<... unrelated debug trail ...> (H:\trunk\reactos_clean\ntoskrnl\mm\ARM3\pagfault.c:1137) Access on reserved section? (H:\trunk\reactos_clean\ntoskrnl\mm\ARM3\virtual.c:1578) Not supported Assertion h:\trunk\reactos_clean\ntoskrnl\mm\arm3\virtual.c(1579): FALSE nt!MiQueryAddressState+0x25b: 804af38b cd2c int 2Ch kd> .reload Connected to Windows Server 2003 3790 x86 compatible target at (Sat Nov 12 01:41:57.988 2016 (UTC + 1:00)), ptr64 FALSE Loading Kernel Symbols ............................................................. Loading User Symbols ..................................... *** WARNING: Unable to verify checksum for 7-zip.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for 7-zip.dll - *** ERROR: Symbol file could not be found. Defaulted to export symbols for ConvertToPDFShellExtension_x86.dll - *** ERROR: Module load completed but symbols could not be loaded for FILEM701.SYS *** ERROR: Symbol file could not be found. Defaulted to export symbols for VBoxDisp.dll - *** ERROR: Symbol file could not be found. Defaulted to export symbols for VBoxSF.sys - *** ERROR: Symbol file could not be found. Defaulted to export symbols for VBoxMouse.sys - *** ERROR: Symbol file could not be found. Defaulted to export symbols for VBoxVideo.sys - *** ERROR: Symbol file could not be found. Defaulted to export symbols for VBoxGuest.sys - kd> kp ChildEBP RetAddr f6244be4 804afaa1 nt!MiQueryAddressState(void * Va = 0x003a0000, struct _MMVAD * Vad = 0xb0fee968, struct _EPROCESS * TargetProcess = 0xb100e9f0, unsigned long * ReturnedProtect = 0xf6244c40, void ** NextVa = 0xf6244c50)+0x25b [h:\trunk\reactos_clean\ntoskrnl\mm\arm3\virtual.c @ 1579] f6244ca4 804b2560 nt!MiQueryMemoryBasicInformation(void * ProcessHandle = 0xffffffff, void * BaseAddress = 0x003a0047, void * MemoryInformation = 0x0012e9a4, unsigned long MemoryInformationLength = 0x1c, unsigned long * ReturnLength = 0x00000000)+0x5e1 [h:\trunk\reactos_clean\ntoskrnl\mm\arm3\virtual.c @ 1909] f6244cf4 804f753b nt!NtQueryVirtualMemory(void * ProcessHandle = 0xffffffff, void * BaseAddress = 0x003a0047, _MEMORY_INFORMATION_CLASS MemoryInformationClass = MemoryBasicInformation (0n0), void * MemoryInformation = 0x0012e9a4, unsigned long MemoryInformationLength = 0x1c, unsigned long * ReturnLength = 0x00000000)+0x110 [h:\trunk\reactos_clean\ntoskrnl\mm\arm3\virtual.c @ 4336] f6244d1c 804f6bdf nt!KiSystemCallTrampoline(void * Handler = 0x804b2450, void * Arguments = 0x0012e97c, unsigned long StackBytes = 0x18)+0x1b [h:\trunk\reactos_clean\ntoskrnl\include\internal\i386\ke.h @ 742] f6244d5c 80403e23 nt!KiSystemServiceHandler(struct _KTRAP_FRAME * TrapFrame = 0xf6244d64, void * Arguments = 0x0012e97c)+0x22f [h:\trunk\reactos_clean\ntoskrnl\ke\i386\traphdlr.c @ 1738] f6244d5c 7c92c58e nt!KiFastCallEntry+0x8c 0012e970 7c9519ee ntdll!KiFastSystemCallRet 0012e974 7c765b15 ntdll!NtQueryVirtualMemory+0xc 0012e9e8 7c765cd3 kernel32!BasepCheckForReadOnlyResource(void * Ptr = 0x003a0047)+0x45 [h:\trunk\reactos_clean\dll\win32\kernel32\client\except.c @ 162] 0012eeec 7c76ea5c kernel32!UnhandledExceptionFilter(struct _EXCEPTION_POINTERS * ExceptionInfo = 0x0012ef4c)+0xa3 [h:\trunk\reactos_clean\dll\win32\kernel32\client\except.c @ 301] 0012ef24 7c76e984 kernel32!BaseExceptionFilter(struct _EXCEPTION_POINTERS * ExceptionInfo = 0x0012ef4c)+0x8c [h:\trunk\reactos_clean\dll\win32\kernel32\client\proc.c @ 457] 0012ef2c 7c7ab4c2 kernel32!BaseProcessStartup( * lpStartAddress = 0x00418540)+0x64 [h:\trunk\reactos_clean\dll\win32\kernel32\client\proc.c @ 480] 0012fff0 00000000 kernel32!_except_handler3+0x54