VirtualBox

Ticket #18854: analyze2.txt

File analyze2.txt, 7.2 KB (added by MaaSoftware, 5 years ago)

WinDbg analyze 2

Line 
1
2Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
3Copyright (c) Microsoft Corporation. All rights reserved.
4
5
6Loading Dump File [C:\Windows\minidump\080219-11296-01.dmp]
7Mini Kernel Dump File: Only registers and stack trace are available
8
9
10************* Path validation summary **************
11Response Time (ms) Location
12Deferred srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols
13Symbol search path is: srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols
14Executable search path is:
15Windows 10 Kernel Version 18362 MP (8 procs) Free x64
16Product: WinNt, suite: TerminalServer SingleUserTS
17Built by: 18362.1.amd64fre.19h1_release.190318-1202
18Machine Name:
19Kernel base = 0xfffff803`62c00000 PsLoadedModuleList = 0xfffff803`630432f0
20Debug session time: Fri Aug 2 20:37:09.365 2019 (UTC + 3:00)
21System Uptime: 0 days 0:11:15.077
22Loading Kernel Symbols
23...............................................................
24................................................................
25................................................................
26..................
27Loading User Symbols
28Loading unloaded module list
29................
30For analysis of this file, run !analyze -v
310: kd> !analyze -v
32*******************************************************************************
33* *
34* Bugcheck Analysis *
35* *
36*******************************************************************************
37
38ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
39An attempt was made to execute non-executable memory. The guilty driver
40is on the stack trace (and is typically the current instruction pointer).
41When possible, the guilty driver's name (Unicode string) is printed on
42the bugcheck screen and saved in KiBugCheckDriver.
43Arguments:
44Arg1: ffff800803df71a0, Virtual address for the attempted execute.
45Arg2: 8a00000809c008e3, PTE contents.
46Arg3: ffff908edb1c8340, (reserved)
47Arg4: 0000000000000003, (reserved)
48
49Debugging Details:
50------------------
51
52*** WARNING: Unable to verify timestamp for e1d65x64.sys
53*** WARNING: Unable to verify timestamp for win32k.sys
54
55KEY_VALUES_STRING: 1
56
57
58PROCESSES_ANALYSIS: 1
59
60SERVICE_ANALYSIS: 1
61
62STACKHASH_ANALYSIS: 1
63
64TIMELINE_ANALYSIS: 1
65
66
67DUMP_CLASS: 1
68
69DUMP_QUALIFIER: 400
70
71BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
72
73DUMP_TYPE: 2
74
75BUGCHECK_P1: ffff800803df71a0
76
77BUGCHECK_P2: 8a00000809c008e3
78
79BUGCHECK_P3: ffff908edb1c8340
80
81BUGCHECK_P4: 3
82
83CPU_COUNT: 8
84
85CPU_MHZ: 1068
86
87CPU_VENDOR: GenuineIntel
88
89CPU_FAMILY: 6
90
91CPU_MODEL: 9e
92
93CPU_STEPPING: 9
94
95CUSTOMER_CRASH_COUNT: 1
96
97DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
98
99BUGCHECK_STR: 0xFC
100
101PROCESS_NAME: System
102
103CURRENT_IRQL: 2
104
105ANALYSIS_SESSION_HOST: 7700K
106
107ANALYSIS_SESSION_TIME: 08-19-2019 19:08:23.0965
108
109ANALYSIS_VERSION: 10.0.18362.1 amd64fre
110
111TRAP_FRAME: ffff908edb1c8340 -- (.trap 0xffff908edb1c8340)
112NOTE: The trap frame does not contain all registers.
113Some register values may be zeroed or incorrect.
114rax=ffff800803df71a0 rbx=0000000000000000 rcx=ffff8008042dab50
115rdx=ffff80080ae10600 rsi=0000000000000000 rdi=0000000000000000
116rip=ffff800803df71a0 rsp=ffff908edb1c84d8 rbp=ffff908edb1c8559
117 r8=0000000000000001 r9=0000000000000000 r10=fffff8036e9c5b90
118r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
119r14=0000000000000000 r15=0000000000000000
120iopl=0 nv up ei pl zr na po nc
121ffff8008`03df71a0 1101 adc dword ptr [rcx],eax ds:ffff8008`042dab50=03da7ef0
122Resetting default scope
123
124LAST_CONTROL_TRANSFER: from fffff80362e554bc to fffff80362dbc900
125
126STACK_TEXT:
127ffff908e`db1c8118 fffff803`62e554bc : 00000000`000000fc ffff8008`03df71a0 8a000008`09c008e3 ffff908e`db1c8340 : nt!KeBugCheckEx
128ffff908e`db1c8120 fffff803`62e4fbc1 : 00000000`00000003 00000000`00000001 00000000`00000000 ffff908e`db1c8260 : nt!MiCheckSystemNxFault+0x125330
129ffff908e`db1c8160 fffff803`62c7ac2a : 00000000`00000006 00000000`00000011 ffff908e`db1c82a0 00000000`00000000 : nt!MiRaisedIrqlFault+0x12a6e1
130ffff908e`db1c81a0 fffff803`62dca920 : 00000000`00000000 fffff803`b2503711 00000000`00000002 00000000`00000036 : nt!MmAccessFault+0x48a
131ffff908e`db1c8340 ffff8008`03df71a0 : fffff803`6778aa51 ffff8008`0451aa20 ffff8008`03e223f0 fffff803`6ea910b0 : nt!KiPageFault+0x360
132ffff908e`db1c84d8 fffff803`6778aa51 : ffff8008`0451aa20 ffff8008`03e223f0 fffff803`6ea910b0 ffff8008`0ae10600 : 0xffff8008`03df71a0
133ffff908e`db1c84e0 fffff803`6778eba3 : 00000000`00000002 00000000`00000000 fffff803`00000001 fffff803`6ea62101 : ndis!ndisMSendCompleteNetBufferListsInternal+0x121
134ffff908e`db1c85c0 fffff803`6778bcdf : fffff803`60367101 ffff8008`03afb9a1 ffff8008`043198c0 ffff8008`0ae10600 : ndis!ndisCallSendCompleteHandler+0x33
135ffff908e`db1c8600 fffff803`70ed33b4 : 00000000`00000002 00000001`00000000 00000001`00000000 fffff803`70ed0d00 : ndis!NdisMSendNetBufferListsComplete+0x1df
136ffff908e`db1c86f0 00000000`00000002 : 00000001`00000000 00000001`00000000 fffff803`70ed0d00 00000000`00000000 : e1d65x64+0x133b4
137ffff908e`db1c86f8 00000001`00000000 : 00000001`00000000 fffff803`70ed0d00 00000000`00000000 00000000`00000000 : 0x2
138ffff908e`db1c8700 00000001`00000000 : fffff803`70ed0d00 00000000`00000000 00000000`00000000 ffff8008`03e23000 : 0x00000001`00000000
139ffff908e`db1c8708 fffff803`70ed0d00 : 00000000`00000000 00000000`00000000 ffff8008`03e23000 ffff8008`03e23e40 : 0x00000001`00000000
140ffff908e`db1c8710 00000000`00000000 : 00000000`00000000 ffff8008`03e23000 ffff8008`03e23e40 00000001`03e3ed01 : e1d65x64+0x10d00
141
142
143THREAD_SHA1_HASH_MOD_FUNC: c0ffbf375cd55e1aa93daf3c03427b8881b1e850
144
145THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5058410cce10b80427a1f7de155fad955a47b3fb
146
147THREAD_SHA1_HASH_MOD: f2616a5e3854c666781435d2d0ed7d6384206ea6
148
149FOLLOWUP_IP:
150e1d65x64+133b4
151fffff803`70ed33b4 448b7dcb mov r15d,dword ptr [rbp-35h]
152
153FAULT_INSTR_CODE: cb7d8b44
154
155SYMBOL_STACK_INDEX: 9
156
157SYMBOL_NAME: e1d65x64+133b4
158
159FOLLOWUP_NAME: MachineOwner
160
161MODULE_NAME: e1d65x64
162
163IMAGE_NAME: e1d65x64.sys
164
165DEBUG_FLR_IMAGE_TIMESTAMP: 57f4c1b3
166
167STACK_COMMAND: .thread ; .cxr ; kb
168
169BUCKET_ID_FUNC_OFFSET: 133b4
170
171FAILURE_BUCKET_ID: 0xFC_e1d65x64!unknown_function
172
173BUCKET_ID: 0xFC_e1d65x64!unknown_function
174
175PRIMARY_PROBLEM_CLASS: 0xFC_e1d65x64!unknown_function
176
177TARGET_TIME: 2019-08-02T17:37:09.000Z
178
179OSBUILD: 18362
180
181OSSERVICEPACK: 239
182
183SERVICEPACK_NUMBER: 0
184
185OS_REVISION: 0
186
187SUITE_MASK: 272
188
189PRODUCT_TYPE: 1
190
191OSPLATFORM_TYPE: x64
192
193OSNAME: Windows 10
194
195OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
196
197OS_LOCALE:
198
199USER_LCID: 0
200
201OSBUILD_TIMESTAMP: 1972-02-02 11:33:06
202
203BUILDDATESTAMP_STR: 190318-1202
204
205BUILDLAB_STR: 19h1_release
206
207BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
208
209ANALYSIS_SESSION_ELAPSED_TIME: 10b20
210
211ANALYSIS_SOURCE: KM
212
213FAILURE_ID_HASH_STRING: km:0xfc_e1d65x64!unknown_function
214
215FAILURE_ID_HASH: {7259990a-ebc1-3d2e-33f5-0c4abf098887}
216
217Followup: MachineOwner
218---------
219

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy