Bug 1783906
Summary: | [virtio-win-prewhql-174] BSOD after installing balloon driver on Win7 and Win2008r2 guest | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | xiagao | ||||
Component: | virtio-win | Assignee: | ybendito | ||||
virtio-win sub component: | virtio-win-prewhql | QA Contact: | xiagao | ||||
Status: | CLOSED ERRATA | Docs Contact: | |||||
Severity: | high | ||||||
Priority: | high | CC: | ailan, geovannisantosgmc, lmiksik, vrozenfe, ybendito, yvugenfi | ||||
Version: | 8.1 | Keywords: | Regression | ||||
Target Milestone: | rc | ||||||
Target Release: | 8.0 | ||||||
Hardware: | Unspecified | ||||||
OS: | Unspecified | ||||||
Whiteboard: | |||||||
Fixed In Version: | virtio-win-prewhql-0.1-175 | Doc Type: | If docs needed, set a value | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2020-04-28 16:05:16 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Attachments: |
|
Description
xiagao
2019-12-16 09:03:12 UTC
Created attachment 1645523 [details]
BSOD picture
windbg log: 22: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 9fcb6d2c, The address that the exception occurred at Arg3: 877e4638, Exception Record Address Arg4: 877e4220, Context Record Address Debugging Details: ------------------ DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 7601.24354.x86fre.win7sp1_ldr_escrow.190108-1700 SYSTEM_MANUFACTURER: Red Hat SYSTEM_PRODUCT_NAME: KVM SYSTEM_VERSION: RHEL-8.1.0 PC (Q35 + ICH9, 2009) BIOS_VENDOR: SeaBIOS BIOS_VERSION: 1.12.0-5.module+el8.1.0+4022+29a53beb BIOS_DATE: 04/01/2014 DUMP_TYPE: 1 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: ffffffff9fcb6d2c BUGCHECK_P3: ffffffff877e4638 BUGCHECK_P4: ffffffff877e4220 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: balloon+5d2c 9fcb6d2c 8b80e4000000 mov eax,dword ptr [eax+0E4h] EXCEPTION_RECORD: 877e4638 -- (.exr 0xffffffff877e4638) ExceptionAddress: 9fcb6d2c (balloon+0x00005d2c) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 00000000 Parameter[1]: 000000e4 Attempt to read from address 000000e4 CONTEXT: 877e4220 -- (.cxr 0xffffffff877e4220) eax=00000000 ebx=00000000 ecx=8499bb37 edx=9fcba000 esi=8499bb37 edi=00000000 eip=9fcb6d2c esp=877e4700 ebp=877e471c iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 balloon+0x5d2c: 9fcb6d2c 8b80e4000000 mov eax,dword ptr [eax+0E4h] ds:0023:000000e4=???????? Resetting default scope CPU_COUNT: 18 CPU_MHZ: 82f CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3d CPU_STEPPING: 2 CPU_MICROCODE: 6,3d,2,0 (F,M,S,R) SIG: 1'00000000 (cache) 1'00000000 (init) PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 00000000 EXCEPTION_PARAMETER2: 000000e4 FOLLOWUP_IP: balloon+5d2c 9fcb6d2c 8b80e4000000 mov eax,dword ptr [eax+0E4h] BUGCHECK_STR: 0x7E READ_ADDRESS: 000000e4 DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE ANALYSIS_SESSION_HOST: WIN-3IORRL4PE1F ANALYSIS_SESSION_TIME: 12-16-2019 16:10:34.0249 ANALYSIS_VERSION: 10.0.16299.15 amd64fre LOCK_ADDRESS: 827b7d80 -- (!locks 827b7d80) Resource @ nt!PiEngineLock (0x827b7d80) Exclusively owned Contention Count = 36 Threads: 847c9d48-01<*> 1 total locks PNP_TRIAGE: Lock address : 0x827b7d80 Thread Count : 1 Thread address: 0x847c9d48 Thread wait : 0x32d0 LAST_CONTROL_TRANSFER: from 8285ab78 to 82727cc4 STACK_TEXT: WARNING: Stack unwind information not available. Following frames may be wrong. 877e471c 9fcbb8d5 8b3eec70 6d746c42 77c0fa48 balloon+0x5d2c 877e4738 849b20e0 74c11568 77c0fa48 00000008 balloon+0xa8d5 877e4750 849b1484 8b3ee4e8 8b3ee590 8b3ee4e8 Wdf01000!FxPkgPnp::PnpEventFailedOwnHardware+0x36 877e4778 849b1db2 00000108 8b3ee590 8b3ee4e8 Wdf01000!FxPkgPnp::PnpEnterNewState+0x104 877e479c 849b247a 877e47b4 969fa0f0 8b3ee4e8 Wdf01000!FxPkgPnp::PnpProcessEventInner+0x149 877e47c0 849ab40b 00000002 00000000 877e47f0 Wdf01000!FxPkgPnp::PnpProcessEvent+0x13e 877e47d0 849aae02 8b3ee4e8 877e47f8 8e9d4f00 Wdf01000!FxPkgPnp::_PnpStartDevice+0x1e 877e47f0 84987a3f 8e9d4f00 877e4818 84987c63 Wdf01000!FxPkgPnp::Dispatch+0x207 877e47fc 84987c63 8d1f1a38 8e9d4f00 88f78278 Wdf01000!FxDevice::Dispatch+0x7f 877e4818 8298a6c3 8d1f1a38 8e9d4f00 8e9d4fd4 Wdf01000!FxDevice::DispatchWithLock+0x7b 877e483c 8267ef3e 00000000 8e9d4ff8 8d1f1a38 nt!IovCallDriver+0x258 877e4850 8299c35d 88f7e478 8e9d4f00 9289a1e8 nt!IofCallDriver+0x1b 877e4868 8298a6c3 9289a1e8 8d1f1a38 8e9d5000 nt!ViFilterDispatchPnp+0x120 877e488c 8267ef3e 00000000 877e4910 9289a1e8 nt!IovCallDriver+0x258 877e48a0 8280fbc0 00000000 8ac85030 8d0e6fc8 nt!IofCallDriver+0x1b 877e48bc 82657b83 877e48ec 8265a7db 8d0e6fc8 nt!PnpAsynchronousCall+0x92 877e4920 82806a26 8265a7db 8d0e6fc8 8ac7e880 nt!PnpStartDevice+0xe1 877e497c 828068ef 8d0e6fc8 0000003e 00000000 nt!PnpStartDeviceNode+0x12c 877e4998 8280e307 00000000 00000000 883fc528 nt!PipProcessStartPhase1+0x62 877e4b94 828dff0a 8ac7e880 883fc528 877e4bc0 nt!PipProcessDevNodeTree+0x188 877e4bc8 8265a423 827b5ca0 847c9d48 8278bd3c nt!PiRestartDevice+0x8a 877e4bf4 826afb4b 00000000 847b5d20 847c9d48 nt!PnpDeviceActionWorker+0x1fb 877e4c44 8285ab38 00000001 a1b8e556 00000000 nt!ExpWorkerThread+0x10d 877e4c90 826f8301 826afa3e 00000001 00000000 nt!PspSystemThreadStartup+0x159 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19 THREAD_SHA1_HASH_MOD_FUNC: a51c67640d81d6f72a3c380ea748682a595548aa THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 105e9953bfcb851933103dbb44237a77814dd508 THREAD_SHA1_HASH_MOD: 089316c27816212482c3398054905799ccdf938e FAULT_INSTR_CODE: e4808b SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: balloon+5d2c FOLLOWUP_NAME: MachineOwner MODULE_NAME: balloon IMAGE_NAME: balloon.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5df22fe9 STACK_COMMAND: .cxr 0xffffffff877e4220 ; kb FAILURE_BUCKET_ID: 0x7E_VRF_balloon+5d2c BUCKET_ID: 0x7E_VRF_balloon+5d2c PRIMARY_PROBLEM_CLASS: 0x7E_VRF_balloon+5d2c TARGET_TIME: 2019-12-15T19:55:50.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x86 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2019-01-08 18:34:49 BUILDDATESTAMP_STR: 190108-1700 BUILDLAB_STR: win7sp1_ldr_escrow BUILDOSVER_STR: 6.1.7601.24354.x86fre.win7sp1_ldr_escrow.190108-1700 ANALYSIS_SESSION_ELAPSED_TIME: cd1 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x7e_vrf_balloon+5d2c FAILURE_ID_HASH: {d88dd172-3e9f-dea2-9edf-6c4fd065e7cf} Followup: MachineOwner Fixed in virtio-win-prewhql-0.1-175 Verify this bug with virtio-win-prewhql-0.1-175. balloon driver works. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2020:1757 In my opinion, no special documentation required as the build with the bug was never released. The problem exists only in intermediate build |