Code:
- Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\xthequwit\123011-16484-01\123011-17328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c18000 PsLoadedModuleList = 0xfffff800`02e5d670
Debug session time: Fri Dec 30 21:12:21.773 2011 (GMT-7)
System Uptime: 0 days 5:36:45.221
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff88009dbadb0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+19c92 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88009dbadb0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+0
fffff880`09dbadb0 d8bcdb0980f8ff fdivr dword ptr [rbx+rbx*8-77FF7h]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec7100
0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88009dbbcd8 -- (.exr 0xfffff88009dbbcd8)
ExceptionAddress: fffff88004281c92 (Rt64win7+0x0000000000019c92)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88009dbbd80 -- (.trap 0xfffff88009dbbd80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80094ca590
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004281c92 rsp=fffff88009dbbf10 rbp=fffffa80094ca000
r8=0000000000000b78 r9=00000000000000b0 r10=000000000000ffff
r11=fffffa80094ca000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
Rt64win7+0x19c92:
fffff880`04281c92 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002d204fb to fffff80002c94c40
STACK_TEXT:
fffff880`09dbacf8 fffff800`02d204fb : 00000000`0000001e ffffffff`c0000005 fffff880`09dbadb0 00000000`00000000 : nt!KeBugCheckEx
fffff880`09dbad00 fffff800`02ce8bb4 : 00000000`00000000 00000000`00000000 00000001`0000000d 000000c0`00000008 : nt!KipFatalFilter+0x1b
fffff880`09dbad40 fffff800`02cc0a7c : 00000000`0166b000 00000000`00000001 fffff880`09dbc000 fffffa80`06bba000 : nt! ?? ::FNODOBFM::`string'+0x83d
fffff880`09dbad80 fffff800`02cc04fd : fffff800`02dd7c24 fffff880`09dbd280 00000000`00000000 fffff800`02c18000 : nt!_C_specific_handler+0x8c
fffff880`09dbadf0 fffff800`02cbf2d5 : fffff800`02dd7c24 fffff880`09dbae68 fffff880`09dbbcd8 fffff800`02c18000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`09dbae20 fffff800`02cd0361 : fffff880`09dbbcd8 fffff880`09dbb530 fffff880`00000000 00000000`00000005 : nt!RtlDispatchException+0x415
fffff880`09dbb500 fffff800`02c942c2 : fffff880`09dbbcd8 00000000`0000003c fffff880`09dbbd80 fffffa80`094da380 : nt!KiDispatchException+0x135
fffff880`09dbbba0 fffff800`02c92bca : fffffa80`06b29710 fffffa80`0a180210 00000000`00000000 00000000`00000005 : nt!KiExceptionDispatch+0xc2
fffff880`09dbbd80 fffff880`04281c92 : fffffa80`094d0000 00000000`00000000 00000000`0000003c fffffa80`094da380 : nt!KiGeneralProtectionFault+0x10a
fffff880`09dbbf10 fffffa80`094d0000 : 00000000`00000000 00000000`0000003c fffffa80`094da380 fffffa80`094d0901 : Rt64win7+0x19c92
fffff880`09dbbf18 00000000`00000000 : 00000000`0000003c fffffa80`094da380 fffffa80`094d0901 fffffa80`094d0ae0 : 0xfffffa80`094d0000
STACK_COMMAND: kb
FOLLOWUP_IP:
Rt64win7+19c92
fffff880`04281c92 ?? ???
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: Rt64win7+19c92
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Rt64win7
IMAGE_NAME: Rt64win7.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a718af3
FAILURE_BUCKET_ID: X64_0x1E_VRF_Rt64win7+19c92
BUCKET_ID: X64_0x1E_VRF_Rt64win7+19c92
Followup: MachineOwner
---------
3: kd> lmvm Rt64win7
start end module name
fffff880`04268000 fffff880`042a6000 Rt64win7 T (no symbols)
Loaded symbol image file: Rt64win7.sys
Image path: \SystemRoot\system32\DRIVERS\Rt64win7.sys
Image name: Rt64win7.sys
Timestamp: Thu Jul 30 05:58:43 2009 (4A718AF3)
CheckSum: 000460F2
ImageSize: 0003E000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\xthequwit\123011-16484-01\123011-16484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c1d000 PsLoadedModuleList = 0xfffff800`02e62670
Debug session time: Fri Dec 30 21:28:32.873 2011 (GMT-7)
System Uptime: 0 days 0:15:39.123
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff96000097d2e, fffff880092cd780, 0}
Probably caused by : win32k.sys ( win32k!XCLIPOBJ::vSetup+4e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff96000097d2e, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880092cd780, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
win32k!XCLIPOBJ::vSetup+4e
fffff960`00097d2e 8b421c mov eax,dword ptr [rdx+1Ch]
CONTEXT: fffff880092cd780 -- (.cxr 0xfffff880092cd780)
rax=0000000000000000 rbx=fffff880092ce200 rcx=0000000000000000
rdx=fffff900c0f90700 rsi=fffff900c00b2070 rdi=00000000000000a0
rip=fffff96000097d2e rsp=fffff880092ce160 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=fffff880092ce2e0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000001 r15=fffff900c43efd60
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
win32k!XCLIPOBJ::vSetup+0x4e:
fffff960`00097d2e 8b421c mov eax,dword ptr [rdx+1Ch] ds:002b:fffff900`c0f9071c=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x3B
PROCESS_NAME: consent.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff96000097d2e
STACK_TEXT:
fffff880`092ce160 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!XCLIPOBJ::vSetup+0x4e
FOLLOWUP_IP:
win32k!XCLIPOBJ::vSetup+4e
fffff960`00097d2e 8b421c mov eax,dword ptr [rdx+1Ch]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!XCLIPOBJ::vSetup+4e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ecdcd5a
STACK_COMMAND: .cxr 0xfffff880092cd780 ; kb
FAILURE_BUCKET_ID: X64_0x3B_VRF_win32k!XCLIPOBJ::vSetup+4e
BUCKET_ID: X64_0x3B_VRF_win32k!XCLIPOBJ::vSetup+4e
Followup: MachineOwner
---------
Your first blue screen with Verifier running was due to your Realtek Gigabit Ethernet NIC driver. You should update your Realtek Gigabit Ethernet NIC driver (Driver Reference).
The second was a system file. If you unlocked the core, that was probably the result as system based crashes can be hardware related.