| Summary: | [WHQL][netkvm]BSOD (0A)occurs when running Common Scenario Stress with IO job on win2k8-64 guest | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Mike Cao <bcao> |
| Component: | virtio-win | Assignee: | Dmitry Fleytman <dfleytma> |
| Status: | CLOSED WONTFIX | QA Contact: | Virtualization Bugs <virt-bugs> |
| Severity: | urgent | Docs Contact: | |
| Priority: | urgent | ||
| Version: | 6.5 | CC: | acathrow, bcao, bsarathy, chayang, dfleytma, michen, rhod, yvugenfi |
| Target Milestone: | rc | Keywords: | Regression, TestBlocker |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2013-11-06 08:36:44 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
Mike Cao
2013-09-29 12:56:39 UTC
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800016cfe94, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000010
CURRENT_IRQL: 0
FAULTING_IP:
nt!IopCompleteRequest+b74
fffff800`016cfe94 4c8b4910 mov r9,qword ptr [rcx+10h]
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME:
IRP_ADDRESS: fffffa6000865098
TRAP_FRAME: fffffa60019e5090 -- (.trap 0xfffffa60019e5090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa60019e5428 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800016cfe94 rsp=fffffa60019e5220 rbp=fffff9800a4f8e88
r8=fffffa60019e5318 r9=fffffa60019e5310 r10=fffffa60005ecf00
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!IopCompleteRequest+0xb74:
fffff800`016cfe94 4c8b4910 mov r9,qword ptr [rcx+10h] ds:00000000`00000010=????????????????
Resetting default scope
LOCK_ADDRESS: fffff8000185dca0 -- (!locks fffff8000185dca0)
Resource @ nt!PiEngineLock (0xfffff8000185dca0) Exclusively owned
Contention Count = 139
Threads: fffffa8004f6a720-01<*>
1 total locks, 1 locks currently held
PNP_TRIAGE:
Lock address : 0xfffff8000185dca0
Thread Count : 1
Thread address: 0xfffffa8004f6a720
Thread wait : 0x1e703
LAST_CONTROL_TRANSFER: from fffff800016b9eee to fffff800016ba150
STACK_TEXT:
fffffa60`019e4f48 fffff800`016b9eee : 00000000`0000000a 00000000`00000010 00000000`0000000c 00000000`00000000 : nt!KeBugCheckEx
fffffa60`019e4f50 fffff800`016b8dcb : 00000000`00000000 fffff800`0171656f 00000000`00000103 fffff980`0a4f8e10 : nt!KiBugCheckDispatch+0x6e
fffffa60`019e5090 fffff800`016cfe94 : fffff980`00000000 00000000`00000000 fffff980`0a4f8fb8 fffffa80`0758ed20 : nt!KiPageFault+0x20b
fffffa60`019e5220 fffff800`016db8be : fffffa60`00865110 fffffa80`04f6a720 fffffa60`019e5380 fffff800`01abb992 : nt!IopCompleteRequest+0xb74
fffffa60`019e52e0 fffff800`016df303 : fffffa60`019e5400 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x19e
fffffa60`019e5380 fffffa60`00b57b33 : fffffa60`00b389ab 00000000`00000000 fffffa60`00b3a0a8 fffffa80`000e0000 : nt!KiApcInterrupt+0x103
fffffa60`019e5518 fffffa60`00b389ab : 00000000`00000000 fffffa60`00b3a0a8 fffffa80`000e0000 00000000`000007ff : acpi!memset+0x3
fffffa60`019e5520 fffffa60`00b32cef : fffffa80`05b76d50 fffffa80`4154535f fffffa60`00000000 fffffa80`071c5c00 : acpi!ACPIGet+0x197
fffffa60`019e55c0 fffffa60`00b6783b : 00000000`00000000 fffffa60`019e5688 00000000`0000000f 00000000`00000000 : acpi!ACPIDetectFilterDevices+0xf7
fffffa60`019e5650 fffffa60`00b362e5 : fffffa60`00b67794 fffffa80`071c5c70 fffffa80`05b5d450 fffffa80`05a5a140 : acpi!ACPIBusIrpQueryDeviceRelations+0xa7
fffffa60`019e5680 fffff800`01ac658a : fffff980`0a4c8ea0 fffffa80`05b5d450 fffff980`0a4c8ea0 00000000`00000002 : acpi!ACPIDispatchIrp+0x191
fffffa60`019e5700 fffffa60`00bb043f : fffff980`0a4c8f70 fffff980`0a4c8ea0 00000000`00000002 fffffa80`0656f3f0 : nt!IovCallDriver+0x34a
fffffa60`019e5740 fffffa60`00bae608 : 00000000`00000000 fffffa80`05b5b6f0 fffffa60`019e5800 00000000`000007ff : pci!PciCallDownIrpStack+0x73
fffffa60`019e57a0 fffffa60`00b98aaa : fffff980`0a4c8ea0 fffff980`0a4c8fb8 fffff980`0a4c8ea0 fffff800`01ab1dbd : pci!PciBus_QueryDeviceRelations+0x1bc
fffffa60`019e57f0 fffff800`01ac658a : fffff980`0a4c8ea0 00000000`00000002 fffffa80`05b5b5a0 fffff880`06c7b410 : pci!PciDispatchPnpPower+0xda
fffffa60`019e5830 fffff800`019f4901 : fffff980`0a4c8ea0 fffffa80`071b86f0 fffff980`0a4c8ea0 fffffa80`07706e70 : nt!IovCallDriver+0x34a
fffffa60`019e5870 fffff800`019f7060 : 00000000`00280026 fffff800`0176dc30 fffffa80`05b5d450 00000000`00000003 : nt!PnpAsynchronousCall+0xd1
fffffa60`019e58b0 fffff800`01a3e5a0 : fffffa80`05b5c790 fffffa80`05b5c790 00000000`00000002 fffffa80`05b5c790 : nt!PnpQueryDeviceRelations+0xd0
fffffa60`019e5960 fffff800`01a96e7c : fffffa80`05b5c790 fffffa80`05b5c790 fffffa80`05b5c790 00000000`00000002 : nt!PipEnumerateDevice+0x120
fffffa60`019e59c0 fffff800`01a9741a : 00000000`00000000 fffff800`016bf8a4 00000000`00000000 fffff800`018b8531 : nt!PipProcessDevNodeTree+0x21c
fffffa60`019e5c30 fffff800`0179100d : fffff801`00000003 fffffa80`075c6430 00000000`00000000 fffffa60`32706e50 : nt!PiProcessReenumeration+0x8a
fffffa60`019e5c80 fffff800`016c15cb : fffff800`01790de0 fffffa01`00000001 fffff800`017f48f8 00000000`00000000 : nt!PnpDeviceActionWorker+0x22d
fffffa60`019e5cf0 fffff800`018c6227 : fffff800`0185b620 00000000`00000000 fffffa80`04f6a720 00000000`00000080 : nt!ExpWorkerThread+0xfb
fffffa60`019e5d50 fffff800`016f7456 : fffffa60`005ec180 fffffa80`04f6a720 fffffa60`005f5d40 fffffa80`04f69ca8 : nt!PspSystemThreadStartup+0x57
fffffa60`019e5d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
pci!PciCallDownIrpStack+73
fffffa60`00bb043f 3d03010000 cmp eax,103h
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: pci!PciCallDownIrpStack+73
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: pci
IMAGE_NAME: pci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49e024a5
FAILURE_BUCKET_ID: X64_0xA_VRF_pci!PciCallDownIrpStack+73
BUCKET_ID: X64_0xA_VRF_pci!PciCallDownIrpStack+73
Followup: MachineOwner
Is this HCK or WLK? If this is HCK - I suggest to close it. (In reply to Yan Vugenfirer from comment #4) > Is this HCK or WLK? > > If this is HCK - I suggest to close it. HCK |