Bug 683369

Summary: [abrt] kernel: general protection fault: 0000 [#1]
Product: Red Hat Enterprise Linux 6 Reporter: Michal Nowak <mnowak>
Component: kernelAssignee: Red Hat Kernel Manager <kernel-mgr>
Status: CLOSED NOTABUG QA Contact: Red Hat Kernel QE team <kernel-qe>
Severity: medium Docs Contact:
Priority: medium    
Version: 6.0CC: ohudlick
Target Milestone: rc   
Target Release: ---   
Hardware: i686   
OS: Unspecified   
Whiteboard: abrt_hash:1819553649
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-03-09 09:48:46 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
File: backtrace
none
File: backtrace
none
File: backtrace
none
File: backtrace
none
File: backtrace none

Description Michal Nowak 2011-03-09 09:44:35 UTC
abrt version: 1.1.16
architecture: i686
cmdline: not_applicable
component: kernel
executable: kernel
kernel: 2.6.19-hardened-r5-lince-2.2-nohimem #20
package: kernel
reason: general protection fault: 0000 [#1]
release: Red Hat Enterprise Linux Server release 6.0 (Santiago)
Attached file: sosreport.tar.xz, 642492 bytes
time: 1299663184
uid: 0

backtrace
-----
general protection fault: 0000 [#1]
PREEMPT SMP
Modules linked in: r8169 megaraid_sas mptsas mptspi mptscsih mptbase cciss
ipt_ipp2p bnx2 b44 tg3 e1000 e100 e1000bp sky2 skge natsemi reiserfs cloop
isofs cramfs
CPU:    0
EIP:    0060:[<c018a801>]    Not tainted VLI
EFLAGS: 00010046   (2.6.19-hardened-r5-lince-2.2-nohimem #20)
EIP is at note_interrupt+0x3a/0x1e5
eax: 00000001   ebx: c0572180   ecx: c7c20800   edx: 00000014
esi: 00000014   edi: c0572180   ebp: c05721a8   esp: c057df20
ds: 0068   es: 0068   ss: 0068
Process swapper (pid: 0, ti=c057c000 task=c04f41e0 task.ti=c057c000)
Stack: 00000000 c0189e5f 00000014 c7c20800 c0572180 00000014 c6eb5740 c05721a8
       c018b107 00000014 c0572180 00000001 c011f0d0 00000000 00000014 c057df8c
       c0150dc8 00000000 00008000 00000046 00000a00 c0572180 c057dfdc c011f8bc
Call Trace:
 [<c0189e5f>] handle_IRQ_event+0x26/0x4e
 [<c018b107>] handle_fasteoi_irq+0x94/0xb9
 [<c0150dc8>] do_IRQ+0x7e/0xa6
 [<c014ee7e>] common_interrupt+0x1a/0x20
 [<c014c7a8>] default_idle+0x0/0x5f
 [<c014c7df>] default_idle+0x37/0x5f
 [<c014c865>] cpu_idle+0x5e/0x81
 [<c0120787>] start_kernel+0x38b/0x393
 [<c01201e4>] unknown_bootoption+0x0/0x218

How to reproduce
-----
1. 
2. 
3.

Comment 1 Michal Nowak 2011-03-09 09:44:38 UTC
Created attachment 483139 [details]
File: backtrace

Comment 2 Michal Nowak 2011-03-09 09:45:45 UTC
Package: kernel
Architecture: x86_64
OS Release: Red Hat Enterprise Linux Server release 6.0 (Santiago)


How to reproduce
-----
1. 
2. 
3.

Comment 3 Michal Nowak 2011-03-09 09:45:55 UTC
Package: kernel
Architecture: ppc64
OS Release: Red Hat Enterprise Linux Server release 6.0 (Santiago)


How to reproduce
-----
1. 
2. 
3.

Comment 4 Michal Nowak 2011-03-09 09:46:06 UTC
Package: kernel
Architecture: s390x
OS Release: Red Hat Enterprise Linux Server release 6.0 (Santiago)


How to reproduce
-----
1. 
2. 
3.

Comment 6 Red Hat Case Diagnostics 2011-03-09 12:20:01 UTC
Created attachment 483184 [details]
File: backtrace

Comment 8 Red Hat Case Diagnostics 2011-03-09 12:20:31 UTC
Created attachment 483185 [details]
File: backtrace

Comment 10 Red Hat Case Diagnostics 2011-03-09 12:31:36 UTC
Created attachment 483196 [details]
File: backtrace

Comment 12 Red Hat Case Diagnostics 2011-03-11 23:52:58 UTC
Created attachment 483854 [details]
File: backtrace