Einzelnen Beitrag anzeigen
Ungelesen 11.04.10, 21:28   #9
tifftoff
Newbie
 
Benutzerbild von tifftoff
 
Registriert seit: Dec 2009
Ort: Hinterm Mond gleich links ;)
Beiträge: 59
Bedankt: 8
tifftoff ist noch neu hier! | 0 Respekt Punkte
Standard

jawoll! geht doch


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINXP\Minidump\Mini041110-10.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\Programme\Debugging Tools for Windows\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b1c0
Debug session time: Sun Apr 11 15:50:10.593 2010 (GMT+2)
System Uptime: 0 days 0:06:54.168
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
.................................................. .............
.................................................. ..........
Loading User Symbols
Loading unloaded module list
..................
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {d, 0, 0, 0}

*** WARNING: Unable to verify timestamp for nv4_disp.dll
Probably caused by : nv4_disp.dll ( nv4_disp!CNVPVertexProgramParser::lrpMacro+117 )

Followup: MachineOwner
---------

kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_d

CUSTOMER_CRASH_COUNT: 10

DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT

PROCESS_NAME: 3DMark03.exe

LAST_CONTROL_TRANSFER: from e21021b0 to e2473eaf

STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
b219f970 e21021b0 bd502810 e699c0c0 e21020ac 0xe2473eaf
b219f974 bd502810 e699c0c0 e21020ac e699c0c0 0xe21021b0
b219f978 e699c0c0 e21020ac e699c0c0 e2102010 nv4_disp!_NULL_IMPORT_DES*****OR <PERF> (nv4_disp+0x4f0810)
b219f97c e21020ac e699c0c0 e2102010 e21021b0 0xe699c0c0
b219f980 e699c0c0 e2102010 e21021b0 e20fc000 0xe21020ac
b219f984 e2102010 e21021b0 e20fc000 bd502810 0xe699c0c0
b219f988 e21021b0 e20fc000 bd502810 b219fb04 0xe2102010
b219f98c e20fc000 bd502810 b219fb04 bd24bef7 0xe21021b0
b219f990 bd502810 b219fb04 bd24bef7 e21020ac 0xe20fc000
b219f994 b219fb04 bd24bef7 e21020ac e21021b0 nv4_disp!_NULL_IMPORT_DES*****OR <PERF> (nv4_disp+0x4f0810)
b219f998 bd24bef7 e21020ac e21021b0 bd502810 0xb219fb04
b219faa0 e699c0c0 00000010 e2473bc0 000017d4 nv4_disp!CNVPVertexProgramParser::lrpMacro+0x117
b219fb04 bd19c5d1 e2102010 00000bea b219fb68 0xe699c0c0
e2102010 e20fc000 00000000 00000000 00000000 nv4_disp!nvFPPackRegistersConditional+0x1a1
00000000 00000000 00000000 00000000 00000000 0xe20fc000


STACK_COMMAND: kb

FOLLOWUP_IP:
nv4_disp!CNVPVertexProgramParser::lrpMacro+117
bd24bef7 ?? ???

SYMBOL_STACK_INDEX: b

SYMBOL_NAME: nv4_disp!CNVPVertexProgramParser::lrpMacro+117

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nv4_disp

IMAGE_NAME: nv4_disp.dll

DEBUG_FLR_IMAGE_TIMESTAMP: 4b9f5416

FAILURE_BUCKET_ID: 0x7f_d_nv4_disp!CNVPVertexProgramParser::lrpMacro+ 117

BUCKET_ID: 0x7f_d_nv4_disp!CNVPVertexProgramParser::lrpMacro+ 117

Followup: MachineOwner
---------
tifftoff ist offline   Mit Zitat antworten