Bug 1335720
Summary: | watchdog action 'inject-nmi' takes no effect | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Xu Han <xuhan> |
Component: | qemu-kvm-rhev | Assignee: | Bandan Das <bdas> |
Status: | CLOSED ERRATA | QA Contact: | Xu Han <xuhan> |
Severity: | unspecified | Docs Contact: | |
Priority: | medium | ||
Version: | 7.3 | CC: | chayang, huding, juzhang, knoel, mrezanin, virt-maint |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | qemu-kvm-rhev-2.6.0-5.el7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2016-11-07 21:08:03 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Xu Han
2016-05-13 05:41:32 UTC
(In reply to Xu Han from comment #0) > Description of problem: > Watchdog action 'inject-nmi' takes no effect. I checked the source codes and > the build log of qemu-kvm-rhev-2.6.0-1.el7.x86_64 and found that macro > 'TARGET_I386' is missing. > You are right, the code inside of the ifdefs isn't getting compiled and will throw an error even if you try to. I will post patches shortly. Thanks for debugging! Fix included in qemu-kvm-rhev-2.6.0-5.el7 Verified this issue with qemu-kvm-rhev-2.6.0-22.el7.x86_64. Steps: same as comment 0. Results: Guest could receive the NMI. [ 306.155563] i6300esb: Unexpected close, not stopping watchdog! [ 311.158013] Uhhuh. NMI received for unknown reason 21 on CPU 0. [ 311.158013] Do you have a strange power saving mode enabled? [ 311.158013] Dazed and confused, but trying to continue So, this bug has been fixed. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-2673.html |