| Summary: | This is a bug generated by sosreport | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Red Hat Case Diagnostics <case-diagnostics> | ||||
| Component: | kernel | Assignee: | Red Hat Kernel Manager <kernel-mgr> | ||||
| Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Red Hat Kernel QE team <kernel-qe> | ||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | 6.0 | CC: | jwest | ||||
| Target Milestone: | rc | ||||||
| Target Release: | --- | ||||||
| Hardware: | s390x | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | abrt_hash:1686597139 | ||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2011-10-05 21:54:02 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Attachments: |
|
||||||
Created attachment 486609 [details]
File: backtrace
Since RHEL 6.1 External Beta has begun, and this bug remains unresolved, it has been rejected as it is not proposed as exception or blocker. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. Closing this bug, since the associated customer case has closed. Please feel free to re-open this if new information becomes available. |
This description generated by Andreas from an ABRT report architecture: s390x cmdline: not_applicable comment: component: kernel executable: kernel kernel: 2.6.27.9-159.fc10.i686 #1 package: kernel reason: BUG: unable to handle kernel NULL pointer dereference at 00000000 release: Red Hat Enterprise Linux Server release 6.1 Beta (Santiago) reproduce: 1. 2. 3. time: 1300714491 uid: 0 backtrace: BUG: unable to handle kernel NULL pointer dereference at 00000000 IP: [<f88dec25>] :radeon:radeon_cp_init_ring_buffer+0x90/0x302 *pde = 6f5c6067 Oops: 0000 [#1] SMP. Modules linked in: r8169 mii fuse nfsd lockd nfs_acl auth_rpcgss exportfs bridge stp bnep sco l2cap bl Pid: 8003, comm: Xorg Tainted (2.6.27.9-159.fc10.i686 #1) EIP: 0060:[<f88dec25>] EFLAGS: 00213246 CPU: 1 EIP is at radeon_cp_init_ring_buffer+0x90/0x302 [radeon] EAX: 00000000 EBX: f78b4000 ECX: f78b4000 EDX: 00000000 ESI: f5dbe800 EDI: 00006458 EBP: f0a0cf18 ESP: f0a0cf08 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 Process Xorg (pid: 8003, ti=f0a0c000 task=f2380000 task.ti=f0a0c000) Stack: f0a0cf18 f78b4000 f5dbe800 00006458 f0a0cf28 f88e11c7 f8911a24 00000000. f0a0cf4c f88745f8 f30c3ba0 f5dbe800 f88e114a f5dbe828 f890fd78 f097ac00. 00000000 f0a0cf68 c049b1c0 00000000 00006458 f097ac00 f097ac00 00000000. Call Trace: [<f88e11c7>] ? radeon_cp_resume+0x7d/0xbc [radeon] [<f88745f8>] ? drm_ioctl+0x1b0/0x225 [drm] [<f88e114a>] ? radeon_cp_resume+0x0/0xbc [radeon] [<c049b1c0>] ? vfs_ioctl+0x50/0x69 [<c049b414>] ? do_vfs_ioctl+0x23b/0x247 [<c0460a56>] ? audit_syscall_entry+0xf9/0x123 [<c049b460>] ? sys_ioctl+0x40/0x5c [<c0403c76>] ? syscall_call+0x7/0xb ======================= Code: 66 31 d2 09 c2 89 d8 e8 fc e7 ff ff 8b 83 cc 00 00 00 8b 53 34 03 10 8b 86 70 02 00 00 2b 50 44 EIP: [<f88dec25>] radeon_cp_init_ring_buffer+0x90/0x302 [radeon] SS:ESP 0068:f0a0cf08