Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1440538 Details for
Bug 1515663
[virtio-win][whql][NETKVM] guest bsod(8e) when running some jobs on win7-32 --DF-PNP & DF-Fuzz &CHAOS
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
WinDbg_printout_messages
debug_messages.txt (text/plain), 14.70 KB, created by
Peixiu Hou
on 2018-05-23 09:46:43 UTC
(
hide
)
Description:
WinDbg_printout_messages
Filename:
MIME Type:
Creator:
Peixiu Hou
Created:
2018-05-23 09:46:43 UTC
Size:
14.70 KB
patch
obsolete
> >Microsoft (R) Windows Debugger Version 6.3.9600.16520 X86 >Copyright (c) Microsoft Corporation. All rights reserved. > >Opened \\.\com1 >Waiting to reconnect... >Connected to Windows 7 7601 x86 compatible target at (Wed May 23 08:43:55.093 2018 (UTC + 8:00)), ptr64 FALSE >Kernel Debugger connection established. > >************* Symbol Path validation summary ************** >Response Time (ms) Location >Deferred SRV*c:\symbols\*http://msdl.microsoft.com/download/symbols >Symbol search path is: SRV*c:\symbols\*http://msdl.microsoft.com/download/symbols >Executable search path is: >Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible >Product: WinNt, suite: TerminalServer SingleUserTS >Built by: 7601.17514.x86fre.win7sp1_rtm.101119-1850 >Machine Name: >Kernel base = 0x8261b000 PsLoadedModuleList = 0x82765850 >Debug session time: Wed May 23 16:43:53.906 2018 (UTC + 8:00) >System Uptime: 0 days 0:06:00.843 >Assertion: >Interrupt Service Routine has changed extended thread context. >Please run !analyze and notify the person listed as follow-up. > >nt!ViCtxCheckAndReleaseXSaveData+0x59: >8295c20c cd2c int 2Ch >0: kd> >0: kd> >0: kd> !analyze >Connected to Windows 7 7601 x86 compatible target at (Wed May 23 09:00:50.531 2018 (UTC + 8:00)), ptr64 FALSE >Loading Kernel Symbols >..... > >Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. >Run !sym noisy before .reload to track down problems loading symbols. > >.......................................................... >................................................................ >..... >Loading User Symbols >............ > >Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. >Run !sym noisy before .reload to track down problems loading symbols. > >... >Loading unloaded module list >...... >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >Use !analyze -v to get detailed debugging information. > >BugCheck C4, {110, 84d072b0, 8453dc80, 8453d900} > >Probably caused by : ntkrpamp.exe ( nt!ViCtxCheckAndReleaseXSaveData+59 ) > >Followup: MachineOwner >--------- > >0: kd> !analyze -v >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >DRIVER_VERIFIER_DETECTED_VIOLATION (c4) >A device driver attempting to corrupt the system has been caught. This is >because the driver was specified in the registry as being suspect (by the >administrator) and the kernel has enabled substantial checking of this driver. >If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will >be among the most commonly seen crashes. >Arguments: >Arg1: 00000110, Extended thread context corrupted by Interrupt Service Routine. >Arg2: 84d072b0, The address of the Interrupt Service Routine. >Arg3: 8453dc80, Address of the extended context saved before executing ISR. >Arg4: 8453d900, Address of the extended context saved after executing ISR. > >Debugging Details: >------------------ > > >ADDITIONAL_DEBUG_TEXT: Bugcheck data extracted fron VfErrorBugcheckData. > >BUGCHECK_STR: 0xc4_110 > >DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT > >PROCESS_NAME: conhost.exe > >CURRENT_IRQL: 9 > >ANALYSIS_VERSION: 6.3.9600.16520 (debuggers(dbg).140127-0329) x86fre > >EXCEPTION_RECORD: 899e9c80 -- (.exr 0xffffffff899e9c80) >ExceptionAddress: 8295c07c (nt!ViCtxIsr) > ExceptionCode: 02780016 > ExceptionFlags: 899e9c84 >NumberParameters: 0 > >TRAP_FRAME: 88a63a4c -- (.trap 0xffffffff88a63a4c) >ErrCode = 00000000 >eax=00000001 ebx=c080204e ecx=00000000 edx=c0600018 esi=c0003800 edi=c0600018 >eip=8268dc5a esp=88a63ac0 ebp=88a63b14 iopl=0 nv up ei pl nz na pe nc >cs=0008 ss=0010 ds=0111 es=0000 fs=3a00 gs=0000 efl=00010206 >nt!MiCommitExistingVad+0x26f: >8268dc5a 8b0e mov ecx,dword ptr [esi] ds:0111:3800=???????? >Resetting default scope > >LAST_CONTROL_TRANSFER: from 8295c0ac to 8295c20c > >STACK_TEXT: >88a63a04 8295c0ac 84d072b0 899e9c80 899e6ce8 nt!ViCtxCheckAndReleaseXSaveData+0x59 >88a63a20 826557ad 899e9c80 899d0850 88a63a4c nt!ViCtxIsr+0x30 >88a63a20 8268dc5a 899e9c80 899d0850 88a63a4c nt!KiInterruptDispatch+0x6d >88a63b14 828477bc 93baec48 00700000 00001000 nt!MiCommitExistingVad+0x26f >88a63c14 826591ea ffffffff 0058ebe8 00000000 nt!NtAllocateVirtualMemory+0xd5a >88a63c14 771670b4 ffffffff 0058ebe8 00000000 nt!KiFastCallEntry+0x12a >0058eb28 771652e4 77182ba7 ffffffff 0058ebe8 ntdll!KiFastSystemCallRet >0058eb2c 77182ba7 ffffffff 0058ebe8 00000000 ntdll!NtAllocateVirtualMemory+0xc >0058ec08 7552c628 00001002 00000000 00040000 ntdll!RtlCreateHeap+0x487 >0058ec2c 7407b087 00000000 00000000 00000000 KERNELBASE!HeapCreate+0x55 >0058ec44 7407b063 00000001 7407afad 0058ec64 uxtheme!ThemeHeapStaticInitialize+0x1e [d:\w7rtm\shell\themes\themeldr\memory.cpp @ 78] >0058ec4c 7407afad 0058ec64 7407a1a6 74070000 uxtheme!ThemeHeapStaticInitialize+0x7 [d:\w7rtm\shell\themes\themeldr\memory.cpp @ 92] >0058ec54 7407a1a6 74070000 00000000 0058ecc4 uxtheme!ProcessStartUp+0x22 [d:\w7rtm\shell\themes\uxtheme\dllmain.cpp @ 54] >0058ec64 7407a36b 74070000 00000001 00000000 uxtheme!DllMain+0x60 [d:\w7rtm\shell\themes\uxtheme\dllmain.cpp @ 130] >0058ecc4 771789d8 74070000 00000001 00000000 uxtheme!__DllMainCRTStartup+0xe1 [d:\winmain\minkernel\crts\crtw32\dllstuff\crtdll.c @ 573] >0058ece4 77185c41 7407a2dd 74070000 00000001 ntdll!LdrpCallInitRoutine+0x14 >0058edd8 7718052e 00000000 77421fd0 77167c9a ntdll!LdrpRunInitializeRoutines+0x26f >0058ef44 7718232c 0058efa4 0058ef70 00000000 ntdll!LdrpLoadDll+0x4d1 >0058ef78 755288ee 00239a4c 0058efb8 0058efa4 ntdll!LdrLoadDll+0x92 >0058efb0 75efefdc 00000000 00000000 00000001 KERNELBASE!LoadLibraryExW+0x15a >0058f0e4 77166fee 0058f0fc 00000098 0058f1bc USER32!__ClientLoadLibrary+0x60 >0058f190 75f0da1a 75efe34b 0000000f 62b3abdd ntdll!KiUserCallbackDispatcher+0x2e >0058f194 75efe34b 0000000f 62b3abdd 001f06a8 USER32!NtUserCallNoParam+0xc >0058f1cc 75f01274 00000032 001f06a8 001f05a4 USER32!GetSystemMetrics+0x49 >0058f1ec 00e3562a 001f08b8 00000000 0058f21c USER32!PrivateExtractIconExW+0x4e >0058f9f8 00e3551d 001f05a4 001f06a8 0058fa24 conhost!LoadLinkInfo+0x1fe >0058fa18 00e351c7 001f05a4 00000036 001f06a8 conhost!SetUpConsole+0x30 >0058fa40 00e3517e 001f05a4 0023bf58 00000000 conhost!ConsoleAllocateConsole+0x2e >0058fa64 00e3167f 00000000 0058fa88 00000000 conhost!SrvConsoleClientConnect+0xbd >0058fb30 76093c45 00000000 0058fb7c 771837f5 conhost!ConsoleLpcThread+0x13e >0058fb3c 771837f5 00000000 77420be8 00000000 kernel32!BaseThreadInitThunk+0xe >0058fb7c 771837c8 00e315ba 00000000 00000000 ntdll!__RtlUserThreadStart+0x70 >0058fb94 00000000 00e315ba 00000000 00000000 ntdll!_RtlUserThreadStart+0x1b > > >STACK_COMMAND: kb > >FOLLOWUP_IP: >nt!ViCtxCheckAndReleaseXSaveData+59 >8295c20c cd2c int 2Ch > >SYMBOL_STACK_INDEX: 0 > >SYMBOL_NAME: nt!ViCtxCheckAndReleaseXSaveData+59 > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: nt > >IMAGE_NAME: ntkrpamp.exe > >DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78a09 > >IMAGE_VERSION: 6.1.7601.17514 > >FAILURE_BUCKET_ID: 0xc4_110_VRF_nt!ViCtxCheckAndReleaseXSaveData+59 > >BUCKET_ID: 0xc4_110_VRF_nt!ViCtxCheckAndReleaseXSaveData+59 > >ANALYSIS_SOURCE: KM > >FAILURE_ID_HASH_STRING: km:0xc4_110_vrf_nt!victxcheckandreleasexsavedata+59 > >FAILURE_ID_HASH: {ddec3e6d-fc70-e144-f5de-f51734f22a90} > >Followup: MachineOwner >--------- > >0: kd> d >8295c20c cd 2c 85 c0 74 09 33 c0-b9 18 86 99 82 87 01 33 .,..t.3........3 >8295c21c c0 83 c6 04 87 06 5f 5e-5b 5d c2 04 00 90 cc cc ......_^[]...... >8295c22c cc cc cc cc 90 90 90 90-90 8b ff 55 8b ec b9 44 ...........U...D >8295c23c cc 75 82 ff 15 88 c1 61-82 8b 4d 08 88 01 64 a1 .u.....a..M...d. >8295c24c 24 01 00 00 a3 40 cc 75-82 5d c2 04 00 90 90 90 $....@.u.]...... >8295c25c cc cc cc cc cc cc 90 90-90 90 90 83 25 40 cc 75 ............%@.u >8295c26c 82 00 b9 44 cc 75 82 ff-25 84 c1 61 82 90 90 90 ...D.u..%..a.... >8295c27c cc cc cc cc cc cc 90 90-90 90 90 8b ff 55 8b ec .............U.. >0: kd> .crash >Break instruction exception - code 80000003 (first chance) > >A fatal system error has occurred. > >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >Use !analyze -v to get detailed debugging information. > >BugCheck E2, {0, 0, 0, 0} > >Probably caused by : ntkrpamp.exe ( nt!KdpSendWaitContinue+743 ) > >Followup: MachineOwner >--------- > >nt!RtlpBreakWithStatusInstruction: >82696110 cc int 3 >0: kd> !analyze -v >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >MANUALLY_INITIATED_CRASH (e2) >The user manually initiated this crash dump. >Arguments: >Arg1: 00000000 >Arg2: 00000000 >Arg3: 00000000 >Arg4: 00000000 > >Debugging Details: >------------------ > > >BUGCHECK_STR: MANUALLY_INITIATED_CRASH > >DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT > >PROCESS_NAME: conhost.exe > >CURRENT_IRQL: 1f > >ANALYSIS_VERSION: 6.3.9600.16520 (debuggers(dbg).140127-0329) x86fre > >EXCEPTION_RECORD: 899e9c80 -- (.exr 0xffffffff899e9c80) >ExceptionAddress: 8295c07c (nt!ViCtxIsr) > ExceptionCode: 02780016 > ExceptionFlags: 899e9c84 >NumberParameters: 0 > >TRAP_FRAME: 88a63a4c -- (.trap 0xffffffff88a63a4c) >ErrCode = 00000000 >eax=00000001 ebx=c080204e ecx=00000000 edx=c0600018 esi=c0003800 edi=c0600018 >eip=8268dc5a esp=88a63ac0 ebp=88a63b14 iopl=0 nv up ei pl nz na pe nc >cs=0008 ss=0010 ds=0111 es=0000 fs=3a00 gs=0000 efl=00010206 >nt!MiCommitExistingVad+0x26f: >8268dc5a 8b0e mov ecx,dword ptr [esi] ds:0111:3800=???????? >Resetting default scope > >LAST_CONTROL_TRANSFER: from 826fa083 to 82696110 > >STACK_TEXT: >88a62c94 826fa083 00000004 cb7cf494 807c760c nt!RtlpBreakWithStatusInstruction >88a62ce4 826faf75 00000004 00000000 00000002 nt!KiBugCheckDebugBreak+0x1c >88a630a8 826f9f20 000000e2 00000000 00000000 nt!KeBugCheck2+0xa7f >88a630cc 82948086 000000e2 00000000 00000000 nt!KeBugCheckEx+0x1e >88a63208 8294944f 88a63228 807c7340 82746d20 nt!KdpSendWaitContinue+0x743 >88a63328 826dac61 807c7340 00000000 88a63390 nt!KdpReportExceptionStateChange+0xe5 >88a63344 829485f4 88a63984 00000001 88a63930 nt!KdpReport+0x9c >88a63370 826d004d 88a63984 00000000 88a63930 nt!KdpTrap+0x102 >88a63914 82659dd6 88a63930 00000000 88a63984 nt!KiDispatchException+0x16d >88a6397c 82659d72 88a63a04 8295c20e badb0d00 nt!CommonDispatchException+0x4a >88a639a4 826e007f 82712f10 00000000 00000000 nt!KiExceptionExit+0x17a >88a63a04 8295c0ac 84d072b0 899e9c80 899e6ce8 nt!vDbgPrintExWithPrefixInternal+0x2ff >88a63a20 826557ad 899e9c80 899d0850 88a63a4c nt!ViCtxIsr+0x30 >88a63a20 8268dc5a 899e9c80 899d0850 88a63a4c nt!KiInterruptDispatch+0x6d >88a63b14 828477bc 93baec48 00700000 00001000 nt!MiCommitExistingVad+0x26f >88a63c14 826591ea ffffffff 0058ebe8 00000000 nt!NtAllocateVirtualMemory+0xd5a >88a63c14 771670b4 ffffffff 0058ebe8 00000000 nt!KiFastCallEntry+0x12a >0058eb28 771652e4 77182ba7 ffffffff 0058ebe8 ntdll!KiFastSystemCallRet >0058eb2c 77182ba7 ffffffff 0058ebe8 00000000 ntdll!NtAllocateVirtualMemory+0xc >0058ec08 7552c628 00001002 00000000 00040000 ntdll!RtlCreateHeap+0x487 >0058ec2c 7407b087 00000000 00000000 00000000 KERNELBASE!HeapCreate+0x55 >0058ec44 7407b063 00000001 7407afad 0058ec64 uxtheme!ThemeHeapStaticInitialize+0x1e [d:\w7rtm\shell\themes\themeldr\memory.cpp @ 78] >0058ec4c 7407afad 0058ec64 7407a1a6 74070000 uxtheme!ThemeHeapStaticInitialize+0x7 [d:\w7rtm\shell\themes\themeldr\memory.cpp @ 92] >0058ec54 7407a1a6 74070000 00000000 0058ecc4 uxtheme!ProcessStartUp+0x22 [d:\w7rtm\shell\themes\uxtheme\dllmain.cpp @ 54] >0058ec64 7407a36b 74070000 00000001 00000000 uxtheme!DllMain+0x60 [d:\w7rtm\shell\themes\uxtheme\dllmain.cpp @ 130] >0058ecc4 771789d8 74070000 00000001 00000000 uxtheme!__DllMainCRTStartup+0xe1 [d:\winmain\minkernel\crts\crtw32\dllstuff\crtdll.c @ 573] >0058ece4 77185c41 7407a2dd 74070000 00000001 ntdll!LdrpCallInitRoutine+0x14 >0058edd8 7718052e 00000000 77421fd0 77167c9a ntdll!LdrpRunInitializeRoutines+0x26f >0058ef44 7718232c 0058efa4 0058ef70 00000000 ntdll!LdrpLoadDll+0x4d1 >0058ef78 755288ee 00239a4c 0058efb8 0058efa4 ntdll!LdrLoadDll+0x92 >0058efb0 75efefdc 00000000 00000000 00000001 KERNELBASE!LoadLibraryExW+0x15a >0058f0e4 77166fee 0058f0fc 00000098 0058f1bc USER32!__ClientLoadLibrary+0x60 >0058f190 75f0da1a 75efe34b 0000000f 62b3abdd ntdll!KiUserCallbackDispatcher+0x2e >0058f194 75efe34b 0000000f 62b3abdd 001f06a8 USER32!NtUserCallNoParam+0xc >0058f1cc 75f01274 00000032 001f06a8 001f05a4 USER32!GetSystemMetrics+0x49 >0058f1ec 00e3562a 001f08b8 00000000 0058f21c USER32!PrivateExtractIconExW+0x4e >0058f9f8 00e3551d 001f05a4 001f06a8 0058fa24 conhost!LoadLinkInfo+0x1fe >0058fa18 00e351c7 001f05a4 00000036 001f06a8 conhost!SetUpConsole+0x30 >0058fa40 00e3517e 001f05a4 0023bf58 00000000 conhost!ConsoleAllocateConsole+0x2e >0058fa64 00e3167f 00000000 0058fa88 00000000 conhost!SrvConsoleClientConnect+0xbd >0058fb30 76093c45 00000000 0058fb7c 771837f5 conhost!ConsoleLpcThread+0x13e >0058fb3c 771837f5 00000000 77420be8 00000000 kernel32!BaseThreadInitThunk+0xe >0058fb7c 771837c8 00e315ba 00000000 00000000 ntdll!__RtlUserThreadStart+0x70 >0058fb94 00000000 00e315ba 00000000 00000000 ntdll!_RtlUserThreadStart+0x1b > > >STACK_COMMAND: kb > >FOLLOWUP_IP: >nt!KdpSendWaitContinue+743 >82948086 cc int 3 > >SYMBOL_STACK_INDEX: 4 > >SYMBOL_NAME: nt!KdpSendWaitContinue+743 > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: nt > >IMAGE_NAME: ntkrpamp.exe > >DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78a09 > >IMAGE_VERSION: 6.1.7601.17514 > >FAILURE_BUCKET_ID: MANUALLY_INITIATED_CRASH_VRF_nt!KdpSendWaitContinue+743 > >BUCKET_ID: MANUALLY_INITIATED_CRASH_VRF_nt!KdpSendWaitContinue+743 > >ANALYSIS_SOURCE: KM > >FAILURE_ID_HASH_STRING: km:manually_initiated_crash_vrf_nt!kdpsendwaitcontinue+743 > >FAILURE_ID_HASH: {9fec36a2-6fc8-1ebd-ed1c-1747b2c09935} > >Followup: MachineOwner >--------- >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1515663
:
1434758
|
1440523
|
1440524
|
1440531
| 1440538