Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 618383 Details for
Bug 861273
[xenpv-win]WindowsXP 32bit guest crash after Hibernate.
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
dump analyse
dump_analyse_winXP32.txt (text/plain), 4.38 KB, created by
Yuyu Zhou
on 2012-09-28 03:34:32 UTC
(
hide
)
Description:
dump analyse
Filename:
MIME Type:
Creator:
Yuyu Zhou
Created:
2012-09-28 03:34:32 UTC
Size:
4.38 KB
patch
obsolete
> >Microsoft (R) Windows Debugger Version 6.12.0002.633 X86 >Copyright (c) Microsoft Corporation. All rights reserved. > > >Loading Dump File [C:\WINDOWS\MEMORY.DMP] >Kernel Complete Dump File: Full address space is available > >Symbol search path is: C:\WINDOWS\Symbols >Executable search path is: >Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible >Product: WinNt, suite: TerminalServer SingleUserTS >Built by: 2600.xpsp.080413-2111 >Machine Name: >Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720 >Debug session time: Thu Sep 27 02:53:13.703 2012 (UTC - 7:00) >System Uptime: 0 days 0:02:31.046 >Loading Kernel Symbols >............................................................... >........................ >Loading User Symbols > >Loading unloaded module list >............. >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >Use !analyze -v to get detailed debugging information. > >BugCheck D1, {fffffffc, 7, 0, bae210f0} > >*** ERROR: Module load completed but symbols could not be loaded for rhelscsi.sys >Probably caused by : rhelscsi.sys ( rhelscsi+62aa ) > >Followup: MachineOwner >--------- > >0: kd> !analyze -v >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) >An attempt was made to access a pageable (or completely invalid) address at an >interrupt request level (IRQL) that is too high. This is usually >caused by drivers using improper addresses. >If kernel debugger is available get stack backtrace. >Arguments: >Arg1: fffffffc, memory referenced >Arg2: 00000007, IRQL >Arg3: 00000000, value 0 = read operation, 1 = write operation >Arg4: bae210f0, address which referenced memory > >Debugging Details: >------------------ > > >READ_ADDRESS: fffffffc > >CURRENT_IRQL: 7 > >FAULTING_IP: >SCSIPORT!ScsiPortNotification+a >bae210f0 8b58fc mov ebx,dword ptr [eax-4] > >DEFAULT_BUCKET_ID: DRIVER_FAULT > >BUGCHECK_STR: 0xD1 > >PROCESS_NAME: Idle > >TRAP_FRAME: 80551200 -- (.trap 0xffffffff80551200) >ErrCode = 00000000 >eax=00000000 ebx=bae3fc50 ecx=00000048 edx=ffdff980 esi=bae3fc59 edi=bae3d4c9 >eip=bae210f0 esp=80551274 ebp=8055127c iopl=0 nv up ei pl zr na pe nc >cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 >SCSIPORT!ScsiPortNotification+0xa: >bae210f0 8b58fc mov ebx,dword ptr [eax-4] ds:0023:fffffffc=???????? >Resetting default scope > >LAST_CONTROL_TRANSFER: from bae210f0 to 805446e0 > >STACK_TEXT: >80551200 bae210f0 badb0d00 ffdff980 80551260 nt!KiTrap0E+0x238 >8055127c bae3a2aa 00000008 00000000 805512bc SCSIPORT!ScsiPortNotification+0xa >WARNING: Stack unwind information not available. Following frames may be wrong. >80551294 bae39c01 00000000 000000ff 00000000 rhelscsi+0x62aa >80551304 bae398dd 00000000 bae5f030 805460f8 rhelscsi+0x5c01 >80551324 bae3a7b3 bae3e4a4 bae3f650 00000002 rhelscsi+0x58dd >8055134c bae383e6 00000000 86386934 86385ae8 rhelscsi+0x67b3 >80551378 bae3478d 86386934 8055139c bae1edd2 rhelscsi+0x43e6 >80551384 bae1edd2 86386934 80551450 863a1bb0 rhelscsi+0x78d >8055139c 80545695 863a1bb0 86385a30 00010007 SCSIPORT!ScsiPortInterrupt+0x2a >8055139c f7659162 863a1bb0 86385a30 00010007 nt!KiInterruptDispatch+0x45 >80551450 80545d3c 00000000 0000000e 00000000 intelppm!AcpiC1Idle+0x12 >80551454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x10 > > >STACK_COMMAND: kb > >FOLLOWUP_IP: >rhelscsi+62aa >bae3a2aa 83c410 add esp,10h > >SYMBOL_STACK_INDEX: 2 > >SYMBOL_NAME: rhelscsi+62aa > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: rhelscsi > >IMAGE_NAME: rhelscsi.sys > >DEBUG_FLR_IMAGE_TIMESTAMP: 5022aad4 > >FAILURE_BUCKET_ID: 0xD1_VRF_rhelscsi+62aa > >BUCKET_ID: 0xD1_VRF_rhelscsi+62aa > >Followup: MachineOwner >--------- >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 861273
: 618383 |
623373