Bug 562777 - [RHEL5 Xen] EXPERIMENTAL EX/MC: Dom0 soft lockups on >64-way system from hard-virt patches [rhel-5.4.z]
Summary: [RHEL5 Xen] EXPERIMENTAL EX/MC: Dom0 soft lockups on >64-way system from hard...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel-xen
Version: 5.4
Hardware: x86_64
OS: Linux
high
high
Target Milestone: rc
: ---
Assignee: Jiri Pirko
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard:
Depends On: 529271
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-02-08 11:11 UTC by RHEL Program Management
Modified: 2015-05-05 01:19 UTC (History)
26 users (show)

Fixed In Version: kernel-2.6.18-164.13.1.el5
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-03-17 00:19:52 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0147 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2010-03-17 00:18:44 UTC

Description RHEL Program Management 2010-02-08 11:11:57 UTC
This bug has been copied from bug #529271 and has been proposed
to be backported to 5.4 z-stream (EUS).

Comment 6 Jiri Pirko 2010-02-10 07:40:17 UTC
in 2.6.18-164.13.1.el5

Comment 9 Rita Wu 2010-03-02 09:15:13 UTC
Hi,

I'm wondering whether hard-virt patches is supported in released kernel-xen-2.6.18-164 for I to reproduce this bug. Alternately, where can I get kernel-xen-2.6.18-164.el5experimental.2?

Thanks,
Rita

Comment 13 errata-xmlrpc 2010-03-17 00:19:52 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2010-0147.html


Note You need to log in before you can comment on or make changes to this bug.