Bug 689421

Summary: This is a bug generated by sosreport
Product: Red Hat Enterprise Linux 6 Reporter: Red Hat Case Diagnostics <case-diagnostics>
Component: kernelAssignee: Red Hat Kernel Manager <kernel-mgr>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Red Hat Kernel QE team <kernel-qe>
Severity: medium Docs Contact:
Priority: medium    
Version: 6.0CC: jwest
Target Milestone: rc   
Target Release: ---   
Hardware: s390x   
OS: Unspecified   
Whiteboard: abrt_hash:1686597139
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-10-05 21:54:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
File: backtrace none

Description Red Hat Case Diagnostics 2011-03-21 13:33:31 UTC
This description generated by Andreas from an ABRT report
architecture: s390x
cmdline: not_applicable
comment: 
component: kernel
executable: kernel
kernel: 2.6.27.9-159.fc10.i686 #1
package: kernel
reason: BUG: unable to handle kernel NULL pointer dereference at 00000000
release: Red Hat Enterprise Linux Server release 6.1 Beta (Santiago)
reproduce: 1. 
2. 
3. 

time: 1300714491
uid: 0
backtrace: BUG: unable to handle kernel NULL pointer dereference at 00000000
IP: [<f88dec25>] :radeon:radeon_cp_init_ring_buffer+0x90/0x302
*pde = 6f5c6067
Oops: 0000 [#1] SMP.
Modules linked in: r8169 mii fuse nfsd lockd nfs_acl auth_rpcgss exportfs bridge stp bnep sco l2cap bl
Pid: 8003, comm: Xorg Tainted (2.6.27.9-159.fc10.i686 #1)
EIP: 0060:[<f88dec25>] EFLAGS: 00213246 CPU: 1
EIP is at radeon_cp_init_ring_buffer+0x90/0x302 [radeon]
EAX: 00000000 EBX: f78b4000 ECX: f78b4000 EDX: 00000000
ESI: f5dbe800 EDI: 00006458 EBP: f0a0cf18 ESP: f0a0cf08
DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
Process Xorg (pid: 8003, ti=f0a0c000 task=f2380000 task.ti=f0a0c000)
Stack: f0a0cf18 f78b4000 f5dbe800 00006458 f0a0cf28 f88e11c7 f8911a24 00000000.
      f0a0cf4c f88745f8 f30c3ba0 f5dbe800 f88e114a f5dbe828 f890fd78 f097ac00.
      00000000 f0a0cf68 c049b1c0 00000000 00006458 f097ac00 f097ac00 00000000.
Call Trace:
[<f88e11c7>] ? radeon_cp_resume+0x7d/0xbc [radeon]
[<f88745f8>] ? drm_ioctl+0x1b0/0x225 [drm]
[<f88e114a>] ? radeon_cp_resume+0x0/0xbc [radeon]
[<c049b1c0>] ? vfs_ioctl+0x50/0x69
[<c049b414>] ? do_vfs_ioctl+0x23b/0x247
[<c0460a56>] ? audit_syscall_entry+0xf9/0x123
[<c049b460>] ? sys_ioctl+0x40/0x5c
[<c0403c76>] ? syscall_call+0x7/0xb
=======================
Code: 66 31 d2 09 c2 89 d8 e8 fc e7 ff ff 8b 83 cc 00 00 00 8b 53 34 03 10 8b 86 70 02 00 00 2b  50 44
EIP: [<f88dec25>] radeon_cp_init_ring_buffer+0x90/0x302 [radeon] SS:ESP 0068:f0a0cf08

Comment 1 Red Hat Case Diagnostics 2011-03-21 13:33:53 UTC
Created attachment 486609 [details]
File: backtrace

Comment 4 RHEL Program Management 2011-04-04 02:37:58 UTC
Since RHEL 6.1 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.

Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.

Comment 6 Jeremy West 2011-10-05 21:54:02 UTC
Closing this bug, since the associated customer case has closed.  Please feel free to re-open this if new information becomes available.