VirtualBox

Changeset 73353 in vbox for trunk/src


Ignore:
Timestamp:
Jul 25, 2018 3:20:40 PM (6 years ago)
Author:
vboxsync
Message:

DBGFR3BugCheck: build fix, update.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/VMM/VMMR3/DBGFR3BugCheck.cpp

    r73351 r73353  
    588588            switch (uP1)
    589589            {
    590                 case 0x00:  pszCheck = "Stack buffer overrun"; break;
     590                case 0x00:  pszCheck = "Stack buffer overrun (/GS)"; break;
    591591                case 0x01:  pszCheck = "Illegal virtual function table use (VTGuard)"; break;
    592592                case 0x02:  pszCheck = "Stack buffer overrun (via cookie)"; break;
    593593                case 0x03:  pszCheck = "Correupt LIST_ENTRY"; break;
    594594                case 0x04:  pszCheck = "Out of bounds stack pointer"; break;
    595                 case 0x05:  pszCheck = "Invalid parameter"; break;
    596                 case 0x06:  pszCheck = "Uninitialized stack cookie (by loader)"; break;
     595                case 0x05:  pszCheck = "Invalid parameter (fatal)"; break;
     596                case 0x06:  pszCheck = "Uninitialized stack cookie (by loader prior to Win8)"; break;
    597597                case 0x07:  pszCheck = "Fatal program exit request"; break;
    598598                case 0x08:  pszCheck = "Compiler bounds check violation"; break;
    599599                case 0x09:  pszCheck = "Direct RtlQueryRegistryValues w/o typechecking on untrusted hive"; break;
     600                /* https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/bug-check---bug-check-0x139-kernel-security-check-failure
     601                   and !analyze -show differs on the following: */
    600602                case 0x0a: case 0x0b: case 0x0c: case 0x0d: case 0x0e:
    601                 case 0x0f:  pszCheck = "Memory safety violation"; break;
    602                 case 0x10:  pszCheck = "Invalid indirect call (indirect call guard)"; break;
    603                 case 0x11:  pszCheck = "Invalid memory write (write guard)"; break;
    604                 case 0x12:  pszCheck = "Invalid target context for fiber switch"; break;
     603                case 0x0f:  pszCheck = "Memory safety violation [?]"; break;
     604                case 0x10:  pszCheck = "Invalid indirect call (indirect call guard) [?]"; break;
     605                case 0x11:  pszCheck = "Invalid memory write (write guard) [?]"; break;
     606                case 0x12:  pszCheck = "Invalid target context for fiber switch [?]"; break;
    605607                /** @todo there are lots more... */
    606                 default:    pszCheck = "Unknown"; break;
     608                default:    pszCheck = "Todo/Unknown"; break;
    607609            }
    608610            cchUsed = RTStrPrintf(pszDetails, cbDetails,
    609611                                  "KERNEL_SECURITY_CHECK_FAILURE\n"
    610                                   "P1: %016RX64 - %s!\n",
     612                                  "P1: %016RX64 - %s!\n"
    611613                                  "P2: %016RX64 - Trap frame address\n"
    612614                                  "P3: %016RX64 - Exception record\n"
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette