Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 624019 Details for
Bug 864389
Windows2k3 guest get BSOD during HCK whql RHEL SCSI job: Plug and Play Driver Test (Certification)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
dump analyse for win2k3 32bit guest
PNP_dump_analyse_2k3_32.txt (text/plain), 3.74 KB, created by
Yuyu Zhou
on 2012-10-09 10:26:40 UTC
(
hide
)
Description:
dump analyse for win2k3 32bit guest
Filename:
MIME Type:
Creator:
Yuyu Zhou
Created:
2012-10-09 10:26:40 UTC
Size:
3.74 KB
patch
obsolete
> >Microsoft (R) Windows Debugger Version 6.12.0002.633 X86 >Copyright (c) Microsoft Corporation. All rights reserved. > > >Loading Dump File [C:\WINDOWS\MEMORY.DMP] >Kernel Complete Dump File: Full address space is available > >Symbol search path is: C:\WINDOWS\Symbols >Executable search path is: >Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (2 procs) Free x86 compatible >Product: Server, suite: Enterprise TerminalServer SingleUserTS >Built by: 3790.srv03_sp2_rtm.070216-1710 >Machine Name: >Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8 >Debug session time: Thu Sep 27 04:29:07.546 2012 (UTC - 7:00) >System Uptime: 0 days 2:13:21.234 >Loading Kernel Symbols >............................................................... >........................ >Loading User Symbols > >Loading unloaded module list >....... >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >Use !analyze -v to get detailed debugging information. > >BugCheck 7E, {c0000005, f71a56ab, f7906b0c, f7906808} > >Probably caused by : Ntfs.sys ( Ntfs!NtfsFsdClose+67 ) > >Followup: MachineOwner >--------- > >0: kd> !analyze -v >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) >This is a very common bugcheck. Usually the exception address pinpoints >the driver/function that caused the problem. Always note this address >as well as the link date of the driver/image that contains this address. >Arguments: >Arg1: c0000005, The exception code that was not handled >Arg2: f71a56ab, The address that the exception occurred at >Arg3: f7906b0c, Exception Record Address >Arg4: f7906808, Context Record Address > >Debugging Details: >------------------ > > >EXCEPTION_CODE: (HRESULT) 0x8084d111 (2156187921) - <Unable to get error code text> > >FAULTING_IP: >Ntfs!NtfsFsdClose+67 >f71a56ab 3b38 cmp edi,dword ptr [eax] > >EXCEPTION_RECORD: f7906b0c -- (.exr 0xfffffffff7906b0c) >ExceptionAddress: 816dc7b0 > ExceptionCode: 8084d111 > ExceptionFlags: 000003f0 >NumberParameters: 0 > >CONTEXT: f7906808 -- (.cxr 0xfffffffff7906808) >eax=baf37000 ebx=f772fa09 ecx=80829f50 edx=f79068d4 esi=8601f160 edi=80a5c456 >eip=baf37880 esp=00000001 ebp=8601f110 iopl=3 vip nv up di pl nz na po nc >cs=fa48 ss=68dc ds=68b0 es=fa09 fs=f109 gs=fa40 efl=f772f120 >fa48:7880 ?? ??? >Resetting default scope > >DEFAULT_BUCKET_ID: DRIVER_FAULT > >BUGCHECK_STR: 0x7E > >PROCESS_NAME: System > >CURRENT_IRQL: 0 > >ERROR_CODE: (NTSTATUS) 0x8084d111 - <Unable to get error code text> > >LAST_CONTROL_TRANSFER: from 00000000 to 80827c63 > >STACK_TEXT: >f7906618 00000000 00000000 00000000 00000000 nt!KeBugCheckEx+0x1b > > >STACK_COMMAND: .bugcheck ; kb > >FOLLOWUP_IP: >Ntfs!NtfsFsdClose+67 >f71a56ab 3b38 cmp edi,dword ptr [eax] > >SYMBOL_NAME: Ntfs!NtfsFsdClose+67 > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: Ntfs > >IMAGE_NAME: Ntfs.sys > >DEBUG_FLR_IMAGE_TIMESTAMP: 45d6a04b > >FAILURE_BUCKET_ID: 0x7E_VRF_Ntfs!NtfsFsdClose+67 > >BUCKET_ID: 0x7E_VRF_Ntfs!NtfsFsdClose+67 > >Followup: MachineOwner >--------- >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 864389
:
624017
|
624018
| 624019 |
624020