Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 606370 Details for
Bug 849223
RHEL5 Xen SR-IOV VF PCI passthru does not work to RHEL6 HVM guest; no interrupts received on the guest VF
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
rhel63 x64 xen hvm guest linux kernel crash with pci=nomsi
rhel63-x64-hvm-guest-linux-kernel-crash-with-pci-nomsi-log.txt (text/plain), 3.94 KB, created by
Pasi Karkkainen
on 2012-08-22 19:59:39 UTC
(
hide
)
Description:
rhel63 x64 xen hvm guest linux kernel crash with pci=nomsi
Filename:
MIME Type:
Creator:
Pasi Karkkainen
Created:
2012-08-22 19:59:39 UTC
Size:
3.94 KB
patch
obsolete
>BUG: unable to handle kernel NULL pointer dereference at (null) >IP: [<ffffffffa014a295>] ixgbevf_open+0x475/0x600 [ixgbevf] >PGD 37ce7067 PUD 3ded7067 PMD 0 >Oops: 0000 [#1] SMP >last sysfs file: /sys/devices/vbd-768/block/xvda/dev >CPU 0 >Modules linked in: ipt_REJECT nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter ip_tables ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 ext3 jbd xen_netfront ixgbevf i2c_piix4 i2c_core sg ext4 mbcache jbd2 sr_mod cdrom xen_blkfront pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan] > >Pid: 1106, comm: ifconfig Not tainted 2.6.32-279.el6.x86_64 #1 Red Hat HVM domU >RIP: 0010:[<ffffffffa014a295>] [<ffffffffa014a295>] ixgbevf_open+0x475/0x600 [ixgbevf] >RSP: 0018:ffff88003b05dc98 EFLAGS: 00010246 >RAX: 0000000000000000 RBX: ffff880037cf76e0 RCX: 0000000000000000 >RDX: 0000000000000000 RSI: ffffffffa0146cf0 RDI: ffff880037cf7778 >RBP: ffff88003b05dd08 R08: ffff880037cf7770 R09: ffff880037cf7020 >R10: 0000000000000001 R11: 0000000000000000 R12: ffff880037cf7770 >R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 >FS: 00007f9a9bc507a0(0000) GS:ffff880002200000(0000) knlGS:0000000000000000 >CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >CR2: 0000000000000000 CR3: 0000000037ccf000 CR4: 00000000000006f0 >DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 >Process ifconfig (pid: 1106, threadinfo ffff88003b05c000, task ffff880037a18ae0) >Stack: > 0000000000000000 0000000000000000 ffff88003b05dce8 ffffffff81503325 ><d> ffff880037cf7020 ffff880037cf7770 ffffffffa014b280 0000000100001002 ><d> 0000000000000000 ffff880037cf7020 ffffffffa014b280 0000000000001002 >Call Trace: > [<ffffffff81503325>] ? notifier_call_chain+0x55/0x80 > [<ffffffff8143c221>] dev_open+0xa1/0x100 > [<ffffffff8143b981>] dev_change_flags+0xa1/0x1d0 > [<ffffffff814a150b>] devinet_ioctl+0x5eb/0x690 > [<ffffffff814a2698>] inet_ioctl+0x88/0xa0 > [<ffffffff81426bea>] sock_ioctl+0x7a/0x280 > [<ffffffff8118dec2>] vfs_ioctl+0x22/0xa0 > [<ffffffff8118e064>] do_vfs_ioctl+0x84/0x580 > [<ffffffff8118e5e1>] sys_ioctl+0x81/0xa0 > [<ffffffff8100b0f2>] system_call_fastpath+0x16/0x1b >Code: b0 48 c7 c6 19 bb 14 a0 31 c0 4c 89 e7 e8 f4 2a 13 e1 48 8b 83 58 01 00 00 4c 8b 4d b0 31 c9 31 d2 4d 89 e0 48 c7 c6 f0 6c 14 a0 <42> 8b 3c 30 e8 32 2c f9 e0 85 c0 41 89 c6 0f 84 17 01 00 00 41 >RIP [<ffffffffa014a295>] ixgbevf_open+0x475/0x600 [ixgbevf] > RSP <ffff88003b05dc98> >CR2: 0000000000000000 >---[ end trace 1c1bc429b68350a0 ]--- >Kernel panic - not syncing: Fatal exception >Pid: 1106, comm: ifconfig Tainted: G D --------------- 2.6.32-279.el6.x86_64 #1 >Call Trace: > [<ffffffff814fd11a>] ? panic+0xa0/0x168 > [<ffffffff815012b4>] ? oops_end+0xe4/0x100 > [<ffffffff81043bab>] ? no_context+0xfb/0x260 > [<ffffffff81043e35>] ? __bad_area_nosemaphore+0x125/0x1e0 > [<ffffffff81043f5e>] ? bad_area+0x4e/0x60 > [<ffffffff81044710>] ? __do_page_fault+0x3d0/0x480 > [<ffffffff8143014d>] ? __alloc_skb+0x6d/0x190 > [<ffffffff8100bc0e>] ? apic_timer_interrupt+0xe/0x20 > [<ffffffff8100bc0e>] ? apic_timer_interrupt+0xe/0x20 > [<ffffffff8127b550>] ? string+0x40/0x100 > [<ffffffff8127d4e1>] ? delay_tsc+0x51/0x80 > [<ffffffff8150326e>] ? do_page_fault+0x3e/0xa0 > [<ffffffff81500625>] ? page_fault+0x25/0x30 > [<ffffffffa0146cf0>] ? ixgbevf_msix_mbx+0x0/0xf0 [ixgbevf] > [<ffffffffa014a295>] ? ixgbevf_open+0x475/0x600 [ixgbevf] > [<ffffffffa014a27c>] ? ixgbevf_open+0x45c/0x600 [ixgbevf] > [<ffffffff81503325>] ? notifier_call_chain+0x55/0x80 > [<ffffffff8143c221>] ? dev_open+0xa1/0x100 > [<ffffffff8143b981>] ? dev_change_flags+0xa1/0x1d0 > [<ffffffff814a150b>] ? devinet_ioctl+0x5eb/0x690 > [<ffffffff814a2698>] ? inet_ioctl+0x88/0xa0 > [<ffffffff81426bea>] ? sock_ioctl+0x7a/0x280 > [<ffffffff8118dec2>] ? vfs_ioctl+0x22/0xa0 > [<ffffffff8118e064>] ? do_vfs_ioctl+0x84/0x580 > [<ffffffff8118e5e1>] ? sys_ioctl+0x81/0xa0 > [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 849223
:
606043
|
606044
|
606045
|
606046
|
606050
|
606051
|
606365
|
606370
|
606639
|
610520
|
611505
|
613668
|
614372
|
614373
|
614374
|
614596
|
615391
|
615392
|
615482
|
616740
|
617217
|
617218
|
617260
|
617261
|
617528
|
617541
|
617718
|
618009
|
618145
|
618240
|
618241
|
618312