Bug 131029 - gart errors when using 2.4.21-15.0.3.EL.smp or -9.0.1 on AMD64 quad system
Summary: gart errors when using 2.4.21-15.0.3.EL.smp or -9.0.1 on AMD64 quad system
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: kernel
Version: 3.0
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Brian Maly
QA Contact: Brian Brock
URL:
Whiteboard:
Depends On:
Blocks: 156321
TreeView+ depends on / blocked
 
Reported: 2004-08-26 18:59 UTC by Arthur Perry
Modified: 2007-11-30 22:07 UTC (History)
18 users (show)

Fixed In Version: RHSA-2005-663
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2005-09-28 14:27:38 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
Patch to arch/x86_64/kernel/bluesmoke.c (5.10 KB, patch)
2005-06-07 13:26 UTC, Jim Paradis
no flags Details | Diff
patch posted to rhkernel (ACKed) (5.09 KB, patch)
2005-06-14 14:28 UTC, Brian Maly
no flags Details | Diff
RHEL3 patch posted to rhkernel (5.09 KB, patch)
2005-06-14 14:28 UTC, Brian Maly
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2004:433 0 normal SHIPPED_LIVE Updated kernel packages available for Red Hat Enterprise Linux 3 Update 3 2004-09-02 04:00:00 UTC
Red Hat Product Errata RHSA-2005:663 0 qe-ready SHIPPED_LIVE Important: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 6 2005-09-28 04:00:00 UTC

Description Arthur Perry 2004-08-26 18:59:04 UTC
Description of problem:

AMD64 based system (8131 chipset) quad AMD Opteron(tm) Processor 850 
will produce the gart errors below, typically when the system is 
under IO load.
This problem occurs with RedHat Enterprise Kernel, but never with 
mainline 2.4.27 kernel.
Problem also goes away when Enterprise kernel is recompiled without 
AGP support.

Aug 24 04:24:34 StarDragon kernel: CPU 0: Silent Northbridge MCE
Aug 24 04:24:34 StarDragon kernel: Northbridge status a60000010005001b
Aug 24 04:24:34 StarDragon kernel:     GART TLB error generic level 
generic
Aug 24 04:24:34 StarDragon kernel:     extended error gart error
Aug 24 04:24:34 StarDragon kernel:     link number 0
Aug 24 04:24:34 StarDragon kernel:     err cpu1
Aug 24 04:24:34 StarDragon kernel:     processor context corrupt
Aug 24 04:24:34 StarDragon kernel:     error address valid
Aug 24 04:24:34 StarDragon kernel:     error uncorrected
Aug 24 04:24:34 StarDragon kernel:     previous error lost
Aug 24 04:24:34 StarDragon kernel:     error address 0000000037f28a28
Aug 24 04:27:05 StarDragon kernel: CPU 2: Silent Northbridge MCE
Aug 24 04:27:05 StarDragon kernel: Northbridge status a60000010005001b
Aug 24 04:27:05 StarDragon kernel:     GART TLB error generic level 
generic
Aug 24 04:27:05 StarDragon kernel:     extended error gart error
Aug 24 04:27:05 StarDragon kernel:     link number 0
Aug 24 04:27:05 StarDragon kernel:     err cpu1
Aug 24 04:27:05 StarDragon kernel:     processor context corrupt
Aug 24 04:27:05 StarDragon kernel:     error address valid
Aug 24 04:27:05 StarDragon kernel:     error uncorrected
Aug 24 04:27:05 StarDragon kernel:     previous error lost
Aug 24 04:27:05 StarDragon kernel:     error address 0000000037f28a20
Aug 24 04:31:36 StarDragon kernel: CPU 0: Silent Northbridge MCE
Aug 24 04:31:36 StarDragon kernel: CPU 3: Silent Northbridge MCE
Aug 24 04:31:36 StarDragon kernel: Northbridge status a60000010005001b
Aug 24 04:31:36 StarDragon kernel: CPU 1: Silent Northbridge MCE
Aug 24 04:31:36 StarDragon kernel: Northbridge status a60000010005001b
Aug 24 04:31:36 StarDragon kernel:     GART TLB error generic level 
generic
Aug 24 04:31:36 StarDragon kernel:     extended error gart error
Aug 24 04:31:36 StarDragon kernel:     link number 0
Aug 24 04:31:36 StarDragon kernel:     err cpu1
Aug 24 04:31:36 StarDragon kernel:     processor context corrupt
Aug 24 04:31:36 StarDragon kernel:     error address valid
Aug 24 04:31:36 StarDragon kernel:     error uncorrected
Aug 24 04:31:36 StarDragon kernel:     previous error lost
Aug 24 04:31:46 StarDragon kernel:     error address 0000000037f29b30
Aug 24 04:31:47 StarDragon kernel:     GART TLB error generic level 
generic
Aug 24 04:31:47 StarDragon kernel:     extended error gart error
Aug 24 04:31:48 StarDragon kernel:     link number 0
Aug 24 04:31:49 StarDragon kernel:     err cpu1
Aug 24 04:31:50 StarDragon kernel:     processor context corrupt
Aug 24 04:31:53 StarDragon kernel:     error address valid
Aug 24 04:31:53 StarDragon kernel:     error uncorrected
Aug 24 04:31:53 StarDragon kernel:     previous error lost
Aug 24 04:31:54 StarDragon kernel:     error address 0000000037f29b30
Aug 24 04:31:54 StarDragon kernel: Northbridge status a60000010005001b
Aug 24 04:31:57 StarDragon kernel:     GART TLB error generic level 
generic
Aug 24 04:31:57 StarDragon kernel:     extended error gart error
Aug 24 04:31:58 StarDragon kernel:     link number 0
Aug 24 04:31:58 StarDragon kernel:     err cpu1
Aug 24 04:31:58 StarDragon kernel:     processor context corrupt
Aug 24 04:32:00 StarDragon kernel:     error address valid
Aug 24 04:32:01 StarDragon kernel:     error uncorrected
Aug 24 04:32:02 StarDragon kernel:     previous error lost
Aug 24 04:32:02 StarDragon kernel:     error address 0000000037f27598



Version-Release number of selected component (if applicable):
Linux AGP driver 0.99

How reproducible:
Every time

Steps to Reproduce:
1. boot machine
2. run an excerciser that performs heavy CPU and IO operations, in 
some cases you only need to let the machine sit idle for a while.
3. watch for gart errors.
  
Actual results:
GART errors will be produced at any given time, but will most likely 
occur under heavy IO load.

Expected results:
No gart errors should occur.

Additional info:

Comment 1 Jim Paradis 2004-08-27 01:06:37 UTC
This appears to be a known issue with IOMMU prefetch on this chipset.
 A fix for this issue has been made in 2.4.21-19.EL.  Please obtain
this kernel or later and try again.


Comment 2 Arthur Perry 2004-08-27 14:31:30 UTC
This kernel, 2.4.21-19.EL, does not appear to be on rhn.redhat.com.
Is it released yet?

Thanks.

Comment 3 Ernie Petrides 2004-08-27 21:17:51 UTC
Hello, Arthur.  The -19.EL and -20.EL kernels were respins of the
U3 beta kernel, and were never put into the RHN beta channel.  We
anticipate releasing U3 sometime next week, at which point the -20.EL
kernel will be officially available in the main RHEL3 RHN channel.

In the meantime, I have put the UP and SMP kernel RPMs on my "people"
page, which you can download through the Web using the following URLs:

http://people.redhat.com/~petrides/.celestica/kernel-2.4.21-20.EL.x86_64.rpm
http://people.redhat.com/~petrides/.celestica/kernel-smp-2.4.21-20.EL.x86_64.rpm

Please let me know when you've retrieved whichever one you need to
verify that Jim's fix addresses the problem you reported (so that
I can free up the space on that site).

In the meantime, I'm changing the state of this bugzilla to MODIFIED,
since we believe the change that was committed in 2.4.21-19.EL fixes
the problem.



Comment 4 Arthur Perry 2004-08-31 15:13:40 UTC
Thanks Ernie,
I have tested the smp release on the server and ran the test 
overnight.
Unfortunately, I have to report the presence of a GART error.
Again, this does not appear with mainstream 2.4.27 kernel, even with 
agp built in.
There is also additional DMA debug info that is in the log:

Aug 30 13:38:24 StarDragon kernel: Mem-info:
Aug 30 13:38:24 StarDragon kernel: Zone:DMA freepages:     0 min:     
0 low:     0 high:     0
Aug 30 13:38:24 StarDragon kernel: Zone:Normal freepages:  1275 min:  
1279 low: 17406 high: 25597
Aug 30 13:38:24 StarDragon kernel: Zone:HighMem freepages:     0 
min:     0 low:     0 high:     0
Aug 30 13:38:24 StarDragon kernel: Zone:DMA freepages:     0 min:     
0 low:     0 high:     0
Aug 30 13:38:24 StarDragon kernel: Zone:Normal freepages:  1307 min:  
1279 low: 17406 high: 25597
Aug 30 13:38:24 StarDragon kernel: Zone:HighMem freepages:     0 
min:     0 low:     0 high:     0
Aug 30 13:38:24 StarDragon kernel: Zone:DMA freepages:     0 min:     
0 low:     0 high:     0
Aug 30 13:38:24 StarDragon kernel: Zone:Normal freepages:  1329 min:  
1279 low: 17406 high: 25597
Aug 30 13:38:24 StarDragon kernel: Zone:HighMem freepages:     0 
min:     0 low:     0 high:     0
Aug 30 13:38:24 StarDragon kernel: Zone:DMA freepages:  1055 min:  
1056 low:  1088 high:  1120
Aug 30 13:38:24 StarDragon kernel: Zone:Normal freepages:  2036 min:  
1279 low: 17342 high: 25501
Aug 30 13:38:29 StarDragon kernel: Zone:HighMem freepages:     0 
min:     0 low:     0 high:     0
Aug 30 13:38:29 StarDragon kernel: Free pages:        7020 (     0 
HighMem)
Aug 30 13:38:30 StarDragon kernel: ( Active: 3440126/224002, 
inactive_laundry: 33959, inactive_clean: 34011, free: 7035 )
Aug 30 13:38:30 StarDragon kernel:   aa:0 ac:0 id:0 il:0 ic:0 fr:0
Aug 30 13:38:30 StarDragon kernel:   aa:984576 ac:5282 id:0 il:0 ic:0 
fr:1275
Aug 30 13:38:30 StarDragon kernel:   aa:0 ac:0 id:0 il:0 ic:0 fr:0
Aug 30 13:38:31 StarDragon kernel:   aa:0 ac:0 id:0 il:0 ic:0 fr:0
Aug 30 13:38:32 StarDragon kernel:   aa:900313 ac:13334 id:72369 
il:11219 ic:11161 fr:1340
Aug 30 13:38:32 StarDragon kernel:   aa:0 ac:0 id:0 il:0 ic:0 fr:0
Aug 30 13:38:33 StarDragon kernel:   aa:0 ac:0 id:0 il:0 ic:0 fr:0
Aug 30 13:38:34 StarDragon kernel:   aa:970654 ac:9641 id:23912 
il:3618 ic:3655 fr:1329
Aug 30 13:38:34 StarDragon kernel:   aa:0 ac:0 id:0 il:0 ic:0 fr:0
Aug 30 13:38:34 StarDragon kernel:   aa:1543 ac:0 id:0 il:0 ic:0 
fr:1055
Aug 30 13:38:35 StarDragon kernel:   aa:505483 ac:49300 id:127721 
il:19122 ic:19195 fr:2036
Aug 30 13:38:35 StarDragon kernel:   aa:0 ac:0 id:0 il:0 ic:0 fr:0
Aug 30 13:38:36 StarDragon kernel: 33*4kB 1*8kB 0*16kB 1*32kB 1*64kB 
2*128kB 2*256kB 0*512kB 0*1024kB 0*2048kB 1*4096kB = 5100kB)
Aug 30 13:38:36 StarDragon kernel: Swap cache: add 2499902, delete 
1034741, find 2689/3495, race 0+0
Aug 30 13:38:37 StarDragon kernel: 28144 pages of slabcache
Aug 30 13:38:37 StarDragon kernel: 214 pages of kernel stacks
Aug 30 13:38:37 StarDragon kernel: 1261 lowmem pagetables, 6180 
highmem pagetables
Aug 30 13:38:38 StarDragon kernel: Free swap:            0kB
Aug 30 13:38:39 StarDragon kernel: 4194300 pages of RAM
Aug 30 13:38:39 StarDragon kernel: 14579 free pages
Aug 30 13:38:40 StarDragon kernel: 410692 reserved pages
Aug 30 13:38:41 StarDragon kernel: 134023 pages shared
Aug 30 13:38:41 StarDragon kernel: 1465161 pages swap cached
Aug 30 13:38:41 StarDragon kernel: Buffer memory:     1816kB
Aug 30 13:38:42 StarDragon kernel: Cache memory:   6674564kB
Aug 30 13:38:43 StarDragon kernel:   CLEAN: 13869 buffers, 55476 
kbyte, 41 used (last=273), 0 locked, 0 dirty 0 delay
Aug 30 13:38:44 StarDragon kernel:  LOCKED: 3 buffers, 12 kbyte, 3 
used (last=3), 0 locked, 0 dirty 0 delay
Aug 30 13:38:44 StarDragon kernel:   DIRTY: 139 buffers, 556 kbyte, 
139 used (last=139), 0 locked, 131 dirty 0 delay
Aug 30 13:38:44 StarDragon kernel: Out of Memory: Killed process 4523 
(memtest).
Aug 30 14:39:16 StarDragon kernel: CPU 1: Silent Northbridge MCE
Aug 30 14:39:16 StarDragon kernel: CPU 2: Silent Northbridge MCE
Aug 30 14:39:16 StarDragon kernel: Northbridge status a60000010005001b
Aug 30 14:39:16 StarDragon kernel:     GART TLB error generic level 
generic
Aug 30 14:39:16 StarDragon kernel:     extended error gart error
Aug 30 14:39:16 StarDragon kernel:     link number 0
Aug 30 14:39:16 StarDragon kernel:     err cpu1
Aug 30 14:39:16 StarDragon kernel:     processor context corrupt
Aug 30 14:39:16 StarDragon kernel:     error address valid
Aug 30 14:39:16 StarDragon kernel:     error uncorrected
Aug 30 14:39:16 StarDragon kernel:     previous error lost
Aug 30 14:39:16 StarDragon kernel:     error address 0000000037ff0020
Aug 30 14:39:16 StarDragon kernel: Northbridge status a60000010005001b
Aug 30 14:39:17 StarDragon kernel:     GART TLB error generic level 
generic
Aug 30 14:39:18 StarDragon kernel:     extended error gart error
Aug 30 14:39:19 StarDragon kernel:     link number 0
Aug 30 14:39:19 StarDragon kernel:     err cpu1
Aug 30 14:39:19 StarDragon kernel:     processor context corrupt
Aug 30 14:39:20 StarDragon kernel:     error address valid
Aug 30 14:39:20 StarDragon kernel:     error uncorrected
Aug 30 14:39:20 StarDragon kernel:     previous error lost
Aug 30 14:39:20 StarDragon kernel:     error address 0000000037ff0008

I am aware of other issues that arose during test, such as running 
out of disk space and memory, however, I did not expect to still see 
the presence of a GART error.

Thanks for your help, and hope my testing has been of assistance.



Comment 5 Arthur Perry 2004-08-31 20:28:12 UTC
I was just wondering if I can get the necessary patches to bring -15 
up to -20, or if I canget the -20 source, so I can help debug this 
problem.
The GART error resolution is a todo action item on my list, so I 
would like to assist however I can.

Thanks

Comment 6 Ernie Petrides 2004-08-31 20:43:04 UTC
Arthur, I have just removed the 2 RPMs that I had placed under my
"people page" for you, and have added the kernel-source RPM there.

Please use the following URL to download it:

http://people.redhat.com/~petrides/.celestica/kernel-source-2.4.21-20.EL.x86_64.rpm

Thanks.  -ernie


Comment 7 Jim Paradis 2004-09-01 01:57:08 UTC
While you're looking at the source, can you be more precise about your
test so we can try to reproduce the problem here?  Does it only happen
on one model of system?  


Comment 8 Arthur Perry 2004-09-01 14:16:28 UTC
Have the source, thanks.
It was reported to me that we are seeing this problem on both a 4 way 
Opteron model, as well as our 2 way model. They both use the 8111 and 
8131 chipsets.
Neither system model has an AGP bus.
They do have different BIOS vendors, but neither is immune to this 
problem.
It also seems to become more profound, depending on the TYPE of 
processor used.
A 2.4GHz CG processor is likely to get GART errors more frequently 
than a 1.8GHZ C0.
Neither will get them when using the mainstream 2.4.27 kernel.
Also, I have discovered that the latest SuSE kernel has fixed this 
problem as well.
They used to have the same problem, but the latest release of their 
Enterprise kernel does not have this problem anymore.

The test that I have been using is an in-house test, called CSU-ST.
I am probably not able to release it yet, so I unfortuantely am 
unable to send a copy until I get permission.
However, I believe all that is done to produce these errors are CPU 
floating point tests, your standard memory excerciser tests, and a 
lot of heavy IO by reading/writing to both the onboard SCSI disk(s) 
as well as the CDROM simultaneously.
It is a pretty heavy test, as even a 4 way system will come to a 
crawl when this is running.

Let me know if you need more information.

Thanks!

Comment 9 Arthur Perry 2004-09-01 18:30:52 UTC
I just got info that you can use the "Cerberus" test found on 
Sourceforge.
This should do pretty much the same thing that our test is doing now, 
and should help produce GART errors.


Comment 10 Ernie Petrides 2004-09-01 20:18:37 UTC
Arthur, this bug number was listed in the U3 kernel erratum
(RHBA-2004:433), which was frozen on Monday before it was
realized that the problem has not been resolved.  Since U3
is already in the process of being released (pushed live on
RHN), I am not able to correct the bug list.  Thus, this bug
is going to be closed automatically by our Errata System in
the next 24 hours.

I will reopen the bug after this occurs.  -ernie


Comment 11 John Flanagan 2004-09-02 04:32:13 UTC
An errata has been issued which should help the problem 
described in this bug report. This report is therefore being 
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, 
please follow the link below. You may reopen this bug report 
if the solution does not work for you.

http://rhn.redhat.com/errata/RHBA-2004-433.html


Comment 12 Arthur Perry 2004-09-02 17:29:12 UTC
Hi Ernie,
I think it's possible that the test I was performing overnight may 
have been bunked by a passed parameter to kernel commandline that 
should not have been there.
I am going to re-run the overnight test and let you know how it goes.
I have tested the new -20 kernel for the past few hours now and it 
looks good so far.
You may have the correct fix.

I'll let you know if goes successfully here by tomorrow.


Comment 13 Ernie Petrides 2004-09-02 19:48:50 UTC
Ok Arthur, thanks for the update.  I'll leave the bug closed
for now.  If you find that the -20.EL kernel still exhibits
the original problem, please reopen the bug.  Thanks.  -ernie


Comment 14 Arthur Perry 2004-09-03 13:59:37 UTC
I have run the overnight tests and conclude that the fixes to IOMMU 
prefetch (and all other related cleanup) that you guys have done 
related to GART has fixed this problem. (-20 kernel does have fix)
There have been 0 occurences of GART errors after an overnight run.

Good work!

Best regards and thanks,
Art Perry

Comment 15 Ernie Petrides 2004-09-07 20:19:04 UTC
That's a relief!  Thanks, Arthur.  -ernie


Comment 18 Peter Martuccelli 2005-02-21 21:25:47 UTC
Jim, Please review this Bugzilla and the associated Issue Tracker and determine
if we need to leave this report as reopened, or open a new Bugzilla.

Comment 19 Court Cannick 2005-03-04 00:23:04 UTC
FYI,

We saw the bug at our site using kernel 2.4.21-27.ELsmp.

We toggled the TLB reload in the BIOS and the problem seems to have
been solved.

--Court Cannick--



Comment 20 Jim Paradis 2005-03-04 00:25:30 UTC
courtc,

That's an interesting tip; I'll check it out.  What model of system is
this?  Also, how easily can you reproduce?


Comment 21 Court Cannick 2005-03-04 00:43:09 UTC
We're running on a dual Opteron Sun v40z server.  
======================================================================
This is a known bug described in the v40z release notes. 

Translation Look-Aside Buffer (TLB) Reload Causes Errors With Certain
Linux Software

In the BIOS Advanced menu, there is an option named "No Spec. TLB
Reload." By default, this setting is disabled, which allows TLB reload.

With this default setting, errors similar to the following have been
observed on systems running any 64-bit version of Red Hat Linux and
also SUSE Linux with Service Pack 1.

Northbridge status a60000010005001b
GART error 11
Lost an northbridge error
NB status: unrecoverable
NB error address 0000000037ff07f8
Error uncorrected

To avoid these errors, you must disallow TLB reloading. To do this:

1. Reboot the server and press F2 to enter BIOS setup.

2. Navigate to the Advanced > Chipset Configuration BIOS menu.

3. Use the arrow keys to scroll down to the option "No Spec. TLB
reload" and change its setting from Disabled to Enabled.

This will disallow TLB reloading and avoid the error message.
======================================================================

--Court Cannick--

Comment 22 Nick Grundy 2005-05-12 10:10:12 UTC
Hi,

I'm seeing this error on my Quad processor Sun V40z as well running RHEL 3AS.  I set No Spec TLB 
Enabled some months ago.  I've noticed this error occouring more as the system loads and mainly 
noticed it after installing 2.4.21-27.0.4.  It seemed to happen less on 2.4.21-27.0.2 though it may 
simply because we're using the machine more.  This system maintains a load average between 1 and 
2.5 around the clock.

CPU 0: Silent Northbridge MCE
Northbridge status a60000010005001b
    GART TLB error generic level generic
    extended error gart error
    link number 0
    err cpu1
    processor context corrupt
    error address valid
    error uncorrected
    previous error lost
    error address 000000007ffe0000

Comment 23 Kevin Stussman 2005-05-12 15:51:38 UTC
Adding a "me too" to this problem. IBM 326 dual CPU AMD 64 (Memory:
9981156k/10485760k) running 2.4.21-27.0.4.ELsmp under loads from iozone (during
SAN testing).

CPU 1: Silent Northbridge MCE
Northbridge status a60000010005001b
    GART TLB error generic level generic
    extended error gart error
    link number 0
    err cpu1
    processor context corrupt
    error address valid
    error uncorrected
    previous error lost
    error address 000000013ffe0000

I'm calling IBM to see what they say (there are no references to TLB in the BIOS)

Comment 29 Jim Paradis 2005-06-07 13:24:09 UTC
It turns out that this is a misreported error.  arch/x86_64/bluesmoke.c was
decoding the machine check status wrong.  I'll attach a patch that brings RHEL3
in line with upstream.


Comment 30 Jim Paradis 2005-06-07 13:26:12 UTC
Created attachment 115183 [details]
Patch to arch/x86_64/kernel/bluesmoke.c

Comment 31 Jim Paradis 2005-06-07 13:31:30 UTC
*** Bug 138192 has been marked as a duplicate of this bug. ***

Comment 34 Brian Maly 2005-06-09 20:28:25 UTC
patch posted for review 6/9/2005

Comment 35 Brian Maly 2005-06-09 20:37:32 UTC
devel ACK for U6

Comment 38 Brian Maly 2005-06-14 14:28:08 UTC
Created attachment 115407 [details]
patch posted to rhkernel (ACKed)

Comment 39 Brian Maly 2005-06-14 14:28:52 UTC
Created attachment 115408 [details]
RHEL3 patch posted to rhkernel

this patch was acked and can be used for testing

Comment 44 Peter Martuccelli 2005-06-28 18:04:25 UTC
Patch on schedule for delivery in RHEL3 U6.

Comment 47 Ernie Petrides 2005-07-12 01:00:14 UTC
A fix for this problem has just been committed to the RHEL3 U6
patch pool this evening (in kernel version 2.4.21-32.10.EL).


Comment 52 Brian Maly 2005-08-16 15:57:56 UTC
So far we have not been able to reproduce the GART error in house and its
unclear which patch the vendor actually tested. I have been using "iozone" to
reproduce this issue but so far have had no luck (using a recent RHEL3 kernel).
This problem may be hardware specific and not a generic issue that occurs on all
AMD64 SMP systems.

Comment 54 Baif 2005-09-10 13:54:08 UTC
disable all AGP support in kernel will avoid this bug.  

Comment 55 Baif 2005-09-10 13:56:11 UTC
disable all AGP support in kernel will avoid this bug.  

Comment 56 Baif 2005-09-12 02:10:59 UTC
>Problem also goes away when Enterprise kernel is recompiled without AGP 
support. 
 
Oh. That's true. I got that error after a long time with ctcs. 

Comment 58 Red Hat Bugzilla 2005-09-28 14:27:39 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2005-663.html



Note You need to log in before you can comment on or make changes to this bug.