Bug 713439 - [abrt] kernel: BUG: Bad page map in process java pte:ffff88030d662580 pmd:113033067
Summary: [abrt] kernel: BUG: Bad page map in process java pte:ffff88030d662580 pmd:11...
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel
Version: 6.0
Hardware: x86_64
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Red Hat Kernel Manager
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard: abrt_hash:1010014025
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-06-15 12:55 UTC by Red Hat Case Diagnostics
Modified: 2018-11-14 12:01 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-10-05 22:18:21 UTC
Target Upstream Version:


Attachments (Terms of Use)
File: backtrace (1.04 KB, text/plain)
2011-06-15 12:56 UTC, Red Hat Case Diagnostics
no flags Details

Description Red Hat Case Diagnostics 2011-06-15 12:55:24 UTC
This description generated by Andreas from an ABRT report
architecture: x86_64
cmdline: not_applicable
component: kernel
executable: kernel
kernel: 2.6.32-71.el6.x86_64
package: kernel
reason: BUG: Bad page map in process java  pte:ffff88030d662580 pmd:113033067
release: Red Hat Enterprise Linux Workstation release 6.0 (Santiago)
reproduce: 1. Closing a installed programm RH crashes
2.
3.

time: 1307537209
uid: 0
backtrace: BUG: Bad page map in process java  pte:ffff88030d662580 pmd:113033067
addr:00007fd7f6015000 vm_flags:00200077 anon_vma:ffff8801d72b8380 mapping:(null) index:7fd7f6015
Pid: 31059, comm: java Tainted: P    B      ----------------  2.6.32-71.el6.x86_64 #1
Call Trace:
[<ffffffff81130eb5>] print_bad_pte+0x1d5/0x280
[<ffffffff8104ad47>] ? pte_alloc_one+0x37/0x50
[<ffffffff81130fcb>] vm_normal_page+0x6b/0x70
[<ffffffff81131941>] copy_pte_range+0x251/0x4e0
[<ffffffff8111e1c6>] ? __alloc_pages_nodemask+0xf6/0x810
[<ffffffff81132a79>] copy_page_range+0x2c9/0x480
[<ffffffff811561ae>] ? cache_alloc_refill+0x9e/0x240
[<ffffffff81069276>] dup_mm+0x316/0x520
[<ffffffff8106a1fe>] copy_process+0xd0e/0x1360
[<ffffffff81156d52>] ? kmem_cache_alloc+0x182/0x190
[<ffffffff8106a8e4>] do_fork+0x94/0x480
[<ffffffff811892f2>] ? alloc_fd+0x92/0x160
[<ffffffff811696e7>] ? fd_install+0x47/0x90
[<ffffffff81176eaf>] ? do_pipe_flags+0xcf/0x130
[<ffffffff81011588>] sys_clone+0x28/0x30
[<ffffffff81013493>] stub_clone+0x13/0x20
[<ffffffff81013172>] ? system_call_fastpath+0x16/0x1b

Comment 2 Red Hat Case Diagnostics 2011-06-15 12:56:00 UTC
Created attachment 504868 [details]
File: backtrace

Comment 6 Jeremy West 2011-10-05 22:18:21 UTC
Closing this bug, since the associated customer case has closed.  Please feel free to re-open this if new information becomes available.


Note You need to log in before you can comment on or make changes to this bug.