locked
Constant random BSOD happening due to video drivers RRS feed

  • Question

  • Since about June a bunch of PCs in our organizations have been crashing. After looking at the dmp files we see that either nVidia, intel, or directx caused the crash. We update the video drivers, but still the PC crashes. The PC would either be a Dell (e6420, e6520) or Lenovo(T420s, W530). The majority of the dmp's have the words UNEXPECTED_KERNEL_MODE_TRAP. Any help will be appreciated, this has been plaguing us for months.
    Friday, October 10, 2014 6:28 PM

Answers


  • Hi stillNerdyCool,

    As we have several kind of computer have the BSOD issues, so it is recommended to upload these dump files for better analyzation as HonorGamer225 mentioned.

    Here is the dump file result.

    BugCheck 7F, {8, 80050031, 406f8, fffff8800322efec}

    *** ERROR: Module load completed but symbols could not be loaded for nvkflt.sys
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for igdkmd64.sys -
    *** ERROR: Module load completed but symbols could not be loaded for vsdatant.sys
    Probably caused by : nvkflt.sys ( nvkflt+18fec )

    SYMBOL_STACK_INDEX:  3
    SYMBOL_NAME:  nvkflt+18fec
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: nvkflt
    IMAGE_NAME:  nvkflt.sys
    DEBUG_FLR_IMAGE_TIMESTAMP:  534455e8
    FAILURE_BUCKET_ID:  X64_0x7f_8_nvkflt+18fec
    BUCKET_ID:  X64_0x7f_8_nvkflt+18fec

    The following link is BugCheck ID analyzation result.
    http://msdn.microsoft.com/en-us/library/windows/hardware/ff559244(v=vs.85).aspx
    Bug check 0x7F typically occurs after you install a faulty or mismatched hardware (especially memory) or if installed hardware fails.
    A double fault can occur when the kernel stack overflows. This overflow occurs if multiple drivers are attached to the same stack. For example, if two file system filter drivers are attached to the same stack and then the file system recurses back in, the stack overflows.

    As we can see the issue is related to nvkflt.sys igdkmd64.sys. They are associated with Inter and NVIDIA display card. I think we could update these driver from the manufacture website and check if these issue still exist.

    Hope it will be helpful.

    Best regards,
    Fangzhou CHEN


    Fangzhou CHEN
    TechNet Community Support

    • Marked as answer by Michael_LS Tuesday, October 21, 2014 3:03 AM
    Monday, October 13, 2014 10:55 AM

All replies

  • Here is the latest crash info:


    Kernel Summary Dump File: Only kernel address space is available


    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.18229.amd64fre.win7sp1_gdr.130801-1533
    Machine Name:
    Kernel base = 0xfffff800`02e14000 PsLoadedModuleList = 0xfffff800`030576d0
    Debug session time: Fri Oct 10 12:20:52.503 2014 (UTC - 4:00)
    System Uptime: 0 days 3:08:53.232
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ........
    Loading User Symbols

    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 7F, {8, 80050031, 406f8, fffff8800322efec}

    *** ERROR: Module load completed but symbols could not be loaded for nvkflt.sys
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for igdkmd64.sys - 
    *** ERROR: Module load completed but symbols could not be loaded for vsdatant.sys
    Probably caused by : nvkflt.sys ( nvkflt+18fec )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault).  The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
            use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
            use .trap on that value
    Else
            .trap on the appropriate frame will show where the trap was taken
            (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 0000000080050031
    Arg3: 00000000000406f8
    Arg4: fffff8800322efec

    Debugging Details:
    ------------------


    BUGCHECK_STR:  0x7f_8

    DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

    PROCESS_NAME:  System

    CURRENT_IRQL:  a

    ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

    EXCEPTION_RECORD:  fffff80002e67e04 -- (.exr 0xfffff80002e67e04)
    ExceptionAddress: 00076675870f40fe
       ExceptionCode: 74ff8548
      ExceptionFlags: 74f68556
    NumberParameters: 1064629893
       Parameter[0]: 001f0fce8b440000
       Parameter[1]: 0f10c783480f8b48
       Parameter[2]: 048154b60f0141b6
       Parameter[3]: 094c0fe083c28b48
       Parameter[4]: c148c28b4810c344
       Parameter[5]: 0090c384094c04e8
       Parameter[6]: e98349c0d1490000
       Parameter[7]: 3824748b48cd7501
       Parameter[8]: 7c8b4830245c8b48
       Parameter[9]: 28c48348c0332024
       Parameter[10]: 90909090909090c3
       Parameter[11]: 244c894c90909090
       Parameter[12]: 8948102454894820
       Parameter[13]: 485741564108244c
       Parameter[14]: 9824b48b4c58ec83

    LAST_CONTROL_TRANSFER:  from fffff80002e89129 to fffff80002e89b80

    STACK_TEXT:  
    fffff800`00ba4d28 fffff800`02e89129 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000406f8 : nt!KeBugCheckEx
    fffff800`00ba4d30 fffff800`02e875f2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff800`00ba4e70 fffff880`0322efec : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
    fffff880`0e1eefd0 fffff880`0322ef1d : fffffa80`103f1570 fffffa80`103f1570 fffffa80`113cc040 00000000`00000000 : nvkflt+0x18fec
    fffff880`0e1ef070 fffff880`0322ef1d : fffff880`0322ee87 fffffa80`103f1970 fffff880`0e1ef280 fffffa80`113cc040 : nvkflt+0x18f1d
    fffff880`0e1ef110 fffff880`0322ed6f : fffff880`0322ee87 fffffa80`113cc040 fffff880`0e1ef8b0 00000000`00000000 : nvkflt+0x18f1d
    fffff880`0e1ef1b0 fffff880`1058baf2 : fffff880`0322ecdd 00000000`00000000 00000000`00000000 00000000`00000000 : nvkflt+0x18d6f
    fffff880`0e1ef250 fffff880`10516a4b : 00000000`00000000 fffff880`00000000 fffff880`0e1ef890 00000000`00000000 : igdkmd64!hybDriverEntry+0x10dcc2
    fffff880`0e1ef7f0 fffff880`104a7133 : fffffa80`11502000 fffffa80`103f8010 00000000`00000000 fffffa80`1512354c : igdkmd64!hybDriverEntry+0x98c1b
    fffff880`0e1ef870 fffff880`03228d11 : 00000000`00000000 fffffa80`11502000 00000000`00000000 fffffa80`1caaf7b0 : igdkmd64!hybDriverEntry+0x29303
    fffff880`0e1ef8e0 fffff880`03228ed7 : fffff880`03228c7f fffffa80`10401c10 fffffa80`11502000 fffffa80`103f1570 : nvkflt+0x12d11
    fffff880`0e1ef980 fffff880`0322905a : fffff880`03228e3e 00000000`00000000 fffffa80`103f1420 00000000`00000001 : nvkflt+0x12ed7
    fffff880`0e1efa30 fffff800`02e859dc : fffff880`03228fc7 fffff880`0e1efe30 fffff880`0e1efb50 fffffa80`0ffe3f00 : nvkflt+0x1305a
    fffff880`0e1efad0 fffff800`02e8be23 : fffff800`02e67e04 fffff880`0e1f0930 fffff880`0e1f0400 fffff880`0e1f0408 : nt!KiInterruptDispatch+0x16c
    fffff880`0e1efc68 fffff800`02e67e04 : fffff880`0e1f0930 fffff880`0e1f0400 fffff880`0e1f0408 00000000`00000000 : nt!memset+0x93
    fffff880`0e1efc70 fffff800`02e57cbc : fffff880`0e1efd50 fffffa80`139667c8 fffffa80`15113148 00000000`00000000 : nt!RtlSidHashInitialize+0x34
    fffff880`0e1efca0 fffff800`02e57dff : fffffa80`139667c8 00000000`00000001 fffffa80`15123000 fffff880`0e1f0408 : nt!SepTokenFromAccessInformation+0xbc
    fffff880`0e1efcd0 fffff880`01cfda3a : fffff880`0e1f03e0 fffff880`01cfd501 fffff880`0e1f0408 fffff880`0e1f0400 : nt!SeAccessCheckFromState+0x9f
    fffff880`0e1f03c0 fffff880`01cfd29f : fffffa80`1515cf48 00000000`00000000 00000000`00000001 fffff880`01cfd434 : NETIO!CompareSecurityContexts+0x6a
    fffff880`0e1f0430 fffff880`01cfd434 : 00000000`00000000 00000000`00000000 fffffa80`13c57be0 fffff880`01cfd753 : NETIO!MatchValues+0xef
    fffff880`0e1f0480 fffff880`01cfd8e2 : 00000000`00000000 fffffa80`1119aa70 fffff880`0e1f06a8 fffffa80`0fa25ca0 : NETIO!FilterMatch+0x94
    fffff880`0e1f04d0 fffff880`01cfe6ec : 00000000`00000000 00000000`00000010 fffffa80`0fa25ca0 fffff880`0e1f0690 : NETIO!IndexListClassify+0x69
    fffff880`0e1f0550 fffff880`01e811c7 : fffffa80`0fa25ca0 fffff880`0e1f0930 00000000`00000000 fffffa80`20ee5e20 : NETIO!KfdClassify+0xa4e
    fffff880`0e1f08c0 fffff880`01e82d94 : fffffa80`0fa25ca0 fffffa80`14b2a800 fffff880`0e1f1348 fffffa80`111c70e0 : tcpip!WfpAleClassify+0x57
    fffff880`0e1f0900 fffff880`01e83125 : 00000000`00000000 fffff880`00000000 00000000`00000000 00000000`00000002 : tcpip!WfpAlepReauthorizeInboundConnection+0x5f4
    fffff880`0e1f0c00 fffff880`01e5a1cd : fffffa80`14b2a800 fffff880`0e1f0d7c 00000001`00000011 fffffa80`111c70e0 : tcpip!WfpAleReauthorizeInboundConnection+0x1f5
    fffff880`0e1f0d60 fffff880`01e556da : 00000000`00000797 fffffa80`111c71d0 fffffa80`13c44ec0 fffff880`0e1f1200 : tcpip!WfpAleReauthorizeConnection+0x63d
    fffff880`0e1f0ec0 fffff880`01e80bfa : fffffa80`14b2a800 00000000`00000002 00000000`00000000 00000000`00000100 : tcpip!TlShimOptionalReauthorizeConnection+0x2ca
    fffff880`0e1f1000 fffff880`01e8deed : fffff880`00000003 fffff880`00000000 fffff880`00000003 fffffa80`20ee5e20 : tcpip!ProcessALEForTransportPacket+0x3ea
    fffff880`0e1f1270 fffff880`01e81e48 : fffffa80`14b2a800 fffffa80`00000000 00000000`00000000 fffffa80`0fa2eb14 : tcpip!ProcessAleForNonTcpIn+0x1ad
    fffff880`0e1f1390 fffff880`01e598b8 : fffffa80`00000011 fffff880`0e1f0002 fffffa80`14b2eb14 00000000`0000fccc : tcpip!WfpProcessInTransportStackIndication+0xb98
    fffff880`0e1f1520 fffff880`01e85fb9 : 00000000`00000018 fffffa80`0fa5b820 00000000`00000000 fffff880`01e865b4 : tcpip!InetInspectReceiveDatagram+0x1d8
    fffff880`0e1f15c0 fffff880`01e85b34 : fffffa80`14bcbb60 fffffa80`1398d160 fffffa80`13f88080 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x89
    fffff880`0e1f16e0 fffff880`01e800de : fffffa80`0ccc7000 00000000`00000018 fffffa80`00000000 fffff880`0e1f1810 : tcpip!UdpDeliverDatagrams+0x2f4
    fffff880`0e1f17c0 fffff880`01e55197 : 00000000`00000000 fffff800`03401a01 00000000`00000001 fffffa80`00000005 : tcpip!UdpReceiveDatagrams+0x18f
    fffff880`0e1f18a0 fffff880`01e54caa : 00000000`00000000 fffff880`01f6ba10 fffff880`0e1f1a60 00000000`00000000 : tcpip!IppDeliverListToProtocol+0xf7
    fffff880`0e1f1960 fffff880`01e54261 : fffff880`01f6ba10 fffffa80`214afa30 00000000`00000011 fffff880`0e1f1a50 : tcpip!IppProcessDeliverList+0x5a
    fffff880`0e1f1a00 fffff880`01e51eef : 00000000`fc0000e0 fffff880`01f6ba10 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x232
    fffff880`0e1f1b00 fffff880`01f36022 : fffffa80`13439590 00000000`00000000 fffffa80`103c9501 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`0e1f1d00 fffff880`01d8db16 : fffffa80`210bb002 fffffa80`210bb010 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
    fffff880`0e1f1d40 fffff880`04aba7cc : fffffa80`0ccf8570 fffffa80`103c9540 fffffa80`103c9600 fffffa80`214af900 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
    fffff880`0e1f1df0 fffff880`04aba8e5 : fffffa80`103c9540 fffff880`0e1f2700 fffffa80`103c9600 00000000`00000000 : vsdatant+0x137cc
    fffff880`0e1f1e80 fffff880`04ab9c07 : fffffa80`1d645010 fffff880`0e1f2700 fffffa80`1d645010 fffffa80`103c9600 : vsdatant+0x138e5
    fffff880`0e1f1ec0 fffff880`04ab53b4 : fffffa80`103c9540 fffffa80`103c9500 fffff880`0e1f2700 fffffa80`00000000 : vsdatant+0x12c07
    fffff880`0e1f1fd0 fffff880`01d15aaf : fffff880`0e1f26c8 fffff880`0e1f2280 fffffa80`24383ae0 fffffa80`0cceb040 : vsdatant+0xe3b4
    fffff880`0e1f2110 fffff880`01cfcf58 : 00000000`00000018 fffff880`0e1f26c8 fffffa80`111c7138 fffffa80`24383ae0 : NETIO! ?? ::FNODOBFM::`string'+0x7277
    fffff880`0e1f2230 fffff880`01cfe5d2 : 00000000`00000018 fffff880`0e1f26c8 fffff880`0e1f27e0 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x238
    fffff880`0e1f2300 fffff880`01f006cb : fffff880`0e1f2d18 fffff880`0e1f26c8 fffff880`00000000 fffffa80`24383ae0 : NETIO!KfdClassify+0x934
    fffff880`0e1f2670 fffff880`01eb8102 : 00000000`00000000 fffffa80`14b2a800 fffffa80`111c7240 00000000`00000100 : tcpip!WFPDatagramDataShimV4+0x49b
    fffff880`0e1f29d0 fffff880`01e8deed : fffff880`00000003 fffff880`00000000 fffff880`00000003 fffffa80`24383ae0 : tcpip! ?? ::FNODOBFM::`string'+0x26aa2
    fffff880`0e1f2c40 fffff880`01e81e48 : fffffa80`14b2a800 fffffa80`00000000 00000000`00000000 fffffa80`0fa2eb14 : tcpip!ProcessAleForNonTcpIn+0x1ad
    fffff880`0e1f2d60 fffff880`01e598b8 : fffffa80`00000011 fffff880`0e1f0002 fffffa80`14b2eb14 00000000`0000fccc : tcpip!WfpProcessInTransportStackIndication+0xb98
    fffff880`0e1f2ef0 fffff880`01e85fb9 : 00000000`00000018 fffffa80`0fa5b820 00000000`00000000 fffff880`01e865b4 : tcpip!InetInspectReceiveDatagram+0x1d8
    fffff880`0e1f2f90 fffff880`01e85b34 : fffffa80`14bcbb60 fffffa80`1398d160 fffffa80`13f88080 00000000`00000000 : tcpip!UdpBeginMessageIndication+0x89
    fffff880`0e1f30b0 fffff880`01e800de : fffffa80`0ccc7000 00000000`00000018 fffffa80`00000000 fffff880`0e1f31e0 : tcpip!UdpDeliverDatagrams+0x2f4
    fffff880`0e1f3190 fffff880`01e55197 : fffffa80`138f0007 fffff880`0e1f3301 00000000`00000002 fffff880`00000005 : tcpip!UdpReceiveDatagrams+0x18f
    fffff880`0e1f3270 fffff880`01e54caa : 00000000`00000000 fffff880`01f6ba10 fffff880`0e1f3430 00000000`00000000 : tcpip!IppDeliverListToProtocol+0xf7
    fffff880`0e1f3330 fffff880`01e54261 : fffff880`01f6ba10 fffffa80`21196e80 00000000`00000011 fffff880`0e1f3420 : tcpip!IppProcessDeliverList+0x5a
    fffff880`0e1f33d0 fffff880`01e51eef : 00000000`fc0000e0 fffff880`01f6ba10 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x232
    fffff880`0e1f34d0 fffff880`01e514c2 : fffffa80`13439590 00000000`00000000 fffffa80`13884b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`0e1f36d0 fffff880`01e508ea : fffffa80`13884ba0 fffff880`0e1f3800 fffffa80`13884ba0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`0e1f37b0 fffff800`02e95878 : fffffa80`20190030 00000000`00004800 fffffa80`2429eab0 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
    fffff880`0e1f3800 fffff880`01e50fe2 : fffff880`01e50810 fffff880`0e1f3c00 fffff880`0e1f3c02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`0e1f38e0 fffff880`01cc40eb : fffffa80`138b98d0 00000000`00000000 fffffa80`115af1a0 fffffa80`115af1a0 : tcpip!FlReceiveNetBufferListChain+0xb2
    fffff880`0e1f3950 fffff880`01c8dad6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
    fffff880`0e1f39c0 fffff880`01c105d4 : fffffa80`115af1a0 00000000`00000002 00000000`00000001 fffff880`091b300f : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
    fffff880`0e1f3e40 fffff880`01c10549 : fffffa80`13884050 fffff880`091b5630 00000000`00000008 fffff880`01c07d9f : ndis!ndisMTopReceiveNetBufferLists+0x24
    fffff880`0e1f3e80 fffff880`01c104e0 : ffff0000`0aaf8d9e 00000000`00000000 00000000`00000000 fffffa80`138b8930 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff880`0e1f3ec0 fffff880`04abd9f4 : 00000000`00000000 fffffa80`20190030 00000000`00000000 fffffa80`138b8930 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff880`0e1f3f00 fffff880`04abdb20 : 00000000`0000ff00 fffffa80`00000000 00000001`00000000 fffffa80`138a8670 : vsdatant+0x169f4
    fffff880`0e1f3f70 fffff880`01c10549 : 00000000`00000000 00000000`00000000 fffffa80`138ae020 00000000`00000001 : vsdatant+0x16b20
    fffff880`0e1f3fb0 fffff880`01c104e0 : fffff880`091ed5c0 fffffa80`138b1010 fffffa80`138ae020 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
    fffff880`0e1f3ff0 fffff880`091b67ee : fffffa80`138b1010 00000000`00000000 fffffa80`20190030 fffff880`091ed5c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
    fffff880`0e1f4030 fffff880`01c10549 : fffffa80`11c57260 00000000`00000000 00000000`00000001 00000000`00000001 : nwifi!Pt6Receive+0x296
    fffff880`0e1f4090 fffff880`01c104e0 : fffffa80`1220f028 fffff880`0320a0c7 fffff880`0320b340 00000000`00000010 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29


    STACK_COMMAND:  kb

    FOLLOWUP_IP: 
    nvkflt+18fec
    fffff880`0322efec e85b90feff      call    nvkflt+0x204c (fffff880`0321804c)

    SYMBOL_STACK_INDEX:  3

    SYMBOL_NAME:  nvkflt+18fec

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nvkflt

    IMAGE_NAME:  nvkflt.sys

    DEBUG_FLR_IMAGE_TIMESTAMP:  534455e8

    FAILURE_BUCKET_ID:  X64_0x7f_8_nvkflt+18fec

    BUCKET_ID:  X64_0x7f_8_nvkflt+18fec

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:x64_0x7f_8_nvkflt+18fec

    FAILURE_ID_HASH:  {852d6a08-1c03-cc24-3abf-2b8e31df551a}

    Followup: MachineOwner
    ---------
    Friday, October 10, 2014 6:37 PM
  • Could you attach the dump files?
    Sunday, October 12, 2014 4:11 AM

  • Hi stillNerdyCool,

    As we have several kind of computer have the BSOD issues, so it is recommended to upload these dump files for better analyzation as HonorGamer225 mentioned.

    Here is the dump file result.

    BugCheck 7F, {8, 80050031, 406f8, fffff8800322efec}

    *** ERROR: Module load completed but symbols could not be loaded for nvkflt.sys
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for igdkmd64.sys -
    *** ERROR: Module load completed but symbols could not be loaded for vsdatant.sys
    Probably caused by : nvkflt.sys ( nvkflt+18fec )

    SYMBOL_STACK_INDEX:  3
    SYMBOL_NAME:  nvkflt+18fec
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: nvkflt
    IMAGE_NAME:  nvkflt.sys
    DEBUG_FLR_IMAGE_TIMESTAMP:  534455e8
    FAILURE_BUCKET_ID:  X64_0x7f_8_nvkflt+18fec
    BUCKET_ID:  X64_0x7f_8_nvkflt+18fec

    The following link is BugCheck ID analyzation result.
    http://msdn.microsoft.com/en-us/library/windows/hardware/ff559244(v=vs.85).aspx
    Bug check 0x7F typically occurs after you install a faulty or mismatched hardware (especially memory) or if installed hardware fails.
    A double fault can occur when the kernel stack overflows. This overflow occurs if multiple drivers are attached to the same stack. For example, if two file system filter drivers are attached to the same stack and then the file system recurses back in, the stack overflows.

    As we can see the issue is related to nvkflt.sys igdkmd64.sys. They are associated with Inter and NVIDIA display card. I think we could update these driver from the manufacture website and check if these issue still exist.

    Hope it will be helpful.

    Best regards,
    Fangzhou CHEN


    Fangzhou CHEN
    TechNet Community Support

    • Marked as answer by Michael_LS Tuesday, October 21, 2014 3:03 AM
    Monday, October 13, 2014 10:55 AM
  • Hi stillNerdyCool,

    We are having the same exact issue with our E6420's.  Can we chat about it?

    Thanks

    Rich

    Thursday, November 6, 2014 5:39 PM