Advertisement
Guest User

Untitled

a guest
Feb 10th, 2011
146
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.27 KB | None | 0 0
  1. Use !analyze -v to get detailed debugging information.
  2.  
  3. BugCheck 7F, {8, 80050031, 6f8, fffff8000310aba0}
  4.  
  5. Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
  6.  
  7. Followup: MachineOwner
  8. ---------
  9.  
  10. 3: kd> !analyze -v
  11. *******************************************************************************
  12. * *
  13. * Bugcheck Analysis *
  14. * *
  15. *******************************************************************************
  16.  
  17. UNEXPECTED_KERNEL_MODE_TRAP (7f)
  18. This means a trap occurred in kernel mode, and it's a trap of a kind
  19. that the kernel isn't allowed to have/catch (bound trap) or that
  20. is always instant death (double fault). The first number in the
  21. bugcheck params is the number of the trap (8 = double fault, etc)
  22. Consult an Intel x86 family manual to learn more about what these
  23. traps are. Here is a *portion* of those codes:
  24. If kv shows a taskGate
  25. use .tss on the part before the colon, then kv.
  26. Else if kv shows a trapframe
  27. use .trap on that value
  28. Else
  29. .trap on the appropriate frame will show where the trap was taken
  30. (on x86, this will be the ebp that goes with the procedure KiTrap)
  31. Endif
  32. kb will then show the corrected stack.
  33. Arguments:
  34. Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
  35. Arg2: 0000000080050031
  36. Arg3: 00000000000006f8
  37. Arg4: fffff8000310aba0
  38.  
  39. Debugging Details:
  40. ------------------
  41.  
  42.  
  43. BUGCHECK_STR: 0x7f_8
  44.  
  45. CUSTOMER_CRASH_COUNT: 1
  46.  
  47. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  48.  
  49. PROCESS_NAME: System
  50.  
  51. CURRENT_IRQL: 2
  52.  
  53. LAST_CONTROL_TRANSFER: from fffff800030cbca9 to fffff800030cc740
  54.  
  55. STACK_TEXT:
  56. fffff880`02fdbde8 fffff800`030cbca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
  57. fffff880`02fdbdf0 fffff800`030ca172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  58. fffff880`02fdbf30 fffff800`0310aba0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
  59. fffff880`02ff7f30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!vDbgPrintExWithPrefixInternal+0x28
  60.  
  61.  
  62. STACK_COMMAND: kb
  63.  
  64. FOLLOWUP_IP:
  65. nt!KiDoubleFaultAbort+b2
  66. fffff800`030ca172 90 nop
  67.  
  68. SYMBOL_STACK_INDEX: 2
  69.  
  70. SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
  71.  
  72. FOLLOWUP_NAME: MachineOwner
  73.  
  74. MODULE_NAME: nt
  75.  
  76. IMAGE_NAME: ntkrnlmp.exe
  77.  
  78. DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
  79.  
  80. FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
  81.  
  82. BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
  83.  
  84. Followup: MachineOwner
  85. ---------
  86.  
  87. 3: kd> !analyze -v
  88. *******************************************************************************
  89. * *
  90. * Bugcheck Analysis *
  91. * *
  92. *******************************************************************************
  93.  
  94. UNEXPECTED_KERNEL_MODE_TRAP (7f)
  95. This means a trap occurred in kernel mode, and it's a trap of a kind
  96. that the kernel isn't allowed to have/catch (bound trap) or that
  97. is always instant death (double fault). The first number in the
  98. bugcheck params is the number of the trap (8 = double fault, etc)
  99. Consult an Intel x86 family manual to learn more about what these
  100. traps are. Here is a *portion* of those codes:
  101. If kv shows a taskGate
  102. use .tss on the part before the colon, then kv.
  103. Else if kv shows a trapframe
  104. use .trap on that value
  105. Else
  106. .trap on the appropriate frame will show where the trap was taken
  107. (on x86, this will be the ebp that goes with the procedure KiTrap)
  108. Endif
  109. kb will then show the corrected stack.
  110. Arguments:
  111. Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
  112. Arg2: 0000000080050031
  113. Arg3: 00000000000006f8
  114. Arg4: fffff8000310aba0
  115.  
  116. Debugging Details:
  117. ------------------
  118.  
  119.  
  120. BUGCHECK_STR: 0x7f_8
  121.  
  122. CUSTOMER_CRASH_COUNT: 1
  123.  
  124. DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
  125.  
  126. PROCESS_NAME: System
  127.  
  128. CURRENT_IRQL: 2
  129.  
  130. LAST_CONTROL_TRANSFER: from fffff800030cbca9 to fffff800030cc740
  131.  
  132. STACK_TEXT:
  133. fffff880`02fdbde8 fffff800`030cbca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
  134. fffff880`02fdbdf0 fffff800`030ca172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  135. fffff880`02fdbf30 fffff800`0310aba0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
  136. fffff880`02ff7f30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!vDbgPrintExWithPrefixInternal+0x28
  137.  
  138.  
  139. STACK_COMMAND: kb
  140.  
  141. FOLLOWUP_IP:
  142. nt!KiDoubleFaultAbort+b2
  143. fffff800`030ca172 90 nop
  144.  
  145. SYMBOL_STACK_INDEX: 2
  146.  
  147. SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
  148.  
  149. FOLLOWUP_NAME: MachineOwner
  150.  
  151. MODULE_NAME: nt
  152.  
  153. IMAGE_NAME: ntkrnlmp.exe
  154.  
  155. DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
  156.  
  157. FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
  158.  
  159. BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
  160.  
  161. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement