Guest

Preview Tool

Cisco Bug: CSCvh98466 - ESXi PSOD due to port ID corruption

Last Modified

Sep 14, 2019

Products (2)

  • Cisco Nexus 1000V Switch for VMware vSphere
  • Cisco Nexus 1000V Switch

Known Affected Releases

5.2(1)SV3(3.1)

Description (partial)

Symptom:
ESXi crashed with below dump:-

2018-01-10T04:14:38.755Z cpu20:66107)@BlueScreen: #PF Exception 14 in world 66107:vmnic0-pollW IP 0x41801b1667ad addr 0x250
PTEs:0x286afd2027;0x172a29027;0x0;
2018-01-10T04:14:38.756Z cpu20:66107)Code start: 0x41801a600000 VMK uptime: 95:23:54:48.236
2018-01-10T04:14:38.756Z cpu20:66107)0x439111d9b8b0:[0x41801b1667ad]NetSchedFIFOInput@(netsched_fifo)#<None>+0x225 stack: 0x439d50989e00
2018-01-10T04:14:38.756Z cpu20:66107)0x439111d9b960:[0x41801a7d9561]IOChain_Resume@vmkernel#nover+0x1b5 stack: 0x43041c55dc40
2018-01-10T04:14:38.757Z cpu20:66107)0x439111d9ba10:[0x41801a809b60]PortOutput@vmkernel#nover+0x118 stack: 0x439111d9bbf0
2018-01-10T04:14:38.757Z cpu20:66107)0x439111d9ba70:[0x41801a8323b5]vmk_PortOutput@vmkernel#nover+0x69 stack: 0x400007d
2018-01-10T04:14:38.757Z cpu20:66107)0x439111d9bab0:[0x41801b44a3c5]svs_transmit_packet_list@com.vmware.vmkapi#v2_2_0_0+0x141 stack: 0x48
2018-01-10T04:14:38.758Z cpu20:66107)0x439111d9bb10:[0x41801b8fe8b3]sf_platform_pktlist_transmit@com.vmware.vmkapi#v2_2_0_0+0xe3 stack: 0x41801b653b01
2018-01-10T04:14:38.758Z cpu20:66107)0x439111d9bb50:[0x41801b50cb3e]sf_port_egress_list_stage@com.vmware.vmkapi#v2_2_0_0+0x155e stack: 0x2e01
2018-01-10T04:14:38.759Z cpu20:66107)0x439111d9bc80:[0x41801b466ad4]sf_scheduler_exit@com.vmware.vmkapi#v2_2_0_0+0x670 stack: 0x43008ff9ad80
2018-01-10T04:14:38.759Z cpu20:66107)0x439111d9bcd0:[0x41801b46b9d5]sf_sched_packet_list@com.vmware.vmkapi#v2_2_0_0+0x1681 stack: 0x14
2018-01-10T04:14:38.759Z cpu20:66107)0x439111d9be00:[0x41801b8e2296]svs_packet_list_receive@com.vmware.vmkapi#v2_2_0_0+0x12a stack: 0x43041c529cb0
2018-01-10T04:14:38.760Z cpu20:66107)0x439111d9be40:[0x41801b43ca95]svs_set_pcpu_pshandle@com.vmware.vmkapi#v2_2_0_0+0x2f9 stack: 0x0
2018-01-10T04:14:38.760Z cpu20:66107)0x439111d9bec0:[0x41801a809d5c]Port_InputResume@vmkernel#nover+0x120 stack: 0x41801a809d4a
2018-01-10T04:14:38.761Z cpu20:66107)0x439111d9bf10:[0x41801a7b33bf]Net_AcceptRxList@vmkernel#nover+0x11b stack: 0x43041c55d840
2018-01-10T04:14:38.761Z cpu20:66107)0x439111d9bf70:[0x41801a831021]NetPollWorldCallback@vmkernel#nover+0x155 stack: 0x10
2018-01-10T04:14:38.762Z cpu20:66107)0x439111d9bfe0:[0x41801a8c8c95]CpuSched_StartWorld@vmkernel#nover+0x99 stack: 0x0
2018-01-10T04:14:38.771Z cpu20:66107)base fs=0x0 gs=0x418045000000 Kgs=0x0

Conditions:
5.2(1)SV3(3.1)
ESXi : 6.5
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.