Red Hat Bugzilla – Bug 198703
spinlock bad magic after interrupts dropped on 3c574_cs card
Last modified: 2008-01-19 23:37:10 EST
Description of problem:
I found this on /var/log/messages on my firewall (an old notebook with an old
3com pc card playing as the external interface), all in the same second:
eth1: interrupt(s) dropped!
BUG: spinlock bad magic on CPU#0, swapper/0 (Not tainted)
lock: da95ce30, .magic: c0431fc6, .owner: <none>/-1, .owner_cpu: 0
<c04d9066> _raw_spin_lock+0x1b/0xe9 <c0405047> do_IRQ+0x75/0x80
<e08557d0> el3_interrupt+0x50/0x1ce [3c574_cs] <e08564b9>
<c0601955> _spin_unlock_irq+0x5/0x7 <c042eafd> hrtimer_run_queues+0x102/0x119
<c0423727> run_timer_softirq+0x10f/0x16b <c05ad408> net_rx_action+0x7d/0x151
<e0856447> media_check+0x0/0x2ad [3c574_cs] <c042070b> __do_softirq+0x35/0x7f
<c0405047> do_IRQ+0x75/0x80 <c04036f2> common_interrupt+0x1a/0x20
<c0512e7f> acpi_processor_idle+0x15a/0x32b <c0401f4d> cpu_idle+0x3a/0x4f
<c071f724> start_kernel+0x2d7/0x2db <c071f249> unknown_bootoption+0x0/0x204
Version-Release number of selected component (if applicable):
No idea of how to duplicate it
A new kernel update has been released (Version: 2.6.18-1.2200.fc5)
based upon a new upstream kernel release.
Please retest against this new kernel, as a large number of patches
go into each upstream release, possibly including changes that
may address this problem.
This bug has been placed in NEEDINFO state.
Due to the large volume of inactive bugs in bugzilla, if this bug is
still in this state in two weeks time, it will be closed.
Should this bug still be relevant after this period, the reporter
can reopen the bug at any time. Any other users on the Cc: list
of this bug can request that the bug be reopened by adding a
comment to the bug.
In the last few updates, some users upgrading from FC4->FC5
have reported that installing a kernel update has left their
systems unbootable. If you have been affected by this problem
please check you only have one version of device-mapper & lvm2
installed. See bug 207474 for further details.
If this bug is a problem preventing you from installing the
release this version is filed against, please see bug 169613.
If this bug has been fixed, but you are now experiencing a different
problem, please file a separate bug for the new problem.
(this is a mass-close to kernel bugs in NEEDINFO state)
As indicated previously there has been no update on the progress of this bug
therefore I am closing it as INSUFFICIENT_DATA. Please re-open if the issue
still occurs for you and I will try to assist in its resolution. Thank you for
taking the time to report the initial bug.
If you believe that this bug was closed in error, please feel free to reopen