1.
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff800030b1e6e
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: mounter.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff8800a0b4d88 -- (.exr 0xfffff8800a0b4d88)
ExceptionAddress: fffff8800a9eba0a (fastfat! ?? ::NNGAKEGL::`string'+0x00000000000023da)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048
TRAP_FRAME: fffff8800a0b4e30 -- (.trap 0xfffff8800a0b4e30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800a0b8720 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800a9eba0a rsp=fffff8800a0b4fc0 rbp=fffff8800a0b8720
r8=fffff8800a0b5800 r9=fffff8800a0b5180 r10=0000000000000000
r11=fffff8800a0b5088 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
fastfat! ?? ::NNGAKEGL::`string'+0x23da:
fffff880`0a9eba0a 83794802 cmp dword ptr [rcx+48h],2 ds:00000000`00000048=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003084469 to fffff80003084f00
STACK_TEXT:
fffff800`00ba4d28 fffff800`03084469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`03082932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`030b1e6e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0a0b3ed0 fffff800`030bf1b5 : fffff880`0a0b4d88 fffff880`0a0b4ae0 fffff880`0a0b4e30 00000000`00000000 : nt!RtlDispatchException+0x2e
fffff880`0a0b45b0 fffff800`03084542 : fffff880`0a0b4d88 fffff880`0a9c1dcc fffff880`0a0b4e30 fffff880`0a0b8720 : nt!KiDispatchException+0x135
fffff880`0a0b4c50 fffff800`030830ba : 00000000`00000000 fffff880`0a9c1dcc 00000000`00000000 ffff8a00`19be1404 : nt!KiExceptionDispatch+0xc2
fffff880`0a0b4e30 fffff880`0a9eba0a : 00000000`00000000 ffff8a00`1a161404 00000000`0000000f 00000000`00000000 : nt!KiPageFault+0x23a
fffff880`0a0b4fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fastfat! ?? ::NNGAKEGL::`string'+0x23da
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`03082932 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
2.
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88003108618
Arg3: fffff88003107e70
Arg4: fffff880012fc3d0
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88003108618 -- (.exr 0xfffff88003108618)
ExceptionAddress: fffff880012fc3d0 (Ntfs!NtfsMountVolume+0x0000000000000158)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88003107e70 -- (.cxr 0xfffff88003107e70)
rax=007600650044005c rbx=0000000000000000 rcx=fffffa80044d98c0
rdx=fffffa80051684c8 rsi=fffffa8003d15620 rdi=fffffa8004b8ed90
rip=fffff880012fc3d0 rsp=fffff88003108850 rbp=fffff800032785a0
r8=fffff88003108bd8 r9=fffff88003108dd8 r10=0000000000000004
r11=fffff88003108b88 r12=fffffa8003d15620 r13=0000000000000001
r14=fffffa80051683b0 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
Ntfs!NtfsMountVolume+0x158:
fffff880`012fc3d0 f6403404 test byte ptr [rax+34h],4 ds:002b:00760065`00440090=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330b0e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsMountVolume+158
fffff880`012fc3d0 f6403404 test byte ptr [rax+34h],4
FAULTING_IP:
Ntfs!NtfsMountVolume+158
fffff880`012fc3d0 f6403404 test byte ptr [rax+34h],4
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff88001299c79 to fffff880012fc3d0
STACK_TEXT:
fffff880`03108850 fffff880`01299c79 : 00000000`00000000 fffffa80`051683b0 00000000`00000001 00000000`00000000 : Ntfs!NtfsMountVolume+0x158
fffff880`03108b90 fffff880`0122151d : 00000000`00000000 00000000`00000000 fffffa80`03d15620 00000000`00000000 : Ntfs!NtfsCommonFileSystemControl+0x59
fffff880`03108bd0 fffff800`030e2161 : fffffa80`018d2d00 fffff800`030c8b00 fffff800`032da100 00000000`00000001 : Ntfs!NtfsFspDispatch+0x2ad
fffff880`03108cb0 fffff800`03378166 : 00000000`00000000 fffffa80`018c3b60 00000000`00000080 fffffa80`018a8040 : nt!ExpWorkerThread+0x111
fffff880`03108d40 fffff800`030b3486 : fffff880`02f63180 fffffa80`018c3b60 fffff880`02f6df80 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03108d80 00000000`00000000 : fffff880`03109000 fffff880`03103000 fffff880`03108430 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsMountVolume+158
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff88003107e70 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsMountVolume+158
BUCKET_ID: X64_0x24_Ntfs!NtfsMountVolume+158
Followup: MachineOwner
Przeskanowałem dysk HDTune i pokazało się parę bad sector'ów. Nie wiem czy te blue screeny mogą dotyczyć wcześniejszych problemów z kartą graficzną, ponieważ co jakiś czas gasł mi ekran i pojawiał się z powrotem po momencie.