id summary reporter owner description type status component version resolution keywords cc guest host 7601 BSOD 0x0000007F in VBoxNetFlt.sys UNEXPECTED_KERNEL_MODE_TRAP dumghen " {{{ UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 00000008, EXCEPTION_DOUBLE_FAULT Arg2: 80042000 Arg3: 00000000 Arg4: 00000000 Debugging Details: ------------------ BUGCHECK_STR: 0x7f_8 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT LAST_CONTROL_TRANSFER: from a7847ec3 to 8050684f STACK_TEXT: a63b3000 a7847ec3 8a92e52c 8a92e000 8a879740 nt!MmBuildMdlForNonPagedPool+0x5 a63b3018 a7847ed9 8a879700 8a92e000 00000000 tcpip!MdppBuildNextMdl+0x68 a63b3038 a784688c 8a879700 a63b306c a63b3074 tcpip!MdpAllocateAtDpcLevel+0x81 a63b3048 a7846caf 8a85d768 a63b306c 0000000e tcpip!GetARPBufferAtDpcLevel+0x2c a63b3074 a7846916 8a85d768 89e5d1a0 89ef2918 tcpip!ARPSendData+0x85 a63b30a0 a784665a 8a85d768 a63b3002 00000001 tcpip!ARPTransmit+0x193 a63b30d0 a784679f 8a17ad50 4900040a 89e5d1a0 tcpip!SendIPPacket+0x193 a63b321c a784763b a7884b98 00000000 8aaca180 tcpip!IPTransmit+0x289e a63b3268 a784a058 02b62008 00000000 00000002 tcpip!SendACK+0x2d8 a63b3288 a7843a0e 00000002 00000002 a63b32b4 tcpip!ProcessPerCpuTCBDelayQ+0xc6 a63b32bc a7843955 00000002 a7843901 a78433d6 tcpip!ProcessTCBDelayQ+0xc4 a63b32c8 a78433d6 00000000 8a9dd130 a78437f8 tcpip!TCPRcvComplete+0x20 a63b32d4 a78437f8 b9e3cc40 8a85d768 c000009a tcpip!IPRcvComplete+0x21 a63b32d8 b9e3cc40 8a85d768 c000009a 8a9dd130 tcpip!ARPRcvComplete+0x5 WARNING: Stack unwind information not available. Following frames may be wrong. a63b3328 b8f0945c c000009a a63b334c 00000001 NDIS+0x22c40 a63b3354 b9e3cef2 018083e0 89df6e18 89f63760 psched!ClReceiveIndication+0xa0 a63b33bc b8ea48f0 c000009a a63b33d8 00000001 NDIS+0x22ef2 a63b3484 b8ea4d3d 89df6e18 00000001 8872cf10 VBoxNetFlt+0x48f0 a63b34a0 b8ea5263 89f636d0 8aa96838 89f63668 VBoxNetFlt+0x4d3d a63b34c0 b9e3cef2 018136fc 89f636d0 89f63760 VBoxNetFlt+0x5263 a63b3528 b9e2fed4 c000009a a63b3548 00000001 NDIS+0x22ef2 a63b3550 b9e1a99d 00000001 8a8136fc 89e5dda8 NDIS+0x15ed4 a63b356c b8ea61f4 8a427cd0 8872cf10 00000001 NDIS+0x99d a63b3584 b8ea62b7 a0f60001 89e5dd58 00000103 VBoxNetFlt+0x61f4 a63b35a4 b9e1cf87 00000000 a63b35d8 00000001 VBoxNetFlt+0x62b7 a63b35cc b8f0a528 8a883f40 89e5dda8 89e5dd40 NDIS+0x2f87 a63b3608 b9e1a985 8a8083e0 89e5dda8 00000002 psched!MpSend+0x706 a63b3630 a7846d40 8a45b450 89e5dda8 8a85d768 NDIS+0x985 a63b3658 a7846916 8a85d768 89e5dda8 89819890 tcpip!ARPSendData+0x198 a63b3684 a784665a 8a85d768 a63b3602 00000001 tcpip!ARPTransmit+0x193 a63b36b4 a784679f 8a17ad50 9600040a 89e5dda8 tcpip!SendIPPacket+0x193 a63b3800 a784763b a7884b98 00000000 8aaca2e0 tcpip!IPTransmit+0x289e a63b384c a785062a 02e0b008 8abec008 8a637018 tcpip!SendACK+0x2d8 a63b38c8 a7844ef5 8a88c818 9a00040a 9600040a tcpip!TCPRcv+0x17a3 a63b3928 a7844b19 00000020 8a88c818 a78470b6 tcpip!DeliverToUser+0x18e a63b39a4 a7844836 a78848f0 8a88c818 8a637018 tcpip!DeliverToUserEx+0x95e a63b3a5c a7843928 8a88c818 8a63702c 0000001a tcpip!IPRcvPacket+0x6cb a63b3a9c a7843853 00000000 8929d468 8a63700a tcpip!ARPRcvIndicationNew+0x149 a63b3ad8 b9e3cb9f 8a85d768 00000000 b8f0eb40 tcpip!ARPRcvPacket+0x68 a63b3b2c b8f0901d 00890f88 892fc650 00000004 NDIS+0x22b9f a63b3b40 b8f091b4 8a9dd130 892fc650 00000004 psched!PsFlushReceiveQueue+0x15 a63b3b64 b8f093e9 8a8083e8 00000000 8a9dd130 psched!PsEnqueueReceivePacket+0xda a63b3b90 b9e3cef2 8a8083e0 89df6658 89b4ae40 psched!ClReceiveIndication+0x2d a63b3bf8 b8ea48f0 c000009a a63b3c14 00000008 NDIS+0x22ef2 a63b3cc0 b8ea4d3d 89df6658 00000001 8872cd20 VBoxNetFlt+0x48f0 a63b3cdc b8ea5263 89b4adb0 8aa96838 89b4ad48 VBoxNetFlt+0x4d3d a63b3cfc b9e3cef2 018136fc 89b4adb0 89b4ae40 VBoxNetFlt+0x5263 a63b3d64 b9e2fed4 c000009a a63b3d84 00000001 NDIS+0x22ef2 a63b3d8c b9e1a99d 00000001 8a8136fc 888ed3d0 NDIS+0x15ed4 a63b3da8 b8ea61f4 8a427cd0 8872cd20 00000001 NDIS+0x99d a63b3dc0 b8ea62b7 a0f50001 888ed380 00000103 VBoxNetFlt+0x61f4 a63b3de0 b9e1cf87 00000000 a63b3e14 00000001 VBoxNetFlt+0x62b7 a63b3e08 b8f0a528 8a883f40 888ed3d0 888ed368 NDIS+0x2f87 a63b3e44 b9e1a985 8a8083e0 888ed3d0 00000002 psched!MpSend+0x706 a63b3e6c a7846d40 8a45b450 888ed3d0 8a85d768 NDIS+0x985 a63b3e94 a7846916 8a85d768 888ed3d0 8a3aa348 tcpip!ARPSendData+0x198 a63b3ec0 a784665a 8a85d768 a63b3f02 00000001 tcpip!ARPTransmit+0x193 a63b3ef0 a784679f 8a17ad50 c300040a 888ed3d0 tcpip!SendIPPacket+0x193 a63b403c 00000000 00000000 00000000 00000000 tcpip!IPTransmit+0x289e STACK_COMMAND: kb FOLLOWUP_IP: VBoxNetFlt+48f0 b8ea48f0 ?? ??? SYMBOL_STACK_INDEX: 11 SYMBOL_NAME: VBoxNetFlt+48f0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: VBoxNetFlt IMAGE_NAME: VBoxNetFlt.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4caf235e FAILURE_BUCKET_ID: 0x7f_8_VBoxNetFlt+48f0 BUCKET_ID: 0x7f_8_VBoxNetFlt+48f0 Followup: MachineOwner }}} ------------------------- Reproduction: Nothing special, no special command, just a random BSOD when host is in locked screen state. Host: Windows XP SP3 Guest: CentOS (Linux version 2.6.18-194.17.1.el5 (mockbuild@builder10.centos.org) (gcc version 4.1.2 20080704 (Red Hat 4.1.2-48)) #1 SMP Wed Sep 29 12:51:33 EDT 2010) " defect closed network/hostif VirtualBox 3.2.10 fixed Linux Windows