[ros-bugs] [Bug 1263] KDB bugchecks with a pagefault debugging
Xming hang.
ReactOS.Bugzilla at reactos.org
ReactOS.Bugzilla at reactos.org
Mon Jan 9 21:40:57 CET 2006
http://www.reactos.org/bugzilla/show_bug.cgi?id=1263
------- Additional Comments From waxdragon at gmail.com 2006-01-09 21:40 CET -------
Thread->Tcb.TrapFrame is 0x3b?
Entered debugger on embedded INT3 at 0x0008:0x80074670.
kdb:> proc list
PID State Filename
*0x00000004 In Memory System
0x00000050 In Memory smss.exe
0x0000006c In Memory csrss.exe
0x00000090 In Memory winlogon.exe
0x000000ac In Memory services.exe
0x000000bc In Memory eventlog.exe
0x000000cc In Memory umpnpmgr.exe
0x000000e0 In Memory dhcp.exe
0x0000010c In Memory userinit.exe
0x00000120 In Memory cmd.exe
0x0000012c In Memory Xming.exe
kdb:> proc attach 0x120
(ntoskrnl/kdbg/kdb.c:1054) Process = 81603b18
(ntoskrnl/kdbg/kdb.c:1055) Thread = 81601d48
(ntoskrnl/kdbg/kdb.c:1056) Thread->Tcb.TrapFrame = 9fd29d64
(ntoskrnl/kdbg/kdb.c:1057) KdbThreadTrapFrame = 00000000
(ntoskrnl/kdbg/kdb.c:1058) &KdbThreadTrapFrame = 800ccc90
(ntoskrnl/kdbg/kdb.c:1059) KdbCurrentTrapFrame = 800ccd40
(ntoskrnl/kdbg/kdb.c:1060) &KdbCurrentTrapFrame = 800ccc70
(ntoskrnl/kdbg/kdb.c:1062) KdbThreadTrapFrame = 00699a94
(ntoskrnl/kdbg/kdb.c:1063) &KdbThreadTrapFrame = 800ccc90
Attached to process 0x00000120, thread 0x00000124.
kdb:> proc attach 0x12c
(ntoskrnl/kdbg/kdb.c:1054) Process = 817110e8
(ntoskrnl/kdbg/kdb.c:1055) Thread = 81719558
(ntoskrnl/kdbg/kdb.c:1056) Thread->Tcb.TrapFrame = 0000003b
(ntoskrnl/kdbg/kdb.c:1057) KdbThreadTrapFrame = 00699a94
(ntoskrnl/kdbg/kdb.c:1058) &KdbThreadTrapFrame = 800ccc90
(ntoskrnl/kdbg/kdb.c:1059) KdbCurrentTrapFrame = 800ccc90
(ntoskrnl/kdbg/kdb.c:1060) &KdbCurrentTrapFrame = 800ccc70
Entered debugger on last-chance exception number 14 (Page Fault)
Memory at 0x0000003b could not be read: Page not present.
KeBugCheckWithTf at ntoskrnl/ke/i386/exp.c:1242
A problem has been detected and ReactOS has been shut down to prevent damage to
your computer.
The problem seems to be caused by the following file: ntoskrnl.exe
Technical information:
*** STOP: 0x0000001E (0xc0000005,0x80085cf1,0x00000000,0x0000003b)
*** ntoskrnl.exe - Address 0x80085cf1 base at 0x80000000, DateStamp 0x0
Page Fault Exception: 14(0)
Processor: 0 CS:EIP 8:80085cf1 <ntoskrnl.exe:85cf1
(lib/string/i386/memcpy_asm.s:35 (memcpy))>
cr2 3b cr3 1d75f000 Proc: 81603b18 Pid: 120 <cmd.exe> Thrd: 80c099f8 Tid: 24
DS 23 ES 23 FS 30 GS 0
EAX: 0000003b EBX: 800ccc90 ECX: 0000001d
EDX: 00000074 EBP: 800d2170 ESI: 0000003b ESP: 800d20f4
EDI: 800ccc90 EFLAGS: 00010016 kESP 800d20f4 kernel stack base 800cf240
Frames:
<ntoskrnl.exe:69689 (ntoskrnl/kdbg/kdb.c:0 ())>
<ntoskrnl.exe:6a8f1 (ntoskrnl/kdbg/kdb.c:1062 (KdbpAttachToThread))>
<ntoskrnl.exe:6aa9f (ntoskrnl/kdbg/kdb.c:1123 (KdbpAttachToProcess))>
<ntoskrnl.exe:6c92a (ntoskrnl/kdbg/kdb_cli.c:1112 (KdbpCmdProc))>
<ntoskrnl.exe:6dcfc (ntoskrnl/kdbg/kdb_cli.c:2178 (KdbpDoCommand))>
<ntoskrnl.exe:6e3ad (ntoskrnl/kdbg/kdb_cli.c:2238 (KdbpCliMainLoop))>
<ntoskrnl.exe:6aad1 (ntoskrnl/kdbg/kdb.c:1131 (KdbpCallMainLoop))>
<ntoskrnl.exe:695fd (ntoskrnl/kdbg/i386/kdb_help.S:134 (KdbpStackSwitchAndCall))>
Entered debugger on embedded INT3 at 0x0008:0x80074676.
--
Configure bugmail: http://www.reactos.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
You are the QA contact for the bug, or are watching the QA contact.
More information about the Ros-bugs
mailing list