New
#1
Windows 7 x64 BSOD programs and debug in message
Running apps:
- Join.me
- Skype call
- Endpoint was logged in
- VM was up, with CISCO VPN connected
- Pandora was playing in the browser
Windows 7 x64 pro, Lenovo T420
WARNING: .reload failed, module list may be incomplete
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050033, 406f8, fffff88004b1dad0}
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050033
Arg3: 00000000000406f8
Arg4: fffff88004b1dad0
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
BUGCHECK_STR: 0x7f_8
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002c8a1e9 to fffff80002c8ac40
STACK_TEXT:
fffff800`04053d28 fffff800`02c8a1e9 : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000406f8 : 0xfffff800`02c8ac40
fffff800`04053d30 00000000`0000007f : 00000000`00000008 00000000`80050033 00000000`000406f8 fffff880`04b1dad0 : 0xfffff800`02c8a1e9
fffff800`04053d38 00000000`00000008 : 00000000`80050033 00000000`000406f8 fffff880`04b1dad0 00000000`00000000 : 0x7f
fffff800`04053d40 00000000`80050033 : 00000000`000406f8 fffff880`04b1dad0 00000000`00000000 3c746c75`61666564 : 0x8
fffff800`04053d48 00000000`000406f8 : fffff880`04b1dad0 00000000`00000000 3c746c75`61666564 3e676e69`7274732f : 0x80050033
fffff800`04053d50 fffff880`04b1dad0 : 00000000`00000000 3c746c75`61666564 3e676e69`7274732f 3e65756c`61762f3c : 0x406f8
fffff800`04053d58 00000000`00000000 : 3c746c75`61666564 3e676e69`7274732f 3e65756c`61762f3c 7265626d`656d2f3c : 0xfffff880`04b1dad0
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
Followup: MachineOwner
---------
0: kd> lmvm Unknown_Module
start end module name