Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 962307 Details for
Bug 1168784
[virtio-win]win2012r2 guest shows black screen with error code "0x0000005c" after migration and reboot
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
dump-debug-info
dump-debug-info.txt (text/plain), 6.41 KB, created by
Yang Meng
on 2014-11-28 02:04:55 UTC
(
hide
)
Description:
dump-debug-info
Filename:
MIME Type:
Creator:
Yang Meng
Created:
2014-11-28 02:04:55 UTC
Size:
6.41 KB
patch
obsolete
>Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64 >Copyright (c) Microsoft Corporation. All rights reserved. > > >Loading Dump File [C:\Windows\MEMORY.DMP] >Kernel Bitmap Dump File: Only kernel address space is available > >Symbol search path is: SRV*c:\temp*https://msdl.microsoft.com/download/symbols;srv* >Executable search path is: srv* >Windows 8 Kernel Version 9600 MP (2 procs) Free x64 >Product: Server, suite: TerminalServer DataCenter SingleUserTS >Built by: 9600.16384.amd64fre.winblue_rtm.130821-1623 >Machine Name: >Kernel base = 0xfffff802`7c804000 PsLoadedModuleList = 0xfffff802`7cacb9b0 >Debug session time: Wed Nov 26 07:35:11.769 2014 (UTC + 8:00) >System Uptime: 0 days 0:00:03.508 >Loading Kernel Symbols >............................................................... >......................................... >Loading User Symbols > >Loading unloaded module list >.. >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >Use !analyze -v to get detailed debugging information. > >BugCheck A, {9, 2, 0, fffff8027cf8fc83} > >*** ERROR: Module load completed but symbols could not be loaded for netkvm.sys >Probably caused by : netkvm.sys ( netkvm+8aef ) > >Followup: MachineOwner >--------- > >0: kd> !analyze -v >******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >IRQL_NOT_LESS_OR_EQUAL (a) >An attempt was made to access a pageable (or completely invalid) address at an >interrupt request level (IRQL) that is too high. This is usually >caused by drivers using improper addresses. >If a kernel debugger is available get the stack backtrace. >Arguments: >Arg1: 0000000000000009, memory referenced >Arg2: 0000000000000002, IRQL >Arg3: 0000000000000000, bitfield : > bit 0 : value 0 = read operation, 1 = write operation > bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) >Arg4: fffff8027cf8fc83, address which referenced memory > >Debugging Details: >------------------ > > >READ_ADDRESS: fffff8027cab9360: Unable to get special pool info >fffff8027cab9360: Unable to get special pool info > 0000000000000009 > >CURRENT_IRQL: 2 > >FAULTING_IP: >hal!HalPutScatterGatherListV3+1b >fffff802`7cf8fc83 488b5708 mov rdx,qword ptr [rdi+8] > >DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT > >BUGCHECK_STR: AV > >PROCESS_NAME: System > >TAG_NOT_DEFINED_c000000f: FFFFF8027DE69FB0 > >TRAP_FRAME: fffff8027de62460 -- (.trap 0xfffff8027de62460) >NOTE: The trap frame does not contain all registers. >Some register values may be zeroed or incorrect. >rax=00000000fffffffc rbx=0000000000000000 rcx=ffffe000008f9bf0 >rdx=ffffe00000dd4720 rsi=0000000000000000 rdi=0000000000000000 >rip=fffff8027cf8fc83 rsp=fffff8027de625f0 rbp=ffffe00000c3ca70 > r8=0000000000000001 r9=ffffe00000dd4720 r10=ffffe00000b6b000 >r11=ffffe00000b6b000 r12=0000000000000000 r13=0000000000000000 >r14=0000000000000000 r15=0000000000000000 >iopl=0 nv up ei ng nz na po nc >hal!HalPutScatterGatherListV3+0x1b: >fffff802`7cf8fc83 488b5708 mov rdx,qword ptr [rdi+8] ds:00000000`00000008=???????????????? >Resetting default scope > >LAST_CONTROL_TRANSFER: from fffff8027c95fbe9 to fffff8027c9540a0 > >STACK_TEXT: >fffff802`7de62318 fffff802`7c95fbe9 : 00000000`0000000a 00000000`00000009 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx >fffff802`7de62320 fffff802`7c95e43a : 00000000`00000000 ffffe000`008f9bf0 00000000`c0000000 fffff802`7de62460 : nt!KiBugCheckDispatch+0x69 >fffff802`7de62460 fffff802`7cf8fc83 : ffffe000`005b06f0 ffffe000`005b11b0 ffffe000`008cdc40 00000000`00000001 : nt!KiPageFault+0x23a >fffff802`7de625f0 fffff800`006b4f21 : ffffe000`00da2460 ffffe000`00c3cb28 00000000`00000020 fffff800`004ae74a : hal!HalPutScatterGatherListV3+0x1b >fffff802`7de62630 fffff800`017e2aef : 00000000`00000040 ffffe000`00c3cb28 ffffe000`006ca1a0 00000000`00000000 : NDIS!NdisMFreeNetBufferSGList+0x31 >fffff802`7de62670 fffff800`017e44d0 : 00000000`00000000 00000000`00000000 fffff800`004a008b fffff800`005160f0 : netkvm+0x8aef >fffff802`7de626a0 fffff800`017e4c3e : ffffe000`008f9aa0 fffff800`0008ba72 ffffe000`005b13b0 00000000`00000001 : netkvm+0xa4d0 >fffff802`7de626d0 fffff800`017e46f0 : fffff802`00000000 ffffe000`008f9a90 fffff802`7de627e0 00000000`00000000 : netkvm+0xac3e >fffff802`7de62700 fffff800`017e2299 : 00000000`00000000 ffffe000`005b06f0 ffffe000`005b11b0 fffff800`017e20a1 : netkvm+0xa6f0 >fffff802`7de62730 fffff800`017e3026 : ffffe000`008f9a60 fffff802`7de62840 00000000`00000000 fffff802`7c954d3d : netkvm+0x8299 >fffff802`7de62760 fffff800`017dd28c : ffffe000`008f9900 00000000`00000000 00000000`00000000 00000000`00000000 : netkvm+0x9026 >fffff802`7de62800 fffff800`017e7ea8 : ffffe000`00902010 fffff802`00000040 fffff802`7de62969 00000000`00000000 : netkvm+0x328c >fffff802`7de62840 fffff800`006ad5f1 : 00000000`00000000 00001f80`00f60012 00000000`00000000 00001f80`00d000d8 : netkvm+0xdea8 >fffff802`7de628a0 fffff802`7c887e90 : fffff802`7de62c60 fffff802`7c849266 ffffe000`007f3010 fffff802`7de62b60 : NDIS!ndisInterruptDpc+0x1b2 >fffff802`7de629d0 fffff802`7c887111 : fffff802`7cb4da80 fffff802`7de62c20 fffff802`7caf5180 fffff802`7caf5180 : nt!KiExecuteAllDpcs+0x1b0 >fffff802`7de62b20 fffff802`7c957bea : fffff802`7caf5180 fffff802`7caf5180 fffff802`7cb4da80 ffffe000`008cd040 : nt!KiRetireDpcList+0xe1 >fffff802`7de62da0 00000000`00000000 : fffff802`7de63000 fffff802`7de5d000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a > > >STACK_COMMAND: kb > >FOLLOWUP_IP: >netkvm+8aef >fffff800`017e2aef 4883c428 add rsp,28h > >SYMBOL_STACK_INDEX: 5 > >SYMBOL_NAME: netkvm+8aef > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: netkvm > >IMAGE_NAME: netkvm.sys > >DEBUG_FLR_IMAGE_TIMESTAMP: 546c576e > >FAILURE_BUCKET_ID: AV_netkvm+8aef > >BUCKET_ID: AV_netkvm+8aef > >Followup: MachineOwner >--------- >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1168784
: 962307 |
962308
|
962309
|
964043