VirtualBox

Ticket #7389: windbg_memorydmp_analyze.txt

File windbg_memorydmp_analyze.txt, 4.5 KB (added by kgrzybowski89@gmail.com, 14 years ago)

WinDBG memory.dmp analyze

Line 
1
2Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
3Copyright (c) Microsoft Corporation. All rights reserved.
4
5
6Loading Dump File [C:\Windows\MEMORY.DMP]
7Kernel Summary Dump File: Only kernel address space is available
8
9Symbol search path is: http://msdl.microsoft.com/download/symbols
10Executable search path is:
11Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
12Product: WinNt, suite: TerminalServer SingleUserTS Personal
13Built by: 7600.16617.x86fre.win7_gdr.100618-1621
14Machine Name:
15Kernel base = 0x83049000 PsLoadedModuleList = 0x83191810
16Debug session time: Fri Aug 27 23:50:27.008 2010 (GMT+2)
17System Uptime: 1 days 21:34:43.865
18WARNING: Process directory table base 7D3BC600 doesn't match CR3 00185000
19WARNING: Process directory table base 7D3BC600 doesn't match CR3 00185000
20Loading Kernel Symbols
21...............................................................
22................................................................
23...........................
24Loading User Symbols
25PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
26Loading unloaded module list
27.......................
28*******************************************************************************
29* *
30* Bugcheck Analysis *
31* *
32*******************************************************************************
33
34Use !analyze -v to get detailed debugging information.
35
36BugCheck 7F, {8, 807c7750, 0, 0}
37
38*** ERROR: Symbol file could not be found. Defaulted to export symbols for VMMR0.r0 -
39PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
40PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
41Probably caused by : VMMR0.r0 ( VMMR0!EMInterpretWrmsr+677 )
42
43Followup: MachineOwner
44---------
45
461: kd> !analyze -v
47*******************************************************************************
48* *
49* Bugcheck Analysis *
50* *
51*******************************************************************************
52
53UNEXPECTED_KERNEL_MODE_TRAP (7f)
54This means a trap occurred in kernel mode, and it's a trap of a kind
55that the kernel isn't allowed to have/catch (bound trap) or that
56is always instant death (double fault). The first number in the
57bugcheck params is the number of the trap (8 = double fault, etc)
58Consult an Intel x86 family manual to learn more about what these
59traps are. Here is a *portion* of those codes:
60If kv shows a taskGate
61 use .tss on the part before the colon, then kv.
62Else if kv shows a trapframe
63 use .trap on that value
64Else
65 .trap on the appropriate frame will show where the trap was taken
66 (on x86, this will be the ebp that goes with the procedure KiTrap)
67Endif
68kb will then show the corrected stack.
69Arguments:
70Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
71Arg2: 807c7750
72Arg3: 00000000
73Arg4: 00000000
74
75Debugging Details:
76------------------
77
78PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
79PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for details
80
81BUGCHECK_STR: 0x7f_8
82
83TSS: 00000028 -- (.tss 0x28)
84eax=fffffb84 ebx=92ec4000 ecx=00000000 edx=92ec5054 esi=92edf900 edi=92ee1388
85eip=9c6fc3d7 esp=00067d48 ebp=00067d48 iopl=0 nv up ei ng nz ac pe nc
86cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010296
87VMMR0!EMInterpretWrmsr+0x677:
889c6fc3d7 5d pop ebp
89Resetting default scope
90
91DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
92
93PROCESS_NAME: VirtualBox.exe
94
95CURRENT_IRQL: 2
96
97LAST_CONTROL_TRANSFER: from 00000000 to 9c6fc3d7
98
99STACK_TEXT:
10000067d48 00000000 00000000 00000000 00000000 VMMR0!EMInterpretWrmsr+0x677
101
102
103STACK_COMMAND: .tss 0x28 ; kb
104
105FOLLOWUP_IP:
106VMMR0!EMInterpretWrmsr+677
1079c6fc3d7 5d pop ebp
108
109SYMBOL_STACK_INDEX: 0
110
111SYMBOL_NAME: VMMR0!EMInterpretWrmsr+677
112
113FOLLOWUP_NAME: MachineOwner
114
115MODULE_NAME: VMMR0
116
117IMAGE_NAME: VMMR0.r0
118
119DEBUG_FLR_IMAGE_TIMESTAMP: 4c5aa99e
120
121FAILURE_BUCKET_ID: 0x7f_8_VMMR0!EMInterpretWrmsr+677
122
123BUCKET_ID: 0x7f_8_VMMR0!EMInterpretWrmsr+677
124
125Followup: MachineOwner
126---------
127

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy