Kernel Summary Dump File: Only kernel address space is available Symbol search path is: Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506 Machine Name: Kernel base = 0xfffff800`02e04000 PsLoadedModuleList = 0xfffff800`03049670 System Uptime: 2 days 0:55:17.434 Loading Kernel Symbols ............................................................... ................................................................ ........................................... Loading User Symbols PEB is paged out (Peb.Ldr = 000007ff`fffdf018). Type ".hh dbgerr001" for details Loading unloaded module list ............................... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000096, fffff880095c7972, fffff88009958d90, 0} *** ERROR: Symbol file could not be found. Defaulted to export symbols for VMMR0.r0 - *** ERROR: Symbol file could not be found. Defaulted to export symbols for VBoxDrv.sys - Probably caused by : VMMR0.r0 ( VMMR0!VMMR0EntryFast+5cf ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000096, Exception code that caused the bugcheck Arg2: fffff880095c7972, Address of the instruction which caused the bugcheck Arg3: fffff88009958d90, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction. FAULTING_IP: +13 fffff880`095c7972 0f22e0 mov cr4,rax CONTEXT: fffff88009958d90 -- (.cxr 0xfffff88009958d90) rax=0000000000000274 rbx=fffff8800b8f0340 rcx=0000000000000000 rdx=fffff8800b8f0340 rsi=0000000000000000 rdi=fffff8800b8f0000 rip=fffff880095c7972 rsp=fffff88009959778 rbp=fffffa80094534a0 r8=000000000001ae80 r9=fffff8800b8f0000 r10=0000000000000012 r11=ffff800000000000 r12=fffffa80092f5fc0 r13=fffffa800704bc50 r14=0000000000000000 r15=fffffa800704bb00 iopl=0 nv up di pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010006 fffff880`095c7972 0f22e0 mov cr4,rax Resetting default scope DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: VirtualBox.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff880095c77f2 to fffff880095c7972 STACK_TEXT: fffff880`09959778 fffff880`095c77f2 : 00000000`00000010 fffff880`0d6d12ff fffffa80`06a8e220 fffff800`02eb0c70 : 0xfffff880`095c7972 fffff880`09959780 00000000`00000010 : fffff880`0d6d12ff fffffa80`06a8e220 fffff800`02eb0c70 fffffa80`01718b80 : 0xfffff880`095c77f2 fffff880`09959788 fffff880`0d6d12ff : fffffa80`06a8e220 fffff800`02eb0c70 fffffa80`01718b80 fffffa80`06a8e328 : 0x10 fffff880`09959790 fffff880`0d6d1bc8 : fffffa80`00733300 fffffa80`092f5fc0 fffffa80`0937f990 20206f49`00ecd690 : VMMR0!VMMR0EntryFast+0x5cf fffff880`099597d0 fffff880`04179d11 : 00000000`20206f49 00000000`00000001 00000000`00000001 00000000`20206f49 : VMMR0!VMMR0EntryEx+0xe8 fffff880`09959840 fffff880`041731ab : fffffa80`092f5fc0 00000000`00000000 fffffa80`0704bb00 00000000`00000000 : VBoxDrv!SUPR0PageFree+0x2021 fffff880`09959890 fffff800`0319ba97 : fffffa80`07fff070 fffff880`09959b60 fffffa80`07fff070 fffffa80`094533d0 : VBoxDrv+0x11ab fffff880`099598d0 fffff800`0319c2f6 : fffff680`00c00ab0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607 fffff880`09959a00 fffff800`02e7fed3 : 00000000`00000101 0000007f`ffffffff fffffa80`06a8e220 00000980`00000000 : nt!NtDeviceIoControlFile+0x56 fffff880`09959a70 00000000`77c3138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`051efa58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c3138a FOLLOWUP_IP: VMMR0!VMMR0EntryFast+5cf fffff880`0d6d12ff 0fb6542440 movzx edx,byte ptr [rsp+40h] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: VMMR0!VMMR0EntryFast+5cf FOLLOWUP_NAME: MachineOwner MODULE_NAME: VMMR0 IMAGE_NAME: VMMR0.r0 DEBUG_FLR_IMAGE_TIMESTAMP: 4eef3185 STACK_COMMAND: .cxr 0xfffff88009958d90 ; kb FAILURE_BUCKET_ID: X64_0x3B_VMMR0!VMMR0EntryFast+5cf BUCKET_ID: X64_0x3B_VMMR0!VMMR0EntryFast+5cf Followup: MachineOwner --------- 0: kd> lmvm VMMR0 start end module name fffff880`0d6ba000 fffff880`0d749000 VMMR0 (export symbols) VMMR0.r0 Loaded symbol image file: VMMR0.r0 Image path: \??\C:\Program Files\Oracle\VirtualBox\VMMR0.r0 Image name: VMMR0.r0 Timestamp: Mon Dec 19 14:43:49 2011 (4EEF3185) CheckSum: 0008D90E ImageSize: 0008F000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4