Advertisement
Guest User

Untitled

a guest
Sep 28th, 2014
76
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.86 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Users\Freddy\Desktop\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Only kernel address space is available
  8.  
  9.  
  10. ************* Symbol Path validation summary **************
  11. Response Time (ms) Location
  12. OK c:\symbols\private
  13. Deferred srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
  14.  
  15. ************* Symbol Path validation summary **************
  16. Response Time (ms) Location
  17. OK c:\symbols\private
  18. Deferred srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
  19. Symbol search path is: c:\symbols\private;srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
  20. Executable search path is:
  21. Windows 8 Kernel Version 9600 MP (4 procs) Free x64
  22. Product: WinNt, suite: TerminalServer SingleUserTS
  23. Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
  24. Machine Name:
  25. Kernel base = 0xfffff800`4de7a000 PsLoadedModuleList = 0xfffff800`4e13e990
  26. Debug session time: Sun Sep 28 14:19:30.337 2014 (UTC + 2:00)
  27. System Uptime: 1 days 21:46:05.984
  28. Loading Kernel Symbols
  29. ...............................................................
  30. ................................................................
  31. .................Page 2179da not present in the dump file. Type ".hh dbgerr004" for details
  32. ........
  33. Loading User Symbols
  34. PEB is paged out (Peb.Ldr = 00007ff6`d7075018). Type ".hh dbgerr001" for details
  35. Loading unloaded module list
  36. .................
  37. *******************************************************************************
  38. * *
  39. * Bugcheck Analysis *
  40. * *
  41. *******************************************************************************
  42.  
  43. Use !analyze -v to get detailed debugging information.
  44.  
  45. BugCheck 7F, {8, fffff8004fad6e70, 1, fffff80002042cb7}
  46.  
  47. *** ERROR: Symbol file could not be found. Defaulted to export symbols for nvlddmkm.sys -
  48. Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
  49. Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
  50. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  51. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  52. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  53. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  54. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  55. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  56. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  57. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  58. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  59. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  60. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  61. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  62. Probably caused by : nvlddmkm.sys ( nvlddmkm+3fcb7 )
  63.  
  64. Followup: MachineOwner
  65. ---------
  66.  
  67. 0: kd> !analyze -v
  68. *******************************************************************************
  69. * *
  70. * Bugcheck Analysis *
  71. * *
  72. *******************************************************************************
  73.  
  74. UNEXPECTED_KERNEL_MODE_TRAP (7f)
  75. This means a trap occurred in kernel mode, and it's a trap of a kind
  76. that the kernel isn't allowed to have/catch (bound trap) or that
  77. is always instant death (double fault). The first number in the
  78. bugcheck params is the number of the trap (8 = double fault, etc)
  79. Consult an Intel x86 family manual to learn more about what these
  80. traps are. Here is a *portion* of those codes:
  81. If kv shows a taskGate
  82. use .tss on the part before the colon, then kv.
  83. Else if kv shows a trapframe
  84. use .trap on that value
  85. Else
  86. .trap on the appropriate frame will show where the trap was taken
  87. (on x86, this will be the ebp that goes with the procedure KiTrap)
  88. Endif
  89. kb will then show the corrected stack.
  90. Arguments:
  91. Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
  92. Arg2: fffff8004fad6e70
  93. Arg3: 0000000000000001
  94. Arg4: fffff80002042cb7
  95.  
  96. Debugging Details:
  97. ------------------
  98.  
  99. Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
  100. Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
  101. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  102. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  103. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  104. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  105. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  106. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  107. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  108. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  109. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  110. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  111. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  112. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  113.  
  114. BUGCHECK_STR: 0x7f_8
  115.  
  116. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  117.  
  118. PROCESS_NAME: nvxdsync.exe
  119.  
  120. CURRENT_IRQL: 0
  121.  
  122. ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
  123.  
  124. LAST_CONTROL_TRANSFER: from fffff8004dfd37e9 to fffff8004dfc7ca0
  125.  
  126. STACK_TEXT:
  127. fffff800`4fad6d28 fffff800`4dfd37e9 : 00000000`0000007f 00000000`00000008 fffff800`4fad6e70 00000000`00000001 : nt!KeBugCheckEx
  128. fffff800`4fad6d30 fffff800`4dfd18f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  129. fffff800`4fad6e70 fffff800`02042cb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb4
  130. 00000000`00000001 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x3fcb7
  131.  
  132.  
  133. STACK_COMMAND: kb
  134.  
  135. FOLLOWUP_IP:
  136. nvlddmkm+3fcb7
  137. fffff800`02042cb7 c744242848000000 mov dword ptr [rsp+28h],48h
  138.  
  139. SYMBOL_STACK_INDEX: 3
  140.  
  141. SYMBOL_NAME: nvlddmkm+3fcb7
  142.  
  143. FOLLOWUP_NAME: MachineOwner
  144.  
  145. MODULE_NAME: nvlddmkm
  146.  
  147. IMAGE_NAME: nvlddmkm.sys
  148.  
  149. DEBUG_FLR_IMAGE_TIMESTAMP: 53b4446a
  150.  
  151. FAILURE_BUCKET_ID: 0x7f_8_nvlddmkm+3fcb7
  152.  
  153. BUCKET_ID: 0x7f_8_nvlddmkm+3fcb7
  154.  
  155. ANALYSIS_SOURCE: KM
  156.  
  157. FAILURE_ID_HASH_STRING: km:0x7f_8_nvlddmkm+3fcb7
  158.  
  159. FAILURE_ID_HASH: {260ae38f-98d5-204d-6409-f549a19f06b9}
  160.  
  161. Followup: MachineOwner
  162. ---------
  163.  
  164. 0: kd> !sym
  165. !sym <noisy/quiet - prompts/prompts off> - quiet mode - symbol prompts on
  166. 0: kd> !sym noisy
  167. noisy mode - symbol prompts on
  168. 0: kd> !analyze -v
  169. *******************************************************************************
  170. * *
  171. * Bugcheck Analysis *
  172. * *
  173. *******************************************************************************
  174.  
  175. UNEXPECTED_KERNEL_MODE_TRAP (7f)
  176. This means a trap occurred in kernel mode, and it's a trap of a kind
  177. that the kernel isn't allowed to have/catch (bound trap) or that
  178. is always instant death (double fault). The first number in the
  179. bugcheck params is the number of the trap (8 = double fault, etc)
  180. Consult an Intel x86 family manual to learn more about what these
  181. traps are. Here is a *portion* of those codes:
  182. If kv shows a taskGate
  183. use .tss on the part before the colon, then kv.
  184. Else if kv shows a trapframe
  185. use .trap on that value
  186. Else
  187. .trap on the appropriate frame will show where the trap was taken
  188. (on x86, this will be the ebp that goes with the procedure KiTrap)
  189. Endif
  190. kb will then show the corrected stack.
  191. Arguments:
  192. Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
  193. Arg2: fffff8004fad6e70
  194. Arg3: 0000000000000001
  195. Arg4: fffff80002042cb7
  196.  
  197. Debugging Details:
  198. ------------------
  199.  
  200. Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
  201. Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
  202. SYMSRV: c:\symbols\web\nvlddmkm.sys\53B4446Ac8e000\nvlddmkm.sys not found
  203. SYMSRV: c:\symbols\web\nvlddmkm.sys\53B4446Ac8e000\nvlddmkm.sys not found
  204. SYMSRV: http://msdl.microsoft.com/download/symbols/nvlddmkm.sys/53B4446Ac8e000/nvlddmkm.sys not found
  205. SYMSRV: http://msdl.microsoft.com/download/symbols/nvlddmkm.sys/53B4446Ac8e000/nvlddmkm.sys not found
  206. SYMSRV: c:\symbols\web\ntkrnlmp.exe\52718D9C781000\ntkrnlmp.exe not found
  207. SYMSRV: c:\symbols\web\ntkrnlmp.exe\52718D9C781000\ntkrnlmp.exe not found
  208. SYMSRV: http://msdl.microsoft.com/download/symbols/ntkrnlmp.exe/52718D9C781000/ntkrnlmp.exe not found
  209. SYMSRV: http://msdl.microsoft.com/download/symbols/ntkrnlmp.exe/52718D9C781000/ntkrnlmp.exe not found
  210. DBGHELP: c:\symbols\web\ntoskrnl.exe\52718D9C781000\ntoskrnl.exe - OK
  211. DBGHELP: c:\symbols\web\ntoskrnl.exe\52718D9C781000\ntoskrnl.exe - OK
  212. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  213. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  214. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  215. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  216. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  217. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  218. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  219. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  220. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  221. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  222. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  223. Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
  224.  
  225. BUGCHECK_STR: 0x7f_8
  226.  
  227. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  228.  
  229. PROCESS_NAME: nvxdsync.exe
  230.  
  231. CURRENT_IRQL: 0
  232.  
  233. ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
  234.  
  235. LAST_CONTROL_TRANSFER: from fffff8004dfd37e9 to fffff8004dfc7ca0
  236.  
  237. STACK_TEXT:
  238. fffff800`4fad6d28 fffff800`4dfd37e9 : 00000000`0000007f 00000000`00000008 fffff800`4fad6e70 00000000`00000001 : nt!KeBugCheckEx
  239. fffff800`4fad6d30 fffff800`4dfd18f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
  240. fffff800`4fad6e70 fffff800`02042cb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb4
  241. 00000000`00000001 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x3fcb7
  242.  
  243.  
  244. STACK_COMMAND: kb
  245.  
  246. FOLLOWUP_IP:
  247. nvlddmkm+3fcb7
  248. fffff800`02042cb7 c744242848000000 mov dword ptr [rsp+28h],48h
  249.  
  250. SYMBOL_STACK_INDEX: 3
  251.  
  252. SYMBOL_NAME: nvlddmkm+3fcb7
  253.  
  254. FOLLOWUP_NAME: MachineOwner
  255.  
  256. MODULE_NAME: nvlddmkm
  257.  
  258. IMAGE_NAME: nvlddmkm.sys
  259.  
  260. DEBUG_FLR_IMAGE_TIMESTAMP: 53b4446a
  261.  
  262. FAILURE_BUCKET_ID: 0x7f_8_nvlddmkm+3fcb7
  263.  
  264. BUCKET_ID: 0x7f_8_nvlddmkm+3fcb7
  265.  
  266. ANALYSIS_SOURCE: KM
  267.  
  268. FAILURE_ID_HASH_STRING: km:0x7f_8_nvlddmkm+3fcb7
  269.  
  270. FAILURE_ID_HASH: {260ae38f-98d5-204d-6409-f549a19f06b9}
  271.  
  272. Followup: MachineOwner
  273. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement