VirtualBox

Ticket #7445: windbg.txt

File windbg.txt, 5.5 KB (added by Chris Jones, 14 years ago)

windbg output for host win7/x64, guest FreeBSD/amd64

Line 
1
2Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
3Copyright (c) Microsoft Corporation. All rights reserved.
4
5
6Loading Dump File [C:\Windows\MEMORY.DMP]
7Kernel Summary Dump File: Only kernel address space is available
8
9Symbol search path is: srv*c:\cache*http://msdl.microsoft.com/download/symbols
10Executable search path is:
11Windows 7 Kernel Version 7600 MP (4 procs) Free x64
12Product: WinNt, suite: TerminalServer SingleUserTS
13Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
14Machine Name:
15Kernel base = 0xfffff800`02e4c000 PsLoadedModuleList = 0xfffff800`03089e50
16Debug session time: Tue Sep 7 13:48:31.514 2010 (UTC - 6:00)
17System Uptime: 0 days 5:06:46.044
18Loading Kernel Symbols
19...............................................................
20................................................................
21............................................
22Loading User Symbols
23
24Loading unloaded module list
25.........
26*******************************************************************************
27* *
28* Bugcheck Analysis *
29* *
30*******************************************************************************
31
32Use !analyze -v to get detailed debugging information.
33
34BugCheck D1, {90, 2, 1, fffff8800441b353}
35
36*** ERROR: Module load completed but symbols could not be loaded for e1k62x64.sys
37Probably caused by : e1k62x64.sys ( e1k62x64+1b353 )
38
39Followup: MachineOwner
40---------
41
421: kd> !analyze -v
43*******************************************************************************
44* *
45* Bugcheck Analysis *
46* *
47*******************************************************************************
48
49DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
50An attempt was made to access a pageable (or completely invalid) address at an
51interrupt request level (IRQL) that is too high. This is usually
52caused by drivers using improper addresses.
53If kernel debugger is available get stack backtrace.
54Arguments:
55Arg1: 0000000000000090, memory referenced
56Arg2: 0000000000000002, IRQL
57Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
58Arg4: fffff8800441b353, address which referenced memory
59
60Debugging Details:
61------------------
62
63
64WRITE_ADDRESS: 0000000000000090
65
66CURRENT_IRQL: 2
67
68FAULTING_IP:
69e1k62x64+1b353
70fffff880`0441b353 48899090000000 mov qword ptr [rax+90h],rdx
71
72DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
73
74BUGCHECK_STR: 0xD1
75
76PROCESS_NAME: System
77
78TRAP_FRAME: fffff88002b21850 -- (.trap 0xfffff88002b21850)
79NOTE: The trap frame does not contain all registers.
80Some register values may be zeroed or incorrect.
81rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800d19ce20
82rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
83rip=fffff8800441b353 rsp=fffff88002b219e0 rbp=000000000000009e
84 r8=fffffa800ca158e0 r9=0000000000000000 r10=fffffa8009138140
85r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
86r14=0000000000000000 r15=0000000000000000
87iopl=0 nv up ei pl nz na pe nc
88e1k62x64+0x1b353:
89fffff880`0441b353 48899090000000 mov qword ptr [rax+90h],rdx ds:00000000`00000090=????????????????
90Resetting default scope
91
92LAST_CONTROL_TRANSFER: from fffff80002ebbca9 to fffff80002ebc740
93
94STACK_TEXT:
95fffff880`02b21708 fffff800`02ebbca9 : 00000000`0000000a 00000000`00000090 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
96fffff880`02b21710 fffff800`02eba920 : 00000000`00000000 00000000`00000000 fffffa80`0cb57100 fffffa80`09177230 : nt!KiBugCheckDispatch+0x69
97fffff880`02b21850 fffff880`0441b353 : fffffa80`09181850 fffffa80`091b6998 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x260
98fffff880`02b219e0 fffff880`04415c98 : fffffa80`089e1f30 00000000`00000000 00000000`00000000 00000000`00000000 : e1k62x64+0x1b353
99fffff880`02b21a80 fffff880`04416092 : 00000000`00000000 00000000`00000000 fffffa80`08df31a0 fffff800`02ec3992 : e1k62x64+0x15c98
100fffff880`02b21b60 fffff880`016c8e4b : fffff880`0169f110 00000000`00000000 fffffa80`08df31a0 fffffa80`08df3f68 : e1k62x64+0x16092
101fffff880`02b21ba0 fffff880`0164ebfd : fffffa80`09159f08 00000000`0000000a 00000000`00000001 00000000`00000001 : ndis! ?? ::DKGKHJNI::`string'+0x1597
102fffff880`02b21c10 fffff880`01675b0c : 00000000`00000000 fffffa80`09159f08 00000000`00000080 fffffa80`08415f40 : ndis!ndisQueuedMiniportDpcWorkItem+0xcd
103fffff880`02b21cb0 fffff800`03160c06 : 00ffffff`00ffffff fffffa80`0d461b60 00000000`00000080 00ffffff`00ffffff : ndis!ndisReceiveWorkerThread+0x12c
104fffff880`02b21d40 fffff800`02e9ac26 : fffff880`03178180 fffffa80`0d461b60 fffff880`03182fc0 00ffffff`00ffffff : nt!PspSystemThreadStartup+0x5a
105fffff880`02b21d80 00000000`00000000 : fffff880`02b22000 fffff880`02b1c000 fffff880`02b21a00 00000000`00000000 : nt!KxStartSystemThread+0x16
106
107
108STACK_COMMAND: kb
109
110FOLLOWUP_IP:
111e1k62x64+1b353
112fffff880`0441b353 48899090000000 mov qword ptr [rax+90h],rdx
113
114SYMBOL_STACK_INDEX: 3
115
116SYMBOL_NAME: e1k62x64+1b353
117
118FOLLOWUP_NAME: MachineOwner
119
120MODULE_NAME: e1k62x64
121
122IMAGE_NAME: e1k62x64.sys
123
124DEBUG_FLR_IMAGE_TIMESTAMP: 4bbae4c3
125
126FAILURE_BUCKET_ID: X64_0xD1_e1k62x64+1b353
127
128BUCKET_ID: X64_0xD1_e1k62x64+1b353
129
130Followup: MachineOwner
131---------
132

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette