [177858.724117] get_signal+0x9a5/0x9e0 [177858.724121] arch_do_signal_or_restart+0x3e/0x270 [177858.724125] exit_to_user_mode_prepare+0x185/0x1e0 [177858.724128] syscall_exit_to_user_mode+0x1b/0x40 [177858.724131] do_syscall_64+0x6c/0x90 [177858.724134] ? syscall_exit_to_user_mode+0x2b/0x40 [177858.724138] ? do_syscall_64+0x6c/0x90 [177858.724141] ? syscall_exit_to_user_mode+0x2b/0x40 [177858.724144] ? do_syscall_64+0x6c/0x90 [177858.724147] ? do_futex+0x128/0x190 [177858.724150] ? __x64_sys_futex+0x129/0x1e0 [177858.724154] ? native_flush_tlb_local+0x34/0x40 [177858.724157] ? flush_tlb_func+0xd9/0x1f0 [177858.724160] ? switch_fpu_return+0x50/0xe0 [177858.724163] ? sched_clock+0x10/0x30 [177858.724164] ? sched_clock_cpu+0xf/0x190 [177858.724167] ? irqtime_account_irq+0x40/0xc0 [177858.724170] ? __irq_exit_rcu+0x4b/0xc0 [177858.724173] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177858.724176] RIP: 0033:0x7ff5353785cb [177858.724182] Code: Unable to access opcode bytes at 0x7ff5353785a1. [177858.724183] RSP: 002b:00007ff4fe7fbed8 EFLAGS: 00000206 ORIG_RAX: 000000000000001c [177858.724186] RAX: 0000000000000000 RBX: 00007ff4fe7fccdc RCX: 00007ff5353785cb [177858.724188] RDX: 0000000000000004 RSI: 00000000007fb000 RDI: 00007ff4fdffc000 [177858.724189] RBP: 00007ff4fdffc000 R08: 00007ff4fe7fc6c0 R09: 0000000000000007 [177858.724191] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000801000 [177858.724192] R13: 0000000000000000 R14: 00007ff521ffac80 R15: 00007ff4fdffc000 [177858.724195] [177859.266261] BUG: Bad page map in process ld.lld pte:8000000edacc4025 pmd:896eac067 [177859.266268] page:000000007415dd6c refcount:-13 mapcount:-14 mapping:000000005d015134 index:0x47d pfn:0xedacc4 [177859.266272] aops:btrfs_aops [btrfs] ino:1f6d7e19 [177859.266340] flags: 0xaffff180000204e(referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177859.266343] page_type: 0xfffffff1() [177859.266346] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177859.266348] raw: 000000000000047d 0000000000000001 fffffff3fffffff1 0000000000000000 [177859.266348] page dumped because: bad pte [177859.266349] addr:0000000001275000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1075 [177859.266351] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177859.266468] CPU: 41 PID: 1974491 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177859.266471] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177859.266472] Call Trace: [177859.266474] [177859.266477] dump_stack_lvl+0x47/0x60 [177859.266482] print_bad_pte+0x1bc/0x280 [177859.266485] ? page_remove_rmap+0x8d/0x260 [177859.266489] unmap_page_range+0xa96/0x1150 [177859.266494] unmap_vmas+0xf8/0x190 [177859.266497] exit_mmap+0xe4/0x310 [177859.266501] __mmput+0x3e/0x130 [177859.266506] do_exit+0x31c/0xb20 [177859.266509] do_group_exit+0x31/0x80 [177859.266511] __x64_sys_exit_group+0x18/0x20 [177859.266513] do_syscall_64+0x60/0x90 [177859.266517] ? __count_memcg_events+0x42/0x90 [177859.266521] ? count_memcg_events.constprop.0+0x1a/0x30 [177859.266523] ? handle_mm_fault+0x9e/0x350 [177859.266526] ? do_user_addr_fault+0x225/0x640 [177859.266530] ? exc_page_fault+0x7f/0x180 [177859.266534] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177859.266538] RIP: 0033:0x7f7f73145e2d [177859.266563] Code: Unable to access opcode bytes at 0x7f7f73145e03. [177859.266564] RSP: 002b:00007ffe6a1ec908 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [177859.266566] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7f73145e2d [177859.266567] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177859.266568] RBP: 0000000000000001 R08: 0000000005166010 R09: 0000000000000000 [177859.266569] R10: 00007f7f730825c0 R11: 0000000000000202 R12: 0000000000000000 [177859.266570] R13: 00007ffe6a1ecd90 R14: 0000000003830fa0 R15: 0000000003830f38 [177859.266573] [177859.266574] BUG: Bad page map in process ld.lld pte:8000000edacc5025 pmd:896eac067 [177859.266576] page:000000006f99d478 refcount:-7 mapcount:-14 mapping:000000005d015134 index:0x47e pfn:0xedacc5 [177859.266578] aops:btrfs_aops [btrfs] ino:1f6d7e19 [177859.266628] flags: 0xaffff18000020ce(waiters|referenced|uptodate|dirty|workingset|private|node=1|zone=2|lastcpupid=0xffff) [177859.266630] page_type: 0xfffffff1() [177859.266634] raw: 0affff180000204e dead000000000100 dead000000000122 ffff92836aad07e0 [177859.266635] raw: 000000000000047e 0000000000000001 fffffff9fffffff1 0000000000000000 [177859.266635] page dumped because: bad pte [177859.266636] addr:0000000001276000 vm_flags:08000071 anon_vma:0000000000000000 mapping:ffff928202a9fc10 index:1076 [177859.266638] file:lld fault:filemap_fault mmap:btrfs_file_mmap [btrfs] read_folio:btrfs_read_folio [btrfs] [177859.266786] CPU: 41 PID: 1974491 Comm: ld.lld Tainted: G B OE 6.5.4-arch2-1 #1 a30a3b4701899b64bf6025fd97642e50bf2dcad4 [177859.266789] Hardware name: JGINYUE X99-8D3/2.5G Server/X99-8D3/2.5G Server, BIOS 5.11 06/30/2022 [177859.266790] Call Trace: [177859.266791] [177859.266792] dump_stack_lvl+0x47/0x60 [177859.266795] print_bad_pte+0x1bc/0x280 [177859.266798] ? page_remove_rmap+0x8d/0x260 [177859.266801] unmap_page_range+0xa96/0x1150 [177859.266804] unmap_vmas+0xf8/0x190 [177859.266807] exit_mmap+0xe4/0x310 [177859.266812] __mmput+0x3e/0x130 [177859.266814] do_exit+0x31c/0xb20 [177859.266817] do_group_exit+0x31/0x80 [177859.266819] __x64_sys_exit_group+0x18/0x20 [177859.266821] do_syscall_64+0x60/0x90 [177859.266824] ? __count_memcg_events+0x42/0x90 [177859.266826] ? count_memcg_events.constprop.0+0x1a/0x30 [177859.266828] ? handle_mm_fault+0x9e/0x350 [177859.266831] ? do_user_addr_fault+0x225/0x640 [177859.266834] ? exc_page_fault+0x7f/0x180 [177859.266836] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [177859.266839] RIP: 0033:0x7f7f73145e2d [177859.266845] Code: Unable to access opcode bytes at 0x7f7f73145e03. [177859.266845] RSP: 002b:00007ffe6a1ec908 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [177859.266847] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7f73145e2d [177859.266849] RDX: 00000000000000e7 RSI: ffffffffffffff60 RDI: 0000000000000000 [177859.266850] RBP: 0000000000000001 R08: 0000000005166010 R09: 0000000000000000 [177859.266851] R10: 00007f7f730825c0 R11: 0000000000000202 R12: 0000000000000000 [177859.266852] R13: 00007ffe6a1ecd90 R14: 0000000003830fa0 R15: 0000000003830f38 [177859.266855] [178085.024910] wpscloudsvr[2074490]: segfault at 17a ip 00007f2ade443272 sp 00007ffd1ead6770 error 6 in libqingbangong.so[7f2ade246000+1aef000] likely on CPU 46 (core 17, socket 0) [178085.024921] Code: 00 74 27 44 0f b7 35 15 01 a5 01 0f b7 05 10 01 a5 01 41 0f b7 f6 66 89 44 24 36 0f b7 d0 bf 01 00 00 00 e8 90 99 8e 01 eb 00 <45> 88 af 7a 01 00 00 48 8b bc 24 90 00 00 00 e8 6a 7b 19 00 84 c0