100710-16910-01.dmp
MEMORY_MANAGEMENT (1a)
win32k!memset+80
100210-14617-01.dmp
PFN_LIST_CORRUPT (4e)
memory_corruption ( nt!MiBadShareCount+4c )
100410-22089-01.dmp
CLOCK_WATCHDOG_TIMEOUT (101)
Stack: nt!, win32k!, hal!, nt!
Unknown_Image ( ANALYSIS_INCONCLUSIVE )
1. Update:
nvoclk64.sys Mon Aug 18 19:00:01 2008
NVidia System Utility Driver (overclocking related)
adfs.SYS Thu Jun 26 23:52:37 2008
Adobe
P17.sys Tue Apr 21 09:12:47 2009
Creative SB Audigy LS
AsIO.sys Mon Aug 03 10:03:16 2009
ASUS Probe
nusb3xhc.sys Mon Oct 26 16:19:48 2009
USB 3.0 Device Driver NEC Electronics Corporation
2. If crashes persist:
1) run memtest.org overnight RAM - Test with Memtest86+
2) enable driver verifier Driver Verifier - Enable and Disable
3) attach your latest crash dumps
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100710-16910-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e4f000 PsLoadedModuleList = 0xfffff800`0308ce50
System Uptime: 0 days 1:07:55.816
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff90000812000, 1f39, 70300003ee5}
Probably caused by : win32k.sys ( win32k!memset+80 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff90000812000
Arg3: 0000000000001f39
Arg4: 0000070300003ee5
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: spotify.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800547e0b0 -- (.trap 0xfffff8800547e0b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff900c2c6b000 rbx=0000000000000000 rcx=fffff900c2c71000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff960000e3b90 rsp=fffff8800547e248 rbp=0000000000000001
r8=0000000000000008 r9=000000000000074b r10=000000000000007f
r11=0000000000000034 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
win32k!memset+0x80:
fffff960`000e3b90 488911 mov qword ptr [rcx],rdx ds:8cc0:fffff900`c2c71000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f2ee58 to fffff80002ebf740
STACK_TEXT:
fffff880`0547dd48 fffff800`02f2ee58 : 00000000`0000001a 00000000`00005003 fffff900`00812000 00000000`00001f39 : nt!KeBugCheckEx
fffff880`0547dd50 fffff800`02edbca2 : 00000000`00000001 fffff900`c2c71000 fffff880`0547e0b0 fffff6fc`80616388 : nt! ?? ::FNODOBFM::`string'+0x29f57
fffff880`0547de40 fffff800`02ed9cf1 : fffff900`c2b13ff8 00000000`00002c6b fffff880`039f8bd0 fffff800`02ed768f : nt!MiDispatchFault+0x8c2
fffff880`0547df50 fffff800`02ebd82e : 00000000`00000001 fffff900`c2c6b000 00000000`35316800 fffff900`c2c6b000 : nt!MmAccessFault+0x8f1
fffff880`0547e0b0 fffff960`000e3b90 : fffff960`000d29d2 fffff900`c0a9a9f0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`0547e248 fffff960`000d29d2 : fffff900`c0a9a9f0 00000000`00000000 00000000`00000000 fffff960`000e4d0a : win32k!memset+0x80
fffff880`0547e250 fffff960`000d3eeb : 00000000`00000001 fffff880`0547e458 00000000`00000001 00000000`00000000 : win32k!AllocateObject+0xf2
fffff880`0547e290 fffff960`00254886 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!SURFMEM::bCreateDIB+0x1fb
fffff880`0547e380 fffff960`000be741 : 00000980`00000000 fffffa80`036cb040 fffff900`c08aece8 00000000`00000018 : win32k!EngHTBlt+0x9fe
fffff880`0547e7d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!EngStretchBltNew+0x2b9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!memset+80
fffff960`000e3b90 488911 mov qword ptr [rcx],rdx
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32k!memset+80
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c483f
FAILURE_BUCKET_ID: X64_0x1a_5003_win32k!memset+80
BUCKET_ID: X64_0x1a_5003_win32k!memset+80
Followup: MachineOwner
---------
2: kd> lmtn
start end module name
fffff800`00ba8000 fffff800`00bb2000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02e06000 fffff800`02e4f000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff800`02e4f000 fffff800`0342b000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff880`00c00000 fffff880`00c10000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00c10000 fffff880`00c2a000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00c2a000 fffff880`00c54000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00c54000 fffff880`00c5f000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00c8d000 fffff880`00cd1000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:29:10 2009 (4A5BDF66)
fffff880`00cd1000 fffff880`00ce5000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00ce5000 fffff880`00d43000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d43000 fffff880`00d9a000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00d9a000 fffff880`00df6000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00e00000 fffff880`00e0d000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00e0d000 fffff880`00e22000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00e22000 fffff880`00e37000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e37000 fffff880`00e3e000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00e3e000 fffff880`00e47000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00e47000 fffff880`00f07000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00f07000 fffff880`00fab000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00fab000 fffff880`00fba000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00fba000 fffff880`00fc3000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00fc3000 fffff880`00fcd000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00fcd000 fffff880`01000000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`0102a000 fffff880`01076000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`01076000 fffff880`0108a000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`0108a000 fffff880`010e8000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`010e8000 fffff880`0115b000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`0115b000 fffff880`011a7000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`011a7000 fffff880`011e1000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01235000 fffff880`0123e000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`01250000 fffff880`013f3000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`0144a000 fffff880`0145a000 vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`0145a000 fffff880`01462000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`01462000 fffff880`01474000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`0147b000 fffff880`0156d000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0156d000 fffff880`015cd000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`015cd000 fffff880`015f8000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`01800000 fffff880`0182d000 MpFilter MpFilter.sys Sat Mar 20 07:58:08 2010 (4BA463F0)
fffff880`0182d000 fffff880`01836000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`01836000 fffff880`0183d000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`0183d000 fffff880`0184b000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`0184b000 fffff880`01870000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`01870000 fffff880`01880000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`01880000 fffff880`01889000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01889000 fffff880`01892000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`01892000 fffff880`0189b000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`0189b000 fffff880`018a6000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`018a6000 fffff880`018b7000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`018b7000 fffff880`018d5000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`018d5000 fffff880`018e2000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`018f6000 fffff880`01930000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01930000 fffff880`01946000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01946000 fffff880`01976000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`019ac000 fffff880`019d6000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`02c38000 fffff880`02cc2000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02cc2000 fffff880`02d07000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02d07000 fffff880`02d10000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02d10000 fffff880`02d36000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02d36000 fffff880`02d45000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02d45000 fffff880`02d60000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`02d60000 fffff880`02d74000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`02d74000 fffff880`02dc5000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`02dc5000 fffff880`02dd1000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`02dd1000 fffff880`02ddc000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`02ddc000 fffff880`02deb000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`04034000 fffff880`040b7000 csc csc.sys Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`040b7000 fffff880`040d5000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`040d5000 fffff880`040e6000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`040e6000 fffff880`040ec000 AsIO AsIO.sys Mon Aug 03 10:03:16 2009 (4A768BB4)
fffff880`040ec000 fffff880`04112000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`04112000 fffff880`04128000 intelppm intelppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`04128000 fffff880`04143000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04143000 fffff880`04164000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`04164000 fffff880`0417e000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`0417e000 fffff880`0418d000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0418d000 fffff880`0419c000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0419c000 fffff880`041ae000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`04200000 fffff880`0422f000 nusb3xhc nusb3xhc.sys Mon Oct 26 16:19:48 2009 (4AE5B004)
fffff880`0422f000 fffff880`04230f00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`04231000 fffff880`04325000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`04325000 fffff880`0436b000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`0436b000 fffff880`0438f000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`0438f000 fffff880`043a0000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`043a0000 fffff880`043f6000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`043f6000 fffff880`043ff000 wmiacpi wmiacpi.sys Tue Jul 14 02:31:02 2009 (4A5BC3B6)
fffff880`04400000 fffff880`0443d000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`0443d000 fffff880`0445f000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`0445f000 fffff880`04464200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`04465000 fffff880`0446d000 ASACPI ASACPI.sys Thu Jul 16 06:31:29 2009 (4A5E9F11)
fffff880`0446d000 fffff880`0447a000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`0447a000 fffff880`0447b480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`0447c000 fffff880`045fb000 P17 P17.sys Tue Apr 21 09:12:47 2009 (49ED63DF)
fffff880`04c00000 fffff880`04c0e000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`04c0e000 fffff880`04c31000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`04c31000 fffff880`04c52000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`04c52000 fffff880`04c67000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`04c67000 fffff880`04c7f000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`04cb5000 fffff880`04d0f000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`04d0f000 fffff880`04d26000 nusb3hub nusb3hub.sys Mon Oct 26 16:19:44 2009 (4AE5B000)
fffff880`04d26000 fffff880`04d3b000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`04d3b000 fffff880`04d4c000 usbaapl64 usbaapl64.sys Thu Apr 01 06:20:15 2010 (4BB410EF)
fffff880`04d4c000 fffff880`04d5a000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`04d5a000 fffff880`04d73000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`04d73000 fffff880`04d7b080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`04d7c000 fffff880`04d99000 usbccgp usbccgp.sys Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`04d99000 fffff880`04da6000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`04da6000 fffff880`04db2000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`04db2000 fffff880`04dc0000 kbdhid kbdhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`04dc0000 fffff880`04dce000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`04dce000 fffff880`04dda000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`04dda000 fffff880`04de3000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`04de3000 fffff880`04df6000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`05a00000 fffff880`05a23000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`05a23000 fffff880`05a3b000 adfs adfs.SYS Thu Jun 26 23:52:37 2008 (48640195)
fffff880`05a3b000 fffff880`05a44000 cpuz134_x64 cpuz134_x64.sys Fri Jul 09 14:16:58 2010 (4C37052A)
fffff880`05a44000 fffff880`05a53000 nvoclk64 nvoclk64.sys Mon Aug 18 19:00:01 2008 (48A99C81)
fffff880`05a66000 fffff880`05b2e000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`05b2e000 fffff880`05b4c000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`05b4c000 fffff880`05b64000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`05b64000 fffff880`05b91000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`05b91000 fffff880`05bdf000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`05e01000 fffff880`05ea7000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`05ea7000 fffff880`05eb2000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`05eb2000 fffff880`05edf000 srvnet srvnet.sys Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`05edf000 fffff880`05ef1000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`05ef1000 fffff880`05f59000 srv2 srv2.sys Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`05f59000 fffff880`05fef000 srv srv.sys Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`05fef000 fffff880`05fff000 MpNWMon MpNWMon.sys Sat Mar 20 07:58:00 2010 (4BA463E8)
fffff880`08ca5000 fffff880`08cb0000 asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
fffff880`0fe00000 fffff880`0fe16000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`0fe16000 fffff880`0fe3a000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`0fe3a000 fffff880`0fe46000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`0fe46000 fffff880`0fe75000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`0fe75000 fffff880`0fe80000 rdpbus rdpbus.sys Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`0fe85000 fffff880`10b16e00 nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:58 2010 (4C37918E)
fffff880`10b17000 fffff880`10b18180 nvBridge nvBridge.kmd Sat Jul 10 00:07:54 2010 (4C378FAA)
fffff880`10b19000 fffff880`10b6f000 Rt64win7 Rt64win7.sys Wed Jun 23 12:10:45 2010 (4C21CF95)
fffff880`10b6f000 fffff880`10bb2000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`10bb2000 fffff880`10bf0000 1394ohci 1394ohci.sys Tue Jul 14 03:07:12 2009 (4A5BCC30)
fffff880`10bf0000 fffff880`10c00000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff960`00020000 fffff960`0032f000 win32k win32k.sys Sat Jun 19 07:31:59 2010 (4C1C483F)
fffff960`00510000 fffff960`0051a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00630000 fffff960`00657000 cdd cdd.dll Wed May 19 22:48:26 2010 (4BF4408A)
fffff960`00800000 fffff960`00861000 ATMFD ATMFD.DLL Thu May 27 07:11:31 2010 (4BFDF0F3)
Unloaded modules:
fffff880`08c34000 fffff880`08ca5000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01976000 fffff880`01984000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01984000 fffff880`01990000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01990000 fffff880`01999000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01999000 fffff880`019ac000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100210-14617-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e50
System Uptime: 0 days 5:14:11.097
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, c5828, 2, 1084e3}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000000c5828, page frame number
Arg3: 0000000000000002, current page state
Arg4: 00000000001084e3, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002f0338c to fffff80002e73740
STACK_TEXT:
fffff880`0669d998 fffff800`02f0338c : 00000000`0000004e 00000000`00000099 00000000`000c5828 00000000`00000002 : nt!KeBugCheckEx
fffff880`0669d9a0 fffff800`02ed04d2 : 00000000`00000002 00000000`00000000 fffffa80`01265190 00000000`00000000 : nt!MiBadShareCount+0x4c
fffff880`0669d9e0 fffff800`02f3429d : fffffa80`01265190 fffff880`0669db40 00000000`00000080 00000000`000a0418 : nt! ?? ::FNODOBFM::`string'+0x11aa2
fffff880`0669da40 fffff800`02e203a4 : fffff680`000195a8 fffff880`0669db40 00000000`00000000 ffffffff`ffffffff : nt!MiRemoveLowestPriorityStandbyPage+0x2ad
fffff880`0669dac0 fffff800`02e7182e : 00000000`00000001 00000000`032b4640 00000000`00000001 fffffa80`064e9800 : nt! ?? ::FNODOBFM::`string'+0x43485
fffff880`0669dc20 00000000`683e1dbf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0b15e8f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x683e1dbf
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02f0338c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100410-22089-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e09000 PsLoadedModuleList = 0xfffff800`03046e50
System Uptime: 0 days 3:54:55.595
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 101, {19, 0, fffff88002f64180, 2}
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CLOCK_WATCHDOG_TIMEOUT (101)
An expected clock interrupt was not received on a secondary processor in an
MP system within the allocated interval. This indicates that the specified
processor is hung and not processing interrupts.
Arguments:
Arg1: 0000000000000019, Clock interrupt time out interval in nominal clock ticks.
Arg2: 0000000000000000, 0.
Arg3: fffff88002f64180, The PRCB address of the hung processor.
Arg4: 0000000000000002, 0.
Debugging Details:
------------------
BUGCHECK_STR: CLOCK_WATCHDOG_TIMEOUT_8_PROC
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: explorer.exe
CURRENT_IRQL: d
STACK_TEXT:
fffff880`0b4a9af8 fffff800`02e27453 : 00000000`00000101 00000000`00000019 00000000`00000000 fffff880`02f64180 : nt!KeBugCheckEx
fffff880`0b4a9b00 fffff800`02e81de7 : 00000000`00000000 fffff800`00000002 00000000`00002710 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x4dfe
fffff880`0b4a9b90 fffff800`033ef895 : fffff800`03414460 fffff880`0b4a9d40 fffff800`03414460 00000000`00000000 : nt!KeUpdateSystemTime+0x377
fffff880`0b4a9c90 fffff800`02e75c33 : 00000000`3d901e94 fffff800`02ff3e80 fffff800`02ff3e80 00000000`00000001 : hal!HalpHpetClockInterrupt+0x8d
fffff880`0b4a9cc0 fffff800`02e87608 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLock+0x163
fffff880`0b4a9e50 fffff800`02e123f3 : 00000000`00000001 00000000`00000000 fffff880`03f1cc00 00000000`00000000 : nt!KeFlushMultipleRangeTb+0x258
fffff880`0b4a9f20 fffff800`02f80478 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x478da
fffff880`0b4aa080 fffff800`02f80928 : 00000000`00000001 fffff800`02f80693 00000000`0a2ff29c 00000000`030115a1 : nt!MiPurgeSpecialPoolPaged+0x18
fffff880`0b4aa0b0 fffff800`02fac390 : 00000000`000000e0 00000000`34616c47 00000000`00040c20 fffff900`c966cf20 : nt!MmFreeSpecialPool+0x468
fffff880`0b4aa1f0 fffff960`001a4bb0 : fffff980`11adaf80 00000000`00000001 fffff900`c10ec280 fffff900`c627c630 : nt!ExDeferredFreePool+0xf4d
fffff880`0b4aa2a0 fffff960`0016bf00 : fffff880`0b4aa328 00000000`030115a1 00000000`00000000 00000000`00000000 : win32k!FreeObject+0x40
fffff880`0b4aa2d0 fffff960`001a5ca5 : fffff880`0b4aa440 00000000`170115d6 00000000`00000001 fffff900`c000cf40 : win32k!RGNOBJ::vDeleteRGNOBJ+0x24
fffff880`0b4aa300 fffff960`002db6c9 : fffff880`0b4aa440 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!XDCOBJ::bCleanDC+0xfd
fffff880`0b4aa3c0 fffff960`001a7466 : fffff880`0b4aa440 00000000`00000000 00000000`00000000 ffffffff`8f0513da : win32k!bDeleteDCInternalWorker+0x29
fffff880`0b4aa420 fffff960`00166690 : 00000000`170115d6 fffff880`0b4aa520 00000000`00000000 00000000`00000000 : win32k!bDeleteDCInternal+0x56
fffff880`0b4aa470 fffff800`02e78993 : fffffa80`049f95a0 fffff880`0b4aa520 00000000`0185000f 00000000`00000000 : win32k!NtGdiDeleteObjectApp+0x120
fffff880`0b4aa4a0 000007fe`fead118a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0a2fe988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fead118a
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_CLOCK_WATCHDOG_TIMEOUT_8_PROC_VRF_ANALYSIS_INCONCLUSIVE
BUCKET_ID: X64_CLOCK_WATCHDOG_TIMEOUT_8_PROC_VRF_ANALYSIS_INCONCLUSIVE
Followup: MachineOwner
---------