Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [H:\MEMORY.DMP]
- Kernel Bitmap Dump File: Only kernel address space is available
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
- Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 8 Kernel Version 9200 MP (12 procs) Free x86 compatible
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 9200.16384.x86fre.win8_rtm.120725-1247
- Machine Name:
- Kernel base = 0x81a61000 PsLoadedModuleList = 0x81c4bde8
- Debug session time: Sun Jan 11 19:29:58.099 2015 (UTC + 2:00)
- System Uptime: 0 days 0:01:27.855
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ............................................................
- Loading User Symbols
- Loading unloaded module list
- ...........
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 133, {1, 780, 0, 0}
- Probably caused by : nvlddmkm.sys ( nvlddmkm!RtlUnwind+14834 )
- Followup: MachineOwner
- ---------
- 6: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DPC_WATCHDOG_VIOLATION (133)
- The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
- or above.
- Arguments:
- Arg1: 00000001, The system cumulatively spent an extended period of time at
- DISPATCH_LEVEL or above. The offending component can usually be
- identified with a stack trace.
- Arg2: 00000780, The watchdog period.
- Arg3: 00000000
- Arg4: 00000000
- Debugging Details:
- ------------------
- DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: 0x133
- PROCESS_NAME: System
- CURRENT_IRQL: 1c
- ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
- DPC_STACK_BASE: FFFFFFFF8373E000
- LAST_CONTROL_TRANSFER: from 81be2cf6 to 81b58cb0
- STACK_TEXT:
- 8373da64 81be2cf6 00000133 00000001 00000780 nt!KeBugCheckEx
- 8373dad4 81aec49b 000015f5 000015f6 a5202102 nt! ?? ::FNODOBFM::`string'+0xeae6
- 8373dafc 81a28fd4 81b5a3d2 9546a000 8373dba4 nt!KeUpdateRunTime+0x4c
- 8373db18 81a3a5fd 20000002 000000d1 8373dba4 hal!HalpTimerClockInterruptCommon+0x3c
- 8373db18 81b5a3d2 20000002 000000d1 8373dba4 hal!HalpTimerClockInterrupt+0x199
- 8373db98 9cbab5a4 a5202100 8373dbdc 9cc26f8c nt!READ_REGISTER_ULONG+0x6
- 8373dba4 9cc26f8c 8c31f220 9546a000 9546a308 nvlddmkm!RtlUnwind+0x14834
- 8373dbdc 9cd1b6a5 9546a308 00000000 00002100 nvlddmkm!RtlUnwind+0x9021c
- 8373dc14 9d3fbf87 9546a000 95497730 9546a000 nvlddmkm!RtlUnwind+0x184935
- 8373dcf8 9ce3d8a3 9546a000 954802a8 ffffffff nvlddmkm!__safe_se_handler_table <PERF> (nvlddmkm+0x9eff87)
- 8373dd18 9cbabaf9 9546a000 954802a8 95458000 nvlddmkm!RtlUnwind+0x2a6b33
- 8373ddc8 9cac306d 95458000 9546a000 95458000 nvlddmkm!RtlUnwind+0x14d89
- 8373dde8 9cb495af 8371e30c 00000000 95458000 nvlddmkm!KeQueryPerformanceCounter+0xfff2c75f
- 8373ddfc 9cb626e9 9cb4957b 8373df18 8373de18 nvlddmkm!KeQueryPerformanceCounter+0xfffb2ca1
- 8373de0c 9cb49785 95458000 8373ded0 81abd4ab nvlddmkm!KeQueryPerformanceCounter+0xfffcbddb
- 8373de18 81abd4ab 95458078 95458000 00000000 nvlddmkm!KeQueryPerformanceCounter+0xfffb2e77
- 8373ded0 81abd0e6 84485040 8373df18 00000378 nt!KiExecuteAllDpcs+0x1f2
- 8373dff4 81bd081c 8795198c 00000000 00000000 nt!KiRetireDpcList+0xed
- 879519a8 81a1b8c8 00000000 879519e4 879519e4 nt!KiDispatchInterrupt+0x2c
- 879519bc 81a1bb6d 879519e4 edf231bc 8b2e91e8 hal!HalpInterruptCheckForSoftwareInterrupt+0x2c
- 879519d4 81bd04dc 00000207 00000007 87951a5c hal!HalEndSystemInterrupt+0xbb
- 879519d4 81a1b8d0 00000207 00000007 87951a5c nt!KiInterruptDispatch+0xdc
- 87951a5c 81a1b796 00000000 8371c100 00000002 hal!HalpInterruptCheckForSoftwareInterrupt+0x34
- 87951a70 81a96844 8448506c 84485040 8371e340 hal!KfLowerIrql+0x2c
- 87951ae0 81b2113a 84485040 84485120 00000000 nt!KiCommitThreadWait+0x2ac
- 87951b30 81b21022 8371e340 00000005 84485040 nt!KeWaitForGate+0xda
- 87951c34 81b25415 8371c120 b4adfdc7 00000000 nt!KiExecuteDpc+0x77
- 87951c70 81bd1039 81b20fab 8371c120 00000000 nt!PspSystemThreadStartup+0x4a
- 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nvlddmkm!RtlUnwind+14834
- 9cbab5a4 5d pop ebp
- SYMBOL_STACK_INDEX: 6
- SYMBOL_NAME: nvlddmkm!RtlUnwind+14834
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nvlddmkm
- IMAGE_NAME: nvlddmkm.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 4fdf9306
- BUCKET_ID_FUNC_OFFSET: 14834
- FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!RtlUnwind
- BUCKET_ID: 0x133_ISR_nvlddmkm!RtlUnwind
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:0x133_isr_nvlddmkm!rtlunwind
- FAILURE_ID_HASH: {bec9bfec-b4e1-58ef-67b7-2dc445baae4f}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement