Hi people,
On working on a case, while debugging I got this as the bugcheck code which has been introduced lately in the latest Windows 8.1 according to the Carrona DRT. Here is the analysis of the Dump file :-
A simple google search also did not reveal anything except the links to the Carrona DRT where these are stated as added in Windows 8.1 . So could someone shed some light over this and how should I proceed to debug this? Dumps along with relevant info have been attached.
View attachment Lachanadan.zip
On working on a case, while debugging I got this as the bugcheck code which has been introduced lately in the latest Windows 8.1 according to the Carrona DRT. Here is the analysis of the Dump file :-
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_THREAD_PRIORITY_FLOOR_VIOLATION (157)
An illegal operation was attempted on the priority floor of a particular
thread.
Arguments:
Arg1: ffffe000d6aa2880, The address of the thread
Arg2: 0000000000000009, The target priority value
Arg3: 0000000000000002, The priority counter for the target priority underflowed
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x157
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from fffff801f25f66cd to fffff801f25dbfa0
STACK_TEXT:
ffffd000`21bd3858 fffff801`f25f66cd : 00000000`00000157 ffffe000`d6aa2880 00000000`00000009 00000000`00000002 : nt!KeBugCheckEx
ffffd000`21bd3860 fffff801`f24c4cb5 : 00000000`00000100 ffffd000`21bd3980 ffffe000`d6aa2880 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0xa21d
ffffd000`21bd38a0 fffff801`f24ecdaa : ffffe000`d6aa2ba0 00000000`00000000 00000000`00000000 ffffd000`21bd3980 : nt!KiAbThreadUnboostCpuPriority+0x39
ffffd000`21bd38d0 fffff801`f24eca45 : ffffd000`21c47943 00000000`00000000 ffffe000`d6a9e000 fffff801`00000000 : nt!KeAbEntryFree+0x66
ffffd000`21bd3900 fffff801`f24efa09 : ffffe000`0000004f ffffe000`d6aa2880 ffffe000`d6a39758 ffffd000`00000040 : nt!ExfAcquirePushLockExclusiveEx+0x1b5
ffffd000`21bd39c0 fffff801`f25e622f : 00000000`00000001 00000000`0341fdac 00000000`00000001 ffffd000`21bd3b00 : nt!MmAccessFault+0x7e9
ffffd000`21bd3b00 00000000`5fa356a7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
00000000`0341f744 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x5fa356a7
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+a21d
fffff801`f25f66cd cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+a21d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53388e13
IMAGE_VERSION: 6.3.9600.17085
BUCKET_ID_FUNC_OFFSET: a21d
FAILURE_BUCKET_ID: 0x157_nt!_??_::FNODOBFM::_string_
BUCKET_ID: 0x157_nt!_??_::FNODOBFM::_string_
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x157_nt!_??_::fnodobfm::_string_
FAILURE_ID_HASH: {68a86235-3c52-e42e-e778-31dc90dd5954}
Followup: MachineOwner
---------
A simple google search also did not reveal anything except the links to the Carrona DRT where these are stated as added in Windows 8.1 . So could someone shed some light over this and how should I proceed to debug this? Dumps along with relevant info have been attached.
View attachment Lachanadan.zip