Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 999438 Details for
Bug 1168119
[virtio-win][netkvm]win8.1.64 guest BSOD with error 'DRIVER_IRQL_NOT_LESS_OR_EQUAL' (netkvm.sys) after first reboot during os installation on AMD host
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
dump log for virtio-win-1.7.3-1.el7
dump_log.txt (text/plain), 3.94 KB, created by
ShupingCui
on 2015-03-09 06:27:48 UTC
(
hide
)
Description:
dump log for virtio-win-1.7.3-1.el7
Filename:
MIME Type:
Creator:
ShupingCui
Created:
2015-03-09 06:27:48 UTC
Size:
3.94 KB
patch
obsolete
>******************************************************************************* >* * >* Bugcheck Analysis * >* * >******************************************************************************* > >IRQL_NOT_LESS_OR_EQUAL (a) >An attempt was made to access a pageable (or completely invalid) address at an >interrupt request level (IRQL) that is too high. This is usually >caused by drivers using improper addresses. >If a kernel debugger is available get the stack backtrace. >Arguments: >Arg1: 0000000000000001, memory referenced >Arg2: 0000000000000002, IRQL >Arg3: 0000000000000000, bitfield : > bit 0 : value 0 = read operation, 1 = write operation > bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) >Arg4: fffff80093d27402, address which referenced memory > >Debugging Details: >------------------ > > >READ_ADDRESS: 0000000000000001 > >CURRENT_IRQL: 2 > >FAULTING_IP: >nt!KiAbProcessLocksWorker+5e >fffff800`93d27402 488b07 mov rax,qword ptr [rdi] > >DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT > >BUGCHECK_STR: AV > >PROCESS_NAME: System > >ANALYSIS_VERSION: 6.3.9600.16520 (debuggers(dbg).140127-0329) amd64fre > >DPC_STACK_BASE: FFFFF8009561FFB0 > >TRAP_FRAME: fffff80095618790 -- (.trap 0xfffff80095618790) >NOTE: The trap frame does not contain all registers. >Some register values may be zeroed or incorrect. >rax=0000000000000001 rbx=0000000000000000 rcx=ffffe000005f8420 >rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 >rip=fffff80093d27402 rsp=fffff80095618920 rbp=fffff800956189b0 > r8=0000000000000000 r9=ffffe000005f8420 r10=0000000000000001 >r11=ffffe00001605c60 r12=0000000000000000 r13=0000000000000000 >r14=0000000000000000 r15=0000000000000000 >iopl=0 nv up ei pl nz na pe nc >nt!KiAbProcessLocksWorker+0x5e: >fffff800`93d27402 488b07 mov rax,qword ptr [rdi] ds:00000000`00000000=???????????????? >Resetting default scope > >LAST_CONTROL_TRANSFER: from fffff80093de27e9 to fffff80093dd6ca0 > >STACK_TEXT: >fffff800`95618648 fffff800`93de27e9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx >fffff800`95618650 fffff800`93de103a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`95618790 : nt!KiBugCheckDispatch+0x69 >fffff800`95618790 fffff800`93d27402 : fffff800`93f7020d 00000000`00369e99 fffff800`00000001 ffffd000`00000000 : nt!KiPageFault+0x23a >fffff800`95618920 fffff800`93d27371 : fffff800`93f79f00 fffff800`95618aa0 fffff800`95618b20 fffff800`93f77180 : nt!KiAbProcessLocksWorker+0x5e >fffff800`95618970 fffff800`93d08840 : fffff800`93f79f00 ffffe000`01616250 00000000`00000000 ffffe000`01616010 : nt!KiAbDeferredProcessingWorker+0x31 >fffff800`956189a0 fffff800`93d08520 : ffffe000`01616010 00000000`00000001 ffffe000`00190010 fffff800`95618c28 : nt!KiExecuteAllDpcs+0x1b0 >fffff800`95618af0 fffff800`93dda7ea : fffff800`93f77180 fffff800`93f77180 00000000`001a3fe0 fffff800`93fcfa80 : nt!KiRetireDpcList+0xd0 >fffff800`95618c60 00000000`00000000 : fffff800`95619000 fffff800`95613000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a > > >STACK_COMMAND: kb > >FOLLOWUP_IP: >nt!KiAbProcessLocksWorker+5e >fffff800`93d27402 488b07 mov rax,qword ptr [rdi] > >SYMBOL_STACK_INDEX: 3 > >SYMBOL_NAME: nt!KiAbProcessLocksWorker+5e > >FOLLOWUP_NAME: MachineOwner > >MODULE_NAME: nt > >IMAGE_NAME: ntkrnlmp.exe > >DEBUG_FLR_IMAGE_TIMESTAMP: 52341cf4 > >IMAGE_VERSION: 6.3.9600.16404 > >BUCKET_ID_FUNC_OFFSET: 5e > >FAILURE_BUCKET_ID: AV_nt!KiAbProcessLocksWorker > >BUCKET_ID: AV_nt!KiAbProcessLocksWorker > >ANALYSIS_SOURCE: KM > >FAILURE_ID_HASH_STRING: km:av_nt!kiabprocesslocksworker > >FAILURE_ID_HASH: {2d898752-446e-6828-d1d3-03b9d001fb2c} > >Followup: MachineOwner >---------
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1168119
:
961527
| 999438