VirtualBox

Ticket #223: w2003-bugcheck.txt

File w2003-bugcheck.txt, 3.9 KB (added by rr, 18 years ago)

windows 2003 kernel dump bugcheck

Line 
1C:\Program Files\Debugging Tools for Windows>kd -y c:\windows\symbols -z c:\wind
2ows\MEMORY.DMP
3
4Microsoft (R) Windows Debugger Version 6.6.0007.5
5Copyright (c) Microsoft Corporation. All rights reserved.
6
7
8Loading Dump File [c:\windows\MEMORY.DMP]
9Kernel Complete Dump File: Full address space is available
10
11Symbol search path is: c:\windows\symbols
12Executable search path is:
13Windows Server 2003 Kernel Version 3790 (Service Pack 2) UP Free x86 compatible
14Product: Server, suite: Enterprise TerminalServer
15Built by: 3790.srv03_sp2_rtm.070216-1710
16Kernel base = 0x80800000 PsLoadedModuleList = 0x808a8e48
17Debug session time: Fri Mar 23 07:20:43.796 2007 (GMT+1)
18System Uptime: 1 days 4:19:24.147
19Loading Kernel Symbols
20................................................................................
21...............
22Loading User Symbols
23
24Loading unloaded module list
25...
26*******************************************************************************
27* *
28* Bugcheck Analysis *
29* *
30*******************************************************************************
31
32Use !analyze -v to get detailed debugging information.
33
34BugCheck D1, {81, 2, 0, 8176e498}
35
36Probably caused by : ntoskrnl.exe ( nt!KiTrap0E+2a1 )
37
38Followup: MachineOwner
39---------
40kd> !analyze -v
41*******************************************************************************
42* *
43* Bugcheck Analysis *
44* *
45*******************************************************************************
46
47DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
48An attempt was made to access a pageable (or completely invalid) address at an
49interrupt request level (IRQL) that is too high. This is usually
50caused by drivers using improper addresses.
51If kernel debugger is available get stack backtrace.
52Arguments:
53Arg1: 00000081, memory referenced
54Arg2: 00000002, IRQL
55Arg3: 00000000, value 0 = read operation, 1 = write operation
56Arg4: 8176e498, address which referenced memory
57
58Debugging Details:
59------------------
60
61
62READ_ADDRESS: 00000081
63
64CURRENT_IRQL: 2
65
66FAULTING_IP:
67+ffffffff8176e498
688176e498 0000 add byte ptr [eax],al
69
70DEFAULT_BUCKET_ID: DRIVER_FAULT
71
72BUGCHECK_STR: 0xD1
73
74PROCESS_NAME: Idle
75
76TRAP_FRAME: 8089d53c -- (.trap ffffffff8089d53c)
77ErrCode = 00000000
78eax=00000081 ebx=8176e48c ecx=8176f000 edx=ffdffa40 esi=817821a0 edi=ffdffa40
79eip=8176e498 esp=8089d5b0 ebp=8089d5b0 iopl=0 nv up ei pl nz na pe nc
80cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
810008:8176e498 0000 add byte ptr [eax],al ds:0023:00000081=??
82Resetting default scope
83
84LAST_CONTROL_TRANSFER: from 8176e498 to 80826653
85
86STACK_TEXT:
878089d53c 8176e498 badb0d00 ffdffa40 8089fd80 nt!KiTrap0E+0x2a1
88WARNING: Frame IP not in any known module. Following frames may be wrong.
898089d5ac 8089d600 80828a68 817821a0 8176f000 0x8176e498
908089d5b0 80828a68 817821a0 8176f000 00000000 nt!KiDoubleFaultStack+0x2d50
918089d600 80820bba 00000000 0000000e 00000000 nt!KiRetireDpcList+0xca
928089d604 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x2f
93
94
95STACK_COMMAND: kb
96
97FOLLOWUP_IP:
98nt!KiTrap0E+2a1
9980826653 833dc0828a8000 cmp dword ptr [nt!KiFreezeFlag (808a82c0)],0
100
101SYMBOL_STACK_INDEX: 0
102
103SYMBOL_NAME: nt!KiTrap0E+2a1
104
105FOLLOWUP_NAME: MachineOwner
106
107MODULE_NAME: nt
108
109IMAGE_NAME: ntoskrnl.exe
110
111DEBUG_FLR_IMAGE_TIMESTAMP: 45d6a072
112
113FAILURE_BUCKET_ID: 0xD1_nt!KiTrap0E+2a1
114
115BUCKET_ID: 0xD1_nt!KiTrap0E+2a1
116
117Followup: MachineOwner
118---------
119
120kd>

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy