VirtualBox

Ticket #223: bugcheck.txt

File bugcheck.txt, 3.9 KB (added by rr, 18 years ago)

Bugcheck of third crash

Line 
1C:\Documents and Settings\Administrator>"c:\Program Files\Debugging Tools for Wi
2ndows\kd.exe" -z c:\WINDOWS\MEMORY.DMP -y c:\WINDOWS\Symbols
3
4Microsoft (R) Windows Debugger Version 6.6.0007.5
5Copyright (c) Microsoft Corporation. All rights reserved.
6
7
8Loading Dump File [c:\WINDOWS\MEMORY.DMP]
9Kernel Complete Dump File: Full address space is available
10
11Symbol search path is: c:\WINDOWS\Symbols
12Executable search path is:
13Windows Server 2003 Kernel Version 3790 (Service Pack 2) UP Free x86 compatible
14Product: Server, suite: Enterprise TerminalServer
15Built by: 3790.srv03_sp2_rtm.070216-1710
16Kernel base = 0x80800000 PsLoadedModuleList = 0x808a8e48
17Debug session time: Mon Mar 26 11:21:20.103 2007 (GMT+2)
18System Uptime: 0 days 15:59:40.777
19Loading Kernel Symbols
20................................................................................
21............
22Loading User Symbols
23
24Loading unloaded module list
25...
26*******************************************************************************
27* *
28* Bugcheck Analysis *
29* *
30*******************************************************************************
31
32Use !analyze -v to get detailed debugging information.
33
34BugCheck D1, {81, 2, 0, 8176e690}
35
36Probably caused by : ntoskrnl.exe ( nt!KiTrap0E+2a1 )
37
38Followup: MachineOwner
39---------
40
41kd> !analyze -v
42*******************************************************************************
43* *
44* Bugcheck Analysis *
45* *
46*******************************************************************************
47
48DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
49An attempt was made to access a pageable (or completely invalid) address at an
50interrupt request level (IRQL) that is too high. This is usually
51caused by drivers using improper addresses.
52If kernel debugger is available get stack backtrace.
53Arguments:
54Arg1: 00000081, memory referenced
55Arg2: 00000002, IRQL
56Arg3: 00000000, value 0 = read operation, 1 = write operation
57Arg4: 8176e690, address which referenced memory
58
59Debugging Details:
60------------------
61
62
63READ_ADDRESS: 00000081
64
65CURRENT_IRQL: 2
66
67FAULTING_IP:
68+ffffffff8176e690
698176e690 0000 add byte ptr [eax],al
70
71DEFAULT_BUCKET_ID: DRIVER_FAULT
72
73BUGCHECK_STR: 0xD1
74
75PROCESS_NAME: Idle
76
77TRAP_FRAME: 8089d53c -- (.trap ffffffff8089d53c)
78ErrCode = 00000000
79eax=00000081 ebx=8176e684 ecx=8176f000 edx=ffdffa40 esi=817821a0 edi=ffdffa40
80eip=8176e690 esp=8089d5b0 ebp=8089d5b0 iopl=0 nv up ei pl nz na pe nc
81cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
820008:8176e690 0000 add byte ptr [eax],al ds:0023:00000081=??
83Resetting default scope
84
85LAST_CONTROL_TRANSFER: from 8176e690 to 80826653
86
87STACK_TEXT:
888089d53c 8176e690 badb0d00 ffdffa40 00000000 nt!KiTrap0E+0x2a1
89WARNING: Frame IP not in any known module. Following frames may be wrong.
908089d5ac 8089d600 80828a68 817821a0 8176f000 0x8176e690
918089d5b0 80828a68 817821a0 8176f000 00000000 nt!KiDoubleFaultStack+0x2d50
928089d600 80820bba 00000000 0000000e 00000000 nt!KiRetireDpcList+0xca
938089d604 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x2f
94
95
96STACK_COMMAND: kb
97
98FOLLOWUP_IP:
99nt!KiTrap0E+2a1
10080826653 833dc0828a8000 cmp dword ptr [nt!KiFreezeFlag (808a82c0)],0
101
102SYMBOL_STACK_INDEX: 0
103
104SYMBOL_NAME: nt!KiTrap0E+2a1
105
106FOLLOWUP_NAME: MachineOwner
107
108MODULE_NAME: nt
109
110IMAGE_NAME: ntoskrnl.exe
111
112DEBUG_FLR_IMAGE_TIMESTAMP: 45d6a072
113
114FAILURE_BUCKET_ID: 0xD1_nt!KiTrap0E+2a1
115
116BUCKET_ID: 0xD1_nt!KiTrap0E+2a1
117
118Followup: MachineOwner
119---------
120
121kd>

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy