Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 847046 Details for
Bug 1049823
win2008.x86_64 guest BSOD (error code:0x3B, SYSTEM_SERVICE_EXCEPTION)
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
mem_dump debug info
mem_dump-0x3B.txt (text/plain), 5.33 KB, created by
CongLi
on 2014-01-08 10:03:44 UTC
(
hide
)
Description:
mem_dump debug info
Filename:
MIME Type:
Creator:
CongLi
Created:
2014-01-08 10:03:44 UTC
Size:
5.33 KB
patch
obsolete
> >Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64 >Copyright (c) Microsoft Corporation. All rights reserved. > > >Loading Dump File [C:\Users\Administrator\Desktop\Memory-0x3B.dmp] >Kernel Summary Dump File: Only kernel address space is available > >Symbol search path is: SRV*C:\symbols\*http://msdl.microsoft.com/download/symbols >Executable search path is: >Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x64 >Product: Server, suite: TerminalServer DataCenter SingleUserTS >Built by: 6002.18005.amd64fre.lh_sp2rtm.090410-1830 >Machine Name: >Kernel base = 0xfffff800`01603000 PsLoadedModuleList = 0xfffff800`017c7dd0 >Debug session time: Thu Jan 9 07:20:32.640 2014 (UTC + 8:00) >System Uptime: 0 days 0:00:48.859 >Loading Kernel Symbols >............................................................... >............................................... >Loading User Symbols >PEB is paged out (Peb.Ldr = 000007ff`fffdd018). Type ".hh dbgerr001" for details >Loading unloaded module list >........ >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >Use !analyze -v to get detailed debugging information. > >BugCheck 3B, {c0000005, fffff80001738411, fffffa6009399090, 0} > >Page d7cf5 not present in the dump file. Type ".hh dbgerr004" for details >Page d80bc not present in the dump file. Type ".hh dbgerr004" for details >Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+141 ) > >Followup: Pool_corruption >--------- > >1: kd> !analyze -v >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >SYSTEM_SERVICE_EXCEPTION (3b) >An exception happened while executing a system service routine. >Arguments: >Arg1: 00000000c0000005, Exception code that caused the bugcheck >Arg2: fffff80001738411, Address of the instruction which caused the bugcheck >Arg3: fffffa6009399090, Address of the context record for the exception that caused the bugcheck >Arg4: 0000000000000000, zero. > >Debugging Details: >------------------ > >Page d7cf5 not present in the dump file. Type ".hh dbgerr004" for details >Page d80bc not present in the dump file. Type ".hh dbgerr004" for details > >EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. > >FAULTING_IP: >nt!ExDeferredFreePool+141 >fffff800`01738411 41885803 mov byte ptr [r8+3],bl > >CONTEXT: fffffa6009399090 -- (.cxr 0xfffffa6009399090) >rax=0000000000000085 rbx=0000000000000000 rcx=0000000000000640 >rdx=00000000004ef9c4 rsi=fffffa8003658048 rdi=fffff80001795160 >rip=fffff80001738411 rsp=fffffa60093998f0 rbp=0000000000000000 > r8=00000000004f0004 r9=02dfcd35de89d864 r10=0000000000000000 >r11=00000000000000d8 r12=0000000000000016 r13=0000000000000001 >r14=0000000000000000 r15=0000000000000000 >iopl=0 nv up ei pl zr na po nc >cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 >nt!ExDeferredFreePool+0x141: >fffff800`01738411 41885803 mov byte ptr [r8+3],bl ds:002b:00000000`004f0007=?? >Resetting default scope > >DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT > >BUGCHECK_STR: 0x3B > >PROCESS_NAME: svchost.exe > >CURRENT_IRQL: 0 > >LAST_CONTROL_TRANSFER: from fffff800017372b2 to fffff80001738411 > >STACK_TEXT: >fffffa60`093998f0 fffff800`017372b2 : fffff880`05acf650 fffff880`05acf900 00000000`00000000 00000000`00000001 : nt!ExDeferredFreePool+0x141 >fffffa60`09399960 fffff800`018c6d96 : 00000000`00000000 fffffa80`03d4bcf0 00000000`00000008 fffffa60`6d4e6f49 : nt!ExFreePoolWithTag+0x5e2 >fffffa60`09399a10 fffff800`01661ee3 : 00000000`00000000 fffffa80`04bbc800 fffffa80`04bbc7d0 00000000`00000000 : nt!IopDeleteFile+0x1d6 >fffffa60`09399aa0 fffff800`018c705e : fffff880`05886270 fffffa80`00000001 fffffa80`045ad850 00000000`00000000 : nt!ObfDereferenceObject+0x103 >fffffa60`09399b30 fffff800`018c7314 : fffff880`05399e50 fffff880`05399e00 00000000`00000001 00000000`0000089c : nt!ObpCloseHandleTableEntry+0xce >fffffa60`09399bd0 fffff800`0165cef3 : fffffa80`046a5bb0 fffffa60`09399ca0 00000000`00000000 00000000`00000004 : nt!ObpCloseHandle+0x94 >fffffa60`09399c20 00000000`774a6e0a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 >00000000`0208ec98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774a6e0a > > >FOLLOWUP_IP: >nt!ExDeferredFreePool+141 >fffff800`01738411 41885803 mov byte ptr [r8+3],bl > >SYMBOL_STACK_INDEX: 0 > >SYMBOL_NAME: nt!ExDeferredFreePool+141 > >FOLLOWUP_NAME: Pool_corruption > >IMAGE_NAME: Pool_Corruption > >DEBUG_FLR_IMAGE_TIMESTAMP: 0 > >MODULE_NAME: Pool_Corruption > >STACK_COMMAND: .cxr 0xfffffa6009399090 ; kb > >FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+141 > >BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+141 > >Followup: Pool_corruption >--------- >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1049823
: 847046