| 1 |
|
|---|
| 2 | Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
|
|---|
| 3 | Copyright (c) Microsoft Corporation. All rights reserved.
|
|---|
| 4 |
|
|---|
| 5 |
|
|---|
| 6 | Loading Dump File [C:\Windows\MEMORY.DMP]
|
|---|
| 7 | Kernel Summary Dump File: Only kernel address space is available
|
|---|
| 8 |
|
|---|
| 9 | Symbol search path is: http://msdl.microsoft.com/download/symbols
|
|---|
| 10 | Executable search path is:
|
|---|
| 11 | Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
|
|---|
| 12 | Product: WinNt, suite: TerminalServer SingleUserTS Personal
|
|---|
| 13 | Built by: 7600.16617.x86fre.win7_gdr.100618-1621
|
|---|
| 14 | Machine Name:
|
|---|
| 15 | Kernel base = 0x83049000 PsLoadedModuleList = 0x83191810
|
|---|
| 16 | Debug session time: Fri Aug 27 23:50:27.008 2010 (GMT+2)
|
|---|
| 17 | System Uptime: 1 days 21:34:43.865
|
|---|
| 18 | WARNING: Process directory table base 7D3BC600 doesn't match CR3 00185000
|
|---|
| 19 | WARNING: Process directory table base 7D3BC600 doesn't match CR3 00185000
|
|---|
| 20 | Loading Kernel Symbols
|
|---|
| 21 | ...............................................................
|
|---|
| 22 | ................................................................
|
|---|
| 23 | ...........................
|
|---|
| 24 | Loading User Symbols
|
|---|
| 25 | PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
|
|---|
| 26 | Loading unloaded module list
|
|---|
| 27 | .......................
|
|---|
| 28 | *******************************************************************************
|
|---|
| 29 | * *
|
|---|
| 30 | * Bugcheck Analysis *
|
|---|
| 31 | * *
|
|---|
| 32 | *******************************************************************************
|
|---|
| 33 |
|
|---|
| 34 | Use !analyze -v to get detailed debugging information.
|
|---|
| 35 |
|
|---|
| 36 | BugCheck 7F, {8, 807c7750, 0, 0}
|
|---|
| 37 |
|
|---|
| 38 | *** ERROR: Symbol file could not be found. Defaulted to export symbols for VMMR0.r0 -
|
|---|
| 39 | PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
|
|---|
| 40 | PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
|
|---|
| 41 | Probably caused by : VMMR0.r0 ( VMMR0!EMInterpretWrmsr+677 )
|
|---|
| 42 |
|
|---|
| 43 | Followup: MachineOwner
|
|---|
| 44 | ---------
|
|---|
| 45 |
|
|---|
| 46 | 1: kd> !analyze -v
|
|---|
| 47 | *******************************************************************************
|
|---|
| 48 | * *
|
|---|
| 49 | * Bugcheck Analysis *
|
|---|
| 50 | * *
|
|---|
| 51 | *******************************************************************************
|
|---|
| 52 |
|
|---|
| 53 | UNEXPECTED_KERNEL_MODE_TRAP (7f)
|
|---|
| 54 | This means a trap occurred in kernel mode, and it's a trap of a kind
|
|---|
| 55 | that the kernel isn't allowed to have/catch (bound trap) or that
|
|---|
| 56 | is always instant death (double fault). The first number in the
|
|---|
| 57 | bugcheck params is the number of the trap (8 = double fault, etc)
|
|---|
| 58 | Consult an Intel x86 family manual to learn more about what these
|
|---|
| 59 | traps are. Here is a *portion* of those codes:
|
|---|
| 60 | If kv shows a taskGate
|
|---|
| 61 | use .tss on the part before the colon, then kv.
|
|---|
| 62 | Else if kv shows a trapframe
|
|---|
| 63 | use .trap on that value
|
|---|
| 64 | Else
|
|---|
| 65 | .trap on the appropriate frame will show where the trap was taken
|
|---|
| 66 | (on x86, this will be the ebp that goes with the procedure KiTrap)
|
|---|
| 67 | Endif
|
|---|
| 68 | kb will then show the corrected stack.
|
|---|
| 69 | Arguments:
|
|---|
| 70 | Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
|
|---|
| 71 | Arg2: 807c7750
|
|---|
| 72 | Arg3: 00000000
|
|---|
| 73 | Arg4: 00000000
|
|---|
| 74 |
|
|---|
| 75 | Debugging Details:
|
|---|
| 76 | ------------------
|
|---|
| 77 |
|
|---|
| 78 | PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
|
|---|
| 79 | PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
|
|---|
| 80 |
|
|---|
| 81 | BUGCHECK_STR: 0x7f_8
|
|---|
| 82 |
|
|---|
| 83 | TSS: 00000028 -- (.tss 0x28)
|
|---|
| 84 | eax=fffffb84 ebx=92ec4000 ecx=00000000 edx=92ec5054 esi=92edf900 edi=92ee1388
|
|---|
| 85 | eip=9c6fc3d7 esp=00067d48 ebp=00067d48 iopl=0 nv up ei ng nz ac pe nc
|
|---|
| 86 | cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010296
|
|---|
| 87 | VMMR0!EMInterpretWrmsr+0x677:
|
|---|
| 88 | 9c6fc3d7 5d pop ebp
|
|---|
| 89 | Resetting default scope
|
|---|
| 90 |
|
|---|
| 91 | DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
|
|---|
| 92 |
|
|---|
| 93 | PROCESS_NAME: VirtualBox.exe
|
|---|
| 94 |
|
|---|
| 95 | CURRENT_IRQL: 2
|
|---|
| 96 |
|
|---|
| 97 | LAST_CONTROL_TRANSFER: from 00000000 to 9c6fc3d7
|
|---|
| 98 |
|
|---|
| 99 | STACK_TEXT:
|
|---|
| 100 | 00067d48 00000000 00000000 00000000 00000000 VMMR0!EMInterpretWrmsr+0x677
|
|---|
| 101 |
|
|---|
| 102 |
|
|---|
| 103 | STACK_COMMAND: .tss 0x28 ; kb
|
|---|
| 104 |
|
|---|
| 105 | FOLLOWUP_IP:
|
|---|
| 106 | VMMR0!EMInterpretWrmsr+677
|
|---|
| 107 | 9c6fc3d7 5d pop ebp
|
|---|
| 108 |
|
|---|
| 109 | SYMBOL_STACK_INDEX: 0
|
|---|
| 110 |
|
|---|
| 111 | SYMBOL_NAME: VMMR0!EMInterpretWrmsr+677
|
|---|
| 112 |
|
|---|
| 113 | FOLLOWUP_NAME: MachineOwner
|
|---|
| 114 |
|
|---|
| 115 | MODULE_NAME: VMMR0
|
|---|
| 116 |
|
|---|
| 117 | IMAGE_NAME: VMMR0.r0
|
|---|
| 118 |
|
|---|
| 119 | DEBUG_FLR_IMAGE_TIMESTAMP: 4c5aa99e
|
|---|
| 120 |
|
|---|
| 121 | FAILURE_BUCKET_ID: 0x7f_8_VMMR0!EMInterpretWrmsr+677
|
|---|
| 122 |
|
|---|
| 123 | BUCKET_ID: 0x7f_8_VMMR0!EMInterpretWrmsr+677
|
|---|
| 124 |
|
|---|
| 125 | Followup: MachineOwner
|
|---|
| 126 | ---------
|
|---|
| 127 |
|
|---|