Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\Freddy\Desktop\MEMORY.DMP]
- Kernel Bitmap Dump File: Only kernel address space is available
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- OK c:\symbols\private
- Deferred srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- OK c:\symbols\private
- Deferred srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
- Symbol search path is: c:\symbols\private;srv*c:\symbols\web*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 8 Kernel Version 9600 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
- Machine Name:
- Kernel base = 0xfffff800`4de7a000 PsLoadedModuleList = 0xfffff800`4e13e990
- Debug session time: Sun Sep 28 14:19:30.337 2014 (UTC + 2:00)
- System Uptime: 1 days 21:46:05.984
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- .................Page 2179da not present in the dump file. Type ".hh dbgerr004" for details
- ........
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 00007ff6`d7075018). Type ".hh dbgerr001" for details
- Loading unloaded module list
- .................
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 7F, {8, fffff8004fad6e70, 1, fffff80002042cb7}
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for nvlddmkm.sys -
- Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
- Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Probably caused by : nvlddmkm.sys ( nvlddmkm+3fcb7 )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- UNEXPECTED_KERNEL_MODE_TRAP (7f)
- This means a trap occurred in kernel mode, and it's a trap of a kind
- that the kernel isn't allowed to have/catch (bound trap) or that
- is always instant death (double fault). The first number in the
- bugcheck params is the number of the trap (8 = double fault, etc)
- Consult an Intel x86 family manual to learn more about what these
- traps are. Here is a *portion* of those codes:
- If kv shows a taskGate
- use .tss on the part before the colon, then kv.
- Else if kv shows a trapframe
- use .trap on that value
- Else
- .trap on the appropriate frame will show where the trap was taken
- (on x86, this will be the ebp that goes with the procedure KiTrap)
- Endif
- kb will then show the corrected stack.
- Arguments:
- Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
- Arg2: fffff8004fad6e70
- Arg3: 0000000000000001
- Arg4: fffff80002042cb7
- Debugging Details:
- ------------------
- Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
- Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- BUGCHECK_STR: 0x7f_8
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: nvxdsync.exe
- CURRENT_IRQL: 0
- ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
- LAST_CONTROL_TRANSFER: from fffff8004dfd37e9 to fffff8004dfc7ca0
- STACK_TEXT:
- fffff800`4fad6d28 fffff800`4dfd37e9 : 00000000`0000007f 00000000`00000008 fffff800`4fad6e70 00000000`00000001 : nt!KeBugCheckEx
- fffff800`4fad6d30 fffff800`4dfd18f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff800`4fad6e70 fffff800`02042cb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb4
- 00000000`00000001 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x3fcb7
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nvlddmkm+3fcb7
- fffff800`02042cb7 c744242848000000 mov dword ptr [rsp+28h],48h
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nvlddmkm+3fcb7
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nvlddmkm
- IMAGE_NAME: nvlddmkm.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 53b4446a
- FAILURE_BUCKET_ID: 0x7f_8_nvlddmkm+3fcb7
- BUCKET_ID: 0x7f_8_nvlddmkm+3fcb7
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x7f_8_nvlddmkm+3fcb7
- FAILURE_ID_HASH: {260ae38f-98d5-204d-6409-f549a19f06b9}
- Followup: MachineOwner
- ---------
- 0: kd> !sym
- !sym <noisy/quiet - prompts/prompts off> - quiet mode - symbol prompts on
- 0: kd> !sym noisy
- noisy mode - symbol prompts on
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- UNEXPECTED_KERNEL_MODE_TRAP (7f)
- This means a trap occurred in kernel mode, and it's a trap of a kind
- that the kernel isn't allowed to have/catch (bound trap) or that
- is always instant death (double fault). The first number in the
- bugcheck params is the number of the trap (8 = double fault, etc)
- Consult an Intel x86 family manual to learn more about what these
- traps are. Here is a *portion* of those codes:
- If kv shows a taskGate
- use .tss on the part before the colon, then kv.
- Else if kv shows a trapframe
- use .trap on that value
- Else
- .trap on the appropriate frame will show where the trap was taken
- (on x86, this will be the ebp that goes with the procedure KiTrap)
- Endif
- kb will then show the corrected stack.
- Arguments:
- Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
- Arg2: fffff8004fad6e70
- Arg3: 0000000000000001
- Arg4: fffff80002042cb7
- Debugging Details:
- ------------------
- Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
- Page 219bc0 not present in the dump file. Type ".hh dbgerr004" for details
- SYMSRV: c:\symbols\web\nvlddmkm.sys\53B4446Ac8e000\nvlddmkm.sys not found
- SYMSRV: c:\symbols\web\nvlddmkm.sys\53B4446Ac8e000\nvlddmkm.sys not found
- SYMSRV: http://msdl.microsoft.com/download/symbols/nvlddmkm.sys/53B4446Ac8e000/nvlddmkm.sys not found
- SYMSRV: http://msdl.microsoft.com/download/symbols/nvlddmkm.sys/53B4446Ac8e000/nvlddmkm.sys not found
- SYMSRV: c:\symbols\web\ntkrnlmp.exe\52718D9C781000\ntkrnlmp.exe not found
- SYMSRV: c:\symbols\web\ntkrnlmp.exe\52718D9C781000\ntkrnlmp.exe not found
- SYMSRV: http://msdl.microsoft.com/download/symbols/ntkrnlmp.exe/52718D9C781000/ntkrnlmp.exe not found
- SYMSRV: http://msdl.microsoft.com/download/symbols/ntkrnlmp.exe/52718D9C781000/ntkrnlmp.exe not found
- DBGHELP: c:\symbols\web\ntoskrnl.exe\52718D9C781000\ntoskrnl.exe - OK
- DBGHELP: c:\symbols\web\ntoskrnl.exe\52718D9C781000\ntoskrnl.exe - OK
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- Page 21a000 not present in the dump file. Type ".hh dbgerr004" for details
- BUGCHECK_STR: 0x7f_8
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- PROCESS_NAME: nvxdsync.exe
- CURRENT_IRQL: 0
- ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
- LAST_CONTROL_TRANSFER: from fffff8004dfd37e9 to fffff8004dfc7ca0
- STACK_TEXT:
- fffff800`4fad6d28 fffff800`4dfd37e9 : 00000000`0000007f 00000000`00000008 fffff800`4fad6e70 00000000`00000001 : nt!KeBugCheckEx
- fffff800`4fad6d30 fffff800`4dfd18f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
- fffff800`4fad6e70 fffff800`02042cb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb4
- 00000000`00000001 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x3fcb7
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nvlddmkm+3fcb7
- fffff800`02042cb7 c744242848000000 mov dword ptr [rsp+28h],48h
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nvlddmkm+3fcb7
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nvlddmkm
- IMAGE_NAME: nvlddmkm.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 53b4446a
- FAILURE_BUCKET_ID: 0x7f_8_nvlddmkm+3fcb7
- BUCKET_ID: 0x7f_8_nvlddmkm+3fcb7
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x7f_8_nvlddmkm+3fcb7
- FAILURE_ID_HASH: {260ae38f-98d5-204d-6409-f549a19f06b9}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement