Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041811-7971-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0301e000 PsLoadedModuleList = 0xfffff800`03263e90
Debug session time: Mon Apr 18 21:30:34.286 2011 (UTC - 4:00)
System Uptime: 0 days 9:24:32.223
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41284, 4484001, 0, fffff70001080000}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4ac3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 0000000004484001
Arg3: 0000000000000000
Arg4: fffff70001080000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: mocha.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800030f5767 to fffff8000309e640
STACK_TEXT:
fffff880`08d167e8 fffff800`030f5767 : 00000000`0000001a 00000000`00041284 00000000`04484001 00000000`00000000 : nt!KeBugCheckEx
fffff880`08d167f0 fffff800`030d06f0 : fffff700`01080000 85600000`23946867 fffffa80`07c06000 fffff880`08d169a0 : nt! ?? ::FNODOBFM::`string'+0x4ac3
fffff880`08d16830 fffff800`030d1fd9 : fffff880`00000000 00000000`044affff 00000000`00000000 fffffa80`07c06c40 : nt!MiDeleteVirtualAddresses+0x4e8
fffff880`08d169f0 fffff800`033b5731 : fffffa80`0a1e4f80 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`08d16b10 fffff800`033b5b33 : fffffa80`00000000 00000000`04470000 fffffa80`00000001 fffff960`0025e101 : nt!MiUnmapViewOfSection+0x1b1
fffff880`08d16bd0 fffff800`0309d8d3 : 00000000`00000001 00000000`044a8000 fffffa80`09c8e060 00000000`00202040 : nt!NtUnmapViewOfSection+0x5f
fffff880`08d16c20 00000000`777415ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00259368 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777415ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+4ac3
fffff800`030f5767 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4ac3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3
BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+4ac3
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041811-7737-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0305a000 PsLoadedModuleList = 0xfffff800`0329fe90
Debug session time: Mon Apr 18 04:53:27.039 2011 (UTC - 4:00)
System Uptime: 0 days 17:49:44.350
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff88001221d78, 2, 0, fffff800030e4264}
Probably caused by : ataport.SYS ( ataport!GenPnpRefPdoExtensionWithTag+30 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff88001221d78, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030e4264, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330b0e8
fffff88001221d78
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeAcquireSpinLockRaiseToDpc+34
fffff800`030e4264 0fba2518d4170010 bt dword ptr [nt!PerfGlobalGroupMask+0x4 (fffff800`03261684)],10h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff800046be280 -- (.trap 0xfffff800046be280)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa80066a0238
rdx=0000000000000103 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030e4264 rsp=fffff800046be410 rbp=fffffa80066a0238
r8=fffff880010ab830 r9=0000000000000000 r10=0000000000000006
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeAcquireSpinLockRaiseToDpc+0x34:
fffff800`030e4264 0fba2518d4170010 bt dword ptr [nt!PerfGlobalGroupMask+0x4 (fffff800`03261684)],10h ds:0206:fffff800`03261684=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d9be9 to fffff800030da640
STACK_TEXT:
fffff800`046be138 fffff800`030d9be9 : 00000000`0000000a fffff880`01221d78 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`046be140 fffff800`030d8860 : 00000000`0000000e fffffa80`07551030 fffffa80`07551030 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff800`046be280 fffff800`030e4264 : fffff800`0305a000 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x260
fffff800`046be410 fffff880`010a4958 : fffffa80`066a0238 00000000`00000002 00000000`00000103 fffffa80`066a01a0 : nt!KeAcquireSpinLockRaiseToDpc+0x34
fffff800`046be460 fffff880`010af535 : fffff880`010ab830 00000000`00000002 fffff880`010ab830 fffff800`0324f080 : ataport!GenPnpRefPdoExtensionWithTag+0x30
fffff800`046be4b0 fffff880`010af880 : fffff800`0324f080 fffff800`0325acc0 00000000`00000000 00000000`00000000 : ataport!RefPdoExtensionWithTag+0x1d
fffff800`046be4e0 fffff880`010ab94a : fffff800`046be630 fffffa80`066a01a0 fffff800`00000003 fffff800`046be618 : ataport!RefNextPdoExtensionWithTag+0x30
fffff800`046be510 fffff800`030e6062 : fffff800`046be630 00000000`00000103 00000000`00000000 00000000`00000004 : ataport!IdePortTickHandler+0x11a
fffff800`046be570 fffff800`030e5f06 : fffffa80`06845460 00000000`003ec7b3 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`046be5e0 fffff800`030e5dee : 00000095`70daa2c1 fffff800`046bec58 00000000`003ec7b3 fffff800`032508e8 : nt!KiProcessExpiredTimerList+0xc6
fffff800`046bec30 fffff800`030e5bd7 : 00000035`ed79a7c4 00000035`003ec7b3 00000035`ed79a70e 00000000`000000b2 : nt!KiTimerExpiration+0x1be
fffff800`046becd0 fffff800`030d236a : fffff800`0324ce80 fffff800`0325acc0 00000000`00000000 fffff880`0140aa00 : nt!KiRetireDpcList+0x277
fffff800`046bed80 00000000`00000000 : fffff800`046bf000 fffff800`046b9000 fffff800`046bed40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!GenPnpRefPdoExtensionWithTag+30
fffff880`010a4958 448bcf mov r9d,edi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: ataport!GenPnpRefPdoExtensionWithTag+30
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79293
FAILURE_BUCKET_ID: X64_0xA_ataport!GenPnpRefPdoExtensionWithTag+30
BUCKET_ID: X64_0xA_ataport!GenPnpRefPdoExtensionWithTag+30
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-7940-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0300e000 PsLoadedModuleList = 0xfffff800`03253e90
Debug session time: Tue Apr 19 23:08:41.190 2011 (UTC - 4:00)
System Uptime: 1 days 1:37:11.501
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff800006d103a, 2, 0, fffff8000309469f}
Probably caused by : tcpip.sys ( tcpip!TcpPartitionGetNextExpirationTick+6f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff800006d103a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000309469f, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bf0e8
fffff800006d103a
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeReleaseInStackQueuedSpinLockFromDpcLevel+f
fffff800`0309469f 0fba25dd0f180010 bt dword ptr [nt!PerfGlobalGroupMask+0x4 (fffff800`03215684)],10h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff800046b7260 -- (.trap 0xfffff800046b7260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000131 rbx=0000000000000000 rcx=fffff800046b7440
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000309469f rsp=fffff800046b73f0 rbp=00000000008cbbd4
r8=fffff800046b7440 r9=0000000000000000 r10=fffffa8006f64840
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KeReleaseInStackQueuedSpinLockFromDpcLevel+0xf:
fffff800`0309469f 0fba25dd0f180010 bt dword ptr [nt!PerfGlobalGroupMask+0x4 (fffff800`03215684)],10h ds:ed30:fffff800`03215684=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000308dbe9 to fffff8000308e640
STACK_TEXT:
fffff800`046b7118 fffff800`0308dbe9 : 00000000`0000000a fffff800`006d103a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`046b7120 fffff800`0308c860 : 00000000`00000000 00000000`00000000 00000001`00000001 00000000`008cbd05 : nt!KiBugCheckDispatch+0x69
fffff800`046b7260 fffff800`0309469f : fffffa80`06e24d40 00000000`00000000 00000000`00000000 00000000`008cbbd4 : nt!KiPageFault+0x260
fffff800`046b73f0 fffff880`0174ae6f : 00000000`008cbbd4 00000000`00000000 00000000`008cbd05 00000000`00000000 : nt!KeReleaseInStackQueuedSpinLockFromDpcLevel+0xf
fffff800`046b7420 fffff880`0174a8ec : 00000000`00000014 00000000`00000004 fffffa80`06e36a60 fffffa80`008cbbd4 : tcpip!TcpPartitionGetNextExpirationTick+0x6f
fffff800`046b7470 fffff800`0309a062 : fffff800`03200e80 00000000`00000000 fffff800`046b7600 00000000`00000001 : tcpip!TcpPeriodicTimeoutHandler+0x86b
fffff800`046b7570 fffff800`03099f06 : fffffa80`06e36b30 00000000`005a36ad 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`046b75e0 fffff800`03099dee : 000000d6`be423a6a fffff800`046b7c58 00000000`005a36ad fffff800`03204828 : nt!KiProcessExpiredTimerList+0xc6
fffff800`046b7c30 fffff800`03099bd7 : 0000004d`7e2182c1 0000004d`005a36ad 0000004d`7e218266 00000000`000000ad : nt!KiTimerExpiration+0x1be
fffff800`046b7cd0 fffff800`0308636a : fffff800`03200e80 fffff800`0320ecc0 00000000`00000000 fffff880`01438a00 : nt!KiRetireDpcList+0x277
fffff800`046b7d80 00000000`00000000 : fffff800`046b8000 fffff800`046b2000 fffff800`046b7d40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpPartitionGetNextExpirationTick+6f
fffff880`0174ae6f 488b6c2458 mov rbp,qword ptr [rsp+58h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: tcpip!TcpPartitionGetNextExpirationTick+6f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79420
FAILURE_BUCKET_ID: X64_0xA_tcpip!TcpPartitionGetNextExpirationTick+6f
BUCKET_ID: X64_0xA_tcpip!TcpPartitionGetNextExpirationTick+6f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042111-8954-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0304d000 PsLoadedModuleList = 0xfffff800`03292e90
Debug session time: Wed Apr 20 23:21:38.089 2011 (UTC - 4:00)
System Uptime: 0 days 13:05:58.026
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 124, {0, fffffa8007148028, b2000000, 20001}
Probably caused by : hardware
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: fffffa8007148028, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000b2000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000020001, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
BUGCHECK_STR: 0x124_GenuineIntel
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: f
STACK_TEXT:
fffff880`031dda58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0x124_GenuineIntel_PROCESSOR_MAE
BUCKET_ID: X64_0x124_GenuineIntel_PROCESSOR_MAE
Followup: MachineOwner
---------