Hello, welcome to SevenForums!
Two dumps, one points to cdd.dll and the other to usbhub.sys. cdd.dll is the Canonical Display Driver, so there may be an issue with your video card drivers. First off, I'd like you to uninstall your current video card drivers and install the latest version from Drivers - Download NVIDIA Drivers
Second, there's a few tests I'd like you to run:
Chkdsk:
- Open the "Computer" window
- Right-click on the drive in question
- Select the "Tools" tab
- In the Error-checking area, click <Check Now>.
Memtest:
Read the following to test your memory for errors.
Driver Verifier:
Read the following to enable Driver Verifier. Use Driver Second if Memtest finds nothing, as it's likely a software / driver issue, we just aren't being told what it is, and hopefully Driver Verifier will than force a crash if it finds the violating driver.
Before enabling Driver Verifier, my recommendation is to set a backup / restore point as in severe cases Driver Verifier can break your Windows. If you have difficulty getting into Windows, boot into Safe Mode and disable Driver Verifier there.
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Icarus\Downloads\Dumps\Windows_NT6_BSOD_jcgriff2\022612-51558-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`05809000 PsLoadedModuleList = 0xfffff800`05a4e670
Debug session time: Sun Feb 26 17:24:48.510 2012 (UTC - 5:00)
System Uptime: 0 days 0:06:47.665
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff900c52bb000, 0, fffff960007800d4, 0}
Could not read faulting driver name
Probably caused by : cdd.dll ( cdd!memcpy+b4 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900c52bb000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff960007800d4, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
OVERLAPPED_MODULE: Address regions for 'nvlddmkm' and 'nvlddmkm.sys' overlap
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80005ab8100
fffff900c52bb000
FAULTING_IP:
cdd!memcpy+b4
fffff960`007800d4 4c8b540a08 mov r10,qword ptr [rdx+rcx+8]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800b12cf50 -- (.trap 0xfffff8800b12cf50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000e2ea38
rdx=fffff900c448c5c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff960007800d4 rsp=fffff8800b12d0e8 rbp=000000000000009a
r8=000000000000093c r9=0003fffffffd6251 r10=0000000000000000
r11=00000000008f2b34 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cdd!memcpy+0xb4:
fffff960`007800d4 4c8b540a08 mov r10,qword ptr [rdx+rcx+8] ds:d180:fffff900`c52bb000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800058319fc to fffff80005885c40
STACK_TEXT:
fffff880`0b12cde8 fffff800`058319fc : 00000000`00000050 fffff900`c52bb000 00000000`00000000 fffff880`0b12cf50 : nt!KeBugCheckEx
fffff880`0b12cdf0 fffff800`05883d6e : 00000000`00000000 fffff900`c52bb000 fffff8a0`01343a00 fffff900`c4d7f0f4 : nt! ?? ::FNODOBFM::`string'+0x4611f
fffff880`0b12cf50 fffff960`007800d4 : fffff960`00764281 00000000`00000000 fffff8a0`01400000 00000000`00000001 : nt!KiPageFault+0x16e
fffff880`0b12d0e8 fffff960`00764281 : 00000000`00000000 fffff8a0`01400000 00000000`00000001 00000000`00000000 : cdd!memcpy+0xb4
fffff880`0b12d0f0 fffff960`00764c26 : fffff900`c00de020 00000000`00000030 fffff900`c1da6130 fffff900`c01d02b0 : cdd!CopyBits+0xed
fffff880`0b12d130 fffff960`0076606c : ffffffff`fffd7476 00000000`0b0407d8 00000000`00000001 00000000`00000000 : cdd!CddPresentBlt+0x2ae
fffff880`0b12d870 fffff800`05b20fee : fffff880`00000004 fffffa80`06251b60 00000000`00000080 fffffa80`071ceaa0 : cdd!PresentWorkerThread+0xd00
fffff880`0b12dc00 fffff800`058775e6 : fffff880`02fe3180 fffffa80`06251b60 fffff880`02fee040 fffff880`01259cb0 : nt!PspSystemThreadStartup+0x5a
fffff880`0b12dc40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
cdd!memcpy+b4
fffff960`007800d4 4c8b540a08 mov r10,qword ptr [rdx+rcx+8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: cdd!memcpy+b4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7c546
FAILURE_BUCKET_ID: X64_0x50_cdd!memcpy+b4
BUCKET_ID: X64_0x50_cdd!memcpy+b4
Followup: MachineOwner
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Icarus\Downloads\Dumps\Windows_NT6_BSOD_jcgriff2\022612-32261-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0581d000 PsLoadedModuleList = 0xfffff800`05a62670
Debug session time: Sun Feb 26 18:01:20.399 2012 (UTC - 5:00)
System Uptime: 0 days 0:25:15.554
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffa80ab4a52d0, 2, 1, fffff88004d39077}
Probably caused by : usbhub.sys ( usbhub!Log+6f )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa80ab4a52d0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88004d39077, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80005acc100
fffffa80ab4a52d0
CURRENT_IRQL: 2
FAULTING_IP:
usbhub!Log+6f
fffff880`04d39077 8901 mov dword ptr [rcx],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800318b6d0 -- (.trap 0xfffff8800318b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000002d2d7170 rbx=0000000000000000 rcx=fffffa80ab4a52d0
rdx=0000000000001cc1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004d39077 rsp=fffff8800318b868 rbp=fffffa8005ea3050
r8=0000000070712d2d r9=0000000000000003 r10=fffffa8005ea31a0
r11=0000000000000482 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
usbhub!Log+0x6f:
fffff880`04d39077 8901 mov dword ptr [rcx],eax ds:0b00:fffffa80`ab4a52d0=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800058991e9 to fffff80005899c40
STACK_TEXT:
fffff880`0318b588 fffff800`058991e9 : 00000000`0000000a fffffa80`ab4a52d0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0318b590 fffff800`05897e60 : 00000000`00000000 00000001`05ea3050 fffff880`0318b8f0 fffffa80`05ed0b20 : nt!KiBugCheckDispatch+0x69
fffff880`0318b6d0 fffff880`04d39077 : fffff880`04d43901 00000000`00000010 fffff880`2d2d7170 fffffa80`05ea3050 : nt!KiPageFault+0x260
fffff880`0318b868 fffff880`04d43901 : 00000000`00000010 fffff880`2d2d7170 fffffa80`05ea3050 fffff880`0318b8f8 : usbhub!Log+0x6f
fffff880`0318b870 fffff880`04d4796c : fffffa80`05ed0b20 00000000`00000000 00000000`00000000 00000000`000007ff : usbhub!UsbhUnlockPcqWithTag+0x35
fffff880`0318b8b0 fffff880`04d43cf6 : 00000000`00000000 00000000`50447100 fffffa80`05ed0b20 fffffa80`05ea3050 : usbhub!Usbh_PCE_wChange_Action+0x20c
fffff880`0318b8f0 fffff880`04d4a6b0 : fffffa80`05ed0b20 fffffa80`05ed0b38 00000000`00000002 fffffa80`05ea3050 : usbhub!UsbhDispatch_PortChangeQueueEventEx+0x22a
fffff880`0318b930 fffff880`04d46c79 : 00000000`00000000 00000000`00000004 fffffa80`00000100 fffffa80`05ea3050 : usbhub!UsbhHubRunPortChangeQueue+0x188
fffff880`0318ba00 fffff880`04d43b8c : 00000000`00000001 fffffa80`50447100 fffffa80`05ed0b20 fffffa80`05ea3050 : usbhub!Usbh_PCE_wRun_Action+0x1ed
fffff880`0318ba50 fffff880`04d4899a : fffffa80`05ed0b20 fffff800`05a3a2b8 fffffa80`05ed0b38 fffffa80`05ea3050 : usbhub!UsbhDispatch_PortChangeQueueEventEx+0xc0
fffff880`0318ba90 fffff880`04d4aab1 : 00000000`00000002 fffffa80`05ea3050 fffffa80`00000000 00000000`00000002 : usbhub!UsbhPCE_wRun+0x82
fffff880`0318bae0 fffff800`05b909e3 : fffffa80`05ea3050 00000000`00000001 ffffffff`dc3a58a0 fffff800`05a3a2b8 : usbhub!UsbhHubProcessChangeWorker+0x13d
fffff880`0318bb40 fffff800`058a4001 : fffff800`05a3a200 fffff800`05b90901 fffffa80`03a45000 00000000`00000000 : nt!IopProcessWorkItem+0x23
fffff880`0318bb70 fffff800`05b34fee : 00000000`00000000 fffffa80`03a45040 00000000`00000080 fffffa80`03946b30 : nt!ExpWorkerThread+0x111
fffff880`0318bc00 fffff800`0588b5e6 : fffff880`030a4180 fffffa80`03a45040 fffff880`030af040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0318bc40 00000000`00000000 : fffff880`0318c000 fffff880`03186000 fffff880`0318b8a0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
usbhub!Log+6f
fffff880`04d39077 8901 mov dword ptr [rcx],eax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbhub!Log+6f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbhub
IMAGE_NAME: usbhub.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a68e
FAILURE_BUCKET_ID: X64_0xD1_usbhub!Log+6f
BUCKET_ID: X64_0xD1_usbhub!Log+6f
Followup: MachineOwner