| Summary: | Win2008 BSOD on OS booting(0x7e and 0xc5) | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Xiaoqing Wei <xwei> | ||||
| Component: | qemu-kvm | Assignee: | Yvugenfi <yvugenfi> | ||||
| Status: | CLOSED DUPLICATE | QA Contact: | Virtualization Bugs <virt-bugs> | ||||
| Severity: | urgent | Docs Contact: | |||||
| Priority: | urgent | ||||||
| Version: | 7.0 | CC: | acathrow, coli, hhuang, juzhang, kraxel, michen, rhod, shuang, virt-maint, yvugenfi | ||||
| Target Milestone: | rc | ||||||
| Target Release: | --- | ||||||
| Hardware: | Unspecified | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2014-03-18 13:16:11 UTC | Type: | Bug | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Bug Depends On: | |||||||
| Bug Blocks: | 1069309 | ||||||
| Attachments: |
|
||||||
|
Description
Xiaoqing Wei
2013-12-06 05:36:23 UTC
Reproduced, the root caused is 'hv_vapic', this flag will bsod the vm on my machine.
/root/staf-kvm-devel/autotest-devel/client/tests/virt/qemu/qemu -monitor stdio \
-S \
-name 'virt-tests-vm1' \
-sandbox off \
-M pc \
-nodefaults \
-vga std \
-chardev socket,id=qmp_id_qmpmonitor1,path=/tmp/monitor-qmpmonitor1-20140116-112740-kTemQsTl,server,nowait \
-mon chardev=qmp_id_qmpmonitor1,mode=control \
-chardev socket,id=serial_id_serial0,path=/tmp/serial-serial0-20140116-112740-kTemQsTl,server,nowait \
-device isa-serial,chardev=serial_id_serial0 \
-chardev socket,id=seabioslog_id_20140116-112740-kTemQsTl,path=/tmp/seabios-20140116-112740-kTemQsTl,server,nowait \
-device isa-debugcon,chardev=seabioslog_id_20140116-112740-kTemQsTl,iobase=0x402 \
-device ich9-usb-uhci1,id=usb1,bus=pci.0,addr=03 \
-drive id=drive_image1,if=none,cache=unsafe,snapshot=off,aio=native,file=/root/staf-kvm-devel/autotest-devel/client/tests/virt/shared/data/images/win2008-64.qcow2 \
-device ide-hd,id=image1,drive=drive_image1,bus=ide.0,unit=0 \
-device e1000,mac=9a:9d:9e:9f:a0:a1,id=idjHWehh,netdev=idut0ynR,bus=pci.0,addr=04 \
-netdev tap,id=idut0ynR \
-m 2048 \
-smp 2,maxcpus=2,cores=1,threads=1,sockets=2 \
-drive id=drive_cd1,if=none,snapshot=off,aio=native,media=cdrom,file=/root/staf-kvm-devel/autotest-devel/client/tests/virt/shared/data/isos/windows/winutils.iso \
-device ide-cd,id=cd1,drive=drive_cd1,bus=ide.0,unit=1 \
-device usb-tablet,id=usb-tablet1,bus=usb1.0,port=1 \
-vnc :0 \
-rtc base=localtime,clock=host,driftfix=slew \
-boot order=cdn,once=c,menu=off \
-enable-kvm \
-cpu 'Opteron_G5',hv_vapic
Microsoft (R) Windows Debugger Version 6.10.0003.233 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Memory.dmp]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRV*http://msdl.microsoft.com/download/symbols
Executable search path is:
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Windows 7 Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
Product: Server, suite: TerminalServer DataCenter SingleUserTS
Built by: 6002.18005.amd64fre.lh_sp2rtm.090410-1830
Machine Name:
Kernel base = 0xfffff800`01604000 PsLoadedModuleList = 0xfffff800`017c8dd0
Debug session time: Thu Jan 16 14:18:08.671 2014 (GMT-8)
System Uptime: 0 days 0:00:13.609
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Loading Kernel Symbols
...............................................................
.........................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007ff`fffd8018). Type ".hh dbgerr001" for details
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {102bd53e0, 2, 0, fffff800017393a0}
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
Page 75031 not present in the dump file. Type ".hh dbgerr004" for details
Page 75827 not present in the dump file. Type ".hh dbgerr004" for details
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
PEB is paged out (Peb.Ldr = 000007ff`fffd8018). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 000007ff`fffd8018). Type ".hh dbgerr001" for details
Probably caused by : ntkrnlmp.exe ( nt!ExAllocatePoolWithTag+c00 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000102bd53e0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800017393a0, address which referenced memory
Debugging Details:
------------------
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
Page 75031 not present in the dump file. Type ".hh dbgerr004" for details
Page 75827 not present in the dump file. Type ".hh dbgerr004" for details
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
PEB is paged out (Peb.Ldr = 000007ff`fffd8018). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 000007ff`fffd8018). Type ".hh dbgerr001" for details
MODULE_NAME: nt
FAULTING_MODULE: fffff80001604000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 49e0237f
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 0
FAULTING_IP:
nt!ExAllocatePoolWithTag+c00
fffff800`017393a0 4d8b08 mov r9,qword ptr [r8]
DEFAULT_BUCKET_ID: WRONG_SYMBOLS
LAST_CONTROL_TRANSFER: from fffff8000165e1ee to fffff8000165e450
STACK_TEXT:
fffffa60`03b93188 fffff800`0165e1ee : 00000000`0000000a 00000001`02bd53e0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa60`03b93190 fffff800`0165d0cb : 00000000`00000000 fffffa60`01019460 fffffa80`01d15180 00000000`00000000 : nt!ZwUnloadKeyEx+0x23ce
fffffa60`03b932d0 fffff800`017393a0 : fffffa80`0291e400 fffffa80`02bd8c00 fffffa80`02bd8c00 00000000`00000009 : nt!ZwUnloadKeyEx+0x12ab
fffffa60`03b93460 fffff800`017382b2 : fffffa80`0291e5c0 fffffa80`0291e410 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0xc00
fffffa60`03b934d0 fffff800`01662fc1 : fffffa80`0291e420 fffffa80`0291e460 fffffa80`0291e430 fffffa60`656c6946 : nt!ExFreePoolWithTag+0x5e2
fffffa60`03b93580 fffff800`018cbf12 : 00000000`00000000 fffffa80`0189bdc0 fffffa60`03b939e0 00000000`00000000 : nt!ObfDereferenceObject+0x1e1
fffffa60`03b93610 fffff800`018c3a92 : fffffa80`01d55cc0 fffffa60`00d91ba0 fffffa80`024efb10 fffff880`05187101 : nt!NtDeviceIoControlFile+0x29e2
fffffa60`03b937b0 fffff800`018c4622 : 00000000`00000000 fffffa80`024efbf8 00000000`00000100 00000000`00000000 : nt!MmCreateSection+0x10d2
fffffa60`03b938c0 fffff800`0189bb05 : fffffa80`00000080 00000000`023ed790 00000000`023ed3f0 fffffa60`03b93ca0 : nt!ObOpenObjectByName+0x2f2
fffffa60`03b93990 fffff800`0165def3 : fffffa80`02877060 fffffa60`03b93ca0 fffffa80`02877060 00000000`77bf2970 : nt!SeAssignSecurity+0x44d
fffffa60`03b93c20 00000000`77b270ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ZwUnloadKeyEx+0x20d3
00000000`023ed358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b270ea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExAllocatePoolWithTag+c00
fffff800`017393a0 4d8b08 mov r9,qword ptr [r8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ExAllocatePoolWithTag+c00
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
---------
(In reply to Xiaoqing Wei from comment #2) > Reproduced, the root caused is 'hv_vapic', this flag will bsod the vm on my > machine. > The minidump Microsoft (R) Windows Debugger Version 6.10.0003.233 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\Mini011614-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*http://msdl.microsoft.com/download/symbols Executable search path is: Unable to load image \SystemRoot\system32\ntoskrnl.exe, Win32 error 0n2 *** WARNING: Unable to verify timestamp for ntoskrnl.exe *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe Windows 7 Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64 Product: Server, suite: TerminalServer DataCenter SingleUserTS Machine Name: Kernel base = 0xfffff800`01604000 PsLoadedModuleList = 0xfffff800`017c8dd0 Debug session time: Thu Jan 16 14:18:08.671 2014 (GMT-8) System Uptime: 0 days 0:00:13.609 Unable to load image \SystemRoot\system32\ntoskrnl.exe, Win32 error 0n2 *** WARNING: Unable to verify timestamp for ntoskrnl.exe *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe Loading Kernel Symbols . Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. .............................................................. ......................................................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C5, {102bd53e0, 2, 0, fffff800017393a0} Unable to load image \SystemRoot\System32\Drivers\Ntfs.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for Ntfs.sys *** ERROR: Module load completed but symbols could not be loaded for Ntfs.sys ***** Kernel symbols are WRONG. Please fix symbols to do analysis. ************************************************************************* *** *** *** *** *** Your debugger is not using the correct symbols *** *** *** *** In order for this command to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: nt!_KPRCB *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Your debugger is not using the correct symbols *** *** *** *** In order for this command to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: nt!_KPRCB *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Your debugger is not using the correct symbols *** *** *** *** In order for this command to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: nt!_KPRCB *** *** *** ************************************************************************* Probably caused by : ntoskrnl.exe ( nt+1353a0 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_CORRUPTED_EXPOOL (c5) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is caused by drivers that have corrupted the system pool. Run the driver verifier against any new (or suspect) drivers, and if that doesn't turn up the culprit, then use gflags to enable special pool. Arguments: Arg1: 0000000102bd53e0, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff800017393a0, address which referenced memory Debugging Details: ------------------ ***** Kernel symbols are WRONG. Please fix symbols to do analysis. ************************************************************************* *** *** *** *** *** Your debugger is not using the correct symbols *** *** *** *** In order for this command to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: nt!_KPRCB *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Your debugger is not using the correct symbols *** *** *** *** In order for this command to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: nt!_KPRCB *** *** *** ************************************************************************* ************************************************************************* *** *** *** *** *** Your debugger is not using the correct symbols *** *** *** *** In order for this command to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: nt!_KPRCB *** *** *** ************************************************************************* MODULE_NAME: nt FAULTING_MODULE: fffff80001604000 nt DEBUG_FLR_IMAGE_TIMESTAMP: 49e0237f BUGCHECK_STR: 0xC5_2 CURRENT_IRQL: 0 FAULTING_IP: nt+1353a0 fffff800`017393a0 ?? ??? CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WRONG_SYMBOLS LAST_CONTROL_TRANSFER: from fffff8000165e1ee to fffff8000165e450 STACK_TEXT: fffffa60`03b93188 fffff800`0165e1ee : 00000000`0000000a 00000001`02bd53e0 00000000`00000002 00000000`00000000 : nt+0x5a450 fffffa60`03b93190 00000000`0000000a : 00000001`02bd53e0 00000000`00000002 00000000`00000000 fffff800`017393a0 : nt+0x5a1ee fffffa60`03b93198 00000001`02bd53e0 : 00000000`00000002 00000000`00000000 fffff800`017393a0 fffffa60`0101267e : 0xa fffffa60`03b931a0 00000000`00000002 : 00000000`00000000 fffff800`017393a0 fffffa60`0101267e 00000000`00000000 : 0x1`02bd53e0 fffffa60`03b931a8 00000000`00000000 : fffff800`017393a0 fffffa60`0101267e 00000000`00000000 00000000`00000000 : 0x2 fffffa60`03b931b0 fffff800`017393a0 : fffffa60`0101267e 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b931b8 fffffa60`0101267e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt+0x1353a0 fffffa60`03b931c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs+0xd67e fffffa60`03b931c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b931d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b931d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b931e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b931e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b931f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b931f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93200 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93208 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93210 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93218 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93220 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93228 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93230 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93238 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93240 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0x0 fffffa60`03b93248 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : 0x0 fffffa60`03b93250 00000000`00000000 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000001 : 0x0 fffffa60`03b93258 00000000`00000000 : 00000000`00000001 00000000`00000001 00000000`00000001 fffff880`05187000 : 0x0 fffffa60`03b93260 00000000`00000001 : 00000000`00000001 00000000`00000001 fffff880`05187000 fffffa60`03b93291 : 0x0 fffffa60`03b93268 00000000`00000001 : 00000000`00000001 fffff880`05187000 fffffa60`03b93291 00000000`00000000 : 0x1 fffffa60`03b93270 00000000`00000001 : fffff880`05187000 fffffa60`03b93291 00000000`00000000 00000000`00000000 : 0x1 fffffa60`03b93278 fffff880`05187000 : fffffa60`03b93291 00000000`00000000 00000000`00000000 fffff800`01796160 : 0x1 fffffa60`03b93280 fffffa60`03b93291 : 00000000`00000000 00000000`00000000 fffff800`01796160 fffff800`01796160 : 0xfffff880`05187000 fffffa60`03b93288 00000000`00000000 : 00000000`00000000 fffff800`01796160 fffff800`01796160 00000000`0000001c : 0xfffffa60`03b93291 fffffa60`03b93290 00000000`00000000 : fffff800`01796160 fffff800`01796160 00000000`0000001c 00000000`00000001 : 0x0 fffffa60`03b93298 fffff800`01796160 : fffff800`01796160 00000000`0000001c 00000000`00000001 00000000`00000000 : 0x0 fffffa60`03b932a0 fffff800`01796160 : 00000000`0000001c 00000000`00000001 00000000`00000000 00000000`00000000 : nt+0x192160 fffffa60`03b932a8 00000000`0000001c : 00000000`00000001 00000000`00000000 00000000`00000000 fffff800`0165d0cb : nt+0x192160 fffffa60`03b932b0 00000000`00000001 : 00000000`00000000 00000000`00000000 fffff800`0165d0cb 00000000`00000000 : 0x1c fffffa60`03b932b8 00000000`00000000 : 00000000`00000000 fffff800`0165d0cb 00000000`00000000 fffffa60`01019460 : 0x1 fffffa60`03b932c0 00000000`00000000 : fffff800`0165d0cb 00000000`00000000 fffffa60`01019460 fffffa80`01d15180 : 0x0 fffffa60`03b932c8 fffff800`0165d0cb : 00000000`00000000 fffffa60`01019460 fffffa80`01d15180 00000000`00000000 : 0x0 fffffa60`03b932d0 00000000`00000000 : fffffa60`01019460 fffffa80`01d15180 00000000`00000000 fffffa60`03b933b8 : nt+0x590cb fffffa60`03b932d8 fffffa60`01019460 : fffffa80`01d15180 00000000`00000000 fffffa60`03b933b8 00001f80`01000000 : 0x0 fffffa60`03b932e0 fffffa80`01d15180 : 00000000`00000000 fffffa60`03b933b8 00001f80`01000000 fffffa80`02bcd200 : Ntfs+0x14460 fffffa60`03b932e8 00000000`00000000 : fffffa60`03b933b8 00001f80`01000000 fffffa80`02bcd200 00000000`00000004 : 0xfffffa80`01d15180 fffffa60`03b932f0 fffffa60`03b933b8 : 00001f80`01000000 fffffa80`02bcd200 00000000`00000004 fffff800`017961c8 : 0x0 fffffa60`03b932f8 00001f80`01000000 : fffffa80`02bcd200 00000000`00000004 fffff800`017961c8 00000001`02bd53e0 : 0xfffffa60`03b933b8 fffffa60`03b93300 fffffa80`02bcd200 : 00000000`00000004 fffff800`017961c8 00000001`02bd53e0 00000001`02bd53e0 : 0x1f80`01000000 fffffa60`03b93308 00000000`00000004 : fffff800`017961c8 00000001`02bd53e0 00000001`02bd53e0 00000000`00000000 : 0xfffffa80`02bcd200 fffffa60`03b93310 fffff800`017961c8 : 00000001`02bd53e0 00000001`02bd53e0 00000000`00000000 00000000`00000000 : 0x4 fffffa60`03b93318 00000001`02bd53e0 : 00000001`02bd53e0 00000000`00000000 00000000`00000000 fffffa80`01d15180 : nt+0x1921c8 fffffa60`03b93320 00000001`02bd53e0 : 00000000`00000000 00000000`00000000 fffffa80`01d15180 fffffa80`00f80056 : 0x1`02bd53e0 fffffa60`03b93328 00000000`00000000 : 00000000`00000000 fffffa80`01d15180 fffffa80`00f80056 fffff880`055daa30 : 0x1`02bd53e0 fffffa60`03b93330 00000000`00000000 : fffffa80`01d15180 fffffa80`00f80056 fffff880`055daa30 00000000`00000000 : 0x0 fffffa60`03b93338 fffffa80`01d15180 : fffffa80`00f80056 fffff880`055daa30 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93340 fffffa80`00f80056 : fffff880`055daa30 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`01d15180 fffffa60`03b93348 fffff880`055daa30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`00f80056 fffffa60`03b93350 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`055daa30 fffffa60`03b93358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93360 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93368 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93370 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0 fffffa60`03b93380 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000001`02bd53e0 : 0x0 fffffa60`03b93388 00000000`00000000 : 00000000`00000000 00000000`00000000 00000001`02bd53e0 fffffa80`02bd8c00 : 0x0 fffffa60`03b93390 00000000`00000000 : 00000000`00000000 00000001`02bd53e0 fffffa80`02bd8c00 00000000`000001d0 : 0x0 fffffa60`03b93398 00000000`00000000 : 00000001`02bd53e0 fffffa80`02bd8c00 00000000`000001d0 00000000`01000001 : 0x0 fffffa60`03b933a0 00000001`02bd53e0 : fffffa80`02bd8c00 00000000`000001d0 00000000`01000001 00000000`00000000 : 0x0 fffffa60`03b933a8 fffffa80`02bd8c00 : 00000000`000001d0 00000000`01000001 00000000`00000000 00000000`00000000 : 0x1`02bd53e0 fffffa60`03b933b0 00000000`000001d0 : 00000000`01000001 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`02bd8c00 fffffa60`03b933b8 00000000`01000001 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1d0 fffffa60`03b933c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`02bd8c00 : 0x1000001 fffffa60`03b933c8 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`02bd8c00 fffffa60`03b934b0 : 0x0 fffffa60`03b933d0 00000000`00000000 : 00000000`00000000 fffffa80`02bd8c00 fffffa60`03b934b0 00000000`00000000 : 0x0 fffffa60`03b933d8 00000000`00000000 : fffffa80`02bd8c00 fffffa60`03b934b0 00000000`00000000 fffffa80`01ba4100 : 0x0 STACK_COMMAND: kb FOLLOWUP_IP: nt+1353a0 fffff800`017393a0 ?? ??? SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: nt+1353a0 FOLLOWUP_NAME: MachineOwner IMAGE_NAME: ntoskrnl.exe BUCKET_ID: WRONG_SYMBOLS Followup: MachineOwner --------- Since this could be reproduce w/ only booting, raise the priority Hi Yan, When I do system_reset to guest, always generate BSOD w/ different error code. There are the related bugs: 1. Bug 1049800 - win2008.x86_64 guest BSOD (error code:0x50, PAGE_FAULT_IN_NONPAGED_AREA) 2. Bug 1038594 - Win2008 x86_64 BSOD(0x0A) on the starting of OS 3. Bug 1038902 - Win2008 BSOD on OS booting(0x7e and 0xc5) 4. Bug 1049823 - win2008.x86_64 guest BSOD (error code:0x3B, SYSTEM_SERVICE_EXCEPTION) 5. Bug 1056982 - win2008.x86_64 guest BSOD (error code:0x19, BAD_POOL_HEADER) Could you have a look about it? Thanks, Cong *** This bug has been marked as a duplicate of bug 1056982 *** |