Bug 689421 - This is a bug generated by sosreport
Summary: This is a bug generated by sosreport
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel
Version: 6.0
Hardware: s390x
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Red Hat Kernel Manager
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard: abrt_hash:1686597139
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-03-21 13:33 UTC by Red Hat Case Diagnostics
Modified: 2018-11-14 13:45 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-10-05 21:54:02 UTC
Target Upstream Version:


Attachments (Terms of Use)
File: backtrace (1.42 KB, text/plain)
2011-03-21 13:33 UTC, Red Hat Case Diagnostics
no flags Details

Description Red Hat Case Diagnostics 2011-03-21 13:33:31 UTC
This description generated by Andreas from an ABRT report
architecture: s390x
cmdline: not_applicable
comment: 
component: kernel
executable: kernel
kernel: 2.6.27.9-159.fc10.i686 #1
package: kernel
reason: BUG: unable to handle kernel NULL pointer dereference at 00000000
release: Red Hat Enterprise Linux Server release 6.1 Beta (Santiago)
reproduce: 1. 
2. 
3. 

time: 1300714491
uid: 0
backtrace: BUG: unable to handle kernel NULL pointer dereference at 00000000
IP: [<f88dec25>] :radeon:radeon_cp_init_ring_buffer+0x90/0x302
*pde = 6f5c6067
Oops: 0000 [#1] SMP.
Modules linked in: r8169 mii fuse nfsd lockd nfs_acl auth_rpcgss exportfs bridge stp bnep sco l2cap bl
Pid: 8003, comm: Xorg Tainted (2.6.27.9-159.fc10.i686 #1)
EIP: 0060:[<f88dec25>] EFLAGS: 00213246 CPU: 1
EIP is at radeon_cp_init_ring_buffer+0x90/0x302 [radeon]
EAX: 00000000 EBX: f78b4000 ECX: f78b4000 EDX: 00000000
ESI: f5dbe800 EDI: 00006458 EBP: f0a0cf18 ESP: f0a0cf08
DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
Process Xorg (pid: 8003, ti=f0a0c000 task=f2380000 task.ti=f0a0c000)
Stack: f0a0cf18 f78b4000 f5dbe800 00006458 f0a0cf28 f88e11c7 f8911a24 00000000.
      f0a0cf4c f88745f8 f30c3ba0 f5dbe800 f88e114a f5dbe828 f890fd78 f097ac00.
      00000000 f0a0cf68 c049b1c0 00000000 00006458 f097ac00 f097ac00 00000000.
Call Trace:
[<f88e11c7>] ? radeon_cp_resume+0x7d/0xbc [radeon]
[<f88745f8>] ? drm_ioctl+0x1b0/0x225 [drm]
[<f88e114a>] ? radeon_cp_resume+0x0/0xbc [radeon]
[<c049b1c0>] ? vfs_ioctl+0x50/0x69
[<c049b414>] ? do_vfs_ioctl+0x23b/0x247
[<c0460a56>] ? audit_syscall_entry+0xf9/0x123
[<c049b460>] ? sys_ioctl+0x40/0x5c
[<c0403c76>] ? syscall_call+0x7/0xb
=======================
Code: 66 31 d2 09 c2 89 d8 e8 fc e7 ff ff 8b 83 cc 00 00 00 8b 53 34 03 10 8b 86 70 02 00 00 2b  50 44
EIP: [<f88dec25>] radeon_cp_init_ring_buffer+0x90/0x302 [radeon] SS:ESP 0068:f0a0cf08

Comment 1 Red Hat Case Diagnostics 2011-03-21 13:33:53 UTC
Created attachment 486609 [details]
File: backtrace

Comment 4 RHEL Program Management 2011-04-04 02:37:58 UTC
Since RHEL 6.1 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.

Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.

Comment 6 Jeremy West 2011-10-05 21:54:02 UTC
Closing this bug, since the associated customer case has closed.  Please feel free to re-open this if new information becomes available.


Note You need to log in before you can comment on or make changes to this bug.