Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040214-13562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff801`fc615000 PsLoadedModuleList = 0xfffff801`fc8d9990
Debug session time: Wed Apr 2 16:36:48.005 2014 (UTC + 2:00)
System Uptime: 3 days 14:28:46.580
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
...........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, ffffd000206480b0, ffffd0002754df70, fffff801fc650e8e}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b4 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffd000206480b0
Arg3: ffffd0002754df70
Arg4: fffff801fc650e8e
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 0
TRAP_FRAME: ffffd000275514d0 -- (.trap 0xffffd000275514d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000050 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801fc6f04b1 rsp=ffffd00027551660 rbp=ffffd00027551760
r8=00000000001594b3 r9=ffffd00027553b00 r10=0000000000000006
r11=fffff801fc925b03 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
nt!RtlDispatchException+0x371:
fffff801`fc6f04b1 488b02 mov rax,qword ptr [rdx] ds:00000000`000000d0=????????????????
Resetting default scope
EXCEPTION_RECORD: ffffe00000000001 -- (.exr 0xffffe00000000001)
Cannot read Exception record @ ffffe00000000001
LAST_CONTROL_TRANSFER: from fffff801fc76e7e9 to fffff801fc762ca0
STACK_TEXT:
ffffd000`20647f68 fffff801`fc76e7e9 : 00000000`0000007f 00000000`00000008 ffffd000`206480b0 ffffd000`2754df70 : nt!KeBugCheckEx
ffffd000`20647f70 fffff801`fc76c8f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`206480b0 fffff801`fc650e8e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb4
ffffd000`2754df70 fffff801`fc76cf2f : 00000000`00000000 00000000`00000003 00000000`00000000 ffffd000`2754e0b0 : nt!MmAccessFault+0xce
ffffd000`2754e0b0 fffff801`fc6f04b1 : 00000000`00000000 ffffd000`2754e340 ffffd000`2754f168 00000000`000002fe : nt!KiPageFault+0x12f
ffffd000`2754e240 fffff801`fc6f145b : ffffd000`2754f168 ffffd000`2754ee70 ffffd000`2754f168 fffff801`fc894808 : nt!RtlDispatchException+0x371
ffffd000`2754e940 fffff801`fc76e8c2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x61f
ffffd000`2754f030 fffff801`fc76d014 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffd000`2754f210 : nt!KiExceptionDispatch+0xc2
ffffd000`2754f210 fffff801`fc6f04b1 : 00000000`00000000 ffffd000`2754f4a0 ffffd000`275502c8 00000000`000002fe : nt!KiPageFault+0x214
ffffd000`2754f3a0 fffff801`fc6f145b : ffffd000`275502c8 ffffd000`2754ffd0 ffffd000`275502c8 fffff801`fc894808 : nt!RtlDispatchException+0x371
ffffd000`2754faa0 fffff801`fc76e8c2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x61f
ffffd000`27550190 fffff801`fc76d014 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffd000`27550370 : nt!KiExceptionDispatch+0xc2
ffffd000`27550370 fffff801`fc6f04b1 : 00000000`00000000 ffffd000`27550600 ffffd000`27551428 00000000`000002fe : nt!KiPageFault+0x214
ffffd000`27550500 fffff801`fc6f145b : ffffd000`27551428 ffffd000`27551130 ffffd000`27551428 fffff801`fc894808 : nt!RtlDispatchException+0x371
ffffd000`27550c00 fffff801`fc76e8c2 : 00000000`00000000 00000000`0000001b 00000000`00000000 ffffedaf`f991f298 : nt!KiDispatchException+0x61f
ffffd000`275512f0 fffff801`fc76d014 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffd000`275514d0 : nt!KiExceptionDispatch+0xc2
ffffd000`275514d0 fffff801`fc6f04b1 : 00000000`00000000 ffffd000`27551760 ffffd000`27552588 00000000`000002fe : nt!KiPageFault+0x214
ffffd000`27551660 fffff801`fc6f145b : ffffd000`27552588 ffffd000`27552290 ffffd000`27552588 fffff801`fc894808 : nt!RtlDispatchException+0x371
ffffd000`27551d60 fffff801`fc76e8c2 : ffffe000`00000001 fffff800`019fc906 ffffe000`00000003 00000000`7f000001 : nt!KiDispatchException+0x61f
ffffd000`27552450 fffff801`fc76d014 : 00000000`00000000 00000000`00000003 00000014`00000000 ffffd000`27552630 : nt!KiExceptionDispatch+0xc2
ffffd000`27552630 fffff801`fc6f04b1 : 00000000`00000000 ffffd000`275528c0 ffffd000`275536e8 00000000`000002fe : nt!KiPageFault+0x214
ffffd000`275527c0 fffff801`fc6f145b : ffffd000`275536e8 ffffd000`275533f0 ffffd000`275536e8 00000000`00000001 : nt!RtlDispatchException+0x371
ffffd000`27552ec0 fffff801`fc76e8c2 : ffffd000`20640180 ffffe000`09117080 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x61f
ffffd000`275535b0 fffff801`fc76cdfe : ffffe000`091171c0 00000000`00000000 00000000`00000000 ffffe000`095ff570 : nt!KiExceptionDispatch+0xc2
ffffd000`27553790 fffff960`001288fe : fffbf960`00124961 00000000`00000000 fffff901`407a0000 00000000`00003dff : nt!KiGeneralProtectionFault+0xfe
ffffd000`27553928 fffbf960`00124961 : 00000000`00000000 fffff901`407a0000 00000000`00003dff fffff960`00000000 : win32k!xxxRealSleepThread+0x2fe
ffffd000`27553930 00000000`00000000 : fffff901`407a0000 00000000`00003dff fffff960`00000000 00000000`00000000 : 0xfffbf960`00124961
STACK_COMMAND: kb
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 52718d9c
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b4
fffff801`fc76c8f4 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b4
FAILURE_BUCKET_ID: TRAP_FRAME_RECURSION
BUCKET_ID: TRAP_FRAME_RECURSION
Followup: MachineOwner
---------