| 1 | Kernel Summary Dump File: Only kernel address space is available
|
|---|
| 2 |
|
|---|
| 3 | Symbol search path is:
|
|---|
| 4 | Executable search path is:
|
|---|
| 5 | Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
|
|---|
| 6 | Product: WinNt, suite: TerminalServer SingleUserTS Personal
|
|---|
| 7 | Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
|
|---|
| 8 | Machine Name:
|
|---|
| 9 | Kernel base = 0xfffff800`02e04000 PsLoadedModuleList = 0xfffff800`03049670
|
|---|
| 10 | System Uptime: 2 days 0:55:17.434
|
|---|
| 11 | Loading Kernel Symbols
|
|---|
| 12 | ...............................................................
|
|---|
| 13 | ................................................................
|
|---|
| 14 | ...........................................
|
|---|
| 15 | Loading User Symbols
|
|---|
| 16 | PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
|
|---|
| 17 | Loading unloaded module list
|
|---|
| 18 | ...............................
|
|---|
| 19 | *******************************************************************************
|
|---|
| 20 | * *
|
|---|
| 21 | * Bugcheck Analysis *
|
|---|
| 22 | * *
|
|---|
| 23 | *******************************************************************************
|
|---|
| 24 |
|
|---|
| 25 | Use !analyze -v to get detailed debugging information.
|
|---|
| 26 |
|
|---|
| 27 | BugCheck 3B, {c0000096, fffff880095c7972, fffff88009958d90, 0}
|
|---|
| 28 |
|
|---|
| 29 | *** ERROR: Symbol file could not be found. Defaulted to export symbols for VMMR0.r0 -
|
|---|
| 30 | *** ERROR: Symbol file could not be found. Defaulted to export symbols for VBoxDrv.sys -
|
|---|
| 31 | Probably caused by : VMMR0.r0 ( VMMR0!VMMR0EntryFast+5cf )
|
|---|
| 32 |
|
|---|
| 33 | Followup: MachineOwner
|
|---|
| 34 | ---------
|
|---|
| 35 |
|
|---|
| 36 | 0: kd> !analyze -v
|
|---|
| 37 | *******************************************************************************
|
|---|
| 38 | * *
|
|---|
| 39 | * Bugcheck Analysis *
|
|---|
| 40 | * *
|
|---|
| 41 | *******************************************************************************
|
|---|
| 42 |
|
|---|
| 43 | SYSTEM_SERVICE_EXCEPTION (3b)
|
|---|
| 44 | An exception happened while executing a system service routine.
|
|---|
| 45 | Arguments:
|
|---|
| 46 | Arg1: 00000000c0000096, Exception code that caused the bugcheck
|
|---|
| 47 | Arg2: fffff880095c7972, Address of the instruction which caused the bugcheck
|
|---|
| 48 | Arg3: fffff88009958d90, Address of the context record for the exception that caused the bugcheck
|
|---|
| 49 | Arg4: 0000000000000000, zero.
|
|---|
| 50 |
|
|---|
| 51 | Debugging Details:
|
|---|
| 52 | ------------------
|
|---|
| 53 |
|
|---|
| 54 |
|
|---|
| 55 | EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
|
|---|
| 56 |
|
|---|
| 57 | FAULTING_IP:
|
|---|
| 58 | +13
|
|---|
| 59 | fffff880`095c7972 0f22e0 mov cr4,rax
|
|---|
| 60 |
|
|---|
| 61 | CONTEXT: fffff88009958d90 -- (.cxr 0xfffff88009958d90)
|
|---|
| 62 | rax=0000000000000274 rbx=fffff8800b8f0340 rcx=0000000000000000
|
|---|
| 63 | rdx=fffff8800b8f0340 rsi=0000000000000000 rdi=fffff8800b8f0000
|
|---|
| 64 | rip=fffff880095c7972 rsp=fffff88009959778 rbp=fffffa80094534a0
|
|---|
| 65 | r8=000000000001ae80 r9=fffff8800b8f0000 r10=0000000000000012
|
|---|
| 66 | r11=ffff800000000000 r12=fffffa80092f5fc0 r13=fffffa800704bc50
|
|---|
| 67 | r14=0000000000000000 r15=fffffa800704bb00
|
|---|
| 68 | iopl=0 nv up di pl nz na po nc
|
|---|
| 69 | cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010006
|
|---|
| 70 | fffff880`095c7972 0f22e0 mov cr4,rax
|
|---|
| 71 | Resetting default scope
|
|---|
| 72 |
|
|---|
| 73 | DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
|
|---|
| 74 |
|
|---|
| 75 | BUGCHECK_STR: 0x3B
|
|---|
| 76 |
|
|---|
| 77 | PROCESS_NAME: VirtualBox.exe
|
|---|
| 78 |
|
|---|
| 79 | CURRENT_IRQL: 0
|
|---|
| 80 |
|
|---|
| 81 | LAST_CONTROL_TRANSFER: from fffff880095c77f2 to fffff880095c7972
|
|---|
| 82 |
|
|---|
| 83 | STACK_TEXT:
|
|---|
| 84 | fffff880`09959778 fffff880`095c77f2 : 00000000`00000010 fffff880`0d6d12ff fffffa80`06a8e220 fffff800`02eb0c70 : 0xfffff880`095c7972
|
|---|
| 85 | fffff880`09959780 00000000`00000010 : fffff880`0d6d12ff fffffa80`06a8e220 fffff800`02eb0c70 fffffa80`01718b80 : 0xfffff880`095c77f2
|
|---|
| 86 | fffff880`09959788 fffff880`0d6d12ff : fffffa80`06a8e220 fffff800`02eb0c70 fffffa80`01718b80 fffffa80`06a8e328 : 0x10
|
|---|
| 87 | fffff880`09959790 fffff880`0d6d1bc8 : fffffa80`00733300 fffffa80`092f5fc0 fffffa80`0937f990 20206f49`00ecd690 : VMMR0!VMMR0EntryFast+0x5cf
|
|---|
| 88 | fffff880`099597d0 fffff880`04179d11 : 00000000`20206f49 00000000`00000001 00000000`00000001 00000000`20206f49 : VMMR0!VMMR0EntryEx+0xe8
|
|---|
| 89 | fffff880`09959840 fffff880`041731ab : fffffa80`092f5fc0 00000000`00000000 fffffa80`0704bb00 00000000`00000000 : VBoxDrv!SUPR0PageFree+0x2021
|
|---|
| 90 | fffff880`09959890 fffff800`0319ba97 : fffffa80`07fff070 fffff880`09959b60 fffffa80`07fff070 fffffa80`094533d0 : VBoxDrv+0x11ab
|
|---|
| 91 | fffff880`099598d0 fffff800`0319c2f6 : fffff680`00c00ab0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
|
|---|
| 92 | fffff880`09959a00 fffff800`02e7fed3 : 00000000`00000101 0000007f`ffffffff fffffa80`06a8e220 00000980`00000000 : nt!NtDeviceIoControlFile+0x56
|
|---|
| 93 | fffff880`09959a70 00000000`77c3138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
|
|---|
| 94 | 00000000`051efa58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c3138a
|
|---|
| 95 |
|
|---|
| 96 |
|
|---|
| 97 | FOLLOWUP_IP:
|
|---|
| 98 | VMMR0!VMMR0EntryFast+5cf
|
|---|
| 99 | fffff880`0d6d12ff 0fb6542440 movzx edx,byte ptr [rsp+40h]
|
|---|
| 100 |
|
|---|
| 101 | SYMBOL_STACK_INDEX: 3
|
|---|
| 102 |
|
|---|
| 103 | SYMBOL_NAME: VMMR0!VMMR0EntryFast+5cf
|
|---|
| 104 |
|
|---|
| 105 | FOLLOWUP_NAME: MachineOwner
|
|---|
| 106 |
|
|---|
| 107 | MODULE_NAME: VMMR0
|
|---|
| 108 |
|
|---|
| 109 | IMAGE_NAME: VMMR0.r0
|
|---|
| 110 |
|
|---|
| 111 | DEBUG_FLR_IMAGE_TIMESTAMP: 4eef3185
|
|---|
| 112 |
|
|---|
| 113 | STACK_COMMAND: .cxr 0xfffff88009958d90 ; kb
|
|---|
| 114 |
|
|---|
| 115 | FAILURE_BUCKET_ID: X64_0x3B_VMMR0!VMMR0EntryFast+5cf
|
|---|
| 116 |
|
|---|
| 117 | BUCKET_ID: X64_0x3B_VMMR0!VMMR0EntryFast+5cf
|
|---|
| 118 |
|
|---|
| 119 | Followup: MachineOwner
|
|---|
| 120 | ---------
|
|---|
| 121 |
|
|---|
| 122 | 0: kd> lmvm VMMR0
|
|---|
| 123 | start end module name
|
|---|
| 124 | fffff880`0d6ba000 fffff880`0d749000 VMMR0 (export symbols) VMMR0.r0
|
|---|
| 125 | Loaded symbol image file: VMMR0.r0
|
|---|
| 126 | Image path: \??\C:\Program Files\Oracle\VirtualBox\VMMR0.r0
|
|---|
| 127 | Image name: VMMR0.r0
|
|---|
| 128 | Timestamp: Mon Dec 19 14:43:49 2011 (4EEF3185)
|
|---|
| 129 | CheckSum: 0008D90E
|
|---|
| 130 | ImageSize: 0008F000
|
|---|
| 131 | Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
|
|---|