Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Temp\VINGIN_BOB\MEMORY.DMP] Kernel Bitmap Dump File: Full address space is available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred cache*C:\Symbols Deferred srv*https://msdl.microsoft.com/download/symbols Symbol search path is: cache*C:\Symbols;srv*https://msdl.microsoft.com/download/symbols Executable search path is: *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe - Windows 10 Kernel Version 16299 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 16299.15.amd64fre.rs3_release.170928-1534 Machine Name: Kernel base = 0xfffff802`83090000 PsLoadedModuleList = 0xfffff802`833f1ff0 Debug session time: Mon Jan 8 13:49:46.369 2018 (UTC - 5:00) System Uptime: 0 days 0:04:26.860 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .............. Loading User Symbols ................................................................ ...................................... Loading unloaded module list ......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {ffff898104eaa720, ff, 47, ffff898104eaa720} *** ERROR: Symbol file could not be found. Defaulted to export symbols for VMMR0.r0 - *** ERROR: Symbol file could not be found. Defaulted to export symbols for VBoxDrv.sys - *** ERROR: Module load completed but symbols could not be loaded for VBoxRT.dll *** ERROR: Module load completed but symbols could not be loaded for VBoxVMM.DLL Probably caused by : VMMR0.r0 ( VMMR0!VMMR0EntryFast+13de ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffff898104eaa720, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 0000000000000047, value 0 = read operation, 1 = write operation Arg4: ffff898104eaa720, address which referenced memory Debugging Details: ------------------ DUMP_CLASS: 1 DUMP_QUALIFIER: 402 BUILD_VERSION_STRING: 10.0.16299.125 (WinBuild.160101.0800) SYSTEM_MANUFACTURER: HP SYSTEM_PRODUCT_NAME: HP EliteBook 840 G3 SYSTEM_SKU: W4S08UC#ABL BIOS_VENDOR: HP BIOS_VERSION: N75 Ver. 01.22 BIOS_DATE: 12/12/2017 BASEBOARD_MANUFACTURER: HP BASEBOARD_PRODUCT: 8079 BASEBOARD_VERSION: KBC Version 85.77 TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_TYPE: 0 BUGCHECK_P1: ffff898104eaa720 BUGCHECK_P2: ff BUGCHECK_P3: 47 BUGCHECK_P4: ffff898104eaa720 CURRENT_IRQL: 0 FAULTING_IP: +0 ffff8981`04eaa720 4989c9 mov r9,rcx ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target. BUGCHECK_STR: DISABLED_INTERRUPT_FAULT CPU_COUNT: 4 CPU_MHZ: 9c0 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 4e CPU_STEPPING: 3 CPU_MICROCODE: 6,4e,3,0 (F,M,S,R) SIG: C2'00000000 (cache) C2'00000000 (init) DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: VirtualBox.exe ANALYSIS_SESSION_HOST: 5CG726221D ANALYSIS_SESSION_TIME: 01-08-2018 14:07:07.0037 ANALYSIS_VERSION: 10.0.15063.468 amd64fre TRAP_FRAME: ffffee0904d8f4c0 -- (.trap 0xffffee0904d8f4c0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffff898104ce2000 rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000 rip=ffff898104eaa720 rsp=ffffee0904d8f658 rbp=0000000000000206 r8=ffffee0904d8f6e0 r9=0000000000000180 r10=fffff800d68f7050 r11=ffffc58a97aec820 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl zr na po nc ffff8981`04eaa720 4989c9 mov r9,rcx Resetting default scope LAST_CONTROL_TRANSFER: from fffff802831ff9e9 to fffff802831f40e0 STACK_TEXT: ffffee09`04d8f378 fffff802`831ff9e9 : 00000000`0000000a ffff8981`04eaa720 00000000`000000ff 00000000`00000047 : nt!KeBugCheckEx ffffee09`04d8f380 fffff802`831fdd7d : 00000000`00000000 00000000`00000000 8a000002`1f316025 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffee09`04d8f4c0 ffff8981`04eaa720 : fffff800`d68f5c6e 00007ffa`4a1211e8 ffffda86`fdae6108 00000000`00000000 : nt!KiPageFault+0x23d ffffee09`04d8f658 fffff800`d68f5c6e : 00007ffa`4a1211e8 ffffda86`fdae6108 00000000`00000000 ffffc58a`97b50ac0 : 0xffff8981`04eaa720 ffffee09`04d8f660 fffff800`d68f71a2 : 00000000`00000000 ffffc58a`9ba47c50 ffffc58a`9aff4190 ffffc58a`974381a0 : VMMR0!VMMR0EntryFast+0x13de ffffee09`04d8f6e0 fffff800`d535681c : 00000000`ffffff00 ffffc58a`974381a0 00000000`00000000 fffff802`83596020 : VMMR0!VMMR0EntryEx+0x152 ffffee09`04d8f770 fffff800`d5364228 : ffffc58a`00000000 ffffee09`04d8fb00 ffffc58a`974381a0 00000000`00000000 : VBoxDrv!SUPR0PageFree+0x1fac ffffee09`04d8f7d0 fffff802`8355cac8 : 00000000`00000030 00000000`00000000 00000000`0937f858 00000000`00000030 : VBoxDrv!SUPR0Printf+0x2368 ffffee09`04d8f870 fffff802`8355c716 : 00000000`00000100 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x398 ffffee09`04d8f9a0 fffff802`831ff553 : ffffc160`b04fff48 ffffc160`b05827f8 ffff70ba`7862d03a 00000000`00000000 : nt!NtDeviceIoControlFile+0x56 ffffee09`04d8fa10 00007ffa`58efff27 : 00007ffa`486bf82d 00000000`09999120 00007ffa`486b589a 00007ffa`4a106388 : nt!KiSystemServiceCopyEnd+0x13 00000000`0937f7b8 00007ffa`486bf82d : 00000000`09999120 00007ffa`486b589a 00007ffa`4a106388 00007ffa`48606e2d : ntdll!NtDeviceIoControlFile+0x17 00000000`0937f7c0 00000000`09999120 : 00007ffa`486b589a 00007ffa`4a106388 00007ffa`48606e2d 00000000`0937f810 : VBoxRT+0x13f82d 00000000`0937f7c8 00007ffa`486b589a : 00007ffa`4a106388 00007ffa`48606e2d 00000000`0937f810 00000000`0022821c : 0x9999120 00000000`0937f7d0 00007ffa`4a106388 : 00007ffa`48606e2d 00000000`0937f810 00000000`0022821c 00000000`0937f858 : VBoxRT+0x13589a 00000000`0937f7d8 00007ffa`48606e2d : 00000000`0937f810 00000000`0022821c 00000000`0937f858 00000000`00000030 : VBoxVMM+0x206388 00000000`0937f7e0 00000000`0937f810 : 00000000`0022821c 00000000`0937f858 00000000`00000030 00000000`0937f858 : VBoxRT+0x86e2d 00000000`0937f7e8 00000000`0022821c : 00000000`0937f858 00000000`00000030 00000000`0937f858 00000000`00000030 : 0x937f810 00000000`0937f7f0 00000000`0937f858 : 00000000`00000030 00000000`0937f858 00000000`00000030 00007ffa`ffffffff : 0x22821c 00000000`0937f7f8 00000000`00000030 : 00000000`0937f858 00000000`00000030 00007ffa`ffffffff 00000000`00000000 : 0x937f858 00000000`0937f800 00000000`0937f858 : 00000000`00000030 00007ffa`ffffffff 00000000`00000000 00000000`000a468c : 0x30 00000000`0937f808 00000000`00000030 : 00007ffa`ffffffff 00000000`00000000 00000000`000a468c 00007ffa`486bbb93 : 0x937f858 00000000`0937f810 00007ffa`ffffffff : 00000000`00000000 00000000`000a468c 00007ffa`486bbb93 00000000`0937f8c0 : 0x30 00000000`0937f818 00000000`00000000 : 00000000`000a468c 00007ffa`486bbb93 00000000`0937f8c0 00007ffa`48672a58 : 0x00007ffa`ffffffff STACK_COMMAND: kb THREAD_SHA1_HASH_MOD_FUNC: 0827f7d6f8e8d49bbd0f39f4893889efb5825143 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 33c687a9df101b31e4c4e12af3f9e7cb1699aa3a THREAD_SHA1_HASH_MOD: 206522a4ddad0b1458bf571f725108515ad5f60c FOLLOWUP_IP: VMMR0!VMMR0EntryFast+13de fffff800`d68f5c6e 0fb6942480000000 movzx edx,byte ptr [rsp+80h] FAULT_INSTR_CODE: 2494b60f SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: VMMR0!VMMR0EntryFast+13de FOLLOWUP_NAME: MachineOwner MODULE_NAME: VMMR0 IMAGE_NAME: VMMR0.r0 DEBUG_FLR_IMAGE_TIMESTAMP: 5a37e337 IMAGE_VERSION: 5.2.4.19785 BUCKET_ID_FUNC_OFFSET: 13de FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_VMMR0!VMMR0EntryFast BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_VMMR0!VMMR0EntryFast PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_VMMR0!VMMR0EntryFast TARGET_TIME: 2018-01-08T18:49:46.000Z OSBUILD: 16299 OSSERVICEPACK: 125 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2017-12-07 16:55:32 BUILDDATESTAMP_STR: 160101.0800 BUILDLAB_STR: WinBuild BUILDOSVER_STR: 10.0.16299.125 ANALYSIS_SESSION_ELAPSED_TIME: 74d ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_vmmr0!vmmr0entryfast FAILURE_ID_HASH: {c297abe2-ee52-8fdd-8f09-0dbfc95bfeee} Followup: MachineOwner ---------