UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 8ed03750
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for BEDaisy.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1750
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 19065
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_gdr
Key : WER.OS.Timestamp
Value: 2013-03-18T15:33:00Z
Key : WER.OS.Version
Value: 7.1.7601.18113
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffffffff8ed03750
BUGCHECK_P3: 0
BUGCHECK_P4: 0
STACK_OVERFLOW: Stack Limit: 8ed81000. Use (kF) and (!stackusage) to investigate stack usage.
STACKUSAGE_FUNCTION: The function at address 0xffffffff8a07db06 was blamed for the stack overflow. It is using 5736 bytes of stack.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
SYMBOL_NAME: BEDaisy+5ab06
MODULE_NAME: BEDaisy
IMAGE_NAME: BEDaisy.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_BEDaisy+5ab06
OS_VERSION: 7.1.7601.18113
BUILDLAB_STR: win7sp1_gdr
OSPLATFORM_TYPE: x86
OSNAME: Windows 7
FAILURE_ID_HASH: {581f6757-f956-5396-4f31-3b43621b3570}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 8ed03750
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for BEDaisy.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18299
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_gdr
Key : WER.OS.Timestamp
Value: 2013-03-18T15:33:00Z
Key : WER.OS.Version
Value: 7.1.7601.18113
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffffffff8ed03750
BUGCHECK_P3: 0
BUGCHECK_P4: 0
STACK_OVERFLOW: Stack Limit: 8ed8d000. Use (kF) and (!stackusage) to investigate stack usage.
STACKUSAGE_FUNCTION: The function at address 0xffffffffad05bb06 was blamed for the stack overflow. It is using 5736 bytes of stack.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
8ed8d014 954fbea5 86fa4350 8ed8d094 8ed8d03c dxgmms1!VidSchDdiNotifyInterrupt+0x76
8ed8d024 954fbf0e 86aaefd0 86fa4350 8ed8d094 dxgkrnl!VIDSCH_EXPORT::VidSchDdiNotifyInterrupt+0x14
8ed8d03c 95a7ea08 86fa4350 8ed8d094 8ed8d094 dxgkrnl!DxgNotifyInterruptCB+0x60
WARNING: Stack unwind information not available. Following frames may be wrong.
8ed8d058 95a7ec20 8ed8d094 8705e000 87ab61e0 nvlddmkm+0x59a08
8ed8d07c 95ab730d 00000000 0005bf5a 8706206c nvlddmkm+0x59c20
8ed8d118 95ab88dc 00000000 00000000 00000000 nvlddmkm+0x9230d
8ed8d130 95a7ee0b 8705e000 00000000 00000000 nvlddmkm+0x938dc
8ed8d180 95a7f045 00000000 8705e000 8668a284 nvlddmkm+0x59e0b
8ed8d1a8 95ad194f 95a2fb75 00000000 8ed8d1c8 nvlddmkm+0x5a045
8ed8d1b8 954fbb14 8705e000 00000000 8ed8d1dc nvlddmkm+0xac94f
8ed8d1c8 9550bd59 87492c80 86fa4350 00000000 dxgkrnl!DpiFdoMessageInterruptRoutine+0x17
8ed8d1dc 8324abec 87492c80 86fa4350 00000000 dxgkrnl!DpiFdoLineInterruptRoutine+0x12
8ed8d208 8324ab39 8c7cdf02 00000061 8ed8d298 nt!KiChainedDispatch2ndLvl+0x60
8ed8d208 836298ea (T) 8c7cdf02 00000061 8ed8d298 nt!KiChainedDispatch+0x29
8ed8d298 83629b29 (T) 8ed00002 8ed8d2cc c6e90b0c hal!HalpDispatchSoftwareInterrupt+0x24
8ed8d2b0 83629cc3 86606d28 8ed8d2cc 8324ab83 hal!HalpCheckForSoftwareInterrupt+0x83
8ed8d2bc 8324ab83 87505300 000000a2 8ed8d7a4 hal!HalEndSystemInterrupt+0x67
8ed8d2bc 832b9ea8 (T) 87505300 000000a2 8ed8d7a4 nt!KiChainedDispatch+0x73
8ed8d7a4 832434f9 (T) 8ed8d7c8 8c93f62c 00000000 nt!_woutput_l+0x819
8ed8d7e8 832ba0ae 8ed8d850 00000063 8c93f5fc nt!_vsnwprintf_l+0x7b
8ed8d804 8c935160 8ed8d850 00000063 8c93f5fc nt!_vsnwprintf+0x18
8ed8d828 8c93bfac 8ed8d850 000000c8 8c93f5fc volmgr!RtlStringCbPrintfW+0x3a
8ed8d91c 8c9358ab 86b670e8 87c7e978 00004000 volmgr!VmpQueryDeviceName+0x46
8ed8d940 83247c29 86b67030 87c7eb2c 86b68cb8 volmgr!VmDeviceControl+0x2f1
8ed8d958 8d03a854 8ed8d9a0 8d03b74d 86b68c00 nt!IofCallDriver+0x63
8ed8d960 8d03b74d 86b68c00 87c7e978 86b690f0 fvevol!FveFilterSkip+0x1e
8ed8d9a0 83247c29 86b68c00 87c7e978 86b690d8 fvevol!FveFilterDeviceControl+0x16f
8ed8d9b8 8ce0708f 8ed8da58 87c7e978 8ed8da10 nt!IofCallDriver+0x63
8ed8d9c8 8ce0f6f6 86b69020 87c7e978 02396b3f rdyboost!SmdDispatchPassthrough+0x6d
8ed8da10 83247c29 86b69020 87c7e978 87c7e978 rdyboost!SmdDispatchDeviceControl+0x68
8ed8da28 8cfe7217 83331005 86b692a0 41746e4d nt!IofCallDriver+0x63
8ed8da58 83247c29 87c7eb2c 87c7e978 00000000 volsnap!VolSnapDeviceControl+0x49
8ed8da70 8c9ac03c 824031a8 00040000 00000000 nt!IofCallDriver+0x63
8ed8da94 8c9ac523 86b692a0 004d0008 00000000 mountmgr!MountMgrSendDeviceControl+0x54
8ed8dad4 8c9acb51 8663fa38 00000000 8ed8db08 mountmgr!QueryDeviceInformation+0x171
8ed8db14 8c9aeffa 8663fa38 8ed8db3c 00000000 mountmgr!FindDeviceInfo+0x3f
8ed8db5c 8c9b45f0 8663fa38 87b88100 00000000 mountmgr!MountMgrQueryDosVolumePath+0x100
8ed8db78 83247c29 8663fa54 006d0030 00000200 mountmgr!MountMgrDeviceControl+0xe4
8ed8db90 83407c1b 000000c8 c12e44f8 880ee028 nt!IofCallDriver+0x63
8ed8e3f0 83453f02 86b67030 c12e44f8 a7bd5a24 nt!IoVolumeDeviceToDosName+0x1bf
8ed8e440 8340cdf4 880ee028 00000001 be70d130 nt!IopQueryNameInternal+0xb2
8ed8e470 ad05bb06 880ee028 8ed8e58c 861a1000 nt!IoQueryFileDosDeviceName+0x2e
8ed8fad8 833d43a0 860f26a8 861a1000 00000000 BEDaisy+0x5ab06
8ed8fcbc 833d7e52 00000001 00000000 8ed8fce4 nt!IopLoadDriver+0x7ed
8ed8fd00 8328df0b b118fcd0 00000000 85d1ea70 nt!IopLoadUnloadDriver+0x70
8ed8fd50 8341a12f 00000001 a7bd43f4 00000000 nt!ExpWorkerThread+0x10d
8ed8fd90 832c1549 8328ddfe 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_NAME: BEDaisy+5ab06
MODULE_NAME: BEDaisy
IMAGE_NAME: BEDaisy.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_BEDaisy+5ab06
OS_VERSION: 7.1.7601.18113
BUILDLAB_STR: win7sp1_gdr
OSPLATFORM_TYPE: x86
OSNAME: Windows 7
FAILURE_ID_HASH: {581f6757-f956-5396-4f31-3b43621b3570}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: c0802090
Arg3: 0000ffff
Arg4: 00000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1437
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6768
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_gdr
Key : WER.OS.Timestamp
Value: 2013-03-18T15:33:00Z
Key : WER.OS.Version
Value: 7.1.7601.18113
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffffffc0802090
BUGCHECK_P3: ffff
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ac973ba8 832a6626 04790002 04b72fff 86c062a0 nt!MiDeleteVirtualAddresses+0x41a
ac973c78 832a62db 86c062a0 87d8c1c0 85dde680 nt!MiRemoveMappedView+0x325
ac973ca0 8344e4f6 85dde680 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
ac973d04 8346c9ff 86c062a0 04790000 00000000 nt!MiUnmapViewOfSection+0x265
ac973d24 832448ba ffffffff 04790000 001ae3e8 nt!NtUnmapViewOfSection+0x55
ac973d24 771f7094 (T) ffffffff 04790000 001ae3e8 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
001ae3e8 00000000 (T) 00000000 00000000 00000000 0x771f7094
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+41a
MODULE_NAME: nt
IMAGE_VERSION: 6.1.7601.18113
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrpamp.exe
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVirtualAddresses+41a
OS_VERSION: 7.1.7601.18113
BUILDLAB_STR: win7sp1_gdr
OSPLATFORM_TYPE: x86
OSNAME: Windows 7
FAILURE_ID_HASH: {74f59fbc-68cc-18a4-f2dd-4d332b50b356}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: c08024ba
Arg3: 0000ffff
Arg4: 00000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1327
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 2263
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_gdr
Key : WER.OS.Timestamp
Value: 2013-03-18T15:33:00Z
Key : WER.OS.Version
Value: 7.1.7601.18113
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffffffc08024ba
BUGCHECK_P3: ffff
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: zula.exe
STACK_TEXT:
b0913ba8 832f1626 47210002 4761ffff 87d49030 nt!MiDeleteVirtualAddresses+0x41a
b0913c78 832f12db 87d49030 878ff588 87dba658 nt!MiRemoveMappedView+0x325
b0913ca0 834994f6 87dba658 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
b0913d04 834b79ff 87d49030 47210000 00000000 nt!MiUnmapViewOfSection+0x265
b0913d24 8328f8ba ffffffff 47210000 1a9df854 nt!NtUnmapViewOfSection+0x55
b0913d24 77847094 (T) ffffffff 47210000 1a9df854 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
1a9df854 00000000 (T) 00000000 00000000 00000000 0x77847094
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+41a
MODULE_NAME: nt
IMAGE_VERSION: 6.1.7601.18113
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrpamp.exe
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVirtualAddresses+41a
OS_VERSION: 7.1.7601.18113
BUILDLAB_STR: win7sp1_gdr
OSPLATFORM_TYPE: x86
OSNAME: Windows 7
FAILURE_ID_HASH: {74f59fbc-68cc-18a4-f2dd-4d332b50b356}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: c08026f8
Arg3: 0000ffff
Arg4: 00000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 2353
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_gdr
Key : WER.OS.Timestamp
Value: 2013-03-18T15:33:00Z
Key : WER.OS.Version
Value: 7.1.7601.18113
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffffffc08026f8
BUGCHECK_P3: ffff
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
STACK_TEXT:
a429bba8 832bd626 6b1c0002 6b1ddfff 86eecc70 nt!MiDeleteVirtualAddresses+0x41a
a429bc78 832bd2db 86eecc70 87c0e970 883be030 nt!MiRemoveMappedView+0x325
a429bca0 834654f6 883be030 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
a429bd04 834839ff 86eecc70 6b1c0000 00000000 nt!MiUnmapViewOfSection+0x265
a429bd24 8325b8ba ffffffff 6b1c0000 0312f5cc nt!NtUnmapViewOfSection+0x55
a429bd24 77037094 (T) ffffffff 6b1c0000 0312f5cc nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0312f5cc 00000000 (T) 00000000 00000000 00000000 0x77037094
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+41a
MODULE_NAME: nt
IMAGE_VERSION: 6.1.7601.18113
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrpamp.exe
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVirtualAddresses+41a
OS_VERSION: 7.1.7601.18113
BUILDLAB_STR: win7sp1_gdr
OSPLATFORM_TYPE: x86
OSNAME: Windows 7
FAILURE_ID_HASH: {74f59fbc-68cc-18a4-f2dd-4d332b50b356}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8d046648, The address that the exception occurred at
Arg3: b9fd9b5c, Exception Record Address
Arg4: b9fd9740, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Write
Key : Analysis.CPU.mSec
Value: 1359
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5404
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_gdr
Key : WER.OS.Timestamp
Value: 2013-03-18T15:33:00Z
Key : WER.OS.Version
Value: 7.1.7601.18113
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: ffffffff8d046648
BUGCHECK_P3: ffffffffb9fd9b5c
BUGCHECK_P4: ffffffffb9fd9740
EXCEPTION_RECORD: b9fd9b5c -- (.exr 0xffffffffb9fd9b5c)
ExceptionAddress: 8d046648 (volsnap!VspCollectLazyOffsetsPass+0x0000015c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000001
Parameter[1]: 00000000
Attempt to write to address 00000000
CONTEXT: b9fd9740 -- (.cxr 0xffffffffb9fd9740)
eax=00000000 ebx=00000001 ecx=00000018 edx=00000000 esi=00000001 edi=b9fd9cac
eip=8d046648 esp=b9fd9c24 ebp=b9fd9c60 iopl=0 nv up ei ng nz ac pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010297
volsnap!VspCollectLazyOffsetsPass+0x15c:
8d046648 890c90 mov dword ptr [eax+edx*4],ecx ds:0023:00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
WRITE_ADDRESS: 83331c00: Unable to get Flags value from nt!KdVersionBlock
83331c00: Unable to get Flags value from nt!KdVersionBlock
83331c00: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from 83371208
GetUlongPtrFromAddress: unable to read from 833716e0
Unable to get NonPagedPoolStart
Unable to get PagedPoolStart
00000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 00000001
EXCEPTION_PARAMETER2: 00000000
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
b9fd9c60 8d057b38 00000002 b9fd9c90 b9fd9cd0 volsnap!VspCollectLazyOffsetsPass+0x15c
b9fd9d18 8d05fecd 0000afae 8847e020 b9fd9d58 volsnap!VspPopulateFreeBlocksBitmap+0x4a0
b9fd9d50 8341112f 00000000 90a9a4d7 00000000 volsnap!VspLazyPreCopyOnWriteWorker+0xa9
b9fd9d90 832b8549 8d05fe24 8847e008 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_NAME: volsnap!VspCollectLazyOffsetsPass+15c
MODULE_NAME: volsnap
IMAGE_NAME: volsnap.sys
IMAGE_VERSION: 6.1.7601.17514
STACK_COMMAND: .cxr 0xffffffffb9fd9740 ; kb
FAILURE_BUCKET_ID: 0x7E_volsnap!VspCollectLazyOffsetsPass+15c
OS_VERSION: 7.1.7601.18113
BUILDLAB_STR: win7sp1_gdr
OSPLATFORM_TYPE: x86
OSNAME: Windows 7
FAILURE_ID_HASH: {3bea71b2-42c2-4274-cd21-1d524a344053}
Followup: MachineOwner
---------
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: 861b3138, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: 944cea80, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 00000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 00000002, Optional internal context dependent data.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1374
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7738
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7_gdr
Key : WER.OS.Timestamp
Value: 2013-03-18T15:32:00Z
Key : WER.OS.Version
Value: 7.0.7600.17273
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 116
BUGCHECK_P1: ffffffff861b3138
BUGCHECK_P2: ffffffff944cea80
BUGCHECK_P3: 0
BUGCHECK_P4: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
8e2dcb74 95ac0c26 00000116 861b3138 944cea80 nt!KeBugCheckEx+0x1e
8e2dcb98 95ac1a45 944cea80 00000000 00000002 dxgkrnl!TdrBugcheckOnTimeout+0x8d
8e2dcbbc 95af192c 00000000 00000102 86c92008 dxgkrnl!TdrIsRecoveryRequired+0xb8
WARNING: Stack unwind information not available. Following frames may be wrong.
8e2dcc34 95b1b944 fffffcfb 0017570e 00000000 dxgmms1+0x692c
8e2dcc5c 95b1c065 00000000 00000000 00000000 dxgmms1+0x30944
8e2dcc98 95af88f0 8e2dcc90 86a60d58 8798a620 dxgmms1+0x31065
8e2dcd28 95b1d3c9 86c92008 82c3c6b1 86c92008 dxgmms1+0xd8f0
8e2dcd3c 95b1d485 86c92008 00000000 86cc2610 dxgmms1+0x323c9
8e2dcd50 82e0fb6f 86c92008 a75175fd 00000000 dxgmms1+0x32485
8e2dcd90 82cc1299 95b1d406 86c92008 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_NAME: nvlddmkm+aca80
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x116_IMAGE_nvlddmkm.sys
OS_VERSION: 7.0.7600.17273
BUILDLAB_STR: win7_gdr
OSPLATFORM_TYPE: x86
OSNAME: Windows 7
FAILURE_ID_HASH: {c89bfe8c-ed39-f658-ef27-f2898997fdbd}
Followup: MachineOwner
---------