VirtualBox

Ticket #18854: analyze1.txt

File analyze1.txt, 8.6 KB (added by MaaSoftware, 5 years ago)

WinDbg analyze 1

Line 
1
2************* Path validation summary **************
3Response Time (ms) Location
4Deferred srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols
5Deferred cache*c:\MySymbols
6Deferred srv*https://msdl.microsoft.com/download/symbols
7
8Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
9Copyright (c) Microsoft Corporation. All rights reserved.
10
11
12Loading Dump File [C:\Windows\minidump\080219-10984-01.dmp]
13Mini Kernel Dump File: Only registers and stack trace are available
14
15
16************* Path validation summary **************
17Response Time (ms) Location
18Deferred srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols
19Deferred cache*c:\MySymbols
20Deferred srv*https://msdl.microsoft.com/download/symbols
21Symbol search path is: srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols;cache*c:\MySymbols;srv*https://msdl.microsoft.com/download/symbols
22Executable search path is:
23Windows 10 Kernel Version 18362 MP (8 procs) Free x64
24Product: WinNt, suite: TerminalServer SingleUserTS
25Machine Name:
26Kernel base = 0xfffff804`18200000 PsLoadedModuleList = 0xfffff804`186432f0
27Debug session time: Fri Aug 2 20:15:42.372 2019 (UTC + 3:00)
28System Uptime: 0 days 0:49:12.083
29Loading Kernel Symbols
30...............................................................
31................................................................
32................................................................
33..................
34Loading User Symbols
35Loading unloaded module list
36....................
37For analysis of this file, run !analyze -v
380: kd> !analyze -v
39*******************************************************************************
40* *
41* Bugcheck Analysis *
42* *
43*******************************************************************************
44
45ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
46An attempt was made to execute non-executable memory. The guilty driver
47is on the stack trace (and is typically the current instruction pointer).
48When possible, the guilty driver's name (Unicode string) is printed on
49the bugcheck screen and saved in KiBugCheckDriver.
50Arguments:
51Arg1: ffff9d8db279f1a0, Virtual address for the attempted execute.
52Arg2: 8a000008092008e3, PTE contents.
53Arg3: fffff8041db504a0, (reserved)
54Arg4: 0000000000000003, (reserved)
55
56Debugging Details:
57------------------
58
59*** WARNING: Unable to verify timestamp for e1d65x64.sys
60
61KEY_VALUES_STRING: 1
62
63 Key : Dump.Attributes.InsufficientDumpfileSize
64 Value: 1
65
66
67PROCESSES_ANALYSIS: 1
68
69SERVICE_ANALYSIS: 1
70
71STACKHASH_ANALYSIS: 1
72
73TIMELINE_ANALYSIS: 1
74
75
76DUMP_CLASS: 1
77
78DUMP_QUALIFIER: 400
79
80BUILD_VERSION_STRING: 10.0.18362.239 (WinBuild.160101.0800)
81
82DUMP_FILE_ATTRIBUTES: 0xc
83 Insufficient Dumpfile Size
84 Kernel Generated Triage Dump
85
86DUMP_TYPE: 2
87
88BUGCHECK_P1: ffff9d8db279f1a0
89
90BUGCHECK_P2: 8a000008092008e3
91
92BUGCHECK_P3: fffff8041db504a0
93
94BUGCHECK_P4: 3
95
96CPU_COUNT: 8
97
98CPU_MHZ: 1068
99
100CPU_VENDOR: GenuineIntel
101
102CPU_FAMILY: 6
103
104CPU_MODEL: 9e
105
106CPU_STEPPING: 9
107
108CUSTOMER_CRASH_COUNT: 1
109
110DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
111
112BUGCHECK_STR: 0xFC
113
114PROCESS_NAME: VirtualBoxVM.e
115
116CURRENT_IRQL: 2
117
118ANALYSIS_SESSION_HOST: 7700K
119
120ANALYSIS_SESSION_TIME: 08-19-2019 19:05:14.0379
121
122ANALYSIS_VERSION: 10.0.18362.1 amd64fre
123
124DPC_STACK_BASE: FFFFF8041DB50FB0
125
126TRAP_FRAME: fffff8041db504a0 -- (.trap 0xfffff8041db504a0)
127NOTE: The trap frame does not contain all registers.
128Some register values may be zeroed or incorrect.
129rax=ffff9d8db279f1a0 rbx=0000000000000000 rcx=ffff9d8db2ad9950
130rdx=ffff9d8db9a923d0 rsi=0000000000000000 rdi=0000000000000000
131rip=ffff9d8db279f1a0 rsp=fffff8041db50638 rbp=fffff8041db506b9
132 r8=0000000000000001 r9=0000000000000000 r10=fffff80424425b90
133r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
134r14=0000000000000000 r15=0000000000000000
135iopl=0 nv up ei pl zr na po nc
136ffff9d8d`b279f1a0 1101 adc dword ptr [rcx],eax ds:ffff9d8d`b2ad9950=????????
137Resetting default scope
138
139LAST_CONTROL_TRANSFER: from fffff804184554bc to fffff804183bc900
140
141STACK_TEXT:
142fffff804`1db50278 fffff804`184554bc : 00000000`000000fc ffff9d8d`b279f1a0 8a000008`092008e3 fffff804`1db504a0 : nt!KeBugCheckEx
143fffff804`1db50280 fffff804`1844fbc1 : 00000000`00000003 00000000`00000001 00000000`00000000 fffff804`1db503c0 : nt!MiCheckSystemNxFault+0x125330
144fffff804`1db502c0 fffff804`1827ac2a : 00000000`00000003 00000000`00000011 fffff804`1db50400 00000000`00000000 : nt!MiRaisedIrqlFault+0x12a6e1
145fffff804`1db50300 fffff804`183ca920 : ffff9d8d`b279f1a0 ffff9d8d`bb66a950 00000000`00000001 00000000`00000001 : nt!MmAccessFault+0x48a
146fffff804`1db504a0 ffff9d8d`b279f1a0 : fffff804`1d18aa51 ffff9d8d`b2ae7a20 ffff9d8d`b281a120 fffff804`244f10b0 : nt!KiPageFault+0x360
147fffff804`1db50638 fffff804`1d18aa51 : ffff9d8d`b2ae7a20 ffff9d8d`b281a120 fffff804`244f10b0 ffff9d8d`b9a923d0 : 0xffff9d8d`b279f1a0
148fffff804`1db50640 fffff804`1d18eba3 : 00000000`00000002 00000000`00000000 fffff804`00000001 fffff804`244c2101 : ndis!ndisMSendCompleteNetBufferListsInternal+0x121
149fffff804`1db50720 fffff804`1d18bcdf : 00001e00`00001e01 ffff9d8d`b26073c1 ffff9d8d`b2adbb60 ffff9d8d`b9a923d0 : ndis!ndisCallSendCompleteHandler+0x33
150fffff804`1db50760 fffff804`271033b4 : 00000000`00000002 00000001`00000000 00000001`00000000 fffff804`27100d00 : ndis!NdisMSendNetBufferListsComplete+0x1df
151fffff804`1db50850 00000000`00000002 : 00000001`00000000 00000001`00000000 fffff804`27100d00 ffff9d8d`b2be0c60 : e1d65x64+0x133b4
152fffff804`1db50858 00000001`00000000 : 00000001`00000000 fffff804`27100d00 ffff9d8d`b2be0c60 ffff9d8d`b29c9d50 : 0x2
153fffff804`1db50860 00000001`00000000 : fffff804`27100d00 ffff9d8d`b2be0c60 ffff9d8d`b29c9d50 ffff9d8d`b281f000 : 0x00000001`00000000
154fffff804`1db50868 fffff804`27100d00 : ffff9d8d`b2be0c60 ffff9d8d`b29c9d50 ffff9d8d`b281f000 ffff9d8d`b281fe40 : 0x00000001`00000000
155fffff804`1db50870 ffff9d8d`b2be0c60 : ffff9d8d`b29c9d50 ffff9d8d`b281f000 ffff9d8d`b281fe40 00000001`b283ad01 : e1d65x64+0x10d00
156fffff804`1db50878 ffff9d8d`b29c9d50 : ffff9d8d`b281f000 ffff9d8d`b281fe40 00000001`b283ad01 00000000`00000001 : 0xffff9d8d`b2be0c60
157fffff804`1db50880 ffff9d8d`b281f000 : ffff9d8d`b281fe40 00000001`b283ad01 00000000`00000001 ffff9d8d`000001ad : 0xffff9d8d`b29c9d50
158fffff804`1db50888 ffff9d8d`b281fe40 : 00000001`b283ad01 00000000`00000001 ffff9d8d`000001ad 00000000`00000000 : 0xffff9d8d`b281f000
159fffff804`1db50890 00000001`b283ad01 : 00000000`00000001 ffff9d8d`000001ad 00000000`00000000 ffff9d8d`af928350 : 0xffff9d8d`b281fe40
160fffff804`1db50898 00000000`00000001 : ffff9d8d`000001ad 00000000`00000000 ffff9d8d`af928350 00000000`00000000 : 0x00000001`b283ad01
161fffff804`1db508a0 ffff9d8d`000001ad : 00000000`00000000 ffff9d8d`af928350 00000000`00000000 00000000`00000000 : 0x1
162fffff804`1db508a8 00000000`00000000 : ffff9d8d`af928350 00000000`00000000 00000000`00000000 ffff9d00`00000000 : 0xffff9d8d`000001ad
163
164
165THREAD_SHA1_HASH_MOD_FUNC: c0ffbf375cd55e1aa93daf3c03427b8881b1e850
166
167THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5058410cce10b80427a1f7de155fad955a47b3fb
168
169THREAD_SHA1_HASH_MOD: f2616a5e3854c666781435d2d0ed7d6384206ea6
170
171FOLLOWUP_IP:
172e1d65x64+133b4
173fffff804`271033b4 ?? ???
174
175SYMBOL_STACK_INDEX: 9
176
177SYMBOL_NAME: e1d65x64+133b4
178
179FOLLOWUP_NAME: MachineOwner
180
181MODULE_NAME: e1d65x64
182
183IMAGE_NAME: e1d65x64.sys
184
185DEBUG_FLR_IMAGE_TIMESTAMP: 57f4c1b3
186
187STACK_COMMAND: .thread ; .cxr ; kb
188
189BUCKET_ID_FUNC_OFFSET: 133b4
190
191FAILURE_BUCKET_ID: 0xFC_e1d65x64!unknown_function
192
193BUCKET_ID: 0xFC_e1d65x64!unknown_function
194
195PRIMARY_PROBLEM_CLASS: 0xFC_e1d65x64!unknown_function
196
197TARGET_TIME: 2019-08-02T17:15:42.000Z
198
199OSBUILD: 18362
200
201OSSERVICEPACK: 239
202
203SERVICEPACK_NUMBER: 0
204
205OS_REVISION: 0
206
207SUITE_MASK: 272
208
209PRODUCT_TYPE: 1
210
211OSPLATFORM_TYPE: x64
212
213OSNAME: Windows 10
214
215OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
216
217OS_LOCALE:
218
219USER_LCID: 0
220
221OSBUILD_TIMESTAMP: 1972-02-02 11:33:06
222
223BUILDDATESTAMP_STR: 160101.0800
224
225BUILDLAB_STR: WinBuild
226
227BUILDOSVER_STR: 10.0.18362.239
228
229ANALYSIS_SESSION_ELAPSED_TIME: b5e
230
231ANALYSIS_SOURCE: KM
232
233FAILURE_ID_HASH_STRING: km:0xfc_e1d65x64!unknown_function
234
235FAILURE_ID_HASH: {7259990a-ebc1-3d2e-33f5-0c4abf098887}
236
237Followup: MachineOwner
238---------
239

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy