none
블루스크린 minidump 파일 분석 요청 RRS feed

  • 질문

  • unexpected kernel mode trap  블루스크린 자주 나와서

    미니덤프 windbg 로 돌려봤는데 다음과 같이 나왔네요..

    블루스크린 해결방안 요청드립니다 ㅜ

     -----------------------------------------------------------------------------------------------------
    Microsoft (R) Windows Debugger Version 10.0.17763.1 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Users\GS_admin\Downloads\dump\022619-16781-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: srv*
    Executable search path is: 
    Windows 10 Kernel Version 17134 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff802`eaa8f000 PsLoadedModuleList = 0xfffff802`eae3d150
    Debug session time: Tue Feb 26 11:46:58.197 2019 (UTC + 9:00)
    System Uptime: 0 days 11:20:34.502
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    .................................
    Loading User Symbols
    Loading unloaded module list
    ..........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 7F, {8, ffffc181ebd4bf50, fffff08db39a4fc0, fffff80791389b9b}

    *** WARNING: Unable to verify timestamp for symefasi.sys
    *** ERROR: Module load completed but symbols could not be loaded for symefasi.sys
    Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+27f )

    Followup:     MachineOwner
    ---------

    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: ffffc181ebd4bf50
    Arg3: fffff08db39a4fc0
    Arg4: fffff80791389b9b

    Debugging Details:
    ------------------


    KEY_VALUES_STRING: 1


    STACKHASH_ANALYSIS: 1

    TIMELINE_ANALYSIS: 1


    DUMP_CLASS: 1

    DUMP_QUALIFIER: 400

    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804

    SYSTEM_MANUFACTURER:  LG Electronics

    SYSTEM_PRODUCT_NAME:  Z70SV.AS55B2E

    SYSTEM_SKU:  To be filled by O.E.M.

    SYSTEM_VERSION:  TA001

    BIOS_VENDOR:  American Megatrends Inc.

    BIOS_VERSION:  CVF07

    BIOS_DATE:  04/27/2015

    BASEBOARD_MANUFACTURER:  MICRO-STAR INTERNATIONAL CO., LTD

    BASEBOARD_PRODUCT:  MS-7886

    BASEBOARD_VERSION:  1.0

    DUMP_TYPE:  2

    BUGCHECK_P1: 8

    BUGCHECK_P2: ffffc181ebd4bf50

    BUGCHECK_P3: fffff08db39a4fc0

    BUGCHECK_P4: fffff80791389b9b

    BUGCHECK_STR:  0x7f_8

    TRAP_FRAME:  ffffc181ebd4bf50 -- (.trap 0xffffc181ebd4bf50)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff08db39a5068 rbx=0000000000000000 rcx=ffffd68d1df92228
    rdx=ffff82800fd2a630 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80791389b9b rsp=fffff08db39a4fc0 rbp=0000000000000000
     r8=000000000000065f  r9=fffff08db39a5138 r10=0000000000000000
    r11=ffffd68d1df92228 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    Ntfs!NtfsLookupAllocation+0x3b:
    fffff807`91389b9b 4c89542430      mov     qword ptr [rsp+30h],r10 ss:0018:fffff08d`b39a4ff0=????????????????
    Resetting default scope

    CPU_COUNT: 4

    CPU_MHZ: cdc

    CPU_VENDOR:  GenuineIntel

    CPU_FAMILY: 6

    CPU_MODEL: 3c

    CPU_STEPPING: 3

    CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 22'00000000 (cache) 22'00000000 (init)

    BLACKBOXBSD: 1 (!blackboxbsd)


    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    PROCESS_NAME:  dwm.exe

    CURRENT_IRQL:  0

    ANALYSIS_SESSION_HOST:  ¾ç¿µÁØ

    ANALYSIS_SESSION_TIME:  02-26-2019 13:45:59.0494

    ANALYSIS_VERSION: 10.0.17763.1 x86fre

    STACK_OVERFLOW: Stack Limit: fffff08db39a5000. Use (kF) and (!stackusage) to investigate stack usage.

    LAST_CONTROL_TRANSFER:  from fffff802eac49c69 to fffff802eac390c0

    STACK_TEXT:  
    ffffc181`ebd4be08 fffff802`eac49c69 : 00000000`0000007f 00000000`00000008 ffffc181`ebd4bf50 fffff08d`b39a4fc0 : nt!KeBugCheckEx
    ffffc181`ebd4be10 fffff802`eac4557f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    ffffc181`ebd4bf50 fffff807`91389b9b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x27f
    fffff08d`b39a4fc0 fffff807`9138931c : ffffd68d`1df92228 ffff8280`0fd2a630 00000000`0000065f fffff08d`b39a5138 : Ntfs!NtfsLookupAllocation+0x3b
    fffff08d`b39a5070 fffff807`91388a65 : ffffd68d`1df92228 ffffd68d`1d2bf6b0 ffffd68d`1a72bea8 ffffd68d`1d2bf6b0 : Ntfs!NtfsPrepareSimpleBuffers+0x19c
    fffff08d`b39a51e0 fffff807`91387b98 : ffffd68d`1a72bea8 fffff08d`b39a5290 ffffd68d`1df92228 00000000`0065f000 : Ntfs!NtfsPrepareBuffers+0xc5
    fffff08d`b39a5250 fffff807`913982df : 00000000`0065f000 00000000`00000001 fffff08d`b39a5640 00000000`00000000 : Ntfs!NtfsNonCachedIo+0x2c8
    fffff08d`b39a5420 fffff807`91396238 : ffffd68d`1df92228 ffffd68d`1d2bf6b0 00000002`00000700 ffff8280`0fd2a6c0 : Ntfs!NtfsCommonRead+0x1eaf
    fffff08d`b39a5610 fffff802`eab27e89 : ffffd68d`24c566f0 ffffd68d`1d2bf6b0 ffffd68d`1d2bf6b0 ffffd68d`16748860 : Ntfs!NtfsFsdRead+0x1d8
    fffff08d`b39a56d0 fffff807`8f807207 : fffff08d`b39a57a0 fffff807`8f8053b4 00000000`00000000 00000000`00000003 : nt!IofCallDriver+0x59
    fffff08d`b39a5710 fffff807`8f8051c6 : fffff08d`b39a57a0 00000000`00000000 00002001`953a18c0 fffff802`eab01c62 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x157
    fffff08d`b39a5780 fffff802`eab27e89 : ffffd68d`1d2bf6b0 fffff802`eab28155 ffffd68d`1d2bf6b0 fffff802`eab74f04 : FLTMGR!FltpDispatch+0xb6
    fffff08d`b39a57e0 fffff802`eab759c8 : ffffd68d`1d2bf6b0 ffffd68d`16748860 ffffd68d`152e6af0 0000001d`00000000 : nt!IofCallDriver+0x59
    fffff08d`b39a5820 fffff802`eab75834 : ffffd68d`152e6aa0 ffffd68d`196ab280 ffffd68d`152e6b00 ffffd68d`152e6ba8 : nt!IoPageReadEx+0x188
    fffff08d`b39a5870 fffff802`eafa771f : ffffd68d`152e6aa0 ffffd68d`196ab280 ffffd68d`152e6ba8 ffffd68d`152e6aa0 : nt!MiPageRead+0x28
    fffff08d`b39a58c0 fffff802`eafa6db5 : ffffd68d`1b100560 00000000`00000000 ffffd68d`ffffffff 00000000`00000000 : nt!MiPfExecuteReadList+0xd7
    fffff08d`b39a5940 fffff802`eab3ca4e : 00000000`0065f000 00000000`00001000 ffffd68d`1b100560 ffffb08c`7d9df000 : nt!MmPrefetchForCacheManager+0xdd
    fffff08d`b39a59a0 fffff802`eaf90a19 : 00000000`0065fc00 00000000`00000000 00000000`00000001 fffff08d`b39a5ab0 : nt!CcFetchDataForRead+0xee
    fffff08d`b39a5a00 fffff802`eab3c7ae : ffffd68d`24c68770 00000000`0065fc00 ffffd68d`00020400 fffff807`9139a401 : nt!CcMapAndCopyFromCache+0xd9
    fffff08d`b39a5aa0 fffff807`9147c653 : fffff08d`b39a5bd0 00000000`00000000 ffffd68d`00000400 00000000`00000400 : nt!CcCopyReadEx+0x12e
    fffff08d`b39a5b30 fffff807`8f807a4b : 00000000`000002b0 00000000`00000000 00000000`0000000f ffff8280`1fd9ea40 : Ntfs!NtfsCopyReadA+0x273
    fffff08d`b39a5df0 fffff807`8f805017 : fffff08d`b39a5ee0 ffffd68d`15b24500 ffffd68d`2525b110 ffffd68d`2525b010 : FLTMGR!FltpPerformFastIoCall+0x10b
    fffff08d`b39a5e50 fffff807`8f83b7c9 : fffff08d`b39a6370 fffff08d`b39a6278 fffff08d`b39a6140 00000000`00000000 : FLTMGR!FltpPassThroughFastIo+0xc7
    fffff08d`b39a5eb0 fffff802`eafa2c4b : ffffd68d`15b24510 fffff08d`b39a62d0 00000000`00000001 ffffd68d`15b24510 : FLTMGR!FltpFastIoRead+0x159
    fffff08d`b39a5f50 fffff802`eac49743 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x44b
    fffff08d`b39a6050 fffff802`eac3cac0 : fffff807`90582f84 fffff08d`b39a6380 00000000`00000002 00000000`00001980 : nt!KiSystemServiceCopyEnd+0x13
    fffff08d`b39a6258 fffff807`90582f84 : fffff08d`b39a6380 00000000`00000002 00000000`00001980 ffff8280`0fb34088 : nt!KiServiceLinkage
    fffff08d`b39a6260 fffff08d`b39a6380 : 00000000`00000002 00000000`00001980 ffff8280`0fb34088 fffff08d`b39a62b0 : symefasi+0x182f84
    fffff08d`b39a6268 00000000`00000002 : 00000000`00001980 ffff8280`0fb34088 fffff08d`b39a62b0 ffff8280`1fd9ea40 : 0xfffff08d`b39a6380
    fffff08d`b39a6270 00000000`00001980 : ffff8280`0fb34088 fffff08d`b39a62b0 ffff8280`1fd9ea40 ffff8280`00000400 : 0x2
    fffff08d`b39a6278 ffff8280`0fb34088 : fffff08d`b39a62b0 ffff8280`1fd9ea40 ffff8280`00000400 fffff08d`b39a62d0 : 0x1980
    fffff08d`b39a6280 fffff08d`b39a62b0 : ffff8280`1fd9ea40 ffff8280`00000400 fffff08d`b39a62d0 00000000`00000000 : 0xffff8280`0fb34088
    fffff08d`b39a6288 ffff8280`1fd9ea40 : ffff8280`00000400 fffff08d`b39a62d0 00000000`00000000 00000000`00000000 : 0xfffff08d`b39a62b0
    fffff08d`b39a6290 ffff8280`00000400 : fffff08d`b39a62d0 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff8280`1fd9ea40
    fffff08d`b39a6298 fffff08d`b39a62d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff8280`00000400
    fffff08d`b39a62a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff08d`b39a62d0


    THREAD_SHA1_HASH_MOD_FUNC:  d3620bf2079869f91c645089a37f0ea08803cc9a

    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a928f7af7a7618892c1dcd517e8498a6aaf369a3

    THREAD_SHA1_HASH_MOD:  032814ee8b4188cccc6657dd3f4201004202f84e

    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+27f
    fffff802`eac4557f 90              nop

    FAULT_INSTR_CODE:  6666c390

    SYMBOL_STACK_INDEX:  2

    SYMBOL_NAME:  nt!KiDoubleFaultAbort+27f

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  5c5a45ab

    IMAGE_VERSION:  10.0.17134.590

    STACK_COMMAND:  .thread ; .cxr ; kb

    BUCKET_ID_FUNC_OFFSET:  27f

    FAILURE_BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort

    BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort

    PRIMARY_PROBLEM_CLASS:  0x7f_8_nt!KiDoubleFaultAbort

    TARGET_TIME:  2019-02-26T02:46:58.000Z

    OSBUILD:  17134

    OSSERVICEPACK:  590

    SERVICEPACK_NUMBER: 0

    OS_REVISION: 0

    SUITE_MASK:  272

    PRODUCT_TYPE:  1

    OSPLATFORM_TYPE:  x64

    OSNAME:  Windows 10

    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

    OS_LOCALE:  

    USER_LCID:  0

    OSBUILD_TIMESTAMP:  2019-02-06 11:25:47

    BUILDDATESTAMP_STR:  180410-1804

    BUILDLAB_STR:  rs4_release

    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804

    ANALYSIS_SESSION_ELAPSED_TIME:  4105

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:0x7f_8_nt!kidoublefaultabort

    FAILURE_ID_HASH:  {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}

    Followup:     MachineOwner
    ---------

    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: ffffc181ebd4bf50
    Arg3: fffff08db39a4fc0
    Arg4: fffff80791389b9b

    Debugging Details:
    ------------------


    KEY_VALUES_STRING: 1


    STACKHASH_ANALYSIS: 1

    TIMELINE_ANALYSIS: 1


    DUMP_CLASS: 1

    DUMP_QUALIFIER: 400

    BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804

    SYSTEM_MANUFACTURER:  LG Electronics

    SYSTEM_PRODUCT_NAME:  Z70SV.AS55B2E

    SYSTEM_SKU:  To be filled by O.E.M.

    SYSTEM_VERSION:  TA001

    BIOS_VENDOR:  American Megatrends Inc.

    BIOS_VERSION:  CVF07

    BIOS_DATE:  04/27/2015

    BASEBOARD_MANUFACTURER:  MICRO-STAR INTERNATIONAL CO., LTD

    BASEBOARD_PRODUCT:  MS-7886

    BASEBOARD_VERSION:  1.0

    DUMP_TYPE:  2

    BUGCHECK_P1: 8

    BUGCHECK_P2: ffffc181ebd4bf50

    BUGCHECK_P3: fffff08db39a4fc0

    BUGCHECK_P4: fffff80791389b9b

    BUGCHECK_STR:  0x7f_8

    TRAP_FRAME:  ffffc181ebd4bf50 -- (.trap 0xffffc181ebd4bf50)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff08db39a5068 rbx=0000000000000000 rcx=ffffd68d1df92228
    rdx=ffff82800fd2a630 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80791389b9b rsp=fffff08db39a4fc0 rbp=0000000000000000
     r8=000000000000065f  r9=fffff08db39a5138 r10=0000000000000000
    r11=ffffd68d1df92228 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    Ntfs!NtfsLookupAllocation+0x3b:
    fffff807`91389b9b 4c89542430      mov     qword ptr [rsp+30h],r10 ss:0018:fffff08d`b39a4ff0=????????????????
    Resetting default scope

    CPU_COUNT: 4

    CPU_MHZ: cdc

    CPU_VENDOR:  GenuineIntel

    CPU_FAMILY: 6

    CPU_MODEL: 3c

    CPU_STEPPING: 3

    CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 22'00000000 (cache) 22'00000000 (init)

    BLACKBOXBSD: 1 (!blackboxbsd)


    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    PROCESS_NAME:  dwm.exe

    CURRENT_IRQL:  0

    ANALYSIS_SESSION_HOST:  ¾ç¿µÁØ

    ANALYSIS_SESSION_TIME:  02-26-2019 13:46:16.0176

    ANALYSIS_VERSION: 10.0.17763.1 x86fre

    STACK_OVERFLOW: Stack Limit: fffff08db39a5000. Use (kF) and (!stackusage) to investigate stack usage.

    LAST_CONTROL_TRANSFER:  from fffff802eac49c69 to fffff802eac390c0

    STACK_TEXT:  
    ffffc181`ebd4be08 fffff802`eac49c69 : 00000000`0000007f 00000000`00000008 ffffc181`ebd4bf50 fffff08d`b39a4fc0 : nt!KeBugCheckEx
    ffffc181`ebd4be10 fffff802`eac4557f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    ffffc181`ebd4bf50 fffff807`91389b9b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x27f
    fffff08d`b39a4fc0 fffff807`9138931c : ffffd68d`1df92228 ffff8280`0fd2a630 00000000`0000065f fffff08d`b39a5138 : Ntfs!NtfsLookupAllocation+0x3b
    fffff08d`b39a5070 fffff807`91388a65 : ffffd68d`1df92228 ffffd68d`1d2bf6b0 ffffd68d`1a72bea8 ffffd68d`1d2bf6b0 : Ntfs!NtfsPrepareSimpleBuffers+0x19c
    fffff08d`b39a51e0 fffff807`91387b98 : ffffd68d`1a72bea8 fffff08d`b39a5290 ffffd68d`1df92228 00000000`0065f000 : Ntfs!NtfsPrepareBuffers+0xc5
    fffff08d`b39a5250 fffff807`913982df : 00000000`0065f000 00000000`00000001 fffff08d`b39a5640 00000000`00000000 : Ntfs!NtfsNonCachedIo+0x2c8
    fffff08d`b39a5420 fffff807`91396238 : ffffd68d`1df92228 ffffd68d`1d2bf6b0 00000002`00000700 ffff8280`0fd2a6c0 : Ntfs!NtfsCommonRead+0x1eaf
    fffff08d`b39a5610 fffff802`eab27e89 : ffffd68d`24c566f0 ffffd68d`1d2bf6b0 ffffd68d`1d2bf6b0 ffffd68d`16748860 : Ntfs!NtfsFsdRead+0x1d8
    fffff08d`b39a56d0 fffff807`8f807207 : fffff08d`b39a57a0 fffff807`8f8053b4 00000000`00000000 00000000`00000003 : nt!IofCallDriver+0x59
    fffff08d`b39a5710 fffff807`8f8051c6 : fffff08d`b39a57a0 00000000`00000000 00002001`953a18c0 fffff802`eab01c62 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x157
    fffff08d`b39a5780 fffff802`eab27e89 : ffffd68d`1d2bf6b0 fffff802`eab28155 ffffd68d`1d2bf6b0 fffff802`eab74f04 : FLTMGR!FltpDispatch+0xb6
    fffff08d`b39a57e0 fffff802`eab759c8 : ffffd68d`1d2bf6b0 ffffd68d`16748860 ffffd68d`152e6af0 0000001d`00000000 : nt!IofCallDriver+0x59
    fffff08d`b39a5820 fffff802`eab75834 : ffffd68d`152e6aa0 ffffd68d`196ab280 ffffd68d`152e6b00 ffffd68d`152e6ba8 : nt!IoPageReadEx+0x188
    fffff08d`b39a5870 fffff802`eafa771f : ffffd68d`152e6aa0 ffffd68d`196ab280 ffffd68d`152e6ba8 ffffd68d`152e6aa0 : nt!MiPageRead+0x28
    fffff08d`b39a58c0 fffff802`eafa6db5 : ffffd68d`1b100560 00000000`00000000 ffffd68d`ffffffff 00000000`00000000 : nt!MiPfExecuteReadList+0xd7
    fffff08d`b39a5940 fffff802`eab3ca4e : 00000000`0065f000 00000000`00001000 ffffd68d`1b100560 ffffb08c`7d9df000 : nt!MmPrefetchForCacheManager+0xdd
    fffff08d`b39a59a0 fffff802`eaf90a19 : 00000000`0065fc00 00000000`00000000 00000000`00000001 fffff08d`b39a5ab0 : nt!CcFetchDataForRead+0xee
    fffff08d`b39a5a00 fffff802`eab3c7ae : ffffd68d`24c68770 00000000`0065fc00 ffffd68d`00020400 fffff807`9139a401 : nt!CcMapAndCopyFromCache+0xd9
    fffff08d`b39a5aa0 fffff807`9147c653 : fffff08d`b39a5bd0 00000000`00000000 ffffd68d`00000400 00000000`00000400 : nt!CcCopyReadEx+0x12e
    fffff08d`b39a5b30 fffff807`8f807a4b : 00000000`000002b0 00000000`00000000 00000000`0000000f ffff8280`1fd9ea40 : Ntfs!NtfsCopyReadA+0x273
    fffff08d`b39a5df0 fffff807`8f805017 : fffff08d`b39a5ee0 ffffd68d`15b24500 ffffd68d`2525b110 ffffd68d`2525b010 : FLTMGR!FltpPerformFastIoCall+0x10b
    fffff08d`b39a5e50 fffff807`8f83b7c9 : fffff08d`b39a6370 fffff08d`b39a6278 fffff08d`b39a6140 00000000`00000000 : FLTMGR!FltpPassThroughFastIo+0xc7
    fffff08d`b39a5eb0 fffff802`eafa2c4b : ffffd68d`15b24510 fffff08d`b39a62d0 00000000`00000001 ffffd68d`15b24510 : FLTMGR!FltpFastIoRead+0x159
    fffff08d`b39a5f50 fffff802`eac49743 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x44b
    fffff08d`b39a6050 fffff802`eac3cac0 : fffff807`90582f84 fffff08d`b39a6380 00000000`00000002 00000000`00001980 : nt!KiSystemServiceCopyEnd+0x13
    fffff08d`b39a6258 fffff807`90582f84 : fffff08d`b39a6380 00000000`00000002 00000000`00001980 ffff8280`0fb34088 : nt!KiServiceLinkage
    fffff08d`b39a6260 fffff08d`b39a6380 : 00000000`00000002 00000000`00001980 ffff8280`0fb34088 fffff08d`b39a62b0 : symefasi+0x182f84
    fffff08d`b39a6268 00000000`00000002 : 00000000`00001980 ffff8280`0fb34088 fffff08d`b39a62b0 ffff8280`1fd9ea40 : 0xfffff08d`b39a6380
    fffff08d`b39a6270 00000000`00001980 : ffff8280`0fb34088 fffff08d`b39a62b0 ffff8280`1fd9ea40 ffff8280`00000400 : 0x2
    fffff08d`b39a6278 ffff8280`0fb34088 : fffff08d`b39a62b0 ffff8280`1fd9ea40 ffff8280`00000400 fffff08d`b39a62d0 : 0x1980
    fffff08d`b39a6280 fffff08d`b39a62b0 : ffff8280`1fd9ea40 ffff8280`00000400 fffff08d`b39a62d0 00000000`00000000 : 0xffff8280`0fb34088
    fffff08d`b39a6288 ffff8280`1fd9ea40 : ffff8280`00000400 fffff08d`b39a62d0 00000000`00000000 00000000`00000000 : 0xfffff08d`b39a62b0
    fffff08d`b39a6290 ffff8280`00000400 : fffff08d`b39a62d0 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff8280`1fd9ea40
    fffff08d`b39a6298 fffff08d`b39a62d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffff8280`00000400
    fffff08d`b39a62a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff08d`b39a62d0


    THREAD_SHA1_HASH_MOD_FUNC:  d3620bf2079869f91c645089a37f0ea08803cc9a

    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  a928f7af7a7618892c1dcd517e8498a6aaf369a3

    THREAD_SHA1_HASH_MOD:  032814ee8b4188cccc6657dd3f4201004202f84e

    FOLLOWUP_IP: 
    nt!KiDoubleFaultAbort+27f
    fffff802`eac4557f 90              nop

    FAULT_INSTR_CODE:  6666c390

    SYMBOL_STACK_INDEX:  2

    SYMBOL_NAME:  nt!KiDoubleFaultAbort+27f

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  5c5a45ab

    IMAGE_VERSION:  10.0.17134.590

    STACK_COMMAND:  .thread ; .cxr ; kb

    BUCKET_ID_FUNC_OFFSET:  27f

    FAILURE_BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort

    BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort

    PRIMARY_PROBLEM_CLASS:  0x7f_8_nt!KiDoubleFaultAbort

    TARGET_TIME:  2019-02-26T02:46:58.000Z

    OSBUILD:  17134

    OSSERVICEPACK:  590

    SERVICEPACK_NUMBER: 0

    OS_REVISION: 0

    SUITE_MASK:  272

    PRODUCT_TYPE:  1

    OSPLATFORM_TYPE:  x64

    OSNAME:  Windows 10

    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

    OS_LOCALE:  

    USER_LCID:  0

    OSBUILD_TIMESTAMP:  2019-02-06 11:25:47

    BUILDDATESTAMP_STR:  180410-1804

    BUILDLAB_STR:  rs4_release

    BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804

    ANALYSIS_SESSION_ELAPSED_TIME:  9c92

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:0x7f_8_nt!kidoublefaultabort

    FAILURE_ID_HASH:  {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}

    Followup:     MachineOwner
    ---------

    2: kd> lmvm nt
    Browse full module list
    start             end                 module name
    fffff802`eaa8f000 fffff802`eb3e2000   nt         (pdb symbols)          C:\ProgramData\dbg\sym\ntkrnlmp.pdb\CF49BB63D8A249D79D97A5F33C8712B51\ntkrnlmp.pdb
        Loaded symbol image file: ntkrnlmp.exe
        Mapped memory image file: C:\ProgramData\dbg\sym\ntoskrnl.exe\5C5A45AB953000\ntoskrnl.exe
        Image path: ntkrnlmp.exe
        Image name: ntkrnlmp.exe
        Browse all global symbols  functions  data
        Timestamp:        Tue Feb  5 19:25:47 2019 (5C5A45AB)
        CheckSum:         008B0B48
        ImageSize:        00953000
        File version:     10.0.17134.590
        Product version:  10.0.17134.590
        File flags:       0 (Mask 3F)
        File OS:          40004 NT Win32
        File type:        1.0 App
        File date:        00000000.00000000
        Translations:     0409.04b0
        Information from resource tables:
            CompanyName:      Microsoft Corporation
            ProductName:      Microsoft® Windows® Operating System
            InternalName:     ntkrnlmp.exe
            OriginalFilename: ntkrnlmp.exe
            ProductVersion:   10.0.17134.590
            FileVersion:      10.0.17134.590 (WinBuild.160101.0800)
            FileDescription:  NT Kernel & System
            LegalCopyright:   © Microsoft Corporation. All rights reserved.
    2: kd> .trap 0xffffc181ebd4bf50
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff08db39a5068 rbx=0000000000000000 rcx=ffffd68d1df92228
    rdx=ffff82800fd2a630 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80791389b9b rsp=fffff08db39a4fc0 rbp=0000000000000000
     r8=000000000000065f  r9=fffff08db39a5138 r10=0000000000000000
    r11=ffffd68d1df92228 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    Ntfs!NtfsLookupAllocation+0x3b:
    fffff807`91389b9b 4c89542430      mov     qword ptr [rsp+30h],r10 ss:0018:fffff08d`b39a4ff0=????????????????

    2019년 2월 26일 화요일 오전 4:55

모든 응답