Opened 12 years ago
Closed 9 years ago
#11464 closed defect (obsolete)
BSoD on Windows 8 from VBoxNetFlt.sys
| Reported by: | ub3rst4r | Owned by: | |
|---|---|---|---|
| Component: | network | Version: | VirtualBox 4.2.6 |
| Keywords: | VBoxNetFlt, windows 8, bsod, crash | Cc: | |
| Guest type: | other | Host type: | Windows |
Description
Every now and then my Windows 8 (x64) computer will shutdown from a BSOD (Blue Screen of Death). I have examined the crash dumps generated by the BSOD and they all seem to point to VBoxNetFlt.sys. I do not have VirtualBox running when this happens. I have since uninstalled VirtualBox to prevent this error from happening. I have listed my information below and I also attached the crash dump.
OS: Windows 8 (x64) with latest updates CPU: Intel Core i7 950 RAM: 6GB Network Adapters: Realtek PCIe GBE Family Controller v8.1.1020.2011 + Microsoft Kernel Debug Network Adapter v6.2.9200.16384
Here's the output from the minidump:
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\020613-71042-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c:\temp*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16461.amd64fre.win8_gdr.121119-1606
Machine Name:
Kernel base = 0xfffff800`e2805000 PsLoadedModuleList = 0xfffff800`e2acfa80
Debug session time: Wed Feb 6 11:40:50.018 2013 (UTC - 7:00)
System Uptime: 2 days 14:27:47.406
Loading Kernel Symbols
...............................................................
................................................................
..........................................
Loading User Symbols
Loading unloaded module list
.................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {678, 2, 1, fffff88001b4317a}
*** WARNING: Unable to verify timestamp for VBoxNetFlt.sys
*** ERROR: Module load completed but symbols could not be loaded for VBoxNetFlt.sys
Probably caused by : VBoxNetFlt.sys ( VBoxNetFlt+3061 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000678, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001b4317a, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800e2b5b168
GetUlongFromAddress: unable to read from fffff800e2b5b1f8
0000000000000678 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
ndis!ndisPcwAddEvent+16
fffff880`01b4317a 4e0184c800010000 add qword ptr [rax+r9*8+100h],r8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TAG_NOT_DEFINED_c000000f: FFFFF880012FFFB0
TRAP_FRAME: fffff880012f8300 -- (.trap 0xfffff880012f8300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff880012f8508
rdx=0000000000000007 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001b4317a rsp=fffff880012f8490 rbp=fffffa800a9eec30
r8=0000000000000001 r9=00000000000000af r10=0000000000000093
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
ndis!ndisPcwAddEvent+0x16:
fffff880`01b4317a 4e0184c800010000 add qword ptr [rax+r9*8+100h],r8 ds:00000000`00000678=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800e287f669 to fffff800e2880340
STACK_TEXT:
fffff880`012f81b8 fffff800`e287f669 : 00000000`0000000a 00000000`00000678 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`012f81c0 fffff800`e287dee0 : 00000000`00000001 00000000`00000000 fffffa80`098ed500 fffff880`012f8300 : nt!KiBugCheckDispatch+0x69
fffff880`012f8300 fffff880`01b4317a : fffffa80`0b03b980 fffffa80`07e1aa01 fffff880`00000000 c000009a`00000020 : nt!KiPageFault+0x260
fffff880`012f8490 fffff880`01b507ca : 00000000`00000000 fffffa80`0a9eec30 00000000`00000001 fffff880`01af657c : ndis!ndisPcwAddEvent+0x16
fffff880`012f84c0 fffff880`01af9f86 : fffffa80`074a11a0 fffffa80`0b03b980 fffffa80`00000001 fffff880`01b4f902 : ndis! ?? ::FNODOBFM::`string'+0x6d57
fffff880`012f8570 fffff880`01b2fb8f : fffffa80`05a25802 00000000`00000000 fffffa80`07b241a0 fffff800`e28ac1f3 : ndis!ndisInvokeNextSendCompleteHandler+0x126
fffff880`012f8610 fffff880`01b2f902 : fffffa80`05a25830 00000000`00000000 fffffa80`1ee1fd00 fffff880`03a7e745 : ndis!ndisMSendCompletePacketToNetBufferLists+0x93
fffff880`012f8650 fffff880`03a7f061 : fffffa80`05a257d0 fffffa80`0680f510 fffffa80`05a25830 00000000`00000000 : ndis!ndisMSendCompleteX+0xe2
fffff880`012f86a0 fffffa80`05a257d0 : fffffa80`0680f510 fffffa80`05a25830 00000000`00000000 fffffa80`1e2a95c0 : VBoxNetFlt+0x3061
fffff880`012f86a8 fffffa80`0680f510 : fffffa80`05a25830 00000000`00000000 fffffa80`1e2a95c0 fffff880`01b2c6fe : 0xfffffa80`05a257d0
fffff880`012f86b0 fffffa80`05a25830 : 00000000`00000000 fffffa80`1e2a95c0 fffff880`01b2c6fe fffffa80`0a6453e0 : 0xfffffa80`0680f510
fffff880`012f86b8 00000000`00000000 : fffffa80`1e2a95c0 fffff880`01b2c6fe fffffa80`0a6453e0 00000000`00000000 : 0xfffffa80`05a25830
STACK_COMMAND: kb
FOLLOWUP_IP:
VBoxNetFlt+3061
fffff880`03a7f061 ?? ???
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: VBoxNetFlt+3061
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: VBoxNetFlt
IMAGE_NAME: VBoxNetFlt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 50d1c564
FAILURE_BUCKET_ID: AV_VBoxNetFlt+3061
BUCKET_ID: AV_VBoxNetFlt+3061
Followup: MachineOwner
---------
Please let me know if you need any more information.
Attachments (2)
Change History (3)
by , 12 years ago
| Attachment: | 013013-70902-01.dmp added |
|---|
comment:1 by , 9 years ago
| Resolution: | → obsolete |
|---|---|
| Status: | new → closed |


Minidump from January 30