Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Comment 4RHEL Program Management
2011-04-04 02:37:58 UTC
Since RHEL 6.1 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.
Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.
This description generated by Andreas from an ABRT report architecture: s390x cmdline: not_applicable comment: component: kernel executable: kernel kernel: 2.6.27.9-159.fc10.i686 #1 package: kernel reason: BUG: unable to handle kernel NULL pointer dereference at 00000000 release: Red Hat Enterprise Linux Server release 6.1 Beta (Santiago) reproduce: 1. 2. 3. time: 1300714491 uid: 0 backtrace: BUG: unable to handle kernel NULL pointer dereference at 00000000 IP: [<f88dec25>] :radeon:radeon_cp_init_ring_buffer+0x90/0x302 *pde = 6f5c6067 Oops: 0000 [#1] SMP. Modules linked in: r8169 mii fuse nfsd lockd nfs_acl auth_rpcgss exportfs bridge stp bnep sco l2cap bl Pid: 8003, comm: Xorg Tainted (2.6.27.9-159.fc10.i686 #1) EIP: 0060:[<f88dec25>] EFLAGS: 00213246 CPU: 1 EIP is at radeon_cp_init_ring_buffer+0x90/0x302 [radeon] EAX: 00000000 EBX: f78b4000 ECX: f78b4000 EDX: 00000000 ESI: f5dbe800 EDI: 00006458 EBP: f0a0cf18 ESP: f0a0cf08 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 Process Xorg (pid: 8003, ti=f0a0c000 task=f2380000 task.ti=f0a0c000) Stack: f0a0cf18 f78b4000 f5dbe800 00006458 f0a0cf28 f88e11c7 f8911a24 00000000. f0a0cf4c f88745f8 f30c3ba0 f5dbe800 f88e114a f5dbe828 f890fd78 f097ac00. 00000000 f0a0cf68 c049b1c0 00000000 00006458 f097ac00 f097ac00 00000000. Call Trace: [<f88e11c7>] ? radeon_cp_resume+0x7d/0xbc [radeon] [<f88745f8>] ? drm_ioctl+0x1b0/0x225 [drm] [<f88e114a>] ? radeon_cp_resume+0x0/0xbc [radeon] [<c049b1c0>] ? vfs_ioctl+0x50/0x69 [<c049b414>] ? do_vfs_ioctl+0x23b/0x247 [<c0460a56>] ? audit_syscall_entry+0xf9/0x123 [<c049b460>] ? sys_ioctl+0x40/0x5c [<c0403c76>] ? syscall_call+0x7/0xb ======================= Code: 66 31 d2 09 c2 89 d8 e8 fc e7 ff ff 8b 83 cc 00 00 00 8b 53 34 03 10 8b 86 70 02 00 00 2b 50 44 EIP: [<f88dec25>] radeon_cp_init_ring_buffer+0x90/0x302 [radeon] SS:ESP 0068:f0a0cf08