Bug 713445 - [abrt] kernel: BUG: Bad page map in process gnome-system-mo pte:ffff88030d6625a0 pmd:113033067
Summary: [abrt] kernel: BUG: Bad page map in process gnome-system-mo pte:ffff88030d66...
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel
Version: 6.0
Hardware: x86_64
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Red Hat Kernel Manager
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard: abrt_hash:788166244
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-06-15 12:58 UTC by Red Hat Case Diagnostics
Modified: 2018-11-14 12:01 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-10-05 22:19:14 UTC
Target Upstream Version:


Attachments (Terms of Use)
File: backtrace (829 bytes, text/plain)
2011-06-15 12:59 UTC, Red Hat Case Diagnostics
no flags Details

Description Red Hat Case Diagnostics 2011-06-15 12:58:44 UTC
This description generated by Andreas from an ABRT report
architecture: x86_64
cmdline: not_applicable
component: kernel
executable: kernel
kernel: 2.6.32-71.el6.x86_64
package: kernel
reason: BUG: Bad page map in process gnome-system-mo  pte:ffff88030d6625a0 pmd:113033067
release: Red Hat Enterprise Linux Workstation release 6.0 (Santiago)
reproduce: 1.Closing a installed programm RH crashes
2.
3.

time: 1307537449
uid: 0
backtrace: BUG: Bad page map in process gnome-system-mo  pte:ffff88030d6625a0 pmd:113033067
addr:00007fd7f6015000 vm_flags:00200077 anon_vma:ffff8801d72b8380 mapping:(null) index:7fd7f6015
Pid: 8273, comm: gnome-system-mo Tainted: P    B      ----------------  2.6.32-71.el6.x86_64 #1
Call Trace:
[<ffffffff81130eb5>] print_bad_pte+0x1d5/0x280
[<ffffffff81130fcb>] vm_normal_page+0x6b/0x70
[<ffffffff811ce584>] smaps_pte_range+0x104/0x1e0
[<ffffffff81143e90>] walk_page_range+0x290/0x420
[<ffffffff811cec35>] show_smap+0x175/0x180
[<ffffffff814c9d36>] ? down_read+0x16/0x30
[<ffffffff811ce480>] ? smaps_pte_range+0x0/0x1e0
[<ffffffff8118ea17>] seq_read+0x267/0x3f0
[<ffffffff8116d085>] vfs_read+0xb5/0x1a0
[<ffffffff8116d1ab>] ? sys_read+0x3b/0x90
[<ffffffff8116d1c1>] sys_read+0x51/0x90
[<ffffffff81013172>] system_call_fastpath+0x16/0x1b

Comment 2 Red Hat Case Diagnostics 2011-06-15 12:59:19 UTC
Created attachment 504871 [details]
File: backtrace

Comment 5 Jeremy West 2011-10-05 22:19:14 UTC
Closing this bug, since the associated customer case has closed.  Please feel free to re-open this if new information becomes available.


Note You need to log in before you can comment on or make changes to this bug.