Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 683369

Summary: [abrt] kernel: general protection fault: 0000 [#1]
Product: Red Hat Enterprise Linux 6 Reporter: Michal Nowak <mnowak>
Component: kernelAssignee: Red Hat Kernel Manager <kernel-mgr>
Status: CLOSED NOTABUG QA Contact: Red Hat Kernel QE team <kernel-qe>
Severity: medium Docs Contact:
Priority: medium    
Version: 6.0CC: ohudlick
Target Milestone: rc   
Target Release: ---   
Hardware: i686   
OS: Unspecified   
Whiteboard: abrt_hash:1819553649
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-03-09 09:48:46 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
File: backtrace
none
File: backtrace
none
File: backtrace
none
File: backtrace
none
File: backtrace none

Description Michal Nowak 2011-03-09 09:44:35 UTC
abrt version: 1.1.16
architecture: i686
cmdline: not_applicable
component: kernel
executable: kernel
kernel: 2.6.19-hardened-r5-lince-2.2-nohimem #20
package: kernel
reason: general protection fault: 0000 [#1]
release: Red Hat Enterprise Linux Server release 6.0 (Santiago)
Attached file: sosreport.tar.xz, 642492 bytes
time: 1299663184
uid: 0

backtrace
-----
general protection fault: 0000 [#1]
PREEMPT SMP
Modules linked in: r8169 megaraid_sas mptsas mptspi mptscsih mptbase cciss
ipt_ipp2p bnx2 b44 tg3 e1000 e100 e1000bp sky2 skge natsemi reiserfs cloop
isofs cramfs
CPU:    0
EIP:    0060:[<c018a801>]    Not tainted VLI
EFLAGS: 00010046   (2.6.19-hardened-r5-lince-2.2-nohimem #20)
EIP is at note_interrupt+0x3a/0x1e5
eax: 00000001   ebx: c0572180   ecx: c7c20800   edx: 00000014
esi: 00000014   edi: c0572180   ebp: c05721a8   esp: c057df20
ds: 0068   es: 0068   ss: 0068
Process swapper (pid: 0, ti=c057c000 task=c04f41e0 task.ti=c057c000)
Stack: 00000000 c0189e5f 00000014 c7c20800 c0572180 00000014 c6eb5740 c05721a8
       c018b107 00000014 c0572180 00000001 c011f0d0 00000000 00000014 c057df8c
       c0150dc8 00000000 00008000 00000046 00000a00 c0572180 c057dfdc c011f8bc
Call Trace:
 [<c0189e5f>] handle_IRQ_event+0x26/0x4e
 [<c018b107>] handle_fasteoi_irq+0x94/0xb9
 [<c0150dc8>] do_IRQ+0x7e/0xa6
 [<c014ee7e>] common_interrupt+0x1a/0x20
 [<c014c7a8>] default_idle+0x0/0x5f
 [<c014c7df>] default_idle+0x37/0x5f
 [<c014c865>] cpu_idle+0x5e/0x81
 [<c0120787>] start_kernel+0x38b/0x393
 [<c01201e4>] unknown_bootoption+0x0/0x218

How to reproduce
-----
1. 
2. 
3.

Comment 1 Michal Nowak 2011-03-09 09:44:38 UTC
Created attachment 483139 [details]
File: backtrace

Comment 2 Michal Nowak 2011-03-09 09:45:45 UTC
Package: kernel
Architecture: x86_64
OS Release: Red Hat Enterprise Linux Server release 6.0 (Santiago)


How to reproduce
-----
1. 
2. 
3.

Comment 3 Michal Nowak 2011-03-09 09:45:55 UTC
Package: kernel
Architecture: ppc64
OS Release: Red Hat Enterprise Linux Server release 6.0 (Santiago)


How to reproduce
-----
1. 
2. 
3.

Comment 4 Michal Nowak 2011-03-09 09:46:06 UTC
Package: kernel
Architecture: s390x
OS Release: Red Hat Enterprise Linux Server release 6.0 (Santiago)


How to reproduce
-----
1. 
2. 
3.

Comment 6 Red Hat Case Diagnostics 2011-03-09 12:20:01 UTC
Created attachment 483184 [details]
File: backtrace

Comment 8 Red Hat Case Diagnostics 2011-03-09 12:20:31 UTC
Created attachment 483185 [details]
File: backtrace

Comment 10 Red Hat Case Diagnostics 2011-03-09 12:31:36 UTC
Created attachment 483196 [details]
File: backtrace

Comment 12 Red Hat Case Diagnostics 2011-03-11 23:52:58 UTC
Created attachment 483854 [details]
File: backtrace