Advertisement
Guest User

Untitled

a guest
Jun 13th, 2015
330
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.73 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [H:\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Only kernel address space is available
  8.  
  9.  
  10. ************* Symbol Path validation summary **************
  11. Response Time (ms) Location
  12. Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
  13. Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
  14. Executable search path is:
  15. Windows 8 Kernel Version 9200 MP (12 procs) Free x86 compatible
  16. Product: WinNt, suite: TerminalServer SingleUserTS
  17. Built by: 9200.16384.x86fre.win8_rtm.120725-1247
  18. Machine Name:
  19. Kernel base = 0x81a61000 PsLoadedModuleList = 0x81c4bde8
  20. Debug session time: Sun Jan 11 19:29:58.099 2015 (UTC + 2:00)
  21. System Uptime: 0 days 0:01:27.855
  22. Loading Kernel Symbols
  23. ...............................................................
  24. ................................................................
  25. ............................................................
  26. Loading User Symbols
  27.  
  28. Loading unloaded module list
  29. ...........
  30. *******************************************************************************
  31. * *
  32. * Bugcheck Analysis *
  33. * *
  34. *******************************************************************************
  35.  
  36. Use !analyze -v to get detailed debugging information.
  37.  
  38. BugCheck 133, {1, 780, 0, 0}
  39.  
  40. Probably caused by : nvlddmkm.sys ( nvlddmkm!RtlUnwind+14834 )
  41.  
  42. Followup: MachineOwner
  43. ---------
  44.  
  45. 6: kd> !analyze -v
  46. *******************************************************************************
  47. * *
  48. * Bugcheck Analysis *
  49. * *
  50. *******************************************************************************
  51.  
  52. DPC_WATCHDOG_VIOLATION (133)
  53. The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
  54. or above.
  55. Arguments:
  56. Arg1: 00000001, The system cumulatively spent an extended period of time at
  57. DISPATCH_LEVEL or above. The offending component can usually be
  58. identified with a stack trace.
  59. Arg2: 00000780, The watchdog period.
  60. Arg3: 00000000
  61. Arg4: 00000000
  62.  
  63. Debugging Details:
  64. ------------------
  65.  
  66.  
  67. DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
  68.  
  69. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  70.  
  71. BUGCHECK_STR: 0x133
  72.  
  73. PROCESS_NAME: System
  74.  
  75. CURRENT_IRQL: 1c
  76.  
  77. ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
  78.  
  79. DPC_STACK_BASE: FFFFFFFF8373E000
  80.  
  81. LAST_CONTROL_TRANSFER: from 81be2cf6 to 81b58cb0
  82.  
  83. STACK_TEXT:
  84. 8373da64 81be2cf6 00000133 00000001 00000780 nt!KeBugCheckEx
  85. 8373dad4 81aec49b 000015f5 000015f6 a5202102 nt! ?? ::FNODOBFM::`string'+0xeae6
  86. 8373dafc 81a28fd4 81b5a3d2 9546a000 8373dba4 nt!KeUpdateRunTime+0x4c
  87. 8373db18 81a3a5fd 20000002 000000d1 8373dba4 hal!HalpTimerClockInterruptCommon+0x3c
  88. 8373db18 81b5a3d2 20000002 000000d1 8373dba4 hal!HalpTimerClockInterrupt+0x199
  89. 8373db98 9cbab5a4 a5202100 8373dbdc 9cc26f8c nt!READ_REGISTER_ULONG+0x6
  90. 8373dba4 9cc26f8c 8c31f220 9546a000 9546a308 nvlddmkm!RtlUnwind+0x14834
  91. 8373dbdc 9cd1b6a5 9546a308 00000000 00002100 nvlddmkm!RtlUnwind+0x9021c
  92. 8373dc14 9d3fbf87 9546a000 95497730 9546a000 nvlddmkm!RtlUnwind+0x184935
  93. 8373dcf8 9ce3d8a3 9546a000 954802a8 ffffffff nvlddmkm!__safe_se_handler_table <PERF> (nvlddmkm+0x9eff87)
  94. 8373dd18 9cbabaf9 9546a000 954802a8 95458000 nvlddmkm!RtlUnwind+0x2a6b33
  95. 8373ddc8 9cac306d 95458000 9546a000 95458000 nvlddmkm!RtlUnwind+0x14d89
  96. 8373dde8 9cb495af 8371e30c 00000000 95458000 nvlddmkm!KeQueryPerformanceCounter+0xfff2c75f
  97. 8373ddfc 9cb626e9 9cb4957b 8373df18 8373de18 nvlddmkm!KeQueryPerformanceCounter+0xfffb2ca1
  98. 8373de0c 9cb49785 95458000 8373ded0 81abd4ab nvlddmkm!KeQueryPerformanceCounter+0xfffcbddb
  99. 8373de18 81abd4ab 95458078 95458000 00000000 nvlddmkm!KeQueryPerformanceCounter+0xfffb2e77
  100. 8373ded0 81abd0e6 84485040 8373df18 00000378 nt!KiExecuteAllDpcs+0x1f2
  101. 8373dff4 81bd081c 8795198c 00000000 00000000 nt!KiRetireDpcList+0xed
  102. 879519a8 81a1b8c8 00000000 879519e4 879519e4 nt!KiDispatchInterrupt+0x2c
  103. 879519bc 81a1bb6d 879519e4 edf231bc 8b2e91e8 hal!HalpInterruptCheckForSoftwareInterrupt+0x2c
  104. 879519d4 81bd04dc 00000207 00000007 87951a5c hal!HalEndSystemInterrupt+0xbb
  105. 879519d4 81a1b8d0 00000207 00000007 87951a5c nt!KiInterruptDispatch+0xdc
  106. 87951a5c 81a1b796 00000000 8371c100 00000002 hal!HalpInterruptCheckForSoftwareInterrupt+0x34
  107. 87951a70 81a96844 8448506c 84485040 8371e340 hal!KfLowerIrql+0x2c
  108. 87951ae0 81b2113a 84485040 84485120 00000000 nt!KiCommitThreadWait+0x2ac
  109. 87951b30 81b21022 8371e340 00000005 84485040 nt!KeWaitForGate+0xda
  110. 87951c34 81b25415 8371c120 b4adfdc7 00000000 nt!KiExecuteDpc+0x77
  111. 87951c70 81bd1039 81b20fab 8371c120 00000000 nt!PspSystemThreadStartup+0x4a
  112. 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
  113.  
  114.  
  115. STACK_COMMAND: kb
  116.  
  117. FOLLOWUP_IP:
  118. nvlddmkm!RtlUnwind+14834
  119. 9cbab5a4 5d pop ebp
  120.  
  121. SYMBOL_STACK_INDEX: 6
  122.  
  123. SYMBOL_NAME: nvlddmkm!RtlUnwind+14834
  124.  
  125. FOLLOWUP_NAME: MachineOwner
  126.  
  127. MODULE_NAME: nvlddmkm
  128.  
  129. IMAGE_NAME: nvlddmkm.sys
  130.  
  131. DEBUG_FLR_IMAGE_TIMESTAMP: 4fdf9306
  132.  
  133. BUCKET_ID_FUNC_OFFSET: 14834
  134.  
  135. FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!RtlUnwind
  136.  
  137. BUCKET_ID: 0x133_ISR_nvlddmkm!RtlUnwind
  138.  
  139. ANALYSIS_SOURCE: KM
  140.  
  141. FAILURE_ID_HASH_STRING: km:0x133_isr_nvlddmkm!rtlunwind
  142.  
  143. FAILURE_ID_HASH: {bec9bfec-b4e1-58ef-67b7-2dc445baae4f}
  144.  
  145. Followup: MachineOwner
  146. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement