Bug 681299 - This is a bug generated by sosreport
Summary: This is a bug generated by sosreport
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel
Version: 6.0
Hardware: x86_64
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Red Hat Kernel Manager
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard: abrt_hash:1461342039
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-03-01 17:46 UTC by Red Hat Case Diagnostics
Modified: 2018-11-14 14:12 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-10-05 21:36:26 UTC
Target Upstream Version:


Attachments (Terms of Use)
File: backtrace (3.45 KB, text/plain)
2011-03-01 17:47 UTC, Red Hat Case Diagnostics
no flags Details

Description Red Hat Case Diagnostics 2011-03-01 17:46:40 UTC
This description generated by Andreas from an ABRT report
architecture: x86_64
cmdline: not_applicable
component: kernel
executable: kernel
kernel: 2.6.32-0.51.rc7.git2.fc13.x86_64
package: kernel
reason: general protection fault: 0000 [#1] SMP
release: Red Hat Enterprise Linux Workstation release 6.0 (Santiago)
reproduce: 1.
2.
3.
ds
time: 1298995139
uid: 0
backtrace: general protection fault: 0000 [#1] SMP
last sysfs file: /sys/devices/system/cpu/cpu0/cpufreq/scaling_cur_freq
CPU 0
Modules linked in: ipt_MASQUERADE iptable_nat nf_nat bridge stp llc sunrpc xt_physdev ip6t_REJECT nf_conntrack_ipv6 ip6table_filter ip6_tables ipv6 cpufreq_ondemand acpi_cpufreq freq_table dm_multipath kvm_intel kvm arc4 snd_hda_codec_analog ecb snd_hda_intel snd_hda_codec iwl3945 snd_hwdep iwlcore snd_seq snd_seq_device mac80211 snd_pcm btusb snd_timer bluetooth snd iTCO_wdt soundcore iTCO_vendor_support ppdev thinkpad_acpi cfg80211 e1000e snd_page_alloc joydev i2c_i801 parport_pc irda hwmon parport rfkill crc_ccitt yenta_socket rsrc_nonstatic video output radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core [last unloaded: microcode]
Pid: 1525, comm: Xorg Not tainted 2.6.32-0.51.rc7.git2.fc13.x86_64 #1 2007CTO
RIP: 0010:[<ffffffffa006c13c>]  [<ffffffffa006c13c>] radeon_read_ring_rptr+0x30/0x34 [radeon]
RSP: 0018:ffff88007a3d9ad0  EFLAGS: 00010202
RAX: ffff88007a398198 RBX: ffff88007921b1b0 RCX: ffffc90006952000
RDX: 0000000000000028 RSI: 6b6b6b6b6b6b6b6b RDI: ffff88007921b1b0
RBP: ffff88007a3d9ad0 R08: ffff88007921b3c0 R09: 0000000000000010
R10: ffffffffffffffff R11: 0000000000000000 R12: 0000000000000010
R13: ffff8800794dd168 R14: ffff88007921b330 R15: ffff8800794dd358
FS:  00007fb32c7687e0(0000) GS:ffff880006000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000007cc4b0 CR3: 0000000001001000 CR4: 00000000000026f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process Xorg (pid: 1525, threadinfo ffff88007a3d8000, task ffff880069d4c9c0)
Stack:
ffff88007a3d9ae0 ffffffffa006c156 ffff88007a3d9af8 ffffffffa006c881
 ffff88007921b1b0 ffff88007a3d9b18 ffffffffa006d84a 0000000000000000
 ffff88007921b1b0 ffff88007a3d9b38 ffffffffa00709e5 ffff88007921b1b0
Call Trace:
[<ffffffffa006c156>] radeon_get_ring_head+0x16/0x41 [radeon]
[<ffffffffa006c881>] radeon_commit_ring+0x4d/0x9c [radeon]
[<ffffffffa006d84a>] radeon_do_cp_idle+0x145/0x152 [radeon]
[<ffffffffa00709e5>] radeon_apply_surface_regs+0x27/0x13d [radeon]
[<ffffffffa0070bdd>] free_surface+0xe2/0xf8 [radeon]
[<ffffffffa0076284>] radeon_driver_lastclose+0x41/0x5b [radeon]
[<ffffffffa0018f04>] drm_lastclose+0x4f/0x2a0 [drm]
[<ffffffffa0019997>] drm_release+0x4d6/0x510 [drm]
[<ffffffff8112b3db>] __fput+0x12a/0x1df
[<ffffffff8112b4aa>] fput+0x1a/0x1c
[<ffffffff81127715>] filp_close+0x68/0x72
[<ffffffff8105b4be>] put_files_struct+0x6a/0xcc
[<ffffffff8105b55b>] exit_files+0x3b/0x40
[<ffffffff8105ce2b>] do_exit+0x25e/0x77f
[<ffffffff810891d1>] ? lockstat_clock+0x11/0x13
[<ffffffff8147cabb>] ? _spin_unlock_irq+0x30/0x3c
[<ffffffff8105d3d0>] do_group_exit+0x84/0xb0
[<ffffffff8106e1ad>] get_signal_to_deliver+0x356/0x375
[<ffffffff81011042>] do_signal+0x72/0x6af
[<ffffffff81011caa>] ? sysret_check+0x2e/0x69
[<ffffffff8108a863>] ? trace_hardirqs_on_caller+0x111/0x135
[<ffffffff810b568e>] ? audit_syscall_entry+0x11e/0x14a
[<ffffffff8147c67d>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[<ffffffff81011d09>] ? sysret_signal+0x5/0x4e
[<ffffffff810116a9>] do_notify_resume+0x2a/0x7c
[<ffffffff81011fc1>] int_signal+0x12/0x17
Code: 1f 44 00 00 f6 87 0e 04 00 00 08 48 8b 87 10 01 00 00 74 0a 89 f6 48 03 70 18 8b 06 eb 0f c1 ee 02 89 f6 48 c1 e6 02 48 03 70 18 <8b> 06 c9 c3 55 48 89 e5 0f 1f 44 00 00 83 7f 74 00 74 09 31 f6
RIP  [<ffffffffa006c13c>] radeon_read_ring_rptr+0x30/0x34 [radeon]
RSP <ffff88007a3d9ad0>

Comment 1 Red Hat Case Diagnostics 2011-03-01 17:47:01 UTC
Created attachment 481693 [details]
File: backtrace

Comment 4 RHEL Program Management 2011-04-04 02:38:36 UTC
Since RHEL 6.1 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.

Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.

Comment 6 Jeremy West 2011-10-05 21:36:26 UTC
Closing this bug, since the associated customer case has closed.  Please feel free to re-open this if new information becomes available.


Note You need to log in before you can comment on or make changes to this bug.