*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {2001b, fffff801680ecff0, 0, 0}
*** WARNING: Unable to verify timestamp for NvStreamKms.sys
*** ERROR: Module load completed but symbols could not be loaded for NvStreamKms.sys
Probably caused by : NvStreamKms.sys ( NvStreamKms+2146 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 000000000002001b, ID of the 'IrqlObPassive' rule that was violated.
Arg2: fffff801680ecff0, A pointer to the string describing the violated rule condition.
Arg3: 0000000000000000, Reserved (unused).
Arg4: 0000000000000000, Reserved (unused).
Debugging Details:
------------------
DV_VIOLATED_CONDITION: ObReferenceObjectByHandle should only be called at IRQL = PASSIVE_LEVEL.
DV_MSDN_LINK: [URL="http://go.microsoft.com/fwlink/?LinkId=216044"]IrqlObPassive rule (wdm) (Windows Drivers)[/URL]
DV_RULE_INFO: 0x2001B
BUGCHECK_STR: 0xc4_IrqlObPassive_XDV
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: nvstreamsvc.ex
CURRENT_IRQL: 1
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
LAST_CONTROL_TRANSFER: from fffff801680e6258 to fffff801495dcfa0
STACK_TEXT:
ffffd001`d866c758 fffff801`680e6258 : 00000000`000000c4 00000000`0002001b fffff801`680ecff0 00000000`00000000 : nt!KeBugCheckEx
ffffd001`d866c760 fffff801`680d7fcf : 00000000`00110001 00000000`00110001 ffffe000`c2a520d8 ffffe000`c2a520d8 : VerifierExt!SLIC_abort+0x5c
ffffd001`d866c7a0 fffff801`680d8000 : fffff801`49766d50 fffff801`4971dae5 00000000`00000200 fffff801`49af7872 : VerifierExt!SLIC_ObReferenceObjectByHandle_entry_IrqlObPassive+0x23
ffffd001`d866c7d0 fffff801`49b108e9 : 00000000`00110000 ffffe000`bf4fb6a0 ffffcf82`14f62f01 fffff801`680da76d : VerifierExt!ObReferenceObjectByHandle_wrapper+0x30
ffffd001`d866c810 fffff801`6aff7146 : 00000000`000004f4 ffffd001`d866c940 ffffcf82`14f62ff0 fffff801`49766980 : nt!VerifierObReferenceObjectByHandle+0x49
ffffd001`d866c850 00000000`000004f4 : ffffd001`d866c940 ffffcf82`14f62ff0 fffff801`49766980 fffff801`6aff9060 : NvStreamKms+0x2146
ffffd001`d866c858 ffffd001`d866c940 : ffffcf82`14f62ff0 fffff801`49766980 fffff801`6aff9060 00000000`00000000 : 0x4f4
ffffd001`d866c860 ffffcf82`14f62ff0 : fffff801`49766980 fffff801`6aff9060 00000000`00000000 00000000`00000000 : 0xffffd001`d866c940
ffffd001`d866c868 fffff801`49766980 : fffff801`6aff9060 00000000`00000000 00000000`00000000 fffff801`6aff6574 : 0xffffcf82`14f62ff0
ffffd001`d866c870 fffff801`6aff9060 : 00000000`00000000 00000000`00000000 fffff801`6aff6574 ffffcf82`14ed4ea0 : nt!NonPagedPoolDescriptor+0x1c0
ffffd001`d866c878 00000000`00000000 : 00000000`00000000 fffff801`6aff6574 ffffcf82`14ed4ea0 ffffd001`d866c940 : NvStreamKms+0x4060
STACK_COMMAND: kb
FOLLOWUP_IP:
NvStreamKms+2146
fffff801`6aff7146 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: NvStreamKms+2146
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NvStreamKms
IMAGE_NAME: NvStreamKms.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 53604b00
FAILURE_BUCKET_ID: 0xc4_IrqlObPassive_XDV_VRF_NvStreamKms+2146
BUCKET_ID: 0xc4_IrqlObPassive_XDV_VRF_NvStreamKms+2146
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc4_irqlobpassive_xdv_vrf_nvstreamkms+2146
FAILURE_ID_HASH: {eace86cc-8949-b87a-9cb9-66f67ee34f9a}
Followup: MachineOwner
---------