VirtualBox

Ticket #10117: VirtualBox-Ticket10117-BSODAnalysis.txt

File VirtualBox-Ticket10117-BSODAnalysis.txt, 5.7 KB (added by gshaham, 13 years ago)
Line 
1Kernel Summary Dump File: Only kernel address space is available
2
3Symbol search path is:
4Executable search path is:
5Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
6Product: WinNt, suite: TerminalServer SingleUserTS Personal
7Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
8Machine Name:
9Kernel base = 0xfffff800`02e04000 PsLoadedModuleList = 0xfffff800`03049670
10System Uptime: 2 days 0:55:17.434
11Loading Kernel Symbols
12...............................................................
13................................................................
14...........................................
15Loading User Symbols
16PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details
17Loading unloaded module list
18...............................
19*******************************************************************************
20* *
21* Bugcheck Analysis *
22* *
23*******************************************************************************
24
25Use !analyze -v to get detailed debugging information.
26
27BugCheck 3B, {c0000096, fffff880095c7972, fffff88009958d90, 0}
28
29*** ERROR: Symbol file could not be found. Defaulted to export symbols for VMMR0.r0 -
30*** ERROR: Symbol file could not be found. Defaulted to export symbols for VBoxDrv.sys -
31Probably caused by : VMMR0.r0 ( VMMR0!VMMR0EntryFast+5cf )
32
33Followup: MachineOwner
34---------
35
360: kd> !analyze -v
37*******************************************************************************
38* *
39* Bugcheck Analysis *
40* *
41*******************************************************************************
42
43SYSTEM_SERVICE_EXCEPTION (3b)
44An exception happened while executing a system service routine.
45Arguments:
46Arg1: 00000000c0000096, Exception code that caused the bugcheck
47Arg2: fffff880095c7972, Address of the instruction which caused the bugcheck
48Arg3: fffff88009958d90, Address of the context record for the exception that caused the bugcheck
49Arg4: 0000000000000000, zero.
50
51Debugging Details:
52------------------
53
54
55EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
56
57FAULTING_IP:
58+13
59fffff880`095c7972 0f22e0 mov cr4,rax
60
61CONTEXT: fffff88009958d90 -- (.cxr 0xfffff88009958d90)
62rax=0000000000000274 rbx=fffff8800b8f0340 rcx=0000000000000000
63rdx=fffff8800b8f0340 rsi=0000000000000000 rdi=fffff8800b8f0000
64rip=fffff880095c7972 rsp=fffff88009959778 rbp=fffffa80094534a0
65 r8=000000000001ae80 r9=fffff8800b8f0000 r10=0000000000000012
66r11=ffff800000000000 r12=fffffa80092f5fc0 r13=fffffa800704bc50
67r14=0000000000000000 r15=fffffa800704bb00
68iopl=0 nv up di pl nz na po nc
69cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010006
70fffff880`095c7972 0f22e0 mov cr4,rax
71Resetting default scope
72
73DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
74
75BUGCHECK_STR: 0x3B
76
77PROCESS_NAME: VirtualBox.exe
78
79CURRENT_IRQL: 0
80
81LAST_CONTROL_TRANSFER: from fffff880095c77f2 to fffff880095c7972
82
83STACK_TEXT:
84fffff880`09959778 fffff880`095c77f2 : 00000000`00000010 fffff880`0d6d12ff fffffa80`06a8e220 fffff800`02eb0c70 : 0xfffff880`095c7972
85fffff880`09959780 00000000`00000010 : fffff880`0d6d12ff fffffa80`06a8e220 fffff800`02eb0c70 fffffa80`01718b80 : 0xfffff880`095c77f2
86fffff880`09959788 fffff880`0d6d12ff : fffffa80`06a8e220 fffff800`02eb0c70 fffffa80`01718b80 fffffa80`06a8e328 : 0x10
87fffff880`09959790 fffff880`0d6d1bc8 : fffffa80`00733300 fffffa80`092f5fc0 fffffa80`0937f990 20206f49`00ecd690 : VMMR0!VMMR0EntryFast+0x5cf
88fffff880`099597d0 fffff880`04179d11 : 00000000`20206f49 00000000`00000001 00000000`00000001 00000000`20206f49 : VMMR0!VMMR0EntryEx+0xe8
89fffff880`09959840 fffff880`041731ab : fffffa80`092f5fc0 00000000`00000000 fffffa80`0704bb00 00000000`00000000 : VBoxDrv!SUPR0PageFree+0x2021
90fffff880`09959890 fffff800`0319ba97 : fffffa80`07fff070 fffff880`09959b60 fffffa80`07fff070 fffffa80`094533d0 : VBoxDrv+0x11ab
91fffff880`099598d0 fffff800`0319c2f6 : fffff680`00c00ab0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
92fffff880`09959a00 fffff800`02e7fed3 : 00000000`00000101 0000007f`ffffffff fffffa80`06a8e220 00000980`00000000 : nt!NtDeviceIoControlFile+0x56
93fffff880`09959a70 00000000`77c3138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
9400000000`051efa58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c3138a
95
96
97FOLLOWUP_IP:
98VMMR0!VMMR0EntryFast+5cf
99fffff880`0d6d12ff 0fb6542440 movzx edx,byte ptr [rsp+40h]
100
101SYMBOL_STACK_INDEX: 3
102
103SYMBOL_NAME: VMMR0!VMMR0EntryFast+5cf
104
105FOLLOWUP_NAME: MachineOwner
106
107MODULE_NAME: VMMR0
108
109IMAGE_NAME: VMMR0.r0
110
111DEBUG_FLR_IMAGE_TIMESTAMP: 4eef3185
112
113STACK_COMMAND: .cxr 0xfffff88009958d90 ; kb
114
115FAILURE_BUCKET_ID: X64_0x3B_VMMR0!VMMR0EntryFast+5cf
116
117BUCKET_ID: X64_0x3B_VMMR0!VMMR0EntryFast+5cf
118
119Followup: MachineOwner
120---------
121
1220: kd> lmvm VMMR0
123start end module name
124fffff880`0d6ba000 fffff880`0d749000 VMMR0 (export symbols) VMMR0.r0
125 Loaded symbol image file: VMMR0.r0
126 Image path: \??\C:\Program Files\Oracle\VirtualBox\VMMR0.r0
127 Image name: VMMR0.r0
128 Timestamp: Mon Dec 19 14:43:49 2011 (4EEF3185)
129 CheckSum: 0008D90E
130 ImageSize: 0008F000
131 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy