Bug 683369 - [abrt] kernel: general protection fault: 0000 [#1]
Summary: [abrt] kernel: general protection fault: 0000 [#1]
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel
Version: 6.0
Hardware: i686
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Red Hat Kernel Manager
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard: abrt_hash:1819553649
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-03-09 09:44 UTC by Michal Nowak
Modified: 2018-11-14 14:00 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-03-09 09:48:46 UTC
Target Upstream Version:


Attachments (Terms of Use)
File: backtrace (1.15 KB, text/plain)
2011-03-09 09:44 UTC, Michal Nowak
no flags Details
File: backtrace (1.15 KB, text/plain)
2011-03-09 12:20 UTC, Red Hat Case Diagnostics
no flags Details
File: backtrace (1.15 KB, text/plain)
2011-03-09 12:20 UTC, Red Hat Case Diagnostics
no flags Details
File: backtrace (1.15 KB, text/plain)
2011-03-09 12:31 UTC, Red Hat Case Diagnostics
no flags Details
File: backtrace (1.15 KB, text/plain)
2011-03-11 23:52 UTC, Red Hat Case Diagnostics
no flags Details

Description Michal Nowak 2011-03-09 09:44:35 UTC
abrt version: 1.1.16
architecture: i686
cmdline: not_applicable
component: kernel
executable: kernel
kernel: 2.6.19-hardened-r5-lince-2.2-nohimem #20
package: kernel
reason: general protection fault: 0000 [#1]
release: Red Hat Enterprise Linux Server release 6.0 (Santiago)
Attached file: sosreport.tar.xz, 642492 bytes
time: 1299663184
uid: 0

backtrace
-----
general protection fault: 0000 [#1]
PREEMPT SMP
Modules linked in: r8169 megaraid_sas mptsas mptspi mptscsih mptbase cciss
ipt_ipp2p bnx2 b44 tg3 e1000 e100 e1000bp sky2 skge natsemi reiserfs cloop
isofs cramfs
CPU:    0
EIP:    0060:[<c018a801>]    Not tainted VLI
EFLAGS: 00010046   (2.6.19-hardened-r5-lince-2.2-nohimem #20)
EIP is at note_interrupt+0x3a/0x1e5
eax: 00000001   ebx: c0572180   ecx: c7c20800   edx: 00000014
esi: 00000014   edi: c0572180   ebp: c05721a8   esp: c057df20
ds: 0068   es: 0068   ss: 0068
Process swapper (pid: 0, ti=c057c000 task=c04f41e0 task.ti=c057c000)
Stack: 00000000 c0189e5f 00000014 c7c20800 c0572180 00000014 c6eb5740 c05721a8
       c018b107 00000014 c0572180 00000001 c011f0d0 00000000 00000014 c057df8c
       c0150dc8 00000000 00008000 00000046 00000a00 c0572180 c057dfdc c011f8bc
Call Trace:
 [<c0189e5f>] handle_IRQ_event+0x26/0x4e
 [<c018b107>] handle_fasteoi_irq+0x94/0xb9
 [<c0150dc8>] do_IRQ+0x7e/0xa6
 [<c014ee7e>] common_interrupt+0x1a/0x20
 [<c014c7a8>] default_idle+0x0/0x5f
 [<c014c7df>] default_idle+0x37/0x5f
 [<c014c865>] cpu_idle+0x5e/0x81
 [<c0120787>] start_kernel+0x38b/0x393
 [<c01201e4>] unknown_bootoption+0x0/0x218

How to reproduce
-----
1. 
2. 
3.

Comment 1 Michal Nowak 2011-03-09 09:44:38 UTC
Created attachment 483139 [details]
File: backtrace

Comment 2 Michal Nowak 2011-03-09 09:45:45 UTC
Package: kernel
Architecture: x86_64
OS Release: Red Hat Enterprise Linux Server release 6.0 (Santiago)


How to reproduce
-----
1. 
2. 
3.

Comment 3 Michal Nowak 2011-03-09 09:45:55 UTC
Package: kernel
Architecture: ppc64
OS Release: Red Hat Enterprise Linux Server release 6.0 (Santiago)


How to reproduce
-----
1. 
2. 
3.

Comment 4 Michal Nowak 2011-03-09 09:46:06 UTC
Package: kernel
Architecture: s390x
OS Release: Red Hat Enterprise Linux Server release 6.0 (Santiago)


How to reproduce
-----
1. 
2. 
3.

Comment 6 Red Hat Case Diagnostics 2011-03-09 12:20:01 UTC
Created attachment 483184 [details]
File: backtrace

Comment 8 Red Hat Case Diagnostics 2011-03-09 12:20:31 UTC
Created attachment 483185 [details]
File: backtrace

Comment 10 Red Hat Case Diagnostics 2011-03-09 12:31:36 UTC
Created attachment 483196 [details]
File: backtrace

Comment 12 Red Hat Case Diagnostics 2011-03-11 23:52:58 UTC
Created attachment 483854 [details]
File: backtrace


Note You need to log in before you can comment on or make changes to this bug.