Code:
-
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010112-15000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e0b000 PsLoadedModuleList = 0xfffff800`03048e50
Debug session time: Sun Jan 1 07:19:05.326 2012 (UTC - 7:00)
System Uptime: 0 days 13:16:34.561
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : hardware ( USBPORT!USBPORT_SetMiniDumpData+20 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3536306261323662
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002ffc868 -- (.exr 0xfffff88002ffc868)
ExceptionAddress: fffff88003e823a4 (USBPORT!USBPORT_SetMiniDumpData+0x0000000000000020)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff88002ffc910 -- (.trap 0xfffff88002ffc910)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80069c61a1 rbx=0000000000000000 rcx=fffffa80069c6050
rdx=00000000000003d8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003e823a4 rsp=fffff88002ffcaa8 rbp=0000000000000008
r8=fffffa8005f94900 r9=0000000000000000 r10=00000000ffffffff
r11=fffffa80069c61a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
USBPORT!USBPORT_SetMiniDumpData+0x20:
fffff880`03e823a4 f08b17 lock mov edx,dword ptr [rdi] ds:4900:00000000`00000000=????????
Resetting default scope
MISALIGNED_IP:
USBPORT!USBPORT_SetMiniDumpData+20
fffff880`03e823a4 f08b17 lock mov edx,dword ptr [rdi]
LAST_CONTROL_TRANSFER: from fffff80002e7346e to fffff80002e7b710
STACK_TEXT:
fffff880`02ffb958 fffff800`02e7346e : 00000000`00000000 fffff880`00000000 fffff880`02ffc0d0 fffff800`02ea8668 : nt!KeBugCheck
fffff880`02ffb960 fffff800`02ea140d : fffff800`03089b7c fffff800`02fc3e84 fffff800`02e0b000 fffff880`02ffc868 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffb990 fffff800`02ea8a90 : fffff800`02fcab14 fffff880`02ffba08 fffff880`02ffc868 fffff800`02e0b000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffb9c0 fffff800`02eb59ef : fffff880`02ffc868 fffff880`02ffc0d0 fffff880`00000000 fffffa80`069c6050 : nt!RtlDispatchException+0x410
fffff880`02ffc0a0 fffff800`02e7ad82 : fffff880`02ffc868 fffffa80`05f94900 fffff880`02ffc910 fffffa80`069c6050 : nt!KiDispatchException+0x16f
fffff880`02ffc730 fffff800`02e78edf : fffff880`02ffc910 fffff880`03e7e002 fffffa80`069c7500 fffff880`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02ffc910 fffff880`03e823a4 : ffffffff`8b40798b 00000000`ffffff01 fffff880`03e7954a fffffa80`069c6050 : nt!KiInvalidOpcodeFault+0x11f
fffff880`02ffcaa8 fffffa80`069c6050 : fffff880`03e7f46f fffffa80`05f94900 00000000`00000008 fffffa80`069c6050 : USBPORT!USBPORT_SetMiniDumpData+0x20
fffff880`02ffcae8 fffff880`03e7f46f : fffffa80`05f94900 00000000`00000008 fffffa80`069c6050 fffffa80`075f3af0 : 0xfffffa80`069c6050
fffff880`02ffcaf0 fffff880`03e7af03 : fffffa80`069c61a0 fffffa80`069c6050 fffffa80`05f94900 fffffa80`069c61a0 : USBPORT!USBPORT_Core_RecordOcaTransferData+0x5b
fffff880`02ffcb20 fffff880`03e7bab7 : fffffa80`05f94902 fffffa80`069688b0 00000000`ffffffff fffffa80`069c6ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x33f
fffff880`02ffcc00 fffff880`03e7964f : fffffa80`069c6ea8 fffffa80`069c61a0 fffffa80`069c7040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02ffcc60 fffff880`03e6af89 : fffffa80`069c6050 00000000`00000000 fffffa80`069c6e02 fffffa80`069c6ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02ffcca0 fffff800`02e86bfc : fffff880`02fd4180 fffffa80`069c6ea8 fffffa80`069c6ec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02ffccd0 fffff800`02e83eea : fffff880`02fd4180 fffff880`02fdefc0 00000000`00000000 fffff880`03e6adb0 : nt!KiRetireDpcList+0x1bc
fffff880`02ffcd80 00000000`00000000 : fffff880`02ffd000 fffff880`02ff7000 fffff880`02ffcd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_SetMiniDumpData+20
fffff880`03e823a4 f08b17 lock mov edx,dword ptr [rdi]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: USBPORT!USBPORT_SetMiniDumpData+20
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010312-13671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e07000 PsLoadedModuleList = 0xfffff800`03044e50
Debug session time: Tue Jan 3 05:26:39.835 2012 (UTC - 7:00)
System Uptime: 0 days 10:42:50.070
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffffff, 2, 1, fffff80002e82bdf}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000ffffffff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e82bdf, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030af0e0
00000000ffffffff
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiRetireDpcList+19f
fffff800`02e82bdf ff00 inc dword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xA
PROCESS_NAME: vlc.exe
TRAP_FRAME: fffff880009b0d70 -- (.trap 0xfffff880009b0d70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=fffff88002fd6300
rdx=fffff88002fd89f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e82bdf rsp=fffff880009b0f00 rbp=fffff88002fd4180
r8=0000000000000000 r9=0000000000000000 r10=fffffa800541a990
r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiRetireDpcList+0x19f:
fffff800`02e82bdf ff00 inc dword ptr [rax] ds:00ff:00000000`ffffffff=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e76ca9 to fffff80002e77740
STACK_TEXT:
fffff880`009b0c28 fffff800`02e76ca9 : 00000000`0000000a 00000000`ffffffff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009b0c30 fffff800`02e75920 : 000000b5`000000a9 fffff880`02fd4180 00000000`00000202 fffff800`02e7c1fa : nt!KiBugCheckDispatch+0x69
fffff880`009b0d70 fffff800`02e82bdf : fffffa80`06bdacc1 fffffa80`0025aa84 fffffa80`06bd4000 00000000`00000084 : nt!KiPageFault+0x260
fffff880`009b0f00 fffff800`02e7d865 : 000004d8`00000000 fffffa80`0541a990 00000000`00000000 fffff800`02f97da0 : nt!KiRetireDpcList+0x19f
fffff880`009b0fb0 fffff800`02e7d67c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`08ae3bf0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80002e820f8-fffff80002e820ff 8 bytes - nt!KeRemoveQueueEx+158
[ 5f 5e 5d c3 4d 85 c9 74:a0 c9 e4 02 00 f8 ff ff ]
fffff80002e82120-fffff80002e82135 22 bytes - nt!KeRemoveQueueEx+180 (+0x28)
[ 00 00 83 67 4c df 8b 47:40 22 e8 02 00 f8 ff ff ]
fffff80002e82137-fffff80002e8213b 5 bytes - nt!KeRemoveQueueEx+197 (+0x17)
[ 0f 85 8f 01 00:ff 00 2a e8 02 ]
fffff80002e8213d-fffff80002e82143 7 bytes - nt!KeRemoveQueueEx+19d (+0x06)
[ f0 48 0f ba af 88 00:f8 ff ff a0 21 e8 02 ]
fffff80002e82145-fffff80002e8214b 7 bytes - nt!KeRemoveQueueEx+1a5 (+0x08)
[ 00 00 0f 82 db 05 00:f8 ff ff 00 2a e8 02 ]
fffff80002e8214d-fffff80002e8214f 3 bytes - nt!KeRemoveQueueEx+1ad (+0x08)
[ 40 38 6f:f8 ff ff ]
fffff80002e82160-fffff80002e8216e 15 bytes - nt!KeRemoveQueueEx+1c0 (+0x13)
[ ff 0f 85 70 01 00 00 44:40 22 e8 02 00 f8 ff ff ]
fffff80002e82170-fffff80002e82182 19 bytes - nt!KeRemoveQueueEx+1d0 (+0x10)
[ 00 c6 87 64 01 00 00 05:80 2a e8 02 00 f8 ff ff ]
fffff80002e82185-fffff80002e82188 4 bytes - nt!KeRemoveQueueEx+1e5 (+0x15)
[ 00 0f a1 20:f8 ff ff 00 ]
fffff80002e82190 - nt!KeRemoveQueueEx+1f0 (+0x0b)
[ 89:c3 ]
fffff80002e821a0-fffff80002e821ab 12 bytes - nt!KeRemoveQueueEx+200 (+0x10)
[ 8b c1 48 c1 e8 20 85 c0:bb 7d f1 02 00 f8 ff ff ]
fffff80002e821ad-fffff80002e821bd 17 bytes - nt!KeRemoveQueueEx+20d (+0x0d)
[ 00 80 a7 c1 00 00 00 fe:f8 ff ff 40 22 e8 02 00 ]
fffff80002e821bf-fffff80002e821cf 17 bytes - nt!KeRemoveQueueEx+21f (+0x12)
[ 48 8b 10 48 8b 05 17 d5:ff bb 7d f1 02 00 f8 ff ]
fffff80002e821d1-fffff80002e821d8 8 bytes - nt!KeRemoveQueueEx+231 (+0x12)
[ 00 00 0f b6 0d 25 cf 22:8b b4 24 b8 00 00 00 1f ]
fffff80002e821da-fffff80002e821eb 18 bytes - nt!KeRemoveQueueEx+23a (+0x09)
[ 48 f7 e2 48 d3 ea 0f b6:10 00 00 00 00 00 40 22 ]
fffff80002e821ed-fffff80002e82230 68 bytes - nt!KeRemoveQueueEx+24d (+0x13)
[ 48 8b 9f d8 00 00 00 8b:00 00 c6 80 2a e8 02 00 ]
fffff80002e82270-fffff80002e8227a 11 bytes - nt!KeRemoveQueueEx+2d0 (+0x83)
[ 48 8d 4e 08 49 89 45 08:1f 00 10 00 80 1f 00 00 ]
fffff80002e8227c-fffff80002e822a5 42 bytes - nt!KeRemoveQueueEx+2dc (+0x0c)
[ 4c 89 28 4c 89 69 08 f0:2b 00 53 00 2b 00 18 00 ]
fffff80002e822a8-fffff80002e822a9 2 bytes - nt!KeRemoveQueueEx+308 (+0x2c)
[ 48 3d:00 00 ]
fffff80002e822ab - nt!KeRemoveQueueEx+30b (+0x03)
[ 01:00 ]
fffff80002e822ae-fffff80002e822b0 3 bytes - nt!KeRemoveQueueEx+30e (+0x03)
[ 0f 84 e3:00 00 00 ]
fffff80002e822b4-fffff80002e822d5 34 bytes - nt!KeRemoveQueueEx+314 (+0x06)
[ 4c 8b d8 48 8b 84 24 d0:00 00 00 00 20 fb ee 05 ]
fffff80002e822d7-fffff80002e822f0 26 bytes - nt!KeRemoveQueueEx+337 (+0x23)
[ 49 0f be c6 40 38 6c 38:ff 14 2c e8 02 00 f8 ff ]
fffff80002e822f2-fffff80002e822f5 4 bytes - nt!KeRemoveQueueEx+352 (+0x1b)
[ 0f 85 47 02:bd 01 00 00 ]
fffff80002e822f7-fffff80002e82305 15 bytes - nt!KeRemoveQueueEx+357 (+0x05)
[ 00 40 38 6f 4a 0f 84 6f:c6 00 00 00 00 00 00 00 ]
fffff80002e82307-fffff80002e82331 43 bytes - nt!KeRemoveQueueEx+367 (+0x10)
[ 8b 46 28 3b 46 2c 0f 83:00 fb ff ff ff ff ff ff ]
fffff80002e82333-fffff80002e8233f 13 bytes - nt!KeRemoveQueueEx+393 (+0x2c)
[ f0 81 26 7f ff ff ff 44:00 00 00 00 00 bb 7d f1 ]
fffff80002e82358-fffff80002e8235b 4 bytes - nt!KeRemoveQueueEx+3b8 (+0x25)
[ 00 0f 85 c9:80 1f 00 00 ]
fffff80002e823e0-fffff80002e823e6 7 bytes - nt!KeRemoveQueueEx+440 (+0x88)
[ ff c3 85 1d e4 ce 22:00 00 00 00 00 00 00 ]
fffff80002e823e8-fffff80002e823ec 5 bytes - nt!KeRemoveQueueEx+448 (+0x08)
[ 0f 84 98 66 07:00 00 00 00 00 ]
fffff80002e823ee-fffff80002e823fe 17 bytes - nt!KeRemoveQueueEx+44e (+0x06)
[ f3 90 8b 06 84 c0 78 ea:00 00 00 00 00 00 00 00 ]
fffff80002e82402-fffff80002e8240c 11 bytes - nt!KeRemoveQueueEx+462 (+0x14)
[ e9 2a fc ff ff f0 48 0f:00 00 00 00 00 00 00 00 ]
fffff80002e8240e-fffff80002e82411 4 bytes - nt!KeRemoveQueueEx+46e (+0x0c)
[ 0f 82 0c 02:00 00 00 00 ]
fffff80002e82414-fffff80002e8243c 41 bytes - nt!KeRemoveQueueEx+474 (+0x06)
[ 4c 8b 6e 10 48 89 6e 10:00 00 00 00 00 00 00 00 ]
fffff80002e8243f-fffff80002e82450 18 bytes - nt!KeRemoveQueueEx+49f (+0x2b)
[ 48 03 c2 48 89 45 18 0f:00 00 00 00 00 00 00 00 ]
fffff80002e82452-fffff80002e82456 5 bytes - nt!KeRemoveQueueEx+4b2 (+0x13)
[ 4c 89 b6 40 47:00 00 00 00 00 ]
fffff80002e82459-fffff80002e82462 10 bytes - nt!KeRemoveQueueEx+4b9 (+0x07)
[ fb 4c 89 6e 08 41 c6 85:00 00 00 00 00 00 00 00 ]
fffff80002e82465-fffff80002e82471 13 bytes - nt!KeRemoveQueueEx+4c5 (+0x0c)
[ 02 48 8b d6 49 8b cc 41:00 00 00 00 00 00 00 00 ]
fffff80002e82474-fffff80002e82485 18 bytes - nt!KeRemoveQueueEx+4d4 (+0x0f)
[ 20 e8 66 db ff ff 49 8b:00 00 00 00 00 00 00 00 ]
fffff80002e82488-fffff80002e82498 17 bytes - nt!KeRemoveQueueEx+4e8 (+0x14)
[ e8 d3 b0 ff ff 84 c0 0f:00 00 00 00 00 00 00 00 ]
fffff80002e8249a-fffff80002e8249e 5 bytes - nt!KeRemoveQueueEx+4fa (+0x12)
[ 44 8b ed 0f 1f:00 00 00 00 00 ]
fffff80002e824a0-fffff80002e824a8 9 bytes - nt!KeRemoveQueueEx+500 (+0x06)
[ 41 ff c5 44 85 2d 22 ce:00 00 00 00 00 00 00 00 ]
fffff80002e824aa-fffff80002e824ae 5 bytes - nt!KeRemoveQueueEx+50a (+0x0a)
[ 0f 84 09 6a 07:00 00 00 00 00 ]
fffff80002e824b0-fffff80002e824c3 20 bytes - nt!KeRemoveQueueEx+510 (+0x06)
[ f3 90 8b 06 84 c0 78 e8:00 00 00 00 00 00 00 00 ]
fffff80002e824c6-fffff80002e824c8 3 bytes - nt!KeRemoveQueueEx+526 (+0x16)
[ 41 ba 80:00 00 00 ]
fffff80002e824cc-fffff80002e824d8 13 bytes - nt!KeRemoveQueueEx+52c (+0x06)
[ e9 69 fd ff ff 48 85 d2:00 00 00 00 00 00 00 00 ]
fffff80002e824da-fffff80002e824de 5 bytes - nt!KeRemoveQueueEx+53a (+0x0e)
[ 4c 8d 87 c8 01:00 00 00 00 00 ]
fffff80002e826d8-fffff80002e826de 7 bytes - nt!KeRemoveQueueEx+738 (+0x1fe)
[ 66 01 00 00 e8 7f ae:c8 05 eb 02 00 f8 ff ]
fffff80002e826f0-fffff80002e826f4 5 bytes - nt!KeRemoveQueueEx+750 (+0x18)
[ ed 66 0f 1f 04:00 00 00 00 00 ]
fffff80002e826f6-fffff80002e826fe 9 bytes - nt!KeRemoveQueueEx+760 (+0x06)
[ 41 ff c5 44 85 2d cc cb:00 00 00 00 00 00 00 00 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
1265 errors : !nt (fffff80002e820f8-fffff80002e82c0f)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010412-17296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e63000 PsLoadedModuleList = 0xfffff800`030a0e50
Debug session time: Wed Jan 4 10:34:17.500 2012 (UTC - 7:00)
System Uptime: 0 days 20:38:06.719
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffaa00810b838, 2, 0, fffff80002ee014b}
Probably caused by : ntkrnlmp.exe ( nt!KiInsertTimerTable+13b )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffaa00810b838, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ee014b, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310b0e0
fffffaa00810b838
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertTimerTable+13b
fffff800`02ee014b 488b42f8 mov rax,qword ptr [rdx-8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: Skype.exe
TRAP_FRAME: fffff8800855d900 -- (.trap 0xfffff8800855d900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000003 rbx=0000000000000000 rcx=0000000000000003
rdx=fffffaa00810b840 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ee014b rsp=fffff8800855da90 rbp=fffff88002dd7b68
r8=ffffffffffffffff r9=00000000000000af r10=fffff88002dd4180
r11=00000000002f9d00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!KiInsertTimerTable+0x13b:
fffff800`02ee014b 488b42f8 mov rax,qword ptr [rdx-8] ds:fffffaa0`0810b838=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ed2ca9 to fffff80002ed3740
STACK_TEXT:
fffff880`0855d7b8 fffff800`02ed2ca9 : 00000000`0000000a fffffaa0`0810b838 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0855d7c0 fffff800`02ed1920 : 00000000`00000000 fffffa80`059ab120 00000000`00001f80 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0855d900 fffff800`02ee014b : 00000000`00000000 fffff800`02ed99a2 00000009`00000003 fffff880`02dd4180 : nt!KiPageFault+0x260
fffff880`0855da90 fffff800`02edaaf2 : fffffa80`059ab060 fffffa80`059ab060 00000000`00000000 00000000`00000003 : nt!KiInsertTimerTable+0x13b
fffff880`0855daf0 fffff800`02edc97a : 00000000`00000000 00000000`00000000 00000000`000000af 00000000`00000000 : nt!KiCommitThreadWait+0x332
fffff880`0855db80 fffff800`031ce10e : fffffa80`059ab060 00000000`7ef1a000 00000000`1772fd00 00000000`000000af : nt!KeDelayExecutionThread+0x186
fffff880`0855dbf0 fffff800`02ed2993 : 00000000`05ee3870 fffff880`0855dca0 ffffffff`fffb6c20 00000000`7ef1a000 : nt!NtDelayExecution+0x59
fffff880`0855dc20 00000000`74142dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`1772f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74142dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiInsertTimerTable+13b
fffff800`02ee014b 488b42f8 mov rax,qword ptr [rdx-8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiInsertTimerTable+13b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiInsertTimerTable+13b
BUCKET_ID: X64_0xA_nt!KiInsertTimerTable+13b
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010912-18859-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e11000 PsLoadedModuleList = 0xfffff800`0304ee50
Debug session time: Mon Jan 9 01:28:35.020 2012 (UTC - 7:00)
System Uptime: 1 days 14:52:34.296
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : amdppm.sys ( amdppm!C1Halt+2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3363353936316566
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: d
EXCEPTION_RECORD: fffff88002d8b808 -- (.exr 0xfffff88002d8b808)
ExceptionAddress: fffff80002e88391 (nt!KeAccumulateTicks+0x0000000000000141)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff88002d8b8b0 -- (.trap 0xfffff88002d8b8b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000b5474a
rdx=0000000000020000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e88391 rsp=fffff88002d8ba40 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=00000000000201bd
r11=fffff88002d63100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeAccumulateTicks+0x141:
fffff800`02e88391 408ac5 mov al,bpl
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e7946e to fffff80002e81710
STACK_TEXT:
fffff880`02d8a8f8 fffff800`02e7946e : 00000000`00000037 00000000`00000000 fffff880`02d8b070 fffff800`02eae668 : nt!KeBugCheck
fffff880`02d8a900 fffff800`02ea740d : fffff800`0308fedc fffff800`02fc8dac fffff800`02e11000 fffff880`02d8b808 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02d8a930 fffff800`02eaea90 : fffff800`02fd0b14 fffff880`02d8a9a8 fffff880`02d8b808 fffff800`02e11000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02d8a960 fffff800`02ebb9ef : fffff880`02d8b808 fffff880`02d8b070 fffff880`00000000 00000000`00000001 : nt!RtlDispatchException+0x410
fffff880`02d8b040 fffff800`02e80d82 : fffff880`02d8b808 fffff880`02d63180 fffff880`02d8b8b0 00000000`00002626 : nt!KiDispatchException+0x16f
fffff880`02d8b6d0 fffff800`02e7eedf : fffff880`02d8b8b0 00000000`0000000d 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02d8b8b0 fffff800`02e88391 : 00000000`00000000 fffff880`047841e6 fffffa80`06b95c00 fffffa80`06b95fa0 : nt!KiInvalidOpcodeFault+0x11f
fffff880`02d8ba40 fffff800`02e8e618 : fffffa80`0790e000 fffff880`02d6dfc0 00000000`00002626 fffffa80`06b95c00 : nt!KeAccumulateTicks+0x141
fffff880`02d8bad0 fffff800`02e8e3a1 : 00000000`00000000 fffff880`02d8bb80 fffff880`02d63180 00000000`00000001 : nt!KeUpdateRunTime+0xb8
fffff880`02d8bb00 fffff880`03d9e7f2 : fffff800`02e8f24a 00000000`003938be fffffa80`06b95d28 fffff880`02d6dfc0 : nt!KiSecondaryClockInterrupt+0x131
fffff880`02d8bc98 fffff800`02e8f24a : 00000000`003938be fffffa80`06b95d28 fffff880`02d6dfc0 00000000`00000001 : amdppm!C1Halt+0x2
fffff880`02d8bca0 fffff800`02e89ebc : fffff880`02d63180 fffff880`00000000 00000000`00000000 fffff880`050f8588 : nt!PoIdle+0x53a
fffff880`02d8bd80 00000000`00000000 : fffff880`02d8c000 fffff880`02d86000 fffff880`02d8bd40 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
amdppm!C1Halt+2
fffff880`03d9e7f2 c3 ret
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: amdppm!C1Halt+2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc0fd
FAILURE_BUCKET_ID: X64_0x1E_0_amdppm!C1Halt+2
BUCKET_ID: X64_0x1E_0_amdppm!C1Halt+2
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010912-15718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e15000 PsLoadedModuleList = 0xfffff800`03052e50
Debug session time: Mon Jan 9 04:05:34.247 2012 (UTC - 7:00)
System Uptime: 0 days 2:36:27.543
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, fffff80002e9136d}
Probably caused by : hardware ( nt!KiTimerExpiration+6d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e9136d, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030bd0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiTimerExpiration+6d
fffff800`02e9136d 0100 add dword ptr [rax],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88002d8caa0 -- (.trap 0xfffff88002d8caa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000092ae2
rdx=0000000000003a9f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e9136d rsp=fffff88002d8cc30 rbp=0000000000092ae1
r8=0000000000000000 r9=0000000000000f44 r10=000000000001b258
r11=fffff88002d64100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiTimerExpiration+0x6d:
fffff800`02e9136d 0100 add dword ptr [rax],eax ds:00000000`00000000=????????
Resetting default scope
MISALIGNED_IP:
nt!KiTimerExpiration+6d
fffff800`02e9136d 0100 add dword ptr [rax],eax
LAST_CONTROL_TRANSFER: from fffff80002e84ca9 to fffff80002e85740
STACK_TEXT:
fffff880`02d8c958 fffff800`02e84ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02d8c960 fffff800`02e83920 : fffffa80`06b61900 00000015`db69875d 00000000`00092ae2 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02d8caa0 fffff800`02e9136d : 00000015`db696137 fffff880`02d8cc58 00000000`00092ae2 fffff880`02d681c8 : nt!KiPageFault+0x260
fffff880`02d8cc30 fffff800`02e90cb7 : 00000008`327d5eac 00000008`00092ae2 00000008`327d5eac 00000000`000000e2 : nt!KiTimerExpiration+0x6d
fffff880`02d8ccd0 fffff800`02e8deea : fffff880`02d64180 fffff880`02d6efc0 00000000`00000000 fffff880`03eb4588 : nt!KiRetireDpcList+0x277
fffff880`02d8cd80 00000000`00000000 : fffff880`02d8d000 fffff880`02d87000 fffff880`02d8cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTimerExpiration+6d
fffff800`02e9136d 0100 add dword ptr [rax],eax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiTimerExpiration+6d
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\simp2041\Windows_NT6_BSOD_jcgriff2\010912-18093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e49000 PsLoadedModuleList = 0xfffff800`03086e50
Debug session time: Mon Jan 9 12:28:40.584 2012 (UTC - 7:00)
System Uptime: 0 days 5:17:28.866
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : amdppm.sys ( amdppm!C1Halt+2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3363353936316566
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: d
EXCEPTION_RECORD: fffff88002f8b808 -- (.exr 0xfffff88002f8b808)
ExceptionAddress: fffff80002ec0391 (nt!KeAccumulateTicks+0x0000000000000141)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff88002f8b8b0 -- (.trap 0xfffff88002f8b8b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=af78282fc9f2f22b rbx=0000000000000000 rcx=0000000000000011
rdx=000000000000dfff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ec0391 rsp=fffff88002f8ba40 rbp=0000000000000000
r8=0000000000010b07 r9=0000000000000000 r10=000000000002d2fc
r11=fffffa800812f4c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeAccumulateTicks+0x141:
fffff800`02ec0391 408ac5 mov al,bpl
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002eb146e to fffff80002eb9710
STACK_TEXT:
fffff880`02f8a8f8 fffff800`02eb146e : 00000000`00000037 00000000`00000000 fffff880`02f8b070 fffff800`02ee6668 : nt!KeBugCheck
fffff880`02f8a900 fffff800`02edf40d : fffff800`030c7edc fffff800`03000dac fffff800`02e49000 fffff880`02f8b808 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f8a930 fffff800`02ee6a90 : fffff800`03008b14 fffff880`02f8a9a8 fffff880`02f8b808 fffff800`02e49000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f8a960 fffff800`02ef39ef : fffff880`02f8b808 fffff880`02f8b070 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x410
fffff880`02f8b040 fffff800`02eb8d82 : fffff880`02f8b808 fffff880`02f63180 fffff880`02f8b8b0 00000000`00002626 : nt!KiDispatchException+0x16f
fffff880`02f8b6d0 fffff800`02eb6edf : fffff880`02f8b8b0 00000000`0000000d 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02f8b8b0 fffff800`02ec0391 : fffff880`07bf9005 fffff880`049bd1e6 fffffa80`06bb3700 fffffa80`06bb3a80 : nt!KiInvalidOpcodeFault+0x11f
fffff880`02f8ba40 fffff800`02ec6618 : 00000000`00000000 fffff880`00000002 00000000`00002626 fffff800`02ebe1fa : nt!KeAccumulateTicks+0x141
fffff880`02f8bad0 fffff800`02ec63a1 : 00000000`00000000 fffff880`02f8bb80 fffff880`02f63180 00000000`00000001 : nt!KeUpdateRunTime+0xb8
fffff880`02f8bb00 fffff880`02ccf7f2 : fffff800`02ec724a 00000000`003939c5 fffffa80`06bb3808 fffff880`02f6dfc0 : nt!KiSecondaryClockInterrupt+0x131
fffff880`02f8bc98 fffff800`02ec724a : 00000000`003939c5 fffffa80`06bb3808 fffff880`02f6dfc0 00000000`00000001 : amdppm!C1Halt+0x2
fffff880`02f8bca0 fffff800`02ec1ebc : fffff880`02f63180 fffff880`00000000 00000000`00000000 fffff880`01201c50 : nt!PoIdle+0x53a
fffff880`02f8bd80 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
amdppm!C1Halt+2
fffff880`02ccf7f2 c3 ret
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: amdppm!C1Halt+2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc0fd
FAILURE_BUCKET_ID: X64_0x1E_0_amdppm!C1Halt+2
BUCKET_ID: X64_0x1E_0_amdppm!C1Halt+2
Followup: MachineOwner
---------
Many of these are system related and could be due to corruption, a virus, lack of Windows updates, or hardware.