Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Windows crash reports.zip\Windows7_BSOD_jcgriff2\061810-24148-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02603000 PsLoadedModuleList = 0xfffff800`02840e50
Debug session time: Fri Jun 18 03:01:09.802 2010 (GMT-4)
System Uptime: 0 days 0:13:01.865
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80002687787}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80002687787
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002674469 to fffff80002674f00
STACK_TEXT:
fffff880`02fdbce8 fffff800`02674469 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02fdbcf0 fffff800`02672932 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02fdbe30 fffff800`02687787 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
00000000`033085f5 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeAcquireQueuedSpinLock+0x93
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8000268777b - nt!KeAcquireQueuedSpinLock+87
[ 48:c8 ]
1 error : !nt (fffff8000268777b)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Windows crash reports.zip\Windows7_BSOD_jcgriff2\062510-39686-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02814000 PsLoadedModuleList = 0xfffff800`02a51e50
Debug session time: Fri Jun 25 21:25:56.588 2010 (GMT-4)
System Uptime: 0 days 19:32:58.650
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41284, 147de001, 7586, fffff70001080000}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4a83 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 00000000147de001
Arg3: 0000000000007586
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Picasa3.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800028dadf3 to fffff80002884600
STACK_TEXT:
fffff880`0579d928 fffff800`028dadf3 : 00000000`0000001a 00000000`00041284 00000000`147de001 00000000`00007586 : nt!KeBugCheckEx
fffff880`0579d930 fffff800`028b5315 : fffff700`01080000 d8600000`ad6ef867 99200000`77796c66 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x4a83
fffff880`0579d970 fffff800`028c5fca : 00000000`00000000 00000000`18a9afff fffffa80`00000000 fffffa80`09f3f060 : nt!MiDeleteVirtualAddresses+0x4cc
fffff880`0579db30 fffff800`02883853 : ffffffff`ffffffff 00000000`07a7e810 00000000`07a7e808 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`0579dc20 00000000`7715ff3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`07a7e7d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7715ff3a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+4a83
fffff800`028dadf3 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4a83
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a83
BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4a83
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Windows crash reports.zip\Windows7_BSOD_jcgriff2\062610-28610-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a4e000 PsLoadedModuleList = 0xfffff800`02c8be50
Debug session time: Sun Jun 27 02:19:27.152 2010 (GMT-4)
System Uptime: 1 days 4:52:41.604
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002a876fa, fffff880073d68d0, 0}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002a876fa, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff880073d68d0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MmGetSessionId+1e
fffff800`02a876fa 3b4241 cmp eax,dword ptr [rdx+41h]
CONTEXT: fffff880073d68d0 -- (.cxr 0xfffff880073d68d0)
rax=0000000000000001 rbx=fffffa8008ebd010 rcx=fffffa80071bb3c0
rdx=00000000ffffffff rsi=0000000000000000 rdi=fffffa80072ff960
rip=fffff80002a876fa rsp=fffff880073d72a8 rbp=fffffa80071bb3c0
r8=0000000000000000 r9=fffff880073d72d0 r10=fffffa80075d0880
r11=fffff880073d7578 r12=0000000000000000 r13=8000080000000001
r14=8000080000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MmGetSessionId+0x1e:
fffff800`02a876fa 3b4241 cmp eax,dword ptr [rdx+41h] ds:002b:00000001`00000040=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: javaw.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002a876fa
STACK_TEXT:
fffff880`073d72a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmGetSessionId+0x1e
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80002a876fb - nt!MmGetSessionId+1f
[ c2:42 ]
1 error : !nt (fffff80002a876fb)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xfffff880073d68d0 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Windows crash reports.zip\Windows7_BSOD_jcgriff2\071010-20311-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a1e000 PsLoadedModuleList = 0xfffff800`02c5be50
Debug session time: Sat Jul 10 22:29:07.726 2010 (GMT-4)
System Uptime: 0 days 6:03:38.178
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Windows crash reports.zip\Windows7_BSOD_jcgriff2\071110-26332-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a01000 PsLoadedModuleList = 0xfffff800`02c3ee50
Debug session time: Sun Jul 11 21:41:23.430 2010 (GMT-4)
System Uptime: 0 days 5:18:03.492
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff80082a774da, 2, 8, fffff80082a774da}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Windows crash reports.zip\Windows7_BSOD_jcgriff2\071010-20311-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a1e000 PsLoadedModuleList = 0xfffff800`02c5be50
Debug session time: Sat Jul 10 22:29:07.726 2010 (GMT-4)
System Uptime: 0 days 6:03:38.178
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+5cb3952f00bdd828
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88002ffdb48 -- (.exr 0xfffff88002ffdb48)
ExceptionAddress: fffff80002a96dd2 (nt!KiIdleLoop+0x0000000000000032)
ExceptionCode: c0000096
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff88002ffdbf0 -- (.trap 0xfffff88002ffdbf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000027194 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a96dd2 rsp=fffff88002ffdd80 rbp=0000000000000000
r8=000000000000872f r9=0000000000000000 r10=0000000000016315
r11=fffffa80078c8e00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiIdleLoop+0x32:
fffff800`02a96dd2 440f22c1 mov cr8,rcx
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a8632e to fffff80002a8e5d0
STACK_TEXT:
fffff880`02ffcc38 fffff800`02a8632e : 00000000`00000000 00000000`0000000f fffff880`02ffd3b0 fffff800`02abb524 : nt!KeBugCheck
fffff880`02ffcc40 fffff800`02ab42ed : 00000000`0010001f fffff880`02ffd3b0 fffff880`02ffdbf0 fffff880`02ffdb48 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffcc70 fffff800`02abb950 : fffff800`02bddb24 fffff880`02ffcce8 fffff880`02ffdb48 fffff800`02a1e000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffcca0 fffff800`02ac88df : fffff880`02ffdb48 fffff880`02ffd3b0 fffff880`00000000 fffffa80`06bcc760 : nt!RtlDispatchException+0x410
fffff880`02ffd380 fffff800`02a8dc42 : fffff880`02ffdb48 fffff880`02fd5180 fffff880`02ffdbf0 fffff880`02fdffc0 : nt!KiDispatchException+0x16f
fffff880`02ffda10 fffff800`02a8c54a : fffff880`02fd5180 fffff880`02ffdc70 fffff880`02fd7d60 00000000`00000003 : nt!KiExceptionDispatch+0xc2
fffff880`02ffdbf0 fffff800`02a96dd2 : fffff880`02fd5180 fffff880`00000002 00000000`00000002 fffff880`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`02ffdd80 00000000`00000000 : fffff880`02ffe000 fffff880`02ff8000 fffff880`02ffdd40 00000000`00000000 : nt!KiIdleLoop+0x32
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`02a8632e 90 nop
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Windows crash reports.zip\Windows7_BSOD_jcgriff2\071210-23836-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a01000 PsLoadedModuleList = 0xfffff800`02c3ee50
Debug session time: Tue Jul 13 02:51:48.720 2010 (GMT-4)
System Uptime: 0 days 0:28:15.172
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffa8086d04fd0, 2, 0, fffff88010bbcf0c}
Probably caused by : usbuhci.sys ( usbuhci!UhciProcessDoneAsyncTd+24 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa8086d04fd0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88010bbcf0c, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ca90e0
fffffa8086d04fd0
CURRENT_IRQL: 2
FAULTING_IP:
usbuhci!UhciProcessDoneAsyncTd+24
fffff880`10bbcf0c 4c8b7f08 mov r15,qword ptr [rdi+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: ffmpeg.exe
TRAP_FRAME: fffff88002f93b50 -- (.trap 0xfffff88002f93b50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002f93d48 rbx=0000000000000000 rcx=fffffa800801b6a0
rdx=fffff880067e40e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88010bbcf0c rsp=fffff88002f93ce0 rbp=fffff880067e1260
r8=0000000000000000 r9=fffff880067e1260 r10=00000000ffffffff
r11=fffffa8006894410 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
usbuhci!UhciProcessDoneAsyncTd+0x24:
fffff880`10bbcf0c 4c8b7f08 mov r15,qword ptr [rdi+8] ds:8010:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a70b69 to fffff80002a71600
STACK_TEXT:
fffff880`02f93a08 fffff800`02a70b69 : 00000000`0000000a fffffa80`86d04fd0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f93a10 fffff800`02a6f7e0 : fffffa80`08656000 00000000`00000000 fffffa80`08688010 fffffa80`086579a0 : nt!KiBugCheckDispatch+0x69
fffff880`02f93b50 fffff880`10bbcf0c : 00000000`00000000 fffff880`0fead924 fffffa80`07e45000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`02f93ce0 fffff880`10bbd7c6 : fffffa80`06b78fd8 fffffa80`06b78f30 00000000`00000000 fffffa80`06b78ff0 : usbuhci!UhciProcessDoneAsyncTd+0x24
fffff880`02f93d50 fffff880`10bba2d6 : 00000000`00000002 fffffa80`06b78cf0 00000000`00000000 fffffa80`0801a1a0 : usbuhci!UhciPollAsyncEndpoint+0x5de
fffff880`02f93db0 fffff880`03f0de8b : fffffa80`0801a1a0 00000000`00000002 00000000`00000000 00000000`00000010 : usbuhci!UhciPollEndpoint+0x1a
fffff880`02f93de0 fffff880`03f129b1 : 00000000`00000010 00000000`00000004 fffffa80`06b78cf0 fffffa80`0801a050 : USBPORT!MPf_PollEndpoint+0x9b
fffff880`02f93e10 fffff880`03f1e043 : fffffa80`0801a1a0 00000000`00000010 fffffa80`0000000e 00000000`00000000 : USBPORT!USBPORT_iSetGlobalEndpointStateTx+0x7c1
fffff880`02f93e70 fffff880`03f0ef89 : fffffa80`0801a050 00000000`00000000 fffffa80`0801aa02 fffffa80`0801aa10 : USBPORT!USBPORT_Core_UsbHcIntDpc_Worker+0x1af
fffff880`02f93ed0 fffff800`02a7ccdc : fffff880`02f64180 fffffa80`0801aa10 fffffa80`0801aa28 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f93f00 fffff800`02a77765 : 0000057c`00000000 fffffa80`06d606e0 00000000`00000000 fffff880`03f0edb0 : nt!KiRetireDpcList+0x1bc
fffff880`02f93fb0 fffff800`02a7757c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KyRetireDpcList+0x5
fffff880`0753cbe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
usbuhci!UhciProcessDoneAsyncTd+24
fffff880`10bbcf0c 4c8b7f08 mov r15,qword ptr [rdi+8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: usbuhci!UhciProcessDoneAsyncTd+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: usbuhci
IMAGE_NAME: usbuhci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc03
FAILURE_BUCKET_ID: X64_0xD1_usbuhci!UhciProcessDoneAsyncTd+24
BUCKET_ID: X64_0xD1_usbuhci!UhciProcessDoneAsyncTd+24
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Windows crash reports.zip\Windows7_BSOD_jcgriff2\071210-24180-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a1a000 PsLoadedModuleList = 0xfffff800`02c57e50
Debug session time: Tue Jul 13 02:22:22.002 2010 (GMT-4)
System Uptime: 0 days 1:44:54.454
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 34, {50830, fffff880031935e8, fffff88003192e50, fffff80002aa7479}
Probably caused by : memory_corruption ( nt!MmCheckCachedPageStates+2f9 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CACHE_MANAGER (34)
See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000050830
Arg2: fffff880031935e8
Arg3: fffff88003192e50
Arg4: fffff80002aa7479
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880031935e8 -- (.exr 0xfffff880031935e8)
ExceptionAddress: fffff80002aa7479 (nt!MmCheckCachedPageStates+0x00000000000002f9)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: fffff88003192e50 -- (.cxr 0xfffff88003192e50)
rax=fffff8a00d088d80 rbx=00000000574d1921 rcx=0000000000000006
rdx=fffff80002a1a000 rsi=fffff6fcc00bb180 rdi=0000000000000000
rip=fffff80002aa7479 rsp=fffff88003193820 rbp=fffff88003193880
r8=0000058000000000 r9=fffffa8000000008 r10=fffffa80021d6d40
r11=2aaaaaaaaaaaaaab r12=fffffa800105e730 r13=0000000000000000
r14=fffff6fcc00bb1f8 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!MmCheckCachedPageStates+0x2f9:
fffff800`02aa7479 f0498344240801 lock add qword ptr [r12+8],1 ds:002b:fffffa80`0105e738=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x34
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
LAST_CONTROL_TRANSFER: from fffff80002aceb8e to fffff80002aa7479
STACK_TEXT:
fffff880`03193820 fffff800`02aceb8e : fffff980`1760b000 00000000`00045000 00000000`00000000 00000000`00000005 : nt!MmCheckCachedPageStates+0x2f9
fffff880`031939d0 fffff800`02ceff4a : 00000000`11180000 00000000`1118b000 00000000`00045000 00000000`00000001 : nt!CcFetchDataForRead+0x10e
fffff880`03193a30 fffff800`02a3cb1c : fffffa80`06713770 00000000`1118b000 00000000`00035000 fffff800`02c2f501 : nt!CcMapAndCopyFromCache+0xba
fffff880`03193ad0 fffff800`02a7e472 : fffffa80`06f327d0 fffff800`02c2f500 00000000`00000005 00000000`00000000 : nt!CcPerformReadAhead+0x3b8
fffff880`03193c00 fffff800`02a97861 : fffffa80`06739550 fffff800`02d87804 fffff800`02c91150 fffff800`00000000 : nt!CcWorkerThread+0x21e
fffff880`03193cb0 fffff800`02d2fa86 : 00000000`00000000 fffffa80`0674a1a0 00000000`00000080 fffffa80`06722040 : nt!ExpWorkerThread+0x111
fffff880`03193d40 fffff800`02a68b06 : fffff880`02f64180 fffffa80`0674a1a0 fffff880`02f6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03193d80 00000000`00000000 : fffff880`03194000 fffff880`0318e000 fffff880`031936e0 00000000`00000000 : nt!KxStartSystemThread+0x16
FOLLOWUP_IP:
nt!MmCheckCachedPageStates+2f9
fffff800`02aa7479 f0498344240801 lock add qword ptr [r12+8],1
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MmCheckCachedPageStates+2f9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
STACK_COMMAND: .cxr 0xfffff88003192e50 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x34_nt!MmCheckCachedPageStates+2f9
BUCKET_ID: X64_0x34_nt!MmCheckCachedPageStates+2f9
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Windows crash reports.zip\Windows7_BSOD_jcgriff2\071310-34975-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a0d000 PsLoadedModuleList = 0xfffff800`02c4ae50
Debug session time: Wed Jul 14 00:34:07.474 2010 (GMT-4)
System Uptime: 0 days 1:06:45.926
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff70001080000, 117a4, e8d801022f48}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+29f97 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 00000000000117a4
Arg4: 0000e8d801022f48
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Bridge.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002aecd98 to fffff80002a7d600
STACK_TEXT:
fffff880`0727c9c8 fffff800`02aecd98 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`000117a4 : nt!KeBugCheckEx
fffff880`0727c9d0 fffff800`02a978a6 : 00000000`00000001 00000000`1786a000 fffff880`0727cc20 fffff680`000bc350 : nt! ?? ::FNODOBFM::`string'+0x29f97
fffff880`0727cac0 fffff800`02a7b6ee : 00000000`00000001 00000000`116f7d70 00000000`064fbc01 00000000`00000006 : nt!MmAccessFault+0x5c6
fffff880`0727cc20 00000000`4fe2d047 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`064fb8ac 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x4fe2d047
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+29f97
fffff800`02aecd98 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+29f97
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29f97
BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29f97
Followup: MachineOwner
---------
You have some obsolete drivers on your system. Win 7 does not like older drivers. They can cause instability and memory corruption.