Имя пользователя:
Пароль:
 

Название темы: 0x0000007F: UNEXPECTED_KERNEL_MODE_TRAP
Показать сообщение отдельно


Moderator


Сообщения: 53589
Благодарности: 15546

Профиль | Отправить PM | Цитировать


Garnostay, так же, как вы.
Кстати, полный текст с опцией -v
Код: Выделить весь код
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: srv*E:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: srv*E:\Symbols*http://msdl.microsoft.com/download/symbols
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (4 procs) Free x86 compatible
Product: Server, suite: Enterprise TerminalServer SingleUserTS
Built by: 3790.srv03_sp2_gdr.100216-1301
Kernel base = 0x80800000 PsLoadedModuleList = 0x808af9c8
Debug session time: Thu Jan 20 01:28:47.850 2011 (GMT+3)
System Uptime: 26 days 23:41:30.296
WARNING: Process directory table base 132E1000 doesn't match CR3 00039000
WARNING: Process directory table base 132E1000 doesn't match CR3 00039000
Loading Kernel Symbols
...........................................................................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 7ffdd00c).  Type ".hh dbgerr001" for details
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80042000, 0, 0}

*** ERROR: Module load completed but symbols could not be loaded for grdkey.sys
Probably caused by : grdkey.sys ( grdkey+1fd03 )

Followup: MachineOwner
---------

0: kd> kd: Reading initial command '!analyze -v; q'
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 80042000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

TSS:  00000028 -- (.tss 0x28)
eax=0000038c ebx=af12e320 ecx=af12e30c edx=00000000 esi=00000013 edi=00000013
eip=8083dd59 esp=af12df54 ebp=af12e2f0 iopl=0         nv up ei ng nz ac po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010292
nt!_SEH_prolog+0x1a:
8083dd59 53              push    ebx
Resetting default scope

DEFAULT_BUCKET_ID:  DRIVER_FAULT

PROCESS_NAME:  grdsrv.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 808346cc to 8083dd59

STACK_TEXT:  
af12e2f0 808346cc af12e30c 00000000 af12e360 nt!_SEH_prolog+0x1a
af12e358 80834680 af130b48 b9e3b068 badb0d00 nt!CommonDispatchException+0x4a
af12e3d4 b9e42d03 00000000 af130b48 b9e438d0 nt!Kei386EoiHelper+0x186
WARNING: Stack unwind information not available. Following frames may be wrong.
af130c3c 80840153 893365d0 84ee2a08 88393af0 grdkey+0x1fd03
af130b80 001ee792 88cf9c98 00000001 afaaebc9 nt!IofCallDriver+0x45
af130c3c 80840153 893365d0 84ee2a08 88393af0 0x1ee792
af130c24 0029ae64 893365d0 84ee2a08 89336688 nt!IofCallDriver+0x45
af130c3c 80840153 893365d0 84ee2a08 88393af0 0x29ae64
af130c50 8092b57f 84ee2a9c 88393af0 84ee2a08 nt!IofCallDriver+0x45
af130c64 8092b4b4 893365d0 84ee2a08 88393af0 nt!IopSynchronousServiceTail+0x10b
af130d00 8092b5d4 000003e4 00000000 00000000 nt!IopXxxControlFile+0x60f
af130d34 80833bef 000003e4 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
af130d34 7c93860c 000003e4 00000000 00000000 nt!KiFastCallEntry+0xfc
01eee098 00000000 00000000 00000000 00000000 0x7c93860c


STACK_COMMAND:  .tss 0x28 ; kb

FOLLOWUP_IP: 
grdkey+1fd03
b9e42d03 5b              pop     ebx

SYMBOL_STACK_INDEX:  3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: grdkey

IMAGE_NAME:  grdkey.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  49a663e9

SYMBOL_NAME:  grdkey+1fd03

FAILURE_BUCKET_ID:  0x7f_8_grdkey+1fd03

BUCKET_ID:  0x7f_8_grdkey+1fd03
Теперь понятно: в минидампах стек был пустой (потому и причина не видна).
Это сообщение посчитали полезным следующие участники:

Отправлено: 13:49, 26-01-2011 | #431

Название темы: 0x0000007F: UNEXPECTED_KERNEL_MODE_TRAP