RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1274125 - Win7 64bit guest got BSOD with error 0x0000000A
Summary: Win7 64bit guest got BSOD with error 0x0000000A
Keywords:
Status: CLOSED DUPLICATE of bug 1241986
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: virtio-win
Version: 7.1
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Amnon Ilan
QA Contact: Virtualization Bugs
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-10-22 03:11 UTC by Yang Meng
Modified: 2016-01-13 08:32 UTC (History)
9 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-01-12 16:52:12 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
bsod screendump (148.15 KB, image/jpeg)
2015-10-22 03:17 UTC, Yang Meng
no flags Details

Description Yang Meng 2015-10-22 03:11:24 UTC
Description of problem:

Win7 64bit guest got BSOD

Version-Release number of selected component (if applicable):

qemu-kvm-1.5.3-86.el7_1.8.x86_64
kernel-3.10.0-229.20.1.el7.x86_64


itried on kernel  kernel-3.10.0-229 ,and didn't hit it .

will try on rhel7.2 and then update the comment.

How reproducible:

repeat to reboot the guest with autotest script.

Steps to Reproduce:
1. boot the guest with cmdline:
/usr/libexec/qemu-kvm \
    -name 'virt-tests-vm1'  \
    -sandbox off  \
    -machine pc  \
    -nodefaults  \
    -vga std  \
    -chardev socket,id=qmp_id_qmpmonitor1,path=/tmp/monitor-qmpmonitor1-20151021-144219-EBYaVDZi,server,nowait \
    -mon chardev=qmp_id_qmpmonitor1,mode=control  \
    -chardev socket,id=qmp_id_catch_monitor,path=/tmp/monitor-catch_monitor-20151021-144219-EBYaVDZi,server,nowait \
    -mon chardev=qmp_id_catch_monitor,mode=control \
    -device pvpanic,ioport=0x505,id=idEy4Hb4  \
    -chardev socket,id=serial_id_serial0,path=/tmp/serial-serial0-20151021-144219-EBYaVDZi,server,nowait \
    -device isa-serial,chardev=serial_id_serial0  \
    -chardev socket,id=seabioslog_id_20151021-144219-EBYaVDZi,path=/tmp/seabios-20151021-144219-EBYaVDZi,server,nowait \
    -device isa-debugcon,chardev=seabioslog_id_20151021-144219-EBYaVDZi,iobase=0x402 \
    -device ich9-usb-ehci1,id=usb1,addr=1d.7,multifunction=on,bus=pci.0 \
    -device ich9-usb-uhci1,id=usb1.0,multifunction=on,masterbus=usb1.0,addr=1d.0,firstport=0,bus=pci.0 \
    -device ich9-usb-uhci2,id=usb1.1,multifunction=on,masterbus=usb1.0,addr=1d.2,firstport=2,bus=pci.0 \
    -device ich9-usb-uhci3,id=usb1.2,multifunction=on,masterbus=usb1.0,addr=1d.4,firstport=4,bus=pci.0 \
    -drive id=drive_image1,if=none,cache=none,snapshot=off,aio=native,format=qcow2,file=/home/autotest/client/tests/virt/shared/data/images/win7-64-sp1-virtio.qcow2 \
    -device virtio-blk-pci,id=image1,drive=drive_image1,bootindex=0,bus=pci.0,addr=03 \
    -device virtio-net-pci,mac=9a:f3:f4:f5:f6:f7,id=id1Xs3Yn,vectors=4,netdev=idLCYBlF,bus=pci.0,addr=04  \
    -netdev tap,id=idLCYBlF,vhost=on \
    -m 16384  \
    -smp 16,maxcpus=16,cores=8,threads=1,sockets=2  \
    -cpu 'Westmere',hv_relaxed,+kvm_pv_unhalt,hv_spinlocks=0x1fff,hv_vapic,hv_time \
    -drive id=drive_cd1,if=none,snapshot=off,aio=native,media=cdrom,file=/home/autotest/client/tests/virt/shared/data/isos/windows/winutils.iso \
    -device ide-cd,id=cd1,drive=drive_cd1,bootindex=1,bus=ide.0,unit=0 \
    -device usb-tablet,id=usb-tablet1,bus=usb1.0,port=1  \
    -vnc :0  \
    -rtc base=localtime,clock=host,driftfix=slew  \
    -boot order=cdn,once=c,menu=off,strict=off \
    -enable-kvm \
    -monitor stdio \


2. reboot for several times.


Actual results:
win7 got bsod

Expected results:
win7 reboot with no error.

Additional info:

host info:

cpu:
processor	: 23
vendor_id	: GenuineIntel
cpu family	: 6
model		: 44
model name	: Intel(R) Xeon(R) CPU           X5650  @ 2.67GHz
stepping	: 2
microcode	: 0x15
cpu MHz		: 2660.000
cache size	: 12288 KB
physical id	: 1
siblings	: 12
core id		: 10
cpu cores	: 6
apicid		: 53
initial apicid	: 53
fpu		: yes
fpu_exception	: yes
cpuid level	: 11
wp		: yes
flags		: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm pcid dca sse4_1 sse4_2 popcnt aes lahf_lm arat epb dtherm tpr_shadow vnmi flexpriority ept vpid

1.memory.dmp analysis:

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000017800111, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800026a07d5, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  0000000017800111 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeSetEvent+1e3
fffff800`026a07d5 488b00          mov     rax,qword ptr [rax]

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

ANALYSIS_VERSION: 6.3.9600.16520 (debuggers(dbg).140127-0329) amd64fre

DPC_STACK_BASE:  FFFFF80003D95FB0

TRAP_FRAME:  fffff80003d8f8a0 -- (.trap 0xfffff80003d8f8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000017800111 rbx=0000000000000000 rcx=fffff88003f969d8
rdx=fffffa800e1561a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800026a07d5 rsp=fffff80003d8fa30 rbp=0000000000000002
 r8=0000000000000100  r9=0000000000000000 r10=0000000017800111
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
nt!KeSetEvent+0x1e3:
fffff800`026a07d5 488b00          mov     rax,qword ptr [rax] ds:00000000`17800111=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000269bbe9 to fffff8000269c640

STACK_TEXT:  
fffff800`03d8f758 fffff800`0269bbe9 : 00000000`0000000a 00000000`17800111 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`03d8f760 fffff800`0269a860 : 00000000`00000001 00000000`000000fe fffffa80`0e3c74d0 fffff880`03f969d0 : nt!KiBugCheckDispatch+0x69
fffff800`03d8f8a0 fffff800`026a07d5 : fffff880`03f969d0 00000000`00000002 00000000`00000000 fffff800`0280ee80 : nt!KiPageFault+0x260
fffff800`03d8fa30 fffff880`01691407 : fffff880`00000000 fffffa80`00000000 fffffa80`0e156100 fffffa80`0e3c7200 : nt!KeSetEvent+0x1e3
fffff800`03d8faa0 fffff880`04a3e870 : fffffa80`0e3c7200 00000000`00000000 00000000`00000000 fffffa80`0e3d5870 : ndis!NdisMPauseComplete+0x67
fffff800`03d8fad0 fffff880`04a3b6d9 : fffffa80`0e3d5968 fffffa80`0e3d58b0 fffffa80`0e3d5870 fffff880`04a37acb : netkvm+0xc870
fffff800`03d8fb00 fffff880`04a351ed : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : netkvm+0x96d9
fffff800`03d8fbb0 fffff880`04a40750 : fffffa80`0e3c7200 00000000`00000000 00000000`00000000 00000000`00000000 : netkvm+0x31ed
fffff800`03d8fbe0 fffff880`01603b51 : 00000000`00000315 fffff800`02811528 fffff800`0280ee80 01d10c51`6c92e7ca : netkvm+0xe750
fffff800`03d8fc40 fffff800`026a7b1c : fffffa80`0e0bf518 fffff800`00000000 00000000`00000000 fffff800`0280ee80 : ndis!ndisInterruptDpc+0x151
fffff800`03d8fcd0 fffff800`0269436a : fffff800`0280ee80 fffff800`0281ccc0 00000000`00000000 fffff880`01603a00 : nt!KiRetireDpcList+0x1bc
fffff800`03d8fd80 00000000`00000000 : fffff800`03d90000 fffff800`03d8a000 fffff800`03d8fd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
netkvm+c870
fffff880`04a3e870 4883c420        add     rsp,20h

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  netkvm+c870

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: netkvm

IMAGE_NAME:  netkvm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5600f3af

FAILURE_BUCKET_ID:  X64_0xA_netkvm+c870

BUCKET_ID:  X64_0xA_netkvm+c870

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xa_netkvm+c870

FAILURE_ID_HASH:  {a0fd52a1-6318-6df3-8a75-2e294a5758ca}

Followup: MachineOwner
---------

Comment 2 Yang Meng 2015-10-22 03:17:23 UTC
Created attachment 1085368 [details]
bsod screendump

Comment 4 Karen Noel 2015-10-22 10:35:33 UTC
Please provide the version of virtio-win drivers installed.

From comment 0:

> Version-Release number of selected component (if applicable):
>
> qemu-kvm-1.5.3-86.el7_1.8.x86_64
>kernel-3.10.0-229.20.1.el7.x86_64
>
> itried on kernel  kernel-3.10.0-229 ,and didn't hit it .
>
> will try on rhel7.2 and then update the comment.

Can you clarify the above? You found the problem with the 229 kernel, but then found it did not reproduce with the same kernel? This is RHEL 7.2, so will you try RHEL 7.1?

Did you get this crash more than once? Was it a similar crash footprint each time? Thanks.

Comment 5 Yang Meng 2015-10-23 01:56:59 UTC
(In reply to Karen Noel from comment #4)
> Please provide the version of virtio-win drivers installed.
> 
> From comment 0:
> 
> > Version-Release number of selected component (if applicable):
> >
> > qemu-kvm-1.5.3-86.el7_1.8.x86_64
> >kernel-3.10.0-229.20.1.el7.x86_64
> >
> > itried on kernel  kernel-3.10.0-229 ,and didn't hit it .
> >
> > will try on rhel7.2 and then update the comment.
> 
> Can you clarify the above? You found the problem with the 229 kernel, but
> then found it did not reproduce with the same kernel? This is RHEL 7.2, so
> will you try RHEL 7.1?
> 
> Did you get this crash more than once? Was it a similar crash footprint each
> time? Thanks.

virtio_win_driver:

virtio-win-1.8.0-4.iso

got this problems on a z stream kernel ,so i use the formal one to retry..i got this problem 2 times,thanks.

Comment 7 Yvugenfi@redhat.com 2016-01-12 16:52:12 UTC

*** This bug has been marked as a duplicate of bug 1241986 ***


Note You need to log in before you can comment on or make changes to this bug.