VirtualBox

5 年 前 建立

#18854 new defect

BSOD on Windows 10 host with console CentOS 7 Linux guest in network driver

回報者: MaaSoftware 負責人:
元件: other 版本: VirtualBox 6.0.10
關鍵字: 副本:
Guest type: Linux Host type: other

描述

I am using VirtualBox on Windows 10 x64 host. BSOD of Windows host occured when I using CentOS 7 x64 Linux without GUI (just console mode) installation and trying to install ISPmanager Business https://www.ispsystem.com/software/ispmanager/download to avaluate it: wget "http://cdn.ispsystem.com/install.sh" sh install.sh , activating the demo version of ISPmanager Business and trying to update packages of it. The probability of BSOD is approx. 80% in update packages state. BSOD is in Windows network card driver in ndis!ndisMSendCompleteNetBufferListsInternal+0x121 ndis!ndisCallSendCompleteHandler+0x33 ndis!NdisMSendNetBufferListsComplete+0x1df e1d65x64+0x133b4 (see Windbg outputs) Guest network is in bridge mode. In addition, RusRoute firewall free version http://rusroute.com/ is installed on host system, independed in disabled or enabled state of it (Standard Windows firewall is disalbed in both cases). Can you tell me what software is the reason os BSOD? Is this the bug in VistualBox or in other third party software, like RusRoute firewall? The Windows 7, XP guests with the same environment is working fine. WinDbg of minidump1, minidump2 are attached.

************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols
Deferred                                       cache*c:\MySymbols
Deferred                                       srv*https://msdl.microsoft.com/download/symbols

Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\minidump\080219-10984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols
Deferred                                       cache*c:\MySymbols
Deferred                                       srv*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols;cache*c:\MySymbols;srv*https://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff804`18200000 PsLoadedModuleList = 0xfffff804`186432f0
Debug session time: Fri Aug  2 20:15:42.372 2019 (UTC + 3:00)
System Uptime: 0 days 0:49:12.083
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
....................
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff9d8db279f1a0, Virtual address for the attempted execute.
Arg2: 8a000008092008e3, PTE contents.
Arg3: fffff8041db504a0, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for e1d65x64.sys

KEY_VALUES_STRING: 1

    Key  : Dump.Attributes.InsufficientDumpfileSize
    Value: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.239 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0xc
  Insufficient Dumpfile Size
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: ffff9d8db279f1a0

BUGCHECK_P2: 8a000008092008e3

BUGCHECK_P3: fffff8041db504a0

BUGCHECK_P4: 3

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  VirtualBoxVM.e

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  7700K

ANALYSIS_SESSION_TIME:  08-19-2019 19:05:14.0379

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

DPC_STACK_BASE:  FFFFF8041DB50FB0

TRAP_FRAME:  fffff8041db504a0 -- (.trap 0xfffff8041db504a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9d8db279f1a0 rbx=0000000000000000 rcx=ffff9d8db2ad9950
rdx=ffff9d8db9a923d0 rsi=0000000000000000 rdi=0000000000000000
rip=ffff9d8db279f1a0 rsp=fffff8041db50638 rbp=fffff8041db506b9
 r8=0000000000000001  r9=0000000000000000 r10=fffff80424425b90
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ffff9d8d`b279f1a0 1101            adc     dword ptr [rcx],eax ds:ffff9d8d`b2ad9950=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff804184554bc to fffff804183bc900

STACK_TEXT:  
fffff804`1db50278 fffff804`184554bc : 00000000`000000fc ffff9d8d`b279f1a0 8a000008`092008e3 fffff804`1db504a0 : nt!KeBugCheckEx
fffff804`1db50280 fffff804`1844fbc1 : 00000000`00000003 00000000`00000001 00000000`00000000 fffff804`1db503c0 : nt!MiCheckSystemNxFault+0x125330
fffff804`1db502c0 fffff804`1827ac2a : 00000000`00000003 00000000`00000011 fffff804`1db50400 00000000`00000000 : nt!MiRaisedIrqlFault+0x12a6e1
fffff804`1db50300 fffff804`183ca920 : ffff9d8d`b279f1a0 ffff9d8d`bb66a950 00000000`00000001 00000000`00000001 : nt!MmAccessFault+0x48a
fffff804`1db504a0 ffff9d8d`b279f1a0 : fffff804`1d18aa51 ffff9d8d`b2ae7a20 ffff9d8d`b281a120 fffff804`244f10b0 : nt!KiPageFault+0x360
fffff804`1db50638 fffff804`1d18aa51 : ffff9d8d`b2ae7a20 ffff9d8d`b281a120 fffff804`244f10b0 ffff9d8d`b9a923d0 : 0xffff9d8d`b279f1a0
fffff804`1db50640 fffff804`1d18eba3 : 00000000`00000002 00000000`00000000 fffff804`00000001 fffff804`244c2101 : ndis!ndisMSendCompleteNetBufferListsInternal+0x121
fffff804`1db50720 fffff804`1d18bcdf : 00001e00`00001e01 ffff9d8d`b26073c1 ffff9d8d`b2adbb60 ffff9d8d`b9a923d0 : ndis!ndisCallSendCompleteHandler+0x33
fffff804`1db50760 fffff804`271033b4 : 00000000`00000002 00000001`00000000 00000001`00000000 fffff804`27100d00 : ndis!NdisMSendNetBufferListsComplete+0x1df
fffff804`1db50850 00000000`00000002 : 00000001`00000000 00000001`00000000 fffff804`27100d00 ffff9d8d`b2be0c60 : e1d65x64+0x133b4
fffff804`1db50858 00000001`00000000 : 00000001`00000000 fffff804`27100d00 ffff9d8d`b2be0c60 ffff9d8d`b29c9d50 : 0x2
fffff804`1db50860 00000001`00000000 : fffff804`27100d00 ffff9d8d`b2be0c60 ffff9d8d`b29c9d50 ffff9d8d`b281f000 : 0x00000001`00000000
fffff804`1db50868 fffff804`27100d00 : ffff9d8d`b2be0c60 ffff9d8d`b29c9d50 ffff9d8d`b281f000 ffff9d8d`b281fe40 : 0x00000001`00000000
fffff804`1db50870 ffff9d8d`b2be0c60 : ffff9d8d`b29c9d50 ffff9d8d`b281f000 ffff9d8d`b281fe40 00000001`b283ad01 : e1d65x64+0x10d00
fffff804`1db50878 ffff9d8d`b29c9d50 : ffff9d8d`b281f000 ffff9d8d`b281fe40 00000001`b283ad01 00000000`00000001 : 0xffff9d8d`b2be0c60
fffff804`1db50880 ffff9d8d`b281f000 : ffff9d8d`b281fe40 00000001`b283ad01 00000000`00000001 ffff9d8d`000001ad : 0xffff9d8d`b29c9d50
fffff804`1db50888 ffff9d8d`b281fe40 : 00000001`b283ad01 00000000`00000001 ffff9d8d`000001ad 00000000`00000000 : 0xffff9d8d`b281f000
fffff804`1db50890 00000001`b283ad01 : 00000000`00000001 ffff9d8d`000001ad 00000000`00000000 ffff9d8d`af928350 : 0xffff9d8d`b281fe40
fffff804`1db50898 00000000`00000001 : ffff9d8d`000001ad 00000000`00000000 ffff9d8d`af928350 00000000`00000000 : 0x00000001`b283ad01
fffff804`1db508a0 ffff9d8d`000001ad : 00000000`00000000 ffff9d8d`af928350 00000000`00000000 00000000`00000000 : 0x1
fffff804`1db508a8 00000000`00000000 : ffff9d8d`af928350 00000000`00000000 00000000`00000000 ffff9d00`00000000 : 0xffff9d8d`000001ad


THREAD_SHA1_HASH_MOD_FUNC:  c0ffbf375cd55e1aa93daf3c03427b8881b1e850

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5058410cce10b80427a1f7de155fad955a47b3fb

THREAD_SHA1_HASH_MOD:  f2616a5e3854c666781435d2d0ed7d6384206ea6

FOLLOWUP_IP: 
e1d65x64+133b4
fffff804`271033b4 ??              ???

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  e1d65x64+133b4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: e1d65x64

IMAGE_NAME:  e1d65x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  57f4c1b3

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  133b4

FAILURE_BUCKET_ID:  0xFC_e1d65x64!unknown_function

BUCKET_ID:  0xFC_e1d65x64!unknown_function

PRIMARY_PROBLEM_CLASS:  0xFC_e1d65x64!unknown_function

TARGET_TIME:  2019-08-02T17:15:42.000Z

OSBUILD:  18362

OSSERVICEPACK:  239

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-02-02 11:33:06

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.239

ANALYSIS_SESSION_ELAPSED_TIME:  b5e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xfc_e1d65x64!unknown_function

FAILURE_ID_HASH:  {7259990a-ebc1-3d2e-33f5-0c4abf098887}

Followup:     MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\minidump\080219-11296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*C:\MySymbols*https://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff803`62c00000 PsLoadedModuleList = 0xfffff803`630432f0
Debug session time: Fri Aug  2 20:37:09.365 2019 (UTC + 3:00)
System Uptime: 0 days 0:11:15.077
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................
Loading User Symbols
Loading unloaded module list
................
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff800803df71a0, Virtual address for the attempted execute.
Arg2: 8a00000809c008e3, PTE contents.
Arg3: ffff908edb1c8340, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for e1d65x64.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffff800803df71a0

BUGCHECK_P2: 8a00000809c008e3

BUGCHECK_P3: ffff908edb1c8340

BUGCHECK_P4: 3

CPU_COUNT: 8

CPU_MHZ: 1068

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: 9

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  7700K

ANALYSIS_SESSION_TIME:  08-19-2019 19:08:23.0965

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffff908edb1c8340 -- (.trap 0xffff908edb1c8340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff800803df71a0 rbx=0000000000000000 rcx=ffff8008042dab50
rdx=ffff80080ae10600 rsi=0000000000000000 rdi=0000000000000000
rip=ffff800803df71a0 rsp=ffff908edb1c84d8 rbp=ffff908edb1c8559
 r8=0000000000000001  r9=0000000000000000 r10=fffff8036e9c5b90
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
ffff8008`03df71a0 1101            adc     dword ptr [rcx],eax ds:ffff8008`042dab50=03da7ef0
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80362e554bc to fffff80362dbc900

STACK_TEXT:  
ffff908e`db1c8118 fffff803`62e554bc : 00000000`000000fc ffff8008`03df71a0 8a000008`09c008e3 ffff908e`db1c8340 : nt!KeBugCheckEx
ffff908e`db1c8120 fffff803`62e4fbc1 : 00000000`00000003 00000000`00000001 00000000`00000000 ffff908e`db1c8260 : nt!MiCheckSystemNxFault+0x125330
ffff908e`db1c8160 fffff803`62c7ac2a : 00000000`00000006 00000000`00000011 ffff908e`db1c82a0 00000000`00000000 : nt!MiRaisedIrqlFault+0x12a6e1
ffff908e`db1c81a0 fffff803`62dca920 : 00000000`00000000 fffff803`b2503711 00000000`00000002 00000000`00000036 : nt!MmAccessFault+0x48a
ffff908e`db1c8340 ffff8008`03df71a0 : fffff803`6778aa51 ffff8008`0451aa20 ffff8008`03e223f0 fffff803`6ea910b0 : nt!KiPageFault+0x360
ffff908e`db1c84d8 fffff803`6778aa51 : ffff8008`0451aa20 ffff8008`03e223f0 fffff803`6ea910b0 ffff8008`0ae10600 : 0xffff8008`03df71a0
ffff908e`db1c84e0 fffff803`6778eba3 : 00000000`00000002 00000000`00000000 fffff803`00000001 fffff803`6ea62101 : ndis!ndisMSendCompleteNetBufferListsInternal+0x121
ffff908e`db1c85c0 fffff803`6778bcdf : fffff803`60367101 ffff8008`03afb9a1 ffff8008`043198c0 ffff8008`0ae10600 : ndis!ndisCallSendCompleteHandler+0x33
ffff908e`db1c8600 fffff803`70ed33b4 : 00000000`00000002 00000001`00000000 00000001`00000000 fffff803`70ed0d00 : ndis!NdisMSendNetBufferListsComplete+0x1df
ffff908e`db1c86f0 00000000`00000002 : 00000001`00000000 00000001`00000000 fffff803`70ed0d00 00000000`00000000 : e1d65x64+0x133b4
ffff908e`db1c86f8 00000001`00000000 : 00000001`00000000 fffff803`70ed0d00 00000000`00000000 00000000`00000000 : 0x2
ffff908e`db1c8700 00000001`00000000 : fffff803`70ed0d00 00000000`00000000 00000000`00000000 ffff8008`03e23000 : 0x00000001`00000000
ffff908e`db1c8708 fffff803`70ed0d00 : 00000000`00000000 00000000`00000000 ffff8008`03e23000 ffff8008`03e23e40 : 0x00000001`00000000
ffff908e`db1c8710 00000000`00000000 : 00000000`00000000 ffff8008`03e23000 ffff8008`03e23e40 00000001`03e3ed01 : e1d65x64+0x10d00


THREAD_SHA1_HASH_MOD_FUNC:  c0ffbf375cd55e1aa93daf3c03427b8881b1e850

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5058410cce10b80427a1f7de155fad955a47b3fb

THREAD_SHA1_HASH_MOD:  f2616a5e3854c666781435d2d0ed7d6384206ea6

FOLLOWUP_IP: 
e1d65x64+133b4
fffff803`70ed33b4 448b7dcb        mov     r15d,dword ptr [rbp-35h]

FAULT_INSTR_CODE:  cb7d8b44

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  e1d65x64+133b4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: e1d65x64

IMAGE_NAME:  e1d65x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  57f4c1b3

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  133b4

FAILURE_BUCKET_ID:  0xFC_e1d65x64!unknown_function

BUCKET_ID:  0xFC_e1d65x64!unknown_function

PRIMARY_PROBLEM_CLASS:  0xFC_e1d65x64!unknown_function

TARGET_TIME:  2019-08-02T17:37:09.000Z

OSBUILD:  18362

OSSERVICEPACK:  239

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-02-02 11:33:06

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  10b20

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xfc_e1d65x64!unknown_function

FAILURE_ID_HASH:  {7259990a-ebc1-3d2e-33f5-0c4abf098887}

Followup:     MachineOwner
---------


附加檔案 (5)

analyze1.txt (8.6 KB ) - 5 年 前, 由 MaaSoftware 新增
WinDbg analyze 1
analyze2.txt (7.2 KB ) - 5 年 前, 由 MaaSoftware 新增
WinDbg analyze 2
CentOS 7 isp.vbox (2.4 KB ) - 5 年 前, 由 MaaSoftware 新增
vbox config sample
080219-10984-01.dmp (389.9 KB ) - 5 年 前, 由 MaaSoftware 新增
minidump1
080219-11296-01.zip (147.1 KB ) - 5 年 前, 由 MaaSoftware 新增
minidump2 zipped

下載所有附檔: .zip

更動歷史 (5)

5 年 前MaaSoftware 編輯

附檔: 新增 analyze1.txt

WinDbg analyze 1

5 年 前MaaSoftware 編輯

附檔: 新增 analyze2.txt

WinDbg analyze 2

5 年 前MaaSoftware 編輯

附檔: 新增 CentOS 7 isp.vbox

vbox config sample

5 年 前MaaSoftware 編輯

附檔: 新增 080219-10984-01.dmp

minidump1

5 年 前MaaSoftware 編輯

附檔: 新增 080219-11296-01.zip

minidump2 zipped

注意: 瀏覽 TracTickets 來幫助您使用待辦事項功能

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette