VirtualBox

Custom Query (16363 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (571 - 573 of 16363)

Ticket Resolution Summary Owner Reporter
#16874 duplicate vbix 5.1.22 on intel i3 samsung laptiop virtualbox fails to start Robert Fernando
Description

1cfc.1dcc: Log file opened: 5.1.22r115126 g_hStartupLog=00000000000000a4 g_uNtVerCombined=0x611db110 1cfc.1dcc: \SystemRoot\System32\ntdll.dll: 1cfc.1dcc: CreationTime: 2017-06-14T09:03:43.509659400Z 1cfc.1dcc: LastWriteTime: 2017-05-12T18:24:12.913140800Z 1cfc.1dcc: ChangeTime: 2017-06-15T02:26:27.388875200Z 1cfc.1dcc: FileAttributes: 0x20 1cfc.1dcc: Size: 0x1a7100 1cfc.1dcc: NT Headers: 0xe0 1cfc.1dcc: Timestamp: 0x5915fdce 1cfc.1dcc: Machine: 0x8664 - amd64 1cfc.1dcc: Timestamp: 0x5915fdce 1cfc.1dcc: Image Version: 6.1 1cfc.1dcc: SizeOfImage: 0x1aa000 (1744896) 1cfc.1dcc: Resource Dir: 0x14e000 LB 0x5a028 1cfc.1dcc: [Version info resource found at 0xd8! (ID/Name: 0x1; SubID/SubName: 0x409)] 1cfc.1dcc: [Raw version resource data: 0x14e0f0 LB 0x380, codepage 0x0 (reserved 0x0)] 1cfc.1dcc: ProductName: Microsoft® Windows® Operating System 1cfc.1dcc: ProductVersion: 6.1.7601.23807 1cfc.1dcc: FileVersion: 6.1.7601.23807 (win7sp1_ldr.170512-0600) 1cfc.1dcc: FileDescription: NT Layer DLL 1cfc.1dcc: \SystemRoot\System32\kernel32.dll: 1cfc.1dcc: CreationTime: 2017-06-14T09:03:34.243200000Z 1cfc.1dcc: LastWriteTime: 2017-05-12T18:22:33.598000000Z 1cfc.1dcc: ChangeTime: 2017-06-15T02:26:29.510488800Z 1cfc.1dcc: FileAttributes: 0x20 1cfc.1dcc: Size: 0x11c000 1cfc.1dcc: NT Headers: 0xe0 1cfc.1dcc: Timestamp: 0x5915fe13 1cfc.1dcc: Machine: 0x8664 - amd64 1cfc.1dcc: Timestamp: 0x5915fe13 1cfc.1dcc: Image Version: 6.1 1cfc.1dcc: SizeOfImage: 0x11f000 (1175552) 1cfc.1dcc: Resource Dir: 0x116000 LB 0x528 1cfc.1dcc: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 1cfc.1dcc: [Raw version resource data: 0x1160b0 LB 0x3a4, codepage 0x0 (reserved 0x0)] 1cfc.1dcc: ProductName: Microsoft® Windows® Operating System 1cfc.1dcc: ProductVersion: 6.1.7601.23807 1cfc.1dcc: FileVersion: 6.1.7601.23807 (win7sp1_ldr.170512-0600) 1cfc.1dcc: FileDescription: Windows NT BASE API Client DLL 1cfc.1dcc: \SystemRoot\System32\KernelBase.dll: 1cfc.1dcc: CreationTime: 2017-06-14T09:03:33.338394200Z 1cfc.1dcc: LastWriteTime: 2017-05-12T18:22:33.598000000Z 1cfc.1dcc: ChangeTime: 2017-06-15T02:26:29.494888700Z 1cfc.1dcc: FileAttributes: 0x20 1cfc.1dcc: Size: 0x66800 1cfc.1dcc: NT Headers: 0xe8 1cfc.1dcc: Timestamp: 0x5915fe14 1cfc.1dcc: Machine: 0x8664 - amd64 1cfc.1dcc: Timestamp: 0x5915fe14 1cfc.1dcc: Image Version: 6.1 1cfc.1dcc: SizeOfImage: 0x6a000 (434176) 1cfc.1dcc: Resource Dir: 0x68000 LB 0x530 1cfc.1dcc: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 1cfc.1dcc: [Raw version resource data: 0x680b0 LB 0x3ac, codepage 0x0 (reserved 0x0)] 1cfc.1dcc: ProductName: Microsoft® Windows® Operating System 1cfc.1dcc: ProductVersion: 6.1.7601.23807 1cfc.1dcc: FileVersion: 6.1.7601.23807 (win7sp1_ldr.170512-0600) 1cfc.1dcc: FileDescription: Windows NT BASE API Client DLL 1cfc.1dcc: \SystemRoot\System32\apisetschema.dll: 1cfc.1dcc: CreationTime: 2017-06-14T09:03:32.386788100Z 1cfc.1dcc: LastWriteTime: 2017-05-12T18:22:28.981000000Z 1cfc.1dcc: ChangeTime: 2017-06-15T02:26:27.326474800Z 1cfc.1dcc: FileAttributes: 0x20 1cfc.1dcc: Size: 0x1a00 1cfc.1dcc: NT Headers: 0xc0 1cfc.1dcc: Timestamp: 0x5915fdad 1cfc.1dcc: Machine: 0x8664 - amd64 1cfc.1dcc: Timestamp: 0x5915fdad 1cfc.1dcc: Image Version: 6.1 1cfc.1dcc: SizeOfImage: 0x50000 (327680) 1cfc.1dcc: Resource Dir: 0x30000 LB 0x3f8 1cfc.1dcc: [Version info resource found at 0x48! (ID/Name: 0x1; SubID/SubName: 0x409)] 1cfc.1dcc: [Raw version resource data: 0x30060 LB 0x398, codepage 0x0 (reserved 0x0)] 1cfc.1dcc: ProductName: Microsoft® Windows® Operating System 1cfc.1dcc: ProductVersion: 6.1.7601.23807 1cfc.1dcc: FileVersion: 6.1.7601.23807 (win7sp1_ldr.170512-0600) 1cfc.1dcc: FileDescription: ApiSet Schema DLL 1cfc.1dcc: Found driver SRTSPX (0x2) 1cfc.1dcc: Found driver SymEvent (0x2) 1cfc.1dcc: Found driver SymIRON (0x2) 1cfc.1dcc: supR3HardenedWinFindAdversaries: 0x2 1cfc.1dcc: \SystemRoot\System32\drivers\symevent64x86.sys: 1cfc.1dcc: CreationTime: 2014-03-03T09:31:28.001275200Z 1cfc.1dcc: LastWriteTime: 2015-12-12T03:48:33.316584900Z 1cfc.1dcc: ChangeTime: 2015-12-12T03:48:33.316584900Z 1cfc.1dcc: FileAttributes: 0x20 1cfc.1dcc: Size: 0x2b658 1cfc.1dcc: NT Headers: 0xe8 1cfc.1dcc: Timestamp: 0x51f32ff2 1cfc.1dcc: Machine: 0x8664 - amd64 1cfc.1dcc: Timestamp: 0x51f32ff2 1cfc.1dcc: Image Version: 6.0 1cfc.1dcc: SizeOfImage: 0x38000 (229376) 1cfc.1dcc: Resource Dir: 0x36000 LB 0x3c8 1cfc.1dcc: [Version info resource found at 0x90! (ID/Name: 0x1; SubID/SubName: 0x409)] 1cfc.1dcc: [Raw version resource data: 0x360b8 LB 0x310, codepage 0x4e4 (reserved 0x0)] 1cfc.1dcc: ProductName: SYMEVENT 1cfc.1dcc: ProductVersion: 12.9.5.2 1cfc.1dcc: FileVersion: 12.9.5.2 1cfc.1dcc: FileDescription: Symantec Event Library 1cfc.1dcc: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 1cfc.1dcc: Calling main() 1cfc.1dcc: SUPR3HardenedMain: pszProgName=VirtualBox fFlags=0x2 1cfc.1dcc: supR3HardenedWinInitAppBin(0x2): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 1cfc.1dcc: SUPR3HardenedMain: Respawn #1 1cfc.1dcc: System32: \Device\HarddiskVolume2\Windows\System32 1cfc.1dcc: WinSxS: \Device\HarddiskVolume2\Windows\winsxs 1cfc.1dcc: KnownDllPath: C:\Windows\system32 1cfc.1dcc: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 1cfc.1dcc: supHardenedWinVerifyImageByHandle: -> 0 (\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe) 1cfc.1dcc: supR3HardNtEnableThreadCreation: 1cfc.1dcc: supR3HardNtDisableThreadCreation: pvLdrInitThunk=0000000077bda360 pvNtTerminateThread=0000000077bfc260 1cfc.1dcc: supR3HardenedWinDoReSpawn(1): New child 1d7c.138 [kernel32]. 1cfc.1dcc: supR3HardNtChildGatherData: PebBaseAddress=000007fffffd7000 cbPeb=0x380 1cfc.1dcc: supR3HardNtPuChFindNtdll: uNtDllParentAddr=0000000077bb0000 uNtDllChildAddr=0000000077bb0000 1cfc.1dcc: supR3HardenedWinSetupChildInit: uLdrInitThunk=0000000077bda360 1cfc.1dcc: supR3HardenedWinSetupChildInit: Start child. 1cfc.1dcc: supR3HardNtChildWaitFor: Found expected request 0 (PurifyChildAndCloseHandles) after 47 ms. 1cfc.1dcc: supR3HardNtChildPurify: Startup delay kludge #1/0: 515 ms, 33 sleeps 1cfc.1dcc: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 1cfc.1dcc: *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000 1cfc.1dcc: *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000 1cfc.1dcc: 0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000 1cfc.1dcc: 0000000000041000-000000000005ffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *0000000000060000-0000000000060fff 0x0040/0x0040 0x0020000 !! 1cfc.1dcc: supHardNtVpFreeOrReplacePrivateExecMemory: Freeing exec mem at 0000000000060000 (LB 0x1000, 0000000000060000 LB 0x1000) 1cfc.1dcc: supHardNtVpFreeOrReplacePrivateExecMemory: Free attempt #1 succeeded: 0x0 [0000000000060000/0000000000060000 LB 0/0x1000] 1cfc.1dcc: supHardNtVpFreeOrReplacePrivateExecMemory: QVM after free 0: [0000000000000000]/0000000000060000 LB 0x60000 s=0x10000 ap=0x0 rp=0x00000000000001 1cfc.1dcc: 0000000000061000-00000000000bffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *00000000000c0000-00000000001bbfff 0x0000/0x0004 0x0020000 1cfc.1dcc: 00000000001bc000-00000000001bdfff 0x0104/0x0004 0x0020000 1cfc.1dcc: 00000000001be000-00000000001bffff 0x0004/0x0004 0x0020000 1cfc.1dcc: 00000000001c0000-0000000077baffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *0000000077bb0000-0000000077bb0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077bb1000-0000000077cadfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077cae000-0000000077cdcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077cdd000-0000000077ce6fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077ce7000-0000000077ce7fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077ce8000-0000000077ceafff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077ceb000-0000000077d59fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077d5a000-000000007efdffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000 1cfc.1dcc: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 1cfc.1dcc: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 1cfc.1dcc: 000000007fff0000-000000013fecffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000000013fed0000-000000013fed0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013fed1000-000000013ff40fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff41000-000000013ff41fff 0x0080/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff42000-000000013ff86fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff87000-000000013ff87fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff88000-000000013ff88fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff89000-000000013ff8dfff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff8e000-000000013ff8efff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff8f000-000000013ff8ffff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff90000-000000013ff93fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff94000-000000013ffdbfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ffdc000-000007feffecffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000007feffed0000-000007feffed0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll 1cfc.1dcc: 000007feffed1000-000007fffffaffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000 1cfc.1dcc: 000007fffffd3000-000007fffffd6fff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000007fffffd7000-000007fffffd7fff 0x0004/0x0004 0x0020000 1cfc.1dcc: 000007fffffd8000-000007fffffddfff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000007fffffde000-000007fffffdffff 0x0004/0x0004 0x0020000 1cfc.1dcc: *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000 1cfc.1dcc: apisetschema.dll: timestamp 0x5915fdad (rc=VINF_SUCCESS) 1cfc.1dcc: VirtualBox.exe: timestamp 0x5903619d (rc=VINF_SUCCESS) 1cfc.1dcc: '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe' has no imports 1cfc.1dcc: '\Device\HarddiskVolume2\Windows\System32\apisetschema.dll' has no imports 1cfc.1dcc: '\Device\HarddiskVolume2\Windows\System32\ntdll.dll' has no imports 1cfc.1dcc: supR3HardNtChildPurify: cFixes=1 g_fSupAdversaries=0x2 cPatchCount=0 1cfc.1dcc: supR3HardNtChildPurify: Startup delay kludge #1/1: 515 ms, 33 sleeps 1cfc.1dcc: supHardNtVpScanVirtualMemory: enmKind=CHILD_PURIFICATION 1cfc.1dcc: *0000000000000000-000000000000ffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *0000000000010000-000000000002ffff 0x0004/0x0004 0x0020000 1cfc.1dcc: *0000000000030000-0000000000033fff 0x0002/0x0002 0x0040000 1cfc.1dcc: 0000000000034000-000000000003ffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *0000000000040000-0000000000040fff 0x0004/0x0004 0x0020000 1cfc.1dcc: 0000000000041000-00000000000bffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *00000000000c0000-00000000001bbfff 0x0000/0x0004 0x0020000 1cfc.1dcc: 00000000001bc000-00000000001bdfff 0x0104/0x0004 0x0020000 1cfc.1dcc: 00000000001be000-00000000001bffff 0x0004/0x0004 0x0020000 1cfc.1dcc: 00000000001c0000-0000000077baffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *0000000077bb0000-0000000077bb0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077bb1000-0000000077cadfff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077cae000-0000000077cdcfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077cdd000-0000000077ce6fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077ce7000-0000000077ce7fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077ce8000-0000000077ce8fff 0x0008/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077ce9000-0000000077ceafff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077ceb000-0000000077d59fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\ntdll.dll 1cfc.1dcc: 0000000077d5a000-000000007efdffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000000007efe0000-000000007ffdffff 0x0000/0x0002 0x0020000 1cfc.1dcc: *000000007ffe0000-000000007ffe0fff 0x0002/0x0002 0x0020000 1cfc.1dcc: 000000007ffe1000-000000007ffeffff 0x0000/0x0002 0x0020000 1cfc.1dcc: 000000007fff0000-000000013fecffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000000013fed0000-000000013fed0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013fed1000-000000013ff40fff 0x0020/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff41000-000000013ff41fff 0x0040/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff42000-000000013ff86fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff87000-000000013ff93fff 0x0004/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ff94000-000000013ffdbfff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Program Files\Oracle\VirtualBox\VirtualBox.exe 1cfc.1dcc: 000000013ffdc000-000007feffecffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000007feffed0000-000007feffed0fff 0x0002/0x0080 0x1000000 \Device\HarddiskVolume2\Windows\System32\apisetschema.dll 1cfc.1dcc: 000007feffed1000-000007fffffaffff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000007fffffb0000-000007fffffd2fff 0x0002/0x0002 0x0040000 1cfc.1dcc: 000007fffffd3000-000007fffffd6fff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000007fffffd7000-000007fffffd7fff 0x0004/0x0004 0x0020000 1cfc.1dcc: 000007fffffd8000-000007fffffddfff 0x0001/0x0000 0x0000000 1cfc.1dcc: *000007fffffde000-000007fffffdffff 0x0004/0x0004 0x0020000 1cfc.1dcc: *000007fffffe0000-000007fffffeffff 0x0001/0x0002 0x0020000 1cfc.1dcc: supR3HardNtChildPurify: Done after 2075 ms and 1 fixes (loop #1). 1cfc.1dcc: supR3HardNtEnableThreadCreation: 1d7c.138: Log file opened: 5.1.22r115126 g_hStartupLog=0000000000000004 g_uNtVerCombined=0x611db100 1d7c.138: supR3HardenedVmProcessInit: uNtDllAddr=0000000077bb0000 g_uNtVerCombined=0x611db100 1d7c.138: ntdll.dll: timestamp 0x5915fdce (rc=VINF_SUCCESS) 1d7c.138: New simple heap: #1 00000000002c0000 LB 0x400000 (for 1744896 allocation) 1d7c.138: supR3HardenedWinInitAppBin(0x0): '\Device\HarddiskVolume2\Program Files\Oracle\VirtualBox' 1d7c.138: System32: \Device\HarddiskVolume2\Windows\System32 1d7c.138: WinSxS: \Device\HarddiskVolume2\Windows\winsxs 1d7c.138: KnownDllPath: C:\Windows\system32 1d7c.138: supR3HardenedVmProcessInit: Opening vboxdrv stub... 1d7c.138: supR3HardenedVmProcessInit: Restoring LdrInitializeThunk... 1d7c.138: supR3HardenedVmProcessInit: Returning to LdrInitializeThunk... 1d7c.138: Registered Dll notification callback with NTDLL. 1d7c.138: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\kernel32.dll) 1d7c.138: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\kernel32.dll 1d7c.138: supR3HardenedMonitor_LdrLoadDll: pName=C:\Windows\system32\kernel32.dll (Input=kernel32.dll, rcNtResolve=0xc0150008) *pfFlags=0xffffffff pwszSearchPath=0000000000000000:<flags> [calling] 1d7c.138: supR3HardenedScreenImage/NtCreateSection: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 1d7c.138: supR3HardenedDllNotificationCallback: load 0000000077990000 LB 0x0011f000 C:\Windows\system32\kernel32.dll [fFlags=0x0] 1d7c.138: supR3HardenedScreenImage/LdrLoadDll: cache hit (Unknown Status 22900 (0x5974)) on \Device\HarddiskVolume2\Windows\System32\kernel32.dll [lacks WinVerifyTrust] 1d7c.138: supR3HardenedDllNotificationCallback: load 000007fefd9a0000 LB 0x0006a000 C:\Windows\system32\KERNELBASE.dll [fFlags=0x0] 1d7c.138: supHardenedWinVerifyImageByHandle: -> 22900 (\Device\HarddiskVolume2\Windows\System32\KernelBase.dll) 1d7c.138: supR3HardenedWinVerifyCacheInsert: \Device\HarddiskVolume2\Windows\System32\KernelBase.dll 1d7c.138: supR3HardenedMonitor_LdrLoadDll: returns rcNt=0x0 hMod=0000000077990000 'C:\Windows\system32\kernel32.dll' 1cfc.1dcc: supR3HardNtChildWaitFor[1]: Quitting: ExitCode=0xc0000005 (rcNtWait=0x0, rcNt1=0x0, rcNt2=0x103, rcNt3=0x103, 2012 ms, CloseEvents);

#10600 fixed vbi_internal_alloc() should not call contig_alloc() for large allocations => Fixed in SVN blakej
Description

A user of VirtualBox 4.1.16, with Solaris s11u1_16 as the host, commented that he was seeing "virtualbox's guru-meditation-screen-of-death due to not being able to allocate and lock memory [...] even though plenty of memory is available." The relevant comment from his logfile was:

PGMR3PhysAllocateLargePage: allocating large pages takes too long

(last attempt 8462 ms; nr of timeouts 1); DISABLE

I asked him to look into what VirtualBox was doing when it generated that error message. He found that it was in the vbox driver, making a call from vbi_internal_alloc() -> contig_alloc() -> page_create_io() -> delay().

Further investigation showed that vbi_internal_alloc() was being called with a size of 2MB, an alignment of 2MB, a high-address limitation of 264 - 1 (i.e. no limitation), and a request for contiguity. In other words, it just wanted a single large page.

Looking at the VBox 4.1.16 source, vbi_internal_alloc() calls contig_alloc() to get this page. As it turns out, contig_alloc() is just about the slowest imaginable way to allocate a single large page -- it assumes that it needs to respect the rest of the ddi_dma_attr_t, and it doesn't assume that it's nicely page-aligned, so it may end up trawling through huge amounts of the system's memory trying to stitch together a valid region for the caller.

If you would like information on a better approach for doing this, please contact me directly -- my email is blake.a.jones at oracle.com. (I am the technical lead for the VM2 project in Solaris.) I expect that a different approach might go 100x faster.

#3981 fixed vbi module panic on opensolaris kernel build 114 and newer => Fixed in SVN Juergen Keil
Description

With the putback for bug 6565817 "sigwait can't wait for SIGTSTP" the Solaris kernel data structure kthread_t was modified. http://bugs.opensolaris.org/view_bug.do?bug_id=6565817

The vbi kernel module distributed with VirtualBox 2.2.2 seems to access data in kthread_t using the old offsets, so that it panics when we run on a build 114 (or newer) kernel. To reproduce the problem, try to start a virtualbox guest on an opensolaris build 114 (or newer) host.

Panic information:

> ::status
debugging crash dump vmcore.0 (32-bit) from max
operating system: 5.11 snv_115_jk (i86pc)
panic message:
BAD TRAP: type=e (#pf Page fault) rp=b5104bf4 addr=4 occurred in
module "vbi" due to a NULL pointer dereference
dump content: kernel pages only

> $C
b5104c54 vbi_user_map+0x11(b5104c84, 1, bf85b2c0, 1000)
b5104c94 rtR0MemObjNativeMapUser+0xc8(b5104cc4, aa5961a8, ffffffff, 1000, 1, 0)
b5104cd4 RTR0MemObjMapUser+0xb8(bf2f0c28, aa5961a8, ffffffff, 0, 1, 0)
b5104d34 SUPR0GipMap+0x1be()
b5104d94 supdrvIOCtl+0x391(c0185614, ab3838e0, bf2f0c10, b5104dbc)
b5104e14 VBoxDrvSolarisIOCtl+0xf1()
b5104e44 cdev_ioctl+0x31(4b40000, c0185614, 8045cd0, 102003, bf037a90, b5104f00)
b5104e74 spec_ioctl+0x6b(c89ef680, c0185614, 8045cd0, 102003,
bf037a90, b5104f00)
b5104ec4 fop_ioctl+0x49(c89ef680, c0185614, 8045cd0, 102003, bf037a90, b5104f00)
b5104f84 ioctl+0x171()
b5104fac sys_sysenter+0x106()

> vbi_user_map::dis
vbi_user_map:                   pushl  %ebp
vbi_user_map+1:                 movl   %esp,%ebp
vbi_user_map+3:                 subl   $0x14,%esp
vbi_user_map+6:                 call   +0x6021c85       <threadp>
vbi_user_map+0xb:               movl   0xdc(%eax),%eax
vbi_user_map+0x11:              movl   0x4(%eax),%eax
vbi_user_map+0x14:              movl   %eax,-0x8(%ebp)
Batch Modify
Note: See TracBatchModify for help on using batch modify.
Note: See TracQuery for help on using queries.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy