well this particular badb0d00 in KiXXXXX is used as marker
google can show you many asserts (_KTRAP_FRAME->DbgArgmark)
a simple pattern searching in windbg can yield many badbod00’s in
almost all Kitraps
lkd> lm m nt
start end module name
804d7000 806cf980 nt (pdb symbols)
f:\symbols\ntkrnlpa.pdb\4BF71966DA15428C9532FDC1F6886F571\ntkrnlpa.pdb
lkd> # badb0d00 804d7000 L?(806cf980-804d7000)
nt!KiCallUserMode+0xda:
804ff776 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiSystemService+0x57:
8053d4f8 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiFastCallEntry+0x7f:
8053d5df c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiGetTickCount+0xab:
8053daa9 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiSetLowWaitHighThread+0x57:
8053dcf7 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiUnexpectedInterruptTail+0x8d:
8053de84 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap00+0x4c:
8053e208 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap01+0x4c:
8053e380 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiDebugService+0x4c:
8053e62c c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap03+0x4c:
8053e750 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap04+0x4c:
8053e8d0 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap05+0x4c:
8053ea2c c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap06+0x4c2:
8053f016 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap07+0x4c:
8053f208 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap09+0x4c:
8053f62c c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap0A+0x4a:
8053f74a c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap0B+0x4a:
8053f88a c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap0C+0x4a:
8053fae6 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap0D+0x187:
8053ff07 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap0E+0x4a:
805404d2 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap0F+0x4c:
80540804 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap10+0x4c:
80540924 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap11+0x4a:
80540a5a c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiTrap13+0x4c:
80540bc4 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
nt!KiInterruptTemplate+0x83:
8054165d c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d0db3 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d11eb c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d1383 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d153f c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d1867 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d1a03 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d1cef c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d1f8b c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d21ad c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d24e3 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d2683 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d2a4b c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d2bef c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
806d37d2 c74508000ddbba mov dword ptr [ebp+8],0BADB0D00h
On 12/21/12, Tim Roberts wrote:
> Adam Thompson wrote:
>>
>> I have noticed the address 0xbadb0d00 appearing quite frequently on
>> various different crash dump stack traces from different servers.
>>
>> Is there something special about this address?
>> …
>> I’m wondering where this address came from, and why it appears to
>> often. I thought it might have been some sort of ‘magic number’ (ala
>> http://en.wikipedia.org/wiki/Magic_number_(programming)), but I
>> can’t find any reference to it.
>>
>> Am I just reading too much into this particular hex string because it
>> looks a bit like “Bad Bod”, or is there some reason for it?
>
> Both. That value is used to initialize uninitialized memory in some
> circumstances, because it is so easily identified in debugging dumps.
>
> Personally, I usually use 0xdeadbeef or 0xfeedf00d…
>
> –
> Tim Roberts, xxxxx@probo.com
> Providenza & Boekelheide, Inc.
>
>
> —
> WINDBG is sponsored by OSR
>
> For our schedule of WDF, WDM, debugging and other seminars visit:
> http://www.osr.com/seminars
>
> To unsubscribe, visit the List Server section of OSR Online at
> http://www.osronline.com/page.cfm?name=ListServer
>