jawoll! geht doch
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINXP\Minidump\Mini041110-10.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: C:\Programme\Debugging Tools for Windows\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b1c0
Debug session time: Sun Apr 11 15:50:10.593 2010 (GMT+2)
System Uptime: 0 days 0:06:54.168
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
.................................................. .............
.................................................. ..........
Loading User Symbols
Loading unloaded module list
..................
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007F, {d, 0, 0, 0}
*** WARNING: Unable to verify timestamp for nv4_disp.dll
Probably caused by : nv4_disp.dll ( nv4_disp!CNVPVertexProgramParser::lrpMacro+117 )
Followup: MachineOwner
---------
kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_d
CUSTOMER_CRASH_COUNT: 10
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: 3DMark03.exe
LAST_CONTROL_TRANSFER: from e21021b0 to e2473eaf
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
b219f970 e21021b0 bd502810 e699c0c0 e21020ac 0xe2473eaf
b219f974 bd502810 e699c0c0 e21020ac e699c0c0 0xe21021b0
b219f978 e699c0c0 e21020ac e699c0c0 e2102010 nv4_disp!_NULL_IMPORT_DES*****OR <PERF> (nv4_disp+0x4f0810)
b219f97c e21020ac e699c0c0 e2102010 e21021b0 0xe699c0c0
b219f980 e699c0c0 e2102010 e21021b0 e20fc000 0xe21020ac
b219f984 e2102010 e21021b0 e20fc000 bd502810 0xe699c0c0
b219f988 e21021b0 e20fc000 bd502810 b219fb04 0xe2102010
b219f98c e20fc000 bd502810 b219fb04 bd24bef7 0xe21021b0
b219f990 bd502810 b219fb04 bd24bef7 e21020ac 0xe20fc000
b219f994 b219fb04 bd24bef7 e21020ac e21021b0 nv4_disp!_NULL_IMPORT_DES*****OR <PERF> (nv4_disp+0x4f0810)
b219f998 bd24bef7 e21020ac e21021b0 bd502810 0xb219fb04
b219faa0 e699c0c0 00000010 e2473bc0 000017d4 nv4_disp!CNVPVertexProgramParser::lrpMacro+0x117
b219fb04 bd19c5d1 e2102010 00000bea b219fb68 0xe699c0c0
e2102010 e20fc000 00000000 00000000 00000000 nv4_disp!nvFPPackRegistersConditional+0x1a1
00000000 00000000 00000000 00000000 00000000 0xe20fc000
STACK_COMMAND: kb
FOLLOWUP_IP:
nv4_disp!CNVPVertexProgramParser::lrpMacro+117
bd24bef7 ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: nv4_disp!CNVPVertexProgramParser::lrpMacro+117
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nv4_disp
IMAGE_NAME: nv4_disp.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4b9f5416
FAILURE_BUCKET_ID: 0x7f_d_nv4_disp!CNVPVertexProgramParser::lrpMacro+ 117
BUCKET_ID: 0x7f_d_nv4_disp!CNVPVertexProgramParser::lrpMacro+ 117
Followup: MachineOwner
---------