Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Use !analyze -v to get detailed debugging information.
- BugCheck 7F, {8, 80050031, 6f8, fffff8000310aba0}
- Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
- Followup: MachineOwner
- ---------
- 3: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- UNEXPECTED_KERNEL_MODE_TRAP (7f)
- This means a trap occurred in kernel mode, and it's a trap of a kind
- that the kernel isn't allowed to have/catch (bound trap) or that
- is always instant death (double fault). The first number in the
- bugcheck params is the number of the trap (8 = double fault, etc)
- Consult an Intel x86 family manual to learn more about what these
- traps are. Here is a *portion* of those codes:
- If kv shows a taskGate
- use .tss on the part before the colon, then kv.
- Else if kv shows a trapframe
- use .trap on that value
- Else
- .trap on the appropriate frame will show where the trap was taken
- (on x86, this will be the ebp that goes with the procedure KiTrap)
- Endif
- kb will then show the corrected stack.
- Arguments:
- Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
- Arg2: 0000000080050031
- Arg3: 00000000000006f8
- Arg4: fffff8000310aba0
- Debugging Details:
- ------------------
- BUGCHECK_STR: 0x7f_8
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff800030cbca9 to fffff800030cc740
- STACK_TEXT:
- fffff880`02fdbde8 fffff800`030cbca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
- fffff880`02fdbdf0 fffff800`030ca172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff880`02fdbf30 fffff800`0310aba0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
- fffff880`02ff7f30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!vDbgPrintExWithPrefixInternal+0x28
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KiDoubleFaultAbort+b2
- fffff800`030ca172 90 nop
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
- FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
- BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
- Followup: MachineOwner
- ---------
- 3: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- UNEXPECTED_KERNEL_MODE_TRAP (7f)
- This means a trap occurred in kernel mode, and it's a trap of a kind
- that the kernel isn't allowed to have/catch (bound trap) or that
- is always instant death (double fault). The first number in the
- bugcheck params is the number of the trap (8 = double fault, etc)
- Consult an Intel x86 family manual to learn more about what these
- traps are. Here is a *portion* of those codes:
- If kv shows a taskGate
- use .tss on the part before the colon, then kv.
- Else if kv shows a trapframe
- use .trap on that value
- Else
- .trap on the appropriate frame will show where the trap was taken
- (on x86, this will be the ebp that goes with the procedure KiTrap)
- Endif
- kb will then show the corrected stack.
- Arguments:
- Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
- Arg2: 0000000080050031
- Arg3: 00000000000006f8
- Arg4: fffff8000310aba0
- Debugging Details:
- ------------------
- BUGCHECK_STR: 0x7f_8
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff800030cbca9 to fffff800030cc740
- STACK_TEXT:
- fffff880`02fdbde8 fffff800`030cbca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
- fffff880`02fdbdf0 fffff800`030ca172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff880`02fdbf30 fffff800`0310aba0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
- fffff880`02ff7f30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!vDbgPrintExWithPrefixInternal+0x28
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!KiDoubleFaultAbort+b2
- fffff800`030ca172 90 nop
- SYMBOL_STACK_INDEX: 2
- SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
- FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
- BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement