Bug 713445

Summary: [abrt] kernel: BUG: Bad page map in process gnome-system-mo pte:ffff88030d6625a0 pmd:113033067
Product: Red Hat Enterprise Linux 6 Reporter: Red Hat Case Diagnostics <case-diagnostics>
Component: kernelAssignee: Red Hat Kernel Manager <kernel-mgr>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Red Hat Kernel QE team <kernel-qe>
Severity: medium Docs Contact:
Priority: medium    
Version: 6.0CC: jwest
Target Milestone: rc   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:788166244
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-10-05 22:19:14 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
File: backtrace none

Description Red Hat Case Diagnostics 2011-06-15 12:58:44 UTC
This description generated by Andreas from an ABRT report
architecture: x86_64
cmdline: not_applicable
component: kernel
executable: kernel
kernel: 2.6.32-71.el6.x86_64
package: kernel
reason: BUG: Bad page map in process gnome-system-mo  pte:ffff88030d6625a0 pmd:113033067
release: Red Hat Enterprise Linux Workstation release 6.0 (Santiago)
reproduce: 1.Closing a installed programm RH crashes
2.
3.

time: 1307537449
uid: 0
backtrace: BUG: Bad page map in process gnome-system-mo  pte:ffff88030d6625a0 pmd:113033067
addr:00007fd7f6015000 vm_flags:00200077 anon_vma:ffff8801d72b8380 mapping:(null) index:7fd7f6015
Pid: 8273, comm: gnome-system-mo Tainted: P    B      ----------------  2.6.32-71.el6.x86_64 #1
Call Trace:
[<ffffffff81130eb5>] print_bad_pte+0x1d5/0x280
[<ffffffff81130fcb>] vm_normal_page+0x6b/0x70
[<ffffffff811ce584>] smaps_pte_range+0x104/0x1e0
[<ffffffff81143e90>] walk_page_range+0x290/0x420
[<ffffffff811cec35>] show_smap+0x175/0x180
[<ffffffff814c9d36>] ? down_read+0x16/0x30
[<ffffffff811ce480>] ? smaps_pte_range+0x0/0x1e0
[<ffffffff8118ea17>] seq_read+0x267/0x3f0
[<ffffffff8116d085>] vfs_read+0xb5/0x1a0
[<ffffffff8116d1ab>] ? sys_read+0x3b/0x90
[<ffffffff8116d1c1>] sys_read+0x51/0x90
[<ffffffff81013172>] system_call_fastpath+0x16/0x1b

Comment 2 Red Hat Case Diagnostics 2011-06-15 12:59:19 UTC
Created attachment 504871 [details]
File: backtrace

Comment 5 Jeremy West 2011-10-05 22:19:14 UTC
Closing this bug, since the associated customer case has closed.  Please feel free to re-open this if new information becomes available.