New
#1
Bugcheck system crashes - 0x0000001e and 0x0000007f
A reliable Windows 7 Ultimate 64 system has started to crash and reboot. Three crashes in circa 40 days.
It may be associated with update to ATI Graphics drivers or use of new software
System Event Log which goes back to 2012 has the following 3 bugcheck events
10/09/2013 14:31:17
The computer has rebooted from a bugcheck. The bugcheck was: 0x0000001e (0xffffffffc000001d, 0xfffff880011b3541, 0x0000000000000001, 0xfffff880009e5d00). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 091013-51168-01.
03/08/2013 05:39:16
The computer has rebooted from a bugcheck. The bugcheck was: 0x0000001e (0xffffffffc0000005, 0xfffff800030b1a2a, 0x0000000000000000, 0xffffffffffffffff). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 080313-51527-01.
01/08/2013 10:04:23
The computer has rebooted from a bugcheck. The bugcheck was: 0x0000007f (0x0000000000000008, 0x0000000080050031, 0x00000000000006f8, 0xfffff8000310e3dd). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 080113-41730-01.
---------------------------
I tried to WinDbg to analyse but my knowledge of windows dumps analysis is minimal.
Summary of WinDbg output from today's crash:
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
fltmgr!FltpCacheCreateNames+341
fffff880`011b3541 483bc3 cmp rax,rbx
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: fffff880009e5d00
ERROR_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
BUGCHECK_STR: 0x1E_c000001d
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 1
LAST_CONTROL_TRANSFER: from fffff80003114748 to fffff800030c9b80
FAILED_INSTRUCTION_ADDRESS:
fltmgr!FltpCacheCreateNames+341
fffff880`011b3541 483bc3 cmp rax,rbx
STACK_TEXT:
fffff880`0cddee48 fffff800`03114748 : 00000000`0000001e ffffffff`c000001d fffff880`011b3541 00000000`00000001 : nt!KeBugCheckEx
fffff880`0cddee50 fffff800`030c9202 : fffff880`0cddf628 00000000`00000000 fffff880`0cddf6d0 fffffa80`05b56b10 : nt! ?? ::FNODOBFM::`string'+0x487ed
fffff880`0cddf4f0 fffff800`030c735f : fffff880`0cddf6d0 fffffa80`20db5c01 fffffa80`211b3000 fffffa80`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0cddf6d0 fffff880`011b3541 : fffffa80`045f5e58 fffffa80`05b56b10 00000000`6e664d46 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`0cddf860 fffff880`011836b3 : fffffa80`05b56b10 fffffa80`1e080310 00000000`00000000 fffffa80`045f5e08 : fltmgr!FltpCacheCreateNames+0x341
fffff880`0cddf8e0 fffff880`0119b2b9 : fffffa80`21085010 fffffa80`045f5800 fffffa80`21085000 fffffa80`0438b360 : fltmgr! ?? ::FNODOBFM::`string'+0x2b76
fffff880`0cddf970 fffff800`033cad5c : 00000000`00000005 fffffa80`211987c8 fffffa80`1e080310 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`0cddfa20 fffff800`033c66d8 : fffffa80`045396d0 fffff800`00000000 fffffa80`21198610 fffffa80`00000001 : nt!IopParseDevice+0x14d3
fffff880`0cddfb80 fffff800`033c78f6 : 00000000`00000000 fffffa80`21198610 fffffa80`05b57200 fffffa80`039e3360 : nt!ObpLookupObjectName+0x588
fffff880`0cddfc70 fffff800`033c91fc : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`20c7a970 : nt!ObOpenObjectByName+0x306
fffff880`0cddfd40 fffff800`033b3804 : fffff880`0cde0780 fffffa80`00100020 fffff880`0cde0168 fffff880`0cde0198 : nt!IopCreateFile+0x2bc
fffff880`0cddfde0 fffff800`030c8e13 : fffff880`0cddff01 fffffa80`21085010 fffffa80`21222000 fffff800`031fa656 : nt!NtOpenFile+0x58
fffff880`0cddfe70 fffff800`030c53d0 : fffff800`03375fec fffffa80`2116b5f0 00000000`00000101 000007ff`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`0cde0078 fffff800`03375fec : fffffa80`2116b5f0 00000000`00000101 000007ff`00000000 fffff880`00000001 : nt!KiServiceLinkage
fffff880`0cde0080 fffff800`030c8e13 : fffffa80`0396df30 fffff880`0cde0b01 00000000`746c6644 fffff880`0cde0bd8 : nt!NtCreateUserProcess+0x2eb
fffff880`0cde0bb0 00000000`77181d8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`013eea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77181d8a
Any help would be much appreciated
I am including the Windbg output in the zipped SF_10-09-2013.zip attachment
Last edited by sa2000; 17 Sep 2013 at 18:11. Reason: removed attachment as no one is analysing the dump info