i keep getting blue screens on win 7 i have win 7 on 500GB western digital hard drive runing on sata channel 1 i have both .dmp files and the listings from debug.exe i will include both could you determine my issue i have had this problem for a while and have tried alot of problem solving methods via microsoft.com thanks for any info i have a p4p800mx mobo 2.5 GB ram nvidia 8400gs graphics card sound blaster live 24 bit sound card and ati wonder pci tuner card 800 watt atx psu pentium 4 ht processor 2.8GHz OClocked to 3.0GHz through the bios.
i also have tried both oem and microsoft drivers for graphics and i still get an occasional your graphics card has unexpectantly stopped working and has recovered i cant send the actual dmp files it wont let me any info on this matter would be appreciated.
Opened log file 'c:debuglog.txt'
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\112709-19343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
Machine Name:
Kernel base = 0x82800000 PsLoadedModuleList = 0x8293f570
Debug session time: Fri Nov 27 14:39:43.708 2009 (GMT-5)
System Uptime: 0 days 2:07:57.115
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.........
0: kd> !analyze -v;r;kv;lmtn;.logclose;q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 0004e977, page frame number
Arg3: 00000002, current page state
Arg4: 0004e974, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 828d7500 to 828bbe94
STACK_TEXT:
821e7778 828d7500 0000004e 00000099 0004e977 nt!KeBugCheckEx+0x1e
821e7790 82889e01 00001c90 00000000 00000059 nt!MiBadShareCount+0x24
821e7868 82888ca3 c03f7d70 00000014 00000000 nt!MiDeleteSystemPagableVm+0x58f
821e7944 829168fa fdf17000 00000000 00059000 nt!MiFreePagedPoolPages+0x33d
821e7a0c 82917ed5 fdf17000 00000026 fdf17000 nt!MiFreePoolPages+0x2ba
821e7a70 93991c6f fdf17000 00000000 00000000 nt!ExFreePoolWithTag+0x438
821e7b20 93991a59 ff9e4648 00000026 00000006 win32k!EngRealizeBrush+0x190
821e7bb8 93991316 93b64200 ffb63748 93991adf win32k!bGetRealizedBrush+0x70c
821e7bd0 93a04153 ff9e4648 ff9e4648 fe4d5000 win32k!pvGetEngRbrush+0x1f
821e7c34 93a1dd63 fe4d5010 00000000 00000000 win32k!EngBitBlt+0x2e2
821e7c98 939b2411 ff9e4648 821e7cfc 821e7cec win32k!GrePatBltLockedDC+0x22b
821e7d14 8284135a d3010772 00000000 00000000 win32k!NtGdiPatBlt+0x14c
821e7d14 778c8244 d3010772 00000000 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
75cd6180 00000000 00000000 00000000 00000000 0x778c8244
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+24
828d7500 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 49ee8b48
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
Followup: MachineOwner
---------
eax=8292e934 ebx=00000002 ecx=00000026 edx=00000000 esi=82921d20 edi=00000000
eip=828bbe94 esp=821e7760 ebp=821e7778 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000206
nt!KeBugCheckEx+0x1e:
828bbe94 cc int 3
ChildEBP RetAddr Args to Child
821e7778 828d7500 0000004e 00000099 0004e977 nt!KeBugCheckEx+0x1e
821e7790 82889e01 00001c90 00000000 00000059 nt!MiBadShareCount+0x24 (FPO: [0,0,0])
821e7868 82888ca3 c03f7d70 00000014 00000000 nt!MiDeleteSystemPagableVm+0x58f
821e7944 829168fa fdf17000 00000000 00059000 nt!MiFreePagedPoolPages+0x33d
821e7a0c 82917ed5 fdf17000 00000026 fdf17000 nt!MiFreePoolPages+0x2ba
821e7a70 93991c6f fdf17000 00000000 00000000 nt!ExFreePoolWithTag+0x438
821e7b20 93991a59 ff9e4648 00000026 00000006 win32k!EngRealizeBrush+0x190 (FPO: [6,37,4])
821e7bb8 93991316 93b64200 ffb63748 93991adf win32k!bGetRealizedBrush+0x70c (FPO: [3,27,4])
821e7bd0 93a04153 ff9e4648 ff9e4648 fe4d5000 win32k!pvGetEngRbrush+0x1f (FPO: [1,0,4])
821e7c34 93a1dd63 fe4d5010 00000000 00000000 win32k!EngBitBlt+0x2e2 (FPO: [11,19,4])
821e7c98 939b2411 ff9e4648 821e7cfc 821e7cec win32k!GrePatBltLockedDC+0x22b (FPO: [9,9,4])
821e7d14 8284135a d3010772 00000000 00000000 win32k!NtGdiPatBlt+0x14c (FPO: [6,17,4])
821e7d14 778c8244 d3010772 00000000 00000000 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ 821e7d34)
WARNING: Frame IP not in any known module. Following frames may be wrong.
75cd6180 00000000 00000000 00000000 00000000 0x778c8244
Unloaded modules:
9e523000 9e52e000 hiber_atapor
Timestamp: unavailable (00000000)
Checksum: 00000000
9e52e000 9e537000 hiber_atapi.
Timestamp: unavailable (00000000)
Checksum: 00000000
9e537000 9e548000 hiber_dumpfv
Timestamp: unavailable (00000000)
Checksum: 00000000
9e4ac000 9e516000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
932d9000 932f1000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aa9d000 8aaaa000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aaaa000 8aab5000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
8aab5000 8aabe000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
8aabe000 8aacf000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Closing open log file c:debuglog.txt
My System SpecsSystem Spec Edit/Delete Message Reply With Quote Multi-Quote This Message
System Manufacturer/Model Number homemade
OS windows 7
CPU pent 4 ht
Motherboard asus p4p800mx
Memory 2.5 GB
Graphics Card Nvidia GeForce 8400 gs
Sound Card sound blaster live 24 bit
Monitor(s) Displays dual stone age monitors e772p and e773p
Update your System Spec
PSU diablotek da series 400w
Case factory modded Dell 2350
Cooling air
Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
jcm2302
View Public Profile
Find More Posts by jcm2302
Add jcm2302 to Your Contacts
Old 1 Minute Ago #2 (permalink)
jcm2302
New Member
jcm2302 is on a distinguished road
Join Date: Nov 2009
windows 7
3 posts
jcm2302 is online now Add to jcm2302's Reputation Report Post
Default
also i get this
Opened log file 'c:debuglog.txt'
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\112709-19593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
Machine Name:
Kernel base = 0x82807000 PsLoadedModuleList = 0x82946570
Debug session time: Fri Nov 27 18:22:52.563 2009 (GMT-5)
System Uptime: 0 days 3:42:22.985
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
......
1: kd> !analyze -v;r;kv;lmtn;.logclose;q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MACHINE_CHECK_EXCEPTION (9c)
A fatal Machine Check Exception has occurred.
KeBugCheckEx parameters;
x86 Processors
If the processor has ONLY MCE feature available (For example Intel
Pentium), the parameters are:
1 - Low 32 bits of P5_MC_TYPE MSR
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of P5_MC_ADDR MSR
4 - Low 32 bits of P5_MC_ADDR MSR
If the processor also has MCA feature available (For example Intel
Pentium Pro), the parameters are:
1 - Bank number
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
IA64 Processors
1 - Bugcheck Type
1 - MCA_ASSERT
2 - MCA_GET_STATEINFO
SAL returned an error for SAL_GET_STATEINFO while processing MCA.
3 - MCA_CLEAR_STATEINFO
SAL returned an error for SAL_CLEAR_STATEINFO while processing MCA.
4 - MCA_FATAL
FW reported a fatal MCA.
5 - MCA_NONFATAL
SAL reported a recoverable MCA and we don't support currently
support recovery or SAL generated an MCA and then couldn't
produce an error record.
0xB - INIT_ASSERT
0xC - INIT_GET_STATEINFO
SAL returned an error for SAL_GET_STATEINFO while processing INIT event.
0xD - INIT_CLEAR_STATEINFO
SAL returned an error for SAL_CLEAR_STATEINFO while processing INIT event.
0xE - INIT_FATAL
Not used.
2 - Address of log
3 - Size of log
4 - Error code in the case of x_GET_STATEINFO or x_CLEAR_STATEINFO
AMD64 Processors
1 - Bank number
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
Arguments:
Arg1: 00000000
Arg2: 80dc794c
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
NOTE: This is a hardware error. This error was reported by the CPU
via Interrupt 18. This analysis will provide more information about
the specific error. Please contact the manufacturer for additional
information about this error and troubleshooting assistance.
This error is documented in the following publication:
- IA-32 Intel(r) Architecture Software Developer's Manual
Volume 3: System Programming Guide
Bit Mask:
MA Model Specific MCA
O ID Other Information Error Code Error Code
VV SDP ___________|____________ _______|_______ _______|______
AEUECRC| | | |
LRCNVVC| | | |
^^^^^^^| | | |
6 5 4 3 2 1
3210987654321098765432109876543210987654321098765432109876543210
----------------------------------------------------------------
0000000000000000000000000000000000000000000000000000000000000000
Concatenated Error Code:
--------------------------
This error code can be reported back to the manufacturer.
They may be able to provide additional information based upon
this error. All questions regarding STOP 0x9C should be
directed to the hardware manufacturer.
BUGCHECK_STR: 0x9C_GenuineIntel
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 1f
LAST_CONTROL_TRANSFER: from 82c161f9 to 828c2e94
SYMBOL_ON_RAW_STACK: 1
STACK_ADDR_RAW_STACK_SYMBOL: ffffffff80dc7958
STACK_COMMAND: dds 80DC7958-0x20 ; kb
STACK_TEXT:
80dc7938 00000000
80dc793c 80dc794c
80dc7940 00000000
80dc7944 00000000
80dc7948 82c23e34 hal!HalpMceRendezvousCount
80dc794c 00000001
80dc7950 00000000
80dc7954 8abaa8cd afd!AfdUnBindSocket+0x24a
80dc7958 01ca6fb8
80dc795c 00000001
80dc7960 00000000
80dc7964 00000000
80dc7968 00000000
80dc796c 00000000
80dc7970 00000000
80dc7974 00000000
80dc7978 00000000
80dc797c 00000000
80dc7980 00000000
80dc7984 00000000
80dc7988 00000000
80dc798c 00000000
80dc7990 00000000
80dc7994 00000000
80dc7998 00000000
80dc799c 00000000
80dc79a0 00000000
80dc79a4 00000000
80dc79a8 00000000
80dc79ac 00000000
80dc79b0 00000000
80dc79b4 00000000
FOLLOWUP_IP:
afd!AfdUnBindSocket+24a
8abaa8cd 750d jne afd!AfdUnBindSocket+0x259 (8abaa8dc)
SYMBOL_NAME: afd!AfdUnBindSocket+24a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49ee8a86
FAILURE_BUCKET_ID: 0x9C_GenuineIntel_afd!AfdUnBindSocket+24a
BUCKET_ID: 0x9C_GenuineIntel_afd!AfdUnBindSocket+24a
Followup: MachineOwner
---------
eax=82935934 ebx=0000001f ecx=00000018 edx=829358b4 esi=80dbf120 edi=00000000
eip=828c2e94 esp=80dc7910 ebp=80dc792c iopl=0 nv up di pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000002
nt!KeBugCheckEx+0x1e:
828c2e94 cc int 3
ChildEBP RetAddr Args to Child
80dc792c 82c161f9 0000009c 00000000 80dc794c nt!KeBugCheckEx+0x1e
80dc7a50 82c163ff 00000000 00000000 00000000 hal!HalpMcaReportError+0x81 (FPO: [2,65,0])
80dc7a70 82c1650a 00000000 85df66b0 80dc7b90 hal!HalpMceHandlerWithRendezvous+0x89 (FPO: [2,1,4])
80dc7a80 82c0c5f5 00000000 00000000 00000000 hal!HalpHandleMachineCheck+0x34 (FPO: [1,0,0])
80dc7b90 82c09261 00000000 80dc2750 00000000 hal!HalpMcaExceptionHandler+0x87 (FPO: [0,65,0])
80dc7b90 00000000 00000000 80dc2750 00000000 hal!HalpMcaExceptionHandlerWrapper+0x89 (FPO: TSS f10f10:0)
start end module name
80ba5000 80bad000 kdcom kdcom.dll Wed Apr 22 01:07:23 2009 (49EEA60B)
82807000 82c07000 nt ntkrnlmp.exe Tue Apr 21 23:13:12 2009 (49EE8B48)
82c07000 82c3e000 hal halmacpi.dll Tue Apr 21 23:08:30 2009 (49EE8A2E)
8a01f000 8a090000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Wed Apr 22 01:05:20 2009 (49EEA590)
8a090000 8a0a1000 PSHED PSHED.dll Wed Apr 22 01:09:07 2009 (49EEA673)
8a0a1000 8a0a9000 BOOTVID BOOTVID.dll Wed Apr 22 01:01:42 2009 (49EEA4B6)
8a0a9000 8a0eb000 CLFS CLFS.SYS Tue Apr 21 23:08:36 2009 (49EE8A34)
8a0eb000 8a196000 CI CI.dll Wed Apr 22 01:08:59 2009 (49EEA66B)
8a196000 8a207000 Wdf01000 Wdf01000.sys Tue Apr 21 23:09:01 2009 (49EE8A4D)
8a207000 8a215000 WDFLDR WDFLDR.SYS Tue Apr 21 23:08:47 2009 (49EE8A3F)
8a215000 8a25d000 ACPI ACPI.sys Tue Apr 21 23:08:37 2009 (49EE8A35)
8a25d000 8a266000 WMILIB WMILIB.SYS Tue Apr 21 23:08:46 2009 (49EE8A3E)
8a266000 8a26e000 msisadrv msisadrv.sys Tue Apr 21 23:08:33 2009 (49EE8A31)
8a26e000 8a298000 pci pci.sys Tue Apr 21 23:08:40 2009 (49EE8A38)
8a298000 8a2a3000 vdrvroot vdrvroot.sys Tue Apr 21 23:44:49 2009 (49EE92B1)
8a2a3000 8a2b4000 partmgr partmgr.sys Tue Apr 21 23:08:57 2009 (49EE8A49)
8a2b4000 8a2c4000 volmgr volmgr.sys Tue Apr 21 23:08:47 2009 (49EE8A3F)
8a2c4000 8a30f000 volmgrx volmgrx.sys Tue Apr 21 23:09:06 2009 (49EE8A52)
8a30f000 8a316000 intelide intelide.sys Tue Apr 21 23:08:44 2009 (49EE8A3C)
8a316000 8a324000 PCIIDEX PCIIDEX.SYS Tue Apr 21 23:08:40 2009 (49EE8A38)
8a324000 8a33a000 mountmgr mountmgr.sys Tue Apr 21 23:08:51 2009 (49EE8A43)
8a33a000 8a343000 atapi atapi.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
8a343000 8a366000 ataport ataport.SYS Tue Apr 21 23:08:42 2009 (49EE8A3A)
8a366000 8a36f000 amdxata amdxata.sys Tue Mar 10 19:22:16 2009 (49B6F628)
8a36f000 8a3a3000 fltmgr fltmgr.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
8a3a3000 8a3b4000 fileinfo fileinfo.sys Tue Apr 21 23:19:22 2009 (49EE8CBA)
8a3b4000 8a3cb000 rassstp rassstp.sys Tue Apr 21 23:53:30 2009 (49EE94BA)
8a3cb000 8a3d9000 umbus umbus.sys Tue Apr 21 23:50:03 2009 (49EE93EB)
8a406000 8a535000 Ntfs Ntfs.sys Tue Apr 21 23:09:31 2009 (49EE8A6B)
8a535000 8a560000 msrpc msrpc.sys Tue Apr 21 23:09:19 2009 (49EE8A5F)
8a560000 8a573000 ksecdd ksecdd.sys Tue Apr 21 23:09:16 2009 (49EE8A5C)
8a573000 8a5d0000 cng cng.sys Tue Apr 21 23:31:04 2009 (49EE8F78)
8a5d0000 8a5de000 pcw pcw.sys Tue Apr 21 23:08:34 2009 (49EE8A32)
8a5de000 8a5e7000 Fs_Rec Fs_Rec.sys Tue Apr 21 23:08:38 2009 (49EE8A36)
8a5e7000 8a69e000 ndis ndis.sys Tue Apr 21 23:09:42 2009 (49EE8A76)
8a69e000 8a6dc000 NETIO NETIO.SYS Tue Apr 21 23:10:05 2009 (49EE8A8D)
8a6dc000 8a701000 ksecpkg ksecpkg.sys Tue Apr 21 23:32:15 2009 (49EE8FBF)
8a701000 8a71f000 pacer pacer.sys Tue Apr 21 23:52:32 2009 (49EE9480)
8a71f000 8a72d000 netbios netbios.sys Tue Apr 21 23:52:28 2009 (49EE947C)
8a72d000 8a747000 serial serial.sys Tue Apr 21 23:44:02 2009 (49EE9282)
8a747000 8a75a000 wanarp wanarp.sys Tue Apr 21 23:53:29 2009 (49EE94B9)
8a75a000 8a76a000 termdd termdd.sys Wed Apr 22 00:00:07 2009 (49EE9647)
8a76a000 8a7ab000 rdbss rdbss.sys Tue Apr 21 23:11:43 2009 (49EE8AEF)
8a7ab000 8a7b5000 mssmbios mssmbios.sys Tue Apr 21 23:16:49 2009 (49EE8C21)
8a7b5000 8a7c1000 discache discache.sys Tue Apr 21 23:21:34 2009 (49EE8D3E)
8a7c1000 8a7d9000 raspppoe raspppoe.sys Tue Apr 21 23:53:24 2009 (49EE94B4)
8a7d9000 8a7f0000 raspptp raspptp.sys Tue Apr 21 23:53:17 2009 (49EE94AD)
8a7f0000 8a7fd000 mouclass mouclass.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
8a800000 8a832000 netbt netbt.sys Tue Apr 21 23:09:39 2009 (49EE8A73)
8a834000 8a979000 tcpip tcpip.sys Tue Apr 21 23:10:47 2009 (49EE8AB7)
8a979000 8a9aa000 fwpkclnt fwpkclnt.sys Tue Apr 21 23:09:26 2009 (49EE8A66)
8a9aa000 8a9b2380 vmstorfl vmstorfl.sys Tue Apr 21 23:26:29 2009 (49EE8E65)
8a9b3000 8a9f1000 volsnap volsnap.sys Tue Apr 21 23:08:58 2009 (49EE8A4A)
8a9f1000 8a9f9000 spldr spldr.sys Wed Mar 25 15:16:08 2009 (49CA82F8)
8a9f9000 8aa26000 rdyboost rdyboost.sys Tue Apr 21 23:19:32 2009 (49EE8CC4)
8aa26000 8aa36000 mup mup.sys Tue Apr 21 23:11:32 2009 (49EE8AE4)
8aa36000 8aa3e000 hwpolicy hwpolicy.sys Tue Apr 21 23:08:27 2009 (49EE8A2B)
8aa3e000 8aa70000 fvevol fvevol.sys Tue Apr 21 23:10:25 2009 (49EE8AA1)
8aa70000 8aa81000 disk disk.sys Tue Apr 21 23:08:52 2009 (49EE8A44)
8aa81000 8aaa6000 CLASSPNP CLASSPNP.SYS Tue Apr 21 23:08:43 2009 (49EE8A3B)
8aad8000 8aaf7000 cdrom cdrom.sys Tue Apr 21 23:08:48 2009 (49EE8A40)
8aaf7000 8aafe000 Null Null.SYS Tue Apr 21 23:08:37 2009 (49EE8A35)
8aafe000 8ab05000 Beep Beep.SYS Tue Apr 21 23:43:27 2009 (49EE925F)
8ab05000 8ab11000 vga vga.sys Tue Apr 21 23:23:17 2009 (49EE8DA5)
8ab11000 8ab32000 VIDEOPRT VIDEOPRT.SYS Tue Apr 21 23:23:20 2009 (49EE8DA8)
8ab32000 8ab3f000 watchdog watchdog.sys Tue Apr 21 23:21:46 2009 (49EE8D4A)
8ab3f000 8ab47000 RDPCDD RDPCDD.sys Wed Apr 22 00:00:11 2009 (49EE964B)
8ab47000 8ab4f000 rdpencdd rdpencdd.sys Wed Apr 22 00:00:11 2009 (49EE964B)
8ab4f000 8ab57000 rdprefmp rdprefmp.sys Wed Apr 22 00:00:11 2009 (49EE964B)
8ab57000 8ab62000 Msfs Msfs.SYS Tue Apr 21 23:08:46 2009 (49EE8A3E)
8ab62000 8ab70000 Npfs Npfs.SYS Tue Apr 21 23:08:49 2009 (49EE8A41)
8ab70000 8ab87000 tdx tdx.sys Tue Apr 21 23:09:29 2009 (49EE8A69)
8ab87000 8ab92000 TDI TDI.SYS Tue Apr 21 23:09:31 2009 (49EE8A6B)
8ab92000 8abec000 afd afd.sys Tue Apr 21 23:09:58 2009 (49EE8A86)
8abec000 8abf3000 wfplwf wfplwf.sys Tue Apr 21 23:52:24 2009 (49EE9478)
8abf3000 8abfd000 nsiproxy nsiproxy.sys Tue Apr 21 23:09:25 2009 (49EE8A65)
91000000 91023000 ndiswan ndiswan.sys Tue Apr 21 23:53:08 2009 (49EE94A4)
91023000 9102d000 rdpbus rdpbus.sys Wed Apr 22 00:01:12 2009 (49EE9688)
91031000 91095000 csc csc.sys Tue Apr 21 23:12:21 2009 (49EE8B15)
91095000 910ad000 dfsc dfsc.sys Tue Apr 21 23:11:34 2009 (49EE8AE6)
910ad000 910bb000 blbdrive blbdrive.sys Tue Apr 21 23:20:31 2009 (49EE8CFF)
910bb000 910da000 tunnel tunnel.sys Tue Apr 21 23:52:38 2009 (49EE9486)
910da000 910ec000 intelppm intelppm.sys Tue Apr 21 23:08:27 2009 (49EE8A2B)
910ec000 910f7000 usbuhci usbuhci.sys Tue Apr 21 23:49:34 2009 (49EE93CE)
910f7000 91141000 USBPORT USBPORT.SYS Tue Apr 21 23:49:38 2009 (49EE93D2)
91141000 91150000 usbehci usbehci.sys Tue Apr 21 23:49:40 2009 (49EE93D4)
91150000 91181280 atidvcxx atidvcxx.sys Thu Dec 08 18:44:40 2005 (4398C568)
91182000 9118f180 STREAM STREAM.SYS Tue Apr 21 23:49:23 2009 (49EE93C3)
91190000 911c4000 ks ks.sys Tue Apr 21 23:43:43 2009 (49EE926F)
911c4000 911c7200 atidacxx atidacxx.sys Thu Dec 08 18:44:59 2005 (4398C57B)
911c8000 911ca780 atiddcxx atiddcxx.sys Thu Dec 08 18:44:06 2005 (4398C546)
911cb000 91328000 P17 P17.sys Thu Oct 15 22:11:53 2009 (4AD7D669)
91328000 91357000 portcls portcls.sys Tue Apr 21 23:49:26 2009 (49EE93C6)
91357000 91370000 drmk drmk.sys Wed Apr 22 00:40:17 2009 (49EE9FB1)
91370000 913a9000 dxgmms1 dxgmms1.sys Tue Apr 21 23:22:57 2009 (49EE8D91)
913a9000 913bc000 HIDCLASS HIDCLASS.SYS Tue Apr 21 23:49:26 2009 (49EE93C6)
913bc000 913ce000 AgileVpn AgileVpn.sys Tue Apr 21 23:53:30 2009 (49EE94BA)
913ce000 913e6000 rasl2tp rasl2tp.sys Tue Apr 21 23:53:07 2009 (49EE94A3)
913e6000 913f1000 ndistapi ndistapi.sys Tue Apr 21 23:52:58 2009 (49EE949A)
913f1000 913fe000 kbdclass kbdclass.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
92422000 92466000 usbhub usbhub.sys Tue Apr 21 23:50:25 2009 (49EE9401)
92466000 92470e00 atidtuxx atidtuxx.sys Thu Dec 08 18:44:52 2005 (4398C574)
92471000 92474000 BdaSup BdaSup.SYS Tue Apr 21 23:49:46 2009 (49EE93DA)
92474000 92476600 atidxbxx atidxbxx.sys Thu Dec 08 18:44:43 2005 (4398C56B)
92477000 92481000 flpydisk flpydisk.sys Tue Apr 21 23:44:14 2009 (49EE928E)
92481000 9248d000 kbdhid kbdhid.sys Tue Apr 21 23:43:35 2009 (49EE9267)
9248d000 9249e000 NDProxy NDProxy.SYS Tue Apr 21 23:53:01 2009 (49EE949D)
9249e000 924b5000 usbccgp usbccgp.sys Tue Apr 21 23:49:53 2009 (49EE93E1)
924b5000 924b6700 USBD USBD.SYS Tue Apr 21 23:49:30 2009 (49EE93CA)
924b7000 924c1000 x10ufx2 x10ufx2.sys Thu Nov 30 18:18:56 2006 (456F66E0)
924c1000 924cf000 usbscan usbscan.sys Wed Apr 22 00:13:48 2009 (49EE997C)
924cf000 924da000 usbprint usbprint.sys Wed Apr 22 00:16:54 2009 (49EE9A36)
924da000 924e3000 dc3d dc3d.sys Tue Nov 03 21:38:29 2009 (4AF0E925)
924e3000 924ee000 hidusb hidusb.sys Tue Apr 21 23:49:29 2009 (49EE93C9)
924ee000 924f5000 NuidFltr NuidFltr.sys Fri May 08 04:35:42 2009 (4A03EEDE)
924f5000 92500000 mouhid mouhid.sys Tue Apr 21 23:43:33 2009 (49EE9265)
92500000 9250a000 Dxapi Dxapi.sys Tue Apr 21 23:22:56 2009 (49EE8D90)
9250a000 92515000 monitor monitor.sys Tue Apr 21 23:23:20 2009 (49EE8DA8)
92515000 9252b000 cdfs cdfs.sys Tue Apr 21 23:08:38 2009 (49EE8A36)
9252b000 92546000 luafv luafv.sys Tue Apr 21 23:13:02 2009 (49EE8B3E)
92546000 92560000 WudfPf WudfPf.sys Tue Apr 21 23:48:41 2009 (49EE9399)
92560000 92570000 lltdio lltdio.sys Tue Apr 21 23:51:49 2009 (49EE9455)
92570000 92583000 rspndr rspndr.sys Tue Apr 21 23:51:50 2009 (49EE9456)
92583000 92608000 HTTP HTTP.sys Tue Apr 21 23:10:08 2009 (49EE8A90)
92608000 92621000 bowser bowser.sys Tue Apr 21 23:11:38 2009 (49EE8AEA)
92621000 92633000 mpsdrv mpsdrv.sys Tue Apr 21 23:51:21 2009 (49EE9439)
92633000 92656000 mrxsmb mrxsmb.sys Tue Apr 21 23:11:40 2009 (49EE8AEC)
92656000 92691000 mrxsmb10 mrxsmb10.sys Tue Apr 21 23:11:55 2009 (49EE8AFB)
92691000 926ac000 mrxsmb20 mrxsmb20.sys Tue Apr 21 23:11:48 2009 (49EE8AF4)
926c4000 926d1000 crashdmp crashdmp.sys Tue Apr 21 23:44:19 2009 (49EE9293)
926d1000 926dc000 dump_dumpata dump_dumpata.sys Tue Apr 21 23:08:41 2009 (49EE8A39)
926dc000 926e5000 dump_atapi dump_atapi.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
926e5000 926f6000 dump_dumpfve dump_dumpfve.sys Tue Apr 21 23:10:11 2009 (49EE8A93)
926f6000 9278d000 peauth peauth.sys Wed Apr 22 00:40:09 2009 (49EE9FA9)
9278d000 92797000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
92797000 927b8000 srvnet srvnet.sys Tue Apr 21 23:12:06 2009 (49EE8B06)
927b8000 927c5000 tcpipreg tcpipreg.sys Tue Apr 21 23:52:46 2009 (49EE948E)
92850000 92a9a000 win32k win32k.sys unavailable (00000000)
92ab0000 92ab9000 TSDDD TSDDD.dll unavailable (00000000)
92ae0000 92afe000 cdd cdd.dll unavailable (00000000)
93400000 9340b000 fdc fdc.sys Tue Apr 21 23:44:14 2009 (49EE928E)
9340b000 93418000 CompositeBus CompositeBus.sys Tue Apr 21 23:43:54 2009 (49EE927A)
93418000 93419b80 x10hid x10hid.sys Fri Nov 17 13:20:44 2006 (455DFD7C)
9341a000 93420480 HIDPARSE HIDPARSE.SYS Tue Apr 21 23:49:24 2009 (49EE93C4)
93421000 93425880 hamachi hamachi.sys Wed Aug 15 19:05:00 2007 (46C3869C)
93426000 93427380 swenum swenum.sys Tue Apr 21 23:43:34 2009 (49EE9266)
9342a000 93f23d00 nvlddmkm nvlddmkm.sys Fri Nov 20 22:55:33 2009 (4B0764B5)
93f24000 93f25040 nvBridge nvBridge.kmd Fri Nov 20 22:41:44 2009 (4B076178)
93f26000 93fdd000 dxgkrnl dxgkrnl.sys Tue Apr 21 23:23:48 2009 (49EE8DC4)
93fdd000 93fee000 Rtnicxp Rtnicxp.sys Mon Mar 31 01:41:05 2008 (47F07971)
93fee000 93ff8000 serenum serenum.sys Tue Apr 21 23:43:55 2009 (49EE927B)
9e83f000 9e88e000 srv2 srv2.sys Wed Sep 09 23:10:12 2009 (4AA86E14)
9e88e000 9e8df000 srv srv.sys Tue Apr 21 23:12:29 2009 (49EE8B1D)
9e949000 9e952000 asyncmac asyncmac.sys Tue Apr 21 23:53:14 2009 (49EE94AA)
9e952000 9e953580 MSPQM MSPQM.sys Tue Apr 21 23:43:35 2009 (49EE9267)
9e954000 9e955700 MSPCLOCK MSPCLOCK.sys Tue Apr 21 23:43:35 2009 (49EE9267)
Unloaded modules:
9e8df000 9e949000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
926ac000 926c4000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aaa6000 8aab3000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aab3000 8aabe000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
8aabe000 8aac7000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
8aac7000 8aad8000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Closing open log file c:debuglog.txt
My System SpecsSystem Spec Edit/Delete Message Reply With Quote Multi-Quote This Message
System Manufacturer/Model Number homemade
OS windows 7
CPU pent 4 ht
Motherboard asus p4p800mx
Memory 2.5 GB
Graphics Card Nvidia GeForce 8400 gs
Sound Card sound blaster live 24 bit
Monitor(s) Displays dual stone age monitors e772p and e773p
Update your System Spec
PSU diablotek da series 400w
Case factory modded Dell 2350
Cooling air
Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
jcm2302
View Public Profile
Find More Posts by jcm2302
Add jcm2302 to Your Contacts
Unread 1 Minute Ago #3 (permalink)
jcm2302
New Member
jcm2302 is on a distinguished road
Join Date: Nov 2009
windows 7
3 posts
jcm2302 is online now Add to jcm2302's Reputation Report Post
Default
and this
Opened log file 'c:debuglog.txt'
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\112709-18812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
Machine Name:
Kernel base = 0x82808000 PsLoadedModuleList = 0x82947570
Debug session time: Fri Nov 27 00:37:26.002 2009 (GMT-5)
System Uptime: 0 days 0:48:09.393
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c000001d, 82876c42, 9d9ada78, 0}
Probably caused by : hardware ( fileinfo!FILockSharedAcquire+14 )
Followup: MachineOwner
---------
0: kd> !analyze -v;r;kv;lmtn;.logclose;q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c000001d, The exception code that was not handled
Arg2: 82876c42, The address that the exception occurred at
Arg3: 9d9ada78, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!ExfAcquirePushLockShared+7
82876c42 f083ec44 lock sub esp,44h
TRAP_FRAME: 9d9ada78 -- (.trap 0xffffffff9d9ada78)
.trap 0xffffffff9d9ada78
ErrCode = 00000000
eax=87040030 ebx=8a3bd364 ecx=8a3bd364 edx=00000000 esi=9d9adb50 edi=00000000
eip=82876c42 esp=9d9adaec ebp=9d9adaec iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!ExfAcquirePushLockShared+0x7:
82876c42 f083ec44 lock sub esp,44h
.trap
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: sidebar.exe
CURRENT_IRQL: 0
MISALIGNED_IP:
nt!ExfAcquirePushLockShared+7
82876c42 f083ec44 lock sub esp,44h
LAST_CONTROL_TRANSFER: from 8a3ba02e to 82876c42
FAILED_INSTRUCTION_ADDRESS:
nt!ExfAcquirePushLockShared+7
82876c42 f083ec44 lock sub esp,44h
STACK_TEXT:
9d9adaec 8a3ba02e 9d9adb14 8a3bef2a 8a3bd364 nt!ExfAcquirePushLockShared+0x7
9d9adaf4 8a3bef2a 8a3bd364 9d9adb50 850c8008 fileinfo!FILockSharedAcquire+0x14
9d9adb14 8a3c00f7 84faab40 9d9adb2c 9d9adb40 fileinfo!FIFileObjectGetContext+0x34
9d9adb30 8a387aeb 850c8068 9d9adb50 00010000 fileinfo!FIPreCloseCallback+0x45
9d9adb9c 8a38a9f0 9d9adbf0 84d705e0 84d70794 fltmgr!FltpPerformPreCallbacks+0x34d
9d9adbb4 8a38af01 9d9adbf0 00000000 864a1218 fltmgr!FltpPassThroughInternal+0x40
9d9adbd8 8a38b3ba 029adbf0 864a1218 84faab40 fltmgr!FltpPassThrough+0x203
9d9adc08 82841dd2 864a1218 84d705e0 864a7024 fltmgr!FltpDispatch+0xb4
9d9adc20 82a2e0a7 84bddf78 84faab28 00000000 nt!IofCallDriver+0x63
9d9adc64 82a276c8 84faab40 84faab40 84faab28 nt!IopDeleteFile+0x10c
9d9adc7c 828e64fd 00000000 87040030 84faab28 nt!ObpRemoveObjectRoutine+0x59
9d9adc90 8287fa85 84faab40 82a27baf 9ed9cd38 nt!ObfDereferenceObjectWithTag+0x88
9d9adc98 82a27baf 9ed9cd38 87040030 00000320 nt!ObfDereferenceObject+0xd
9d9adcdc 82a278d5 9ed9cd38 9edb1640 86f43030 nt!ObpCloseHandleTableEntry+0x21d
9d9add0c 82a27c0d 86f43030 87040001 020a80fc nt!ObpCloseHandle+0x7f
9d9add28 8284935a 00000320 020a8100 77cf8244 nt!NtClose+0x4e
9d9add28 77cf8244 00000320 020a8100 77cf8244 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
020a8100 00000000 00000000 00000000 00000000 0x77cf8244
STACK_COMMAND: kb
FOLLOWUP_IP:
fileinfo!FILockSharedAcquire+14
8a3ba02e 5d pop ebp
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: fileinfo!FILockSharedAcquire+14
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
Followup: MachineOwner
---------
eax=87040030 ebx=8a3bd364 ecx=8a3bd364 edx=00000000 esi=9d9adb50 edi=00000000
eip=82876c42 esp=9d9adaec ebp=9d9adaec iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!ExfAcquirePushLockShared+0x7:
82876c42 f083ec44 lock sub esp,44h
ChildEBP RetAddr Args to Child
9d9adaec 8a3ba02e 9d9adb14 8a3bef2a 8a3bd364 nt!ExfAcquirePushLockShared+0x7
9d9adaf4 8a3bef2a 8a3bd364 9d9adb50 850c8008 fileinfo!FILockSharedAcquire+0x14 (FPO: [1,0,0])
9d9adb14 8a3c00f7 84faab40 9d9adb2c 9d9adb40 fileinfo!FIFileObjectGetContext+0x34 (FPO: [3,2,4])
9d9adb30 8a387aeb 850c8068 9d9adb50 00010000 fileinfo!FIPreCloseCallback+0x45 (FPO: [3,1,4])
9d9adb9c 8a38a9f0 9d9adbf0 84d705e0 84d70794 fltmgr!FltpPerformPreCallbacks+0x34d (FPO: [1,19,4])
9d9adbb4 8a38af01 9d9adbf0 00000000 864a1218 fltmgr!FltpPassThroughInternal+0x40 (FPO: [2,0,4])
9d9adbd8 8a38b3ba 029adbf0 864a1218 84faab40 fltmgr!FltpPassThrough+0x203 (FPO: [1,2,4])
9d9adc08 82841dd2 864a1218 84d705e0 864a7024 fltmgr!FltpDispatch+0xb4 (FPO: [2,6,4])
9d9adc20 82a2e0a7 84bddf78 84faab28 00000000 nt!IofCallDriver+0x63
9d9adc64 82a276c8 84faab40 84faab40 84faab28 nt!IopDeleteFile+0x10c
9d9adc7c 828e64fd 00000000 87040030 84faab28 nt!ObpRemoveObjectRoutine+0x59
9d9adc90 8287fa85 84faab40 82a27baf 9ed9cd38 nt!ObfDereferenceObjectWithTag+0x88 (FPO: [0,0,3])
9d9adc98 82a27baf 9ed9cd38 87040030 00000320 nt!ObfDereferenceObject+0xd (FPO: [0,1,0])
9d9adcdc 82a278d5 9ed9cd38 9edb1640 86f43030 nt!ObpCloseHandleTableEntry+0x21d
9d9add0c 82a27c0d 86f43030 87040001 020a80fc nt!ObpCloseHandle+0x7f
9d9add28 8284935a 00000320 020a8100 77cf8244 nt!NtClose+0x4e
9d9add28 77cf8244 00000320 020a8100 77cf8244 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ 9d9add34)
WARNING: Frame IP not in any known module. Following frames may be wrong.
020a8100 00000000 00000000 00000000 00000000 0x77cf8244
Unloaded modules:
9e4f4000 9e55e000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
93f36000 93f4e000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aaab000 8aab8000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aab8000 8aac3000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
8aac3000 8aacc000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
8aacc000 8aadd000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Closing open log file c:debuglog.txt
My System SpecsSystem Spec Edit/Delete Message Reply With Quote Multi-Quote This Message
System Manufacturer/Model Number homemade
OS windows 7
CPU pent 4 ht
Motherboard asus p4p800mx
Memory 2.5 GB
Graphics Card Nvidia GeForce 8400 gs
Sound Card sound blaster live 24 bit
Monitor(s) Displays dual stone age monitors e772p and e773p
Update your System Spec
PSU diablotek da series 400w
Case factory modded Dell 2350
Cooling air
Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
jcm2302
View Public Profile
Find More Posts by jcm2302
Add jcm2302 to Your Contacts
Unread 1 Minute Ago #4 (permalink)
jcm2302
New Member
jcm2302 is on a distinguished road
Join Date: Nov 2009
windows 7
4 posts
jcm2302 is online now Add to jcm2302's Reputation Report Post
Default
even this sometimes
Opened log file 'c:debuglog.txt'
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\112709-21312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
Machine Name:
Kernel base = 0x8283d000 PsLoadedModuleList = 0x8297c570
Debug session time: Fri Nov 27 09:19:52.006 2009 (GMT-5)
System Uptime: 0 days 1:28:39.428
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.........
0: kd> !analyze -v;r;kv;lmtn;.logclose;q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 00089140, page frame number
Arg3: 00000003, current page state
Arg4: 0008c60f, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: sidebar.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 82914500 to 828f8e94
STACK_TEXT:
a07267e0 82914500 0000004e 00000099 00089140 nt!KeBugCheckEx+0x1e
a07267f8 828dad84 c000b790 00000fff 86b58a68 nt!MiBadShareCount+0x24
a0726838 828daa70 86e65b60 00000200 86f6d090 nt!MiDeletePteList+0x2ba
a0726c84 828c2f60 c000b78c 86e65b60 e6c8320c nt!MiDecommitPages+0x38b
a0726d1c 8287e35a ffffffff 01f78f00 01f78f14 nt!NtFreeVirtualMemory+0x882
a0726d1c 77078244 ffffffff 01f78f00 01f78f14 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
01f78ed4 00000000 00000000 00000000 00000000 0x77078244
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+24
82914500 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 49ee8b48
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
Followup: MachineOwner
---------
eax=8296b934 ebx=848d9e02 ecx=00000018 edx=00000000 esi=8295ed20 edi=00000000
eip=828f8e94 esp=a07267c8 ebp=a07267e0 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000202
nt!KeBugCheckEx+0x1e:
828f8e94 cc int 3
ChildEBP RetAddr Args to Child
a07267e0 82914500 0000004e 00000099 00089140 nt!KeBugCheckEx+0x1e
a07267f8 828dad84 c000b790 00000fff 86b58a68 nt!MiBadShareCount+0x24 (FPO: [0,0,0])
a0726838 828daa70 86e65b60 00000200 86f6d090 nt!MiDeletePteList+0x2ba
a0726c84 828c2f60 c000b78c 86e65b60 e6c8320c nt!MiDecommitPages+0x38b
a0726d1c 8287e35a ffffffff 01f78f00 01f78f14 nt!NtFreeVirtualMemory+0x882
a0726d1c 77078244 ffffffff 01f78f00 01f78f14 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ a0726d34)
WARNING: Frame IP not in any known module. Following frames may be wrong.
01f78ed4 00000000 00000000 00000000 00000000 0x77078244
Unloaded modules:
9d4a2000 9d4c3000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
93d35000 93d4c000 USBSTOR.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
93d2f000 93d35000 RimUsb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
9d4c3000 9d52d000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
93f34000 93f4c000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aa73000 8aa80000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aa80000 8aa8b000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
8aa8b000 8aa94000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
8aa94000 8aaa5000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Closing open log file c:debuglog.txt
My System SpecsSystem Spec Edit/Delete Message Reply With Quote Multi-Quote This Message
System Manufacturer/Model Number homemade
OS windows 7
CPU pent 4 ht
Motherboard asus p4p800mx
Memory 2.5 GB
Graphics Card Nvidia GeForce 8400 gs
Sound Card sound blaster live 24 bit
Monitor(s) Displays dual stone age monitors e772p and e773p
Update your System Spec
PSU diablotek da series 400w
Case factory modded Dell 2350
Cooling air
Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
jcm2302
View Public Profile
Find More Posts by jcm2302
Add jcm2302 to Your Contacts
Unread 1 Minute Ago #5 (permalink)
jcm2302
New Member
jcm2302 is on a distinguished road
Join Date: Nov 2009
windows 7
5 posts
jcm2302 is online now Add to jcm2302's Reputation Report Post
Default
and this so far
Opened log file 'c:debuglog.txt'
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\112609-26937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
Machine Name:
Kernel base = 0x82810000 PsLoadedModuleList = 0x8294f570
Debug session time: Thu Nov 26 23:48:06.587 2009 (GMT-5)
System Uptime: 0 days 1:14:21.994
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {0, 0, 0, 0}
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+5021c9 )
Followup: MachineOwner
---------
0: kd> !analyze -v;r;kv;lmtn;.logclose;q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000000, EXCEPTION_DIVIDED_BY_ZERO
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_0
TRAP_FRAME: 80d8a7e0 -- (.trap 0xffffffff80d8a7e0)
.trap 0xffffffff80d8a7e0
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=86d2f8e0 edi=84fce530
eip=af5161c9 esp=80d8a854 ebp=80d8a85c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nvlddmkm+0x5021c9:
af5161c9 f7f1 div eax,ecx
.trap
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from af5161c9 to 828521bb
STACK_TEXT:
80d8a7e0 af5161c9 badb0d00 00000000 84fce530 nt!KiTrap00+0x8b
WARNING: Stack unwind information not available. Following frames may be wrong.
80d8a85c af2d7932 84fce530 00000001 8533603c nvlddmkm+0x5021c9
80d8a878 af51b8c3 84fce530 851f3000 86d2f8e0 nvlddmkm+0x2c3932
80d8a8a8 af51f44a 84fce530 851f3000 00000003 nvlddmkm+0x5078c3
80d8a8c8 af24c9de 84fce530 851f3000 86d2f8b8 nvlddmkm+0x50b44a
80d8a90c af33c161 00000000 86b0a1b0 86d2f8b8 nvlddmkm+0x2389de
80d8a97c af33ba4f 84fce530 850181a8 00000000 nvlddmkm+0x328161
80d8a9d0 af4345a9 00000001 850181a8 0000001a nvlddmkm+0x327a4f
80d8aa24 af42fa7d 850181a8 86c1dba0 00e00000 nvlddmkm+0x4205a9
80d8aa4c af434bf1 84fce530 86c1dba0 00e00000 nvlddmkm+0x41ba7d
80d8ab88 af3b5912 850181a8 00e00000 86b0a1b0 nvlddmkm+0x420bf1
80d8ac10 af43616e 00000001 86b0a1b0 0021704b nvlddmkm+0x3a1912
80d8ac4c af434b36 00000000 86c1dba0 00000400 nvlddmkm+0x42216e
80d8ad88 af3b521b 850181a8 ffffffff 85eae380 nvlddmkm+0x420b36
80d8ae64 af2e1b90 00000000 86b0a1b0 86b0a1b0 nvlddmkm+0x3a121b
80d8ae80 af15b642 84fce530 86b0a1b0 850bd000 nvlddmkm+0x2cdb90
80d8af00 af091f13 850bd000 00000000 850bd010 nvlddmkm+0x147642
80d8af24 af0280f0 8504edcc 80d8af3c af0f2947 nvlddmkm+0x7df13
80d8af30 af0f2947 af0280bf 80d8af48 af0633ec nvlddmkm+0x140f0
80d8af3c af0633ec 850bd000 80d8afa4 828d3f82 nvlddmkm+0xde947
80d8af48 828d3f82 850bd010 850bd000 00000000 nvlddmkm+0x4f3ec
80d8afa4 82874c10 82931d20 8504ed48 00000000 nt!KiExecuteAllDpcs+0xf9
80d8aff4 828713dc 9e59fce4 00000000 00000000 nt!KiRetireDpcList+0xd5
80d8aff8 9e59fce4 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2c
828713dc 00000000 0000001a 00d6850f bb830000 0x9e59fce4
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+5021c9
af5161c9 f7f1 div eax,ecx
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nvlddmkm+5021c9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b0764b5
FAILURE_BUCKET_ID: 0x7f_0_nvlddmkm+5021c9
BUCKET_ID: 0x7f_0_nvlddmkm+5021c9
Followup: MachineOwner
---------
eax=8293e934 ebx=80d8a802 ecx=0000001f edx=00000000 esi=82931d20 edi=00000000
eip=828521bb esp=80d8a7c8 ebp=80d8a7e0 iopl=0 nv up ei pl nz ac po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000212
nt!KiTrap00+0x8b:
828521bb 66837d6c1b cmp word ptr [ebp+6Ch],1Bh ss:0010:80d8a84c=0008
ChildEBP RetAddr Args to Child
80d8a7e0 af5161c9 badb0d00 00000000 84fce530 nt!KiTrap00+0x8b (FPO: [0,0] TrapFrame @ 80d8a7e0)
WARNING: Stack unwind information not available. Following frames may be wrong.
80d8a85c af2d7932 84fce530 00000001 8533603c nvlddmkm+0x5021c9
80d8a878 af51b8c3 84fce530 851f3000 86d2f8e0 nvlddmkm+0x2c3932
80d8a8a8 af51f44a 84fce530 851f3000 00000003 nvlddmkm+0x5078c3
80d8a8c8 af24c9de 84fce530 851f3000 86d2f8b8 nvlddmkm+0x50b44a
80d8a90c af33c161 00000000 86b0a1b0 86d2f8b8 nvlddmkm+0x2389de
80d8a97c af33ba4f 84fce530 850181a8 00000000 nvlddmkm+0x328161
80d8a9d0 af4345a9 00000001 850181a8 0000001a nvlddmkm+0x327a4f
80d8aa24 af42fa7d 850181a8 86c1dba0 00e00000 nvlddmkm+0x4205a9
80d8aa4c af434bf1 84fce530 86c1dba0 00e00000 nvlddmkm+0x41ba7d
80d8ab88 af3b5912 850181a8 00e00000 86b0a1b0 nvlddmkm+0x420bf1
80d8ac10 af43616e 00000001 86b0a1b0 0021704b nvlddmkm+0x3a1912
80d8ac4c af434b36 00000000 86c1dba0 00000400 nvlddmkm+0x42216e
80d8ad88 af3b521b 850181a8 ffffffff 85eae380 nvlddmkm+0x420b36
80d8ae64 af2e1b90 00000000 86b0a1b0 86b0a1b0 nvlddmkm+0x3a121b
80d8ae80 af15b642 84fce530 86b0a1b0 850bd000 nvlddmkm+0x2cdb90
80d8af00 af091f13 850bd000 00000000 850bd010 nvlddmkm+0x147642
80d8af24 af0280f0 8504edcc 80d8af3c af0f2947 nvlddmkm+0x7df13
80d8af30 af0f2947 af0280bf 80d8af48 af0633ec nvlddmkm+0x140f0
80d8af3c af0633ec 850bd000 80d8afa4 828d3f82 nvlddmkm+0xde947
i also have tried both oem and microsoft drivers for graphics and i still get an occasional your graphics card has unexpectantly stopped working and has recovered i cant send the actual dmp files it wont let me any info on this matter would be appreciated.
Opened log file 'c:debuglog.txt'
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\112709-19343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
Machine Name:
Kernel base = 0x82800000 PsLoadedModuleList = 0x8293f570
Debug session time: Fri Nov 27 14:39:43.708 2009 (GMT-5)
System Uptime: 0 days 2:07:57.115
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.........
0: kd> !analyze -v;r;kv;lmtn;.logclose;q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 0004e977, page frame number
Arg3: 00000002, current page state
Arg4: 0004e974, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 828d7500 to 828bbe94
STACK_TEXT:
821e7778 828d7500 0000004e 00000099 0004e977 nt!KeBugCheckEx+0x1e
821e7790 82889e01 00001c90 00000000 00000059 nt!MiBadShareCount+0x24
821e7868 82888ca3 c03f7d70 00000014 00000000 nt!MiDeleteSystemPagableVm+0x58f
821e7944 829168fa fdf17000 00000000 00059000 nt!MiFreePagedPoolPages+0x33d
821e7a0c 82917ed5 fdf17000 00000026 fdf17000 nt!MiFreePoolPages+0x2ba
821e7a70 93991c6f fdf17000 00000000 00000000 nt!ExFreePoolWithTag+0x438
821e7b20 93991a59 ff9e4648 00000026 00000006 win32k!EngRealizeBrush+0x190
821e7bb8 93991316 93b64200 ffb63748 93991adf win32k!bGetRealizedBrush+0x70c
821e7bd0 93a04153 ff9e4648 ff9e4648 fe4d5000 win32k!pvGetEngRbrush+0x1f
821e7c34 93a1dd63 fe4d5010 00000000 00000000 win32k!EngBitBlt+0x2e2
821e7c98 939b2411 ff9e4648 821e7cfc 821e7cec win32k!GrePatBltLockedDC+0x22b
821e7d14 8284135a d3010772 00000000 00000000 win32k!NtGdiPatBlt+0x14c
821e7d14 778c8244 d3010772 00000000 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
75cd6180 00000000 00000000 00000000 00000000 0x778c8244
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+24
828d7500 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 49ee8b48
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
Followup: MachineOwner
---------
eax=8292e934 ebx=00000002 ecx=00000026 edx=00000000 esi=82921d20 edi=00000000
eip=828bbe94 esp=821e7760 ebp=821e7778 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000206
nt!KeBugCheckEx+0x1e:
828bbe94 cc int 3
ChildEBP RetAddr Args to Child
821e7778 828d7500 0000004e 00000099 0004e977 nt!KeBugCheckEx+0x1e
821e7790 82889e01 00001c90 00000000 00000059 nt!MiBadShareCount+0x24 (FPO: [0,0,0])
821e7868 82888ca3 c03f7d70 00000014 00000000 nt!MiDeleteSystemPagableVm+0x58f
821e7944 829168fa fdf17000 00000000 00059000 nt!MiFreePagedPoolPages+0x33d
821e7a0c 82917ed5 fdf17000 00000026 fdf17000 nt!MiFreePoolPages+0x2ba
821e7a70 93991c6f fdf17000 00000000 00000000 nt!ExFreePoolWithTag+0x438
821e7b20 93991a59 ff9e4648 00000026 00000006 win32k!EngRealizeBrush+0x190 (FPO: [6,37,4])
821e7bb8 93991316 93b64200 ffb63748 93991adf win32k!bGetRealizedBrush+0x70c (FPO: [3,27,4])
821e7bd0 93a04153 ff9e4648 ff9e4648 fe4d5000 win32k!pvGetEngRbrush+0x1f (FPO: [1,0,4])
821e7c34 93a1dd63 fe4d5010 00000000 00000000 win32k!EngBitBlt+0x2e2 (FPO: [11,19,4])
821e7c98 939b2411 ff9e4648 821e7cfc 821e7cec win32k!GrePatBltLockedDC+0x22b (FPO: [9,9,4])
821e7d14 8284135a d3010772 00000000 00000000 win32k!NtGdiPatBlt+0x14c (FPO: [6,17,4])
821e7d14 778c8244 d3010772 00000000 00000000 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ 821e7d34)
WARNING: Frame IP not in any known module. Following frames may be wrong.
75cd6180 00000000 00000000 00000000 00000000 0x778c8244
Unloaded modules:
9e523000 9e52e000 hiber_atapor
Timestamp: unavailable (00000000)
Checksum: 00000000
9e52e000 9e537000 hiber_atapi.
Timestamp: unavailable (00000000)
Checksum: 00000000
9e537000 9e548000 hiber_dumpfv
Timestamp: unavailable (00000000)
Checksum: 00000000
9e4ac000 9e516000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
932d9000 932f1000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aa9d000 8aaaa000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aaaa000 8aab5000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
8aab5000 8aabe000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
8aabe000 8aacf000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Closing open log file c:debuglog.txt
My System SpecsSystem Spec Edit/Delete Message Reply With Quote Multi-Quote This Message
System Manufacturer/Model Number homemade
OS windows 7
CPU pent 4 ht
Motherboard asus p4p800mx
Memory 2.5 GB
Graphics Card Nvidia GeForce 8400 gs
Sound Card sound blaster live 24 bit
Monitor(s) Displays dual stone age monitors e772p and e773p
Update your System Spec
PSU diablotek da series 400w
Case factory modded Dell 2350
Cooling air
Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
jcm2302
View Public Profile
Find More Posts by jcm2302
Add jcm2302 to Your Contacts
Old 1 Minute Ago #2 (permalink)
jcm2302
New Member
jcm2302 is on a distinguished road
Join Date: Nov 2009
windows 7
3 posts
jcm2302 is online now Add to jcm2302's Reputation Report Post
Default
also i get this
Opened log file 'c:debuglog.txt'
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\112709-19593-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
Machine Name:
Kernel base = 0x82807000 PsLoadedModuleList = 0x82946570
Debug session time: Fri Nov 27 18:22:52.563 2009 (GMT-5)
System Uptime: 0 days 3:42:22.985
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
......
1: kd> !analyze -v;r;kv;lmtn;.logclose;q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MACHINE_CHECK_EXCEPTION (9c)
A fatal Machine Check Exception has occurred.
KeBugCheckEx parameters;
x86 Processors
If the processor has ONLY MCE feature available (For example Intel
Pentium), the parameters are:
1 - Low 32 bits of P5_MC_TYPE MSR
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of P5_MC_ADDR MSR
4 - Low 32 bits of P5_MC_ADDR MSR
If the processor also has MCA feature available (For example Intel
Pentium Pro), the parameters are:
1 - Bank number
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
IA64 Processors
1 - Bugcheck Type
1 - MCA_ASSERT
2 - MCA_GET_STATEINFO
SAL returned an error for SAL_GET_STATEINFO while processing MCA.
3 - MCA_CLEAR_STATEINFO
SAL returned an error for SAL_CLEAR_STATEINFO while processing MCA.
4 - MCA_FATAL
FW reported a fatal MCA.
5 - MCA_NONFATAL
SAL reported a recoverable MCA and we don't support currently
support recovery or SAL generated an MCA and then couldn't
produce an error record.
0xB - INIT_ASSERT
0xC - INIT_GET_STATEINFO
SAL returned an error for SAL_GET_STATEINFO while processing INIT event.
0xD - INIT_CLEAR_STATEINFO
SAL returned an error for SAL_CLEAR_STATEINFO while processing INIT event.
0xE - INIT_FATAL
Not used.
2 - Address of log
3 - Size of log
4 - Error code in the case of x_GET_STATEINFO or x_CLEAR_STATEINFO
AMD64 Processors
1 - Bank number
2 - Address of MCA_EXCEPTION structure
3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
Arguments:
Arg1: 00000000
Arg2: 80dc794c
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
NOTE: This is a hardware error. This error was reported by the CPU
via Interrupt 18. This analysis will provide more information about
the specific error. Please contact the manufacturer for additional
information about this error and troubleshooting assistance.
This error is documented in the following publication:
- IA-32 Intel(r) Architecture Software Developer's Manual
Volume 3: System Programming Guide
Bit Mask:
MA Model Specific MCA
O ID Other Information Error Code Error Code
VV SDP ___________|____________ _______|_______ _______|______
AEUECRC| | | |
LRCNVVC| | | |
^^^^^^^| | | |
6 5 4 3 2 1
3210987654321098765432109876543210987654321098765432109876543210
----------------------------------------------------------------
0000000000000000000000000000000000000000000000000000000000000000
Concatenated Error Code:
--------------------------
This error code can be reported back to the manufacturer.
They may be able to provide additional information based upon
this error. All questions regarding STOP 0x9C should be
directed to the hardware manufacturer.
BUGCHECK_STR: 0x9C_GenuineIntel
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 1f
LAST_CONTROL_TRANSFER: from 82c161f9 to 828c2e94
SYMBOL_ON_RAW_STACK: 1
STACK_ADDR_RAW_STACK_SYMBOL: ffffffff80dc7958
STACK_COMMAND: dds 80DC7958-0x20 ; kb
STACK_TEXT:
80dc7938 00000000
80dc793c 80dc794c
80dc7940 00000000
80dc7944 00000000
80dc7948 82c23e34 hal!HalpMceRendezvousCount
80dc794c 00000001
80dc7950 00000000
80dc7954 8abaa8cd afd!AfdUnBindSocket+0x24a
80dc7958 01ca6fb8
80dc795c 00000001
80dc7960 00000000
80dc7964 00000000
80dc7968 00000000
80dc796c 00000000
80dc7970 00000000
80dc7974 00000000
80dc7978 00000000
80dc797c 00000000
80dc7980 00000000
80dc7984 00000000
80dc7988 00000000
80dc798c 00000000
80dc7990 00000000
80dc7994 00000000
80dc7998 00000000
80dc799c 00000000
80dc79a0 00000000
80dc79a4 00000000
80dc79a8 00000000
80dc79ac 00000000
80dc79b0 00000000
80dc79b4 00000000
FOLLOWUP_IP:
afd!AfdUnBindSocket+24a
8abaa8cd 750d jne afd!AfdUnBindSocket+0x259 (8abaa8dc)
SYMBOL_NAME: afd!AfdUnBindSocket+24a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49ee8a86
FAILURE_BUCKET_ID: 0x9C_GenuineIntel_afd!AfdUnBindSocket+24a
BUCKET_ID: 0x9C_GenuineIntel_afd!AfdUnBindSocket+24a
Followup: MachineOwner
---------
eax=82935934 ebx=0000001f ecx=00000018 edx=829358b4 esi=80dbf120 edi=00000000
eip=828c2e94 esp=80dc7910 ebp=80dc792c iopl=0 nv up di pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000002
nt!KeBugCheckEx+0x1e:
828c2e94 cc int 3
ChildEBP RetAddr Args to Child
80dc792c 82c161f9 0000009c 00000000 80dc794c nt!KeBugCheckEx+0x1e
80dc7a50 82c163ff 00000000 00000000 00000000 hal!HalpMcaReportError+0x81 (FPO: [2,65,0])
80dc7a70 82c1650a 00000000 85df66b0 80dc7b90 hal!HalpMceHandlerWithRendezvous+0x89 (FPO: [2,1,4])
80dc7a80 82c0c5f5 00000000 00000000 00000000 hal!HalpHandleMachineCheck+0x34 (FPO: [1,0,0])
80dc7b90 82c09261 00000000 80dc2750 00000000 hal!HalpMcaExceptionHandler+0x87 (FPO: [0,65,0])
80dc7b90 00000000 00000000 80dc2750 00000000 hal!HalpMcaExceptionHandlerWrapper+0x89 (FPO: TSS f10f10:0)
start end module name
80ba5000 80bad000 kdcom kdcom.dll Wed Apr 22 01:07:23 2009 (49EEA60B)
82807000 82c07000 nt ntkrnlmp.exe Tue Apr 21 23:13:12 2009 (49EE8B48)
82c07000 82c3e000 hal halmacpi.dll Tue Apr 21 23:08:30 2009 (49EE8A2E)
8a01f000 8a090000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Wed Apr 22 01:05:20 2009 (49EEA590)
8a090000 8a0a1000 PSHED PSHED.dll Wed Apr 22 01:09:07 2009 (49EEA673)
8a0a1000 8a0a9000 BOOTVID BOOTVID.dll Wed Apr 22 01:01:42 2009 (49EEA4B6)
8a0a9000 8a0eb000 CLFS CLFS.SYS Tue Apr 21 23:08:36 2009 (49EE8A34)
8a0eb000 8a196000 CI CI.dll Wed Apr 22 01:08:59 2009 (49EEA66B)
8a196000 8a207000 Wdf01000 Wdf01000.sys Tue Apr 21 23:09:01 2009 (49EE8A4D)
8a207000 8a215000 WDFLDR WDFLDR.SYS Tue Apr 21 23:08:47 2009 (49EE8A3F)
8a215000 8a25d000 ACPI ACPI.sys Tue Apr 21 23:08:37 2009 (49EE8A35)
8a25d000 8a266000 WMILIB WMILIB.SYS Tue Apr 21 23:08:46 2009 (49EE8A3E)
8a266000 8a26e000 msisadrv msisadrv.sys Tue Apr 21 23:08:33 2009 (49EE8A31)
8a26e000 8a298000 pci pci.sys Tue Apr 21 23:08:40 2009 (49EE8A38)
8a298000 8a2a3000 vdrvroot vdrvroot.sys Tue Apr 21 23:44:49 2009 (49EE92B1)
8a2a3000 8a2b4000 partmgr partmgr.sys Tue Apr 21 23:08:57 2009 (49EE8A49)
8a2b4000 8a2c4000 volmgr volmgr.sys Tue Apr 21 23:08:47 2009 (49EE8A3F)
8a2c4000 8a30f000 volmgrx volmgrx.sys Tue Apr 21 23:09:06 2009 (49EE8A52)
8a30f000 8a316000 intelide intelide.sys Tue Apr 21 23:08:44 2009 (49EE8A3C)
8a316000 8a324000 PCIIDEX PCIIDEX.SYS Tue Apr 21 23:08:40 2009 (49EE8A38)
8a324000 8a33a000 mountmgr mountmgr.sys Tue Apr 21 23:08:51 2009 (49EE8A43)
8a33a000 8a343000 atapi atapi.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
8a343000 8a366000 ataport ataport.SYS Tue Apr 21 23:08:42 2009 (49EE8A3A)
8a366000 8a36f000 amdxata amdxata.sys Tue Mar 10 19:22:16 2009 (49B6F628)
8a36f000 8a3a3000 fltmgr fltmgr.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
8a3a3000 8a3b4000 fileinfo fileinfo.sys Tue Apr 21 23:19:22 2009 (49EE8CBA)
8a3b4000 8a3cb000 rassstp rassstp.sys Tue Apr 21 23:53:30 2009 (49EE94BA)
8a3cb000 8a3d9000 umbus umbus.sys Tue Apr 21 23:50:03 2009 (49EE93EB)
8a406000 8a535000 Ntfs Ntfs.sys Tue Apr 21 23:09:31 2009 (49EE8A6B)
8a535000 8a560000 msrpc msrpc.sys Tue Apr 21 23:09:19 2009 (49EE8A5F)
8a560000 8a573000 ksecdd ksecdd.sys Tue Apr 21 23:09:16 2009 (49EE8A5C)
8a573000 8a5d0000 cng cng.sys Tue Apr 21 23:31:04 2009 (49EE8F78)
8a5d0000 8a5de000 pcw pcw.sys Tue Apr 21 23:08:34 2009 (49EE8A32)
8a5de000 8a5e7000 Fs_Rec Fs_Rec.sys Tue Apr 21 23:08:38 2009 (49EE8A36)
8a5e7000 8a69e000 ndis ndis.sys Tue Apr 21 23:09:42 2009 (49EE8A76)
8a69e000 8a6dc000 NETIO NETIO.SYS Tue Apr 21 23:10:05 2009 (49EE8A8D)
8a6dc000 8a701000 ksecpkg ksecpkg.sys Tue Apr 21 23:32:15 2009 (49EE8FBF)
8a701000 8a71f000 pacer pacer.sys Tue Apr 21 23:52:32 2009 (49EE9480)
8a71f000 8a72d000 netbios netbios.sys Tue Apr 21 23:52:28 2009 (49EE947C)
8a72d000 8a747000 serial serial.sys Tue Apr 21 23:44:02 2009 (49EE9282)
8a747000 8a75a000 wanarp wanarp.sys Tue Apr 21 23:53:29 2009 (49EE94B9)
8a75a000 8a76a000 termdd termdd.sys Wed Apr 22 00:00:07 2009 (49EE9647)
8a76a000 8a7ab000 rdbss rdbss.sys Tue Apr 21 23:11:43 2009 (49EE8AEF)
8a7ab000 8a7b5000 mssmbios mssmbios.sys Tue Apr 21 23:16:49 2009 (49EE8C21)
8a7b5000 8a7c1000 discache discache.sys Tue Apr 21 23:21:34 2009 (49EE8D3E)
8a7c1000 8a7d9000 raspppoe raspppoe.sys Tue Apr 21 23:53:24 2009 (49EE94B4)
8a7d9000 8a7f0000 raspptp raspptp.sys Tue Apr 21 23:53:17 2009 (49EE94AD)
8a7f0000 8a7fd000 mouclass mouclass.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
8a800000 8a832000 netbt netbt.sys Tue Apr 21 23:09:39 2009 (49EE8A73)
8a834000 8a979000 tcpip tcpip.sys Tue Apr 21 23:10:47 2009 (49EE8AB7)
8a979000 8a9aa000 fwpkclnt fwpkclnt.sys Tue Apr 21 23:09:26 2009 (49EE8A66)
8a9aa000 8a9b2380 vmstorfl vmstorfl.sys Tue Apr 21 23:26:29 2009 (49EE8E65)
8a9b3000 8a9f1000 volsnap volsnap.sys Tue Apr 21 23:08:58 2009 (49EE8A4A)
8a9f1000 8a9f9000 spldr spldr.sys Wed Mar 25 15:16:08 2009 (49CA82F8)
8a9f9000 8aa26000 rdyboost rdyboost.sys Tue Apr 21 23:19:32 2009 (49EE8CC4)
8aa26000 8aa36000 mup mup.sys Tue Apr 21 23:11:32 2009 (49EE8AE4)
8aa36000 8aa3e000 hwpolicy hwpolicy.sys Tue Apr 21 23:08:27 2009 (49EE8A2B)
8aa3e000 8aa70000 fvevol fvevol.sys Tue Apr 21 23:10:25 2009 (49EE8AA1)
8aa70000 8aa81000 disk disk.sys Tue Apr 21 23:08:52 2009 (49EE8A44)
8aa81000 8aaa6000 CLASSPNP CLASSPNP.SYS Tue Apr 21 23:08:43 2009 (49EE8A3B)
8aad8000 8aaf7000 cdrom cdrom.sys Tue Apr 21 23:08:48 2009 (49EE8A40)
8aaf7000 8aafe000 Null Null.SYS Tue Apr 21 23:08:37 2009 (49EE8A35)
8aafe000 8ab05000 Beep Beep.SYS Tue Apr 21 23:43:27 2009 (49EE925F)
8ab05000 8ab11000 vga vga.sys Tue Apr 21 23:23:17 2009 (49EE8DA5)
8ab11000 8ab32000 VIDEOPRT VIDEOPRT.SYS Tue Apr 21 23:23:20 2009 (49EE8DA8)
8ab32000 8ab3f000 watchdog watchdog.sys Tue Apr 21 23:21:46 2009 (49EE8D4A)
8ab3f000 8ab47000 RDPCDD RDPCDD.sys Wed Apr 22 00:00:11 2009 (49EE964B)
8ab47000 8ab4f000 rdpencdd rdpencdd.sys Wed Apr 22 00:00:11 2009 (49EE964B)
8ab4f000 8ab57000 rdprefmp rdprefmp.sys Wed Apr 22 00:00:11 2009 (49EE964B)
8ab57000 8ab62000 Msfs Msfs.SYS Tue Apr 21 23:08:46 2009 (49EE8A3E)
8ab62000 8ab70000 Npfs Npfs.SYS Tue Apr 21 23:08:49 2009 (49EE8A41)
8ab70000 8ab87000 tdx tdx.sys Tue Apr 21 23:09:29 2009 (49EE8A69)
8ab87000 8ab92000 TDI TDI.SYS Tue Apr 21 23:09:31 2009 (49EE8A6B)
8ab92000 8abec000 afd afd.sys Tue Apr 21 23:09:58 2009 (49EE8A86)
8abec000 8abf3000 wfplwf wfplwf.sys Tue Apr 21 23:52:24 2009 (49EE9478)
8abf3000 8abfd000 nsiproxy nsiproxy.sys Tue Apr 21 23:09:25 2009 (49EE8A65)
91000000 91023000 ndiswan ndiswan.sys Tue Apr 21 23:53:08 2009 (49EE94A4)
91023000 9102d000 rdpbus rdpbus.sys Wed Apr 22 00:01:12 2009 (49EE9688)
91031000 91095000 csc csc.sys Tue Apr 21 23:12:21 2009 (49EE8B15)
91095000 910ad000 dfsc dfsc.sys Tue Apr 21 23:11:34 2009 (49EE8AE6)
910ad000 910bb000 blbdrive blbdrive.sys Tue Apr 21 23:20:31 2009 (49EE8CFF)
910bb000 910da000 tunnel tunnel.sys Tue Apr 21 23:52:38 2009 (49EE9486)
910da000 910ec000 intelppm intelppm.sys Tue Apr 21 23:08:27 2009 (49EE8A2B)
910ec000 910f7000 usbuhci usbuhci.sys Tue Apr 21 23:49:34 2009 (49EE93CE)
910f7000 91141000 USBPORT USBPORT.SYS Tue Apr 21 23:49:38 2009 (49EE93D2)
91141000 91150000 usbehci usbehci.sys Tue Apr 21 23:49:40 2009 (49EE93D4)
91150000 91181280 atidvcxx atidvcxx.sys Thu Dec 08 18:44:40 2005 (4398C568)
91182000 9118f180 STREAM STREAM.SYS Tue Apr 21 23:49:23 2009 (49EE93C3)
91190000 911c4000 ks ks.sys Tue Apr 21 23:43:43 2009 (49EE926F)
911c4000 911c7200 atidacxx atidacxx.sys Thu Dec 08 18:44:59 2005 (4398C57B)
911c8000 911ca780 atiddcxx atiddcxx.sys Thu Dec 08 18:44:06 2005 (4398C546)
911cb000 91328000 P17 P17.sys Thu Oct 15 22:11:53 2009 (4AD7D669)
91328000 91357000 portcls portcls.sys Tue Apr 21 23:49:26 2009 (49EE93C6)
91357000 91370000 drmk drmk.sys Wed Apr 22 00:40:17 2009 (49EE9FB1)
91370000 913a9000 dxgmms1 dxgmms1.sys Tue Apr 21 23:22:57 2009 (49EE8D91)
913a9000 913bc000 HIDCLASS HIDCLASS.SYS Tue Apr 21 23:49:26 2009 (49EE93C6)
913bc000 913ce000 AgileVpn AgileVpn.sys Tue Apr 21 23:53:30 2009 (49EE94BA)
913ce000 913e6000 rasl2tp rasl2tp.sys Tue Apr 21 23:53:07 2009 (49EE94A3)
913e6000 913f1000 ndistapi ndistapi.sys Tue Apr 21 23:52:58 2009 (49EE949A)
913f1000 913fe000 kbdclass kbdclass.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
92422000 92466000 usbhub usbhub.sys Tue Apr 21 23:50:25 2009 (49EE9401)
92466000 92470e00 atidtuxx atidtuxx.sys Thu Dec 08 18:44:52 2005 (4398C574)
92471000 92474000 BdaSup BdaSup.SYS Tue Apr 21 23:49:46 2009 (49EE93DA)
92474000 92476600 atidxbxx atidxbxx.sys Thu Dec 08 18:44:43 2005 (4398C56B)
92477000 92481000 flpydisk flpydisk.sys Tue Apr 21 23:44:14 2009 (49EE928E)
92481000 9248d000 kbdhid kbdhid.sys Tue Apr 21 23:43:35 2009 (49EE9267)
9248d000 9249e000 NDProxy NDProxy.SYS Tue Apr 21 23:53:01 2009 (49EE949D)
9249e000 924b5000 usbccgp usbccgp.sys Tue Apr 21 23:49:53 2009 (49EE93E1)
924b5000 924b6700 USBD USBD.SYS Tue Apr 21 23:49:30 2009 (49EE93CA)
924b7000 924c1000 x10ufx2 x10ufx2.sys Thu Nov 30 18:18:56 2006 (456F66E0)
924c1000 924cf000 usbscan usbscan.sys Wed Apr 22 00:13:48 2009 (49EE997C)
924cf000 924da000 usbprint usbprint.sys Wed Apr 22 00:16:54 2009 (49EE9A36)
924da000 924e3000 dc3d dc3d.sys Tue Nov 03 21:38:29 2009 (4AF0E925)
924e3000 924ee000 hidusb hidusb.sys Tue Apr 21 23:49:29 2009 (49EE93C9)
924ee000 924f5000 NuidFltr NuidFltr.sys Fri May 08 04:35:42 2009 (4A03EEDE)
924f5000 92500000 mouhid mouhid.sys Tue Apr 21 23:43:33 2009 (49EE9265)
92500000 9250a000 Dxapi Dxapi.sys Tue Apr 21 23:22:56 2009 (49EE8D90)
9250a000 92515000 monitor monitor.sys Tue Apr 21 23:23:20 2009 (49EE8DA8)
92515000 9252b000 cdfs cdfs.sys Tue Apr 21 23:08:38 2009 (49EE8A36)
9252b000 92546000 luafv luafv.sys Tue Apr 21 23:13:02 2009 (49EE8B3E)
92546000 92560000 WudfPf WudfPf.sys Tue Apr 21 23:48:41 2009 (49EE9399)
92560000 92570000 lltdio lltdio.sys Tue Apr 21 23:51:49 2009 (49EE9455)
92570000 92583000 rspndr rspndr.sys Tue Apr 21 23:51:50 2009 (49EE9456)
92583000 92608000 HTTP HTTP.sys Tue Apr 21 23:10:08 2009 (49EE8A90)
92608000 92621000 bowser bowser.sys Tue Apr 21 23:11:38 2009 (49EE8AEA)
92621000 92633000 mpsdrv mpsdrv.sys Tue Apr 21 23:51:21 2009 (49EE9439)
92633000 92656000 mrxsmb mrxsmb.sys Tue Apr 21 23:11:40 2009 (49EE8AEC)
92656000 92691000 mrxsmb10 mrxsmb10.sys Tue Apr 21 23:11:55 2009 (49EE8AFB)
92691000 926ac000 mrxsmb20 mrxsmb20.sys Tue Apr 21 23:11:48 2009 (49EE8AF4)
926c4000 926d1000 crashdmp crashdmp.sys Tue Apr 21 23:44:19 2009 (49EE9293)
926d1000 926dc000 dump_dumpata dump_dumpata.sys Tue Apr 21 23:08:41 2009 (49EE8A39)
926dc000 926e5000 dump_atapi dump_atapi.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
926e5000 926f6000 dump_dumpfve dump_dumpfve.sys Tue Apr 21 23:10:11 2009 (49EE8A93)
926f6000 9278d000 peauth peauth.sys Wed Apr 22 00:40:09 2009 (49EE9FA9)
9278d000 92797000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
92797000 927b8000 srvnet srvnet.sys Tue Apr 21 23:12:06 2009 (49EE8B06)
927b8000 927c5000 tcpipreg tcpipreg.sys Tue Apr 21 23:52:46 2009 (49EE948E)
92850000 92a9a000 win32k win32k.sys unavailable (00000000)
92ab0000 92ab9000 TSDDD TSDDD.dll unavailable (00000000)
92ae0000 92afe000 cdd cdd.dll unavailable (00000000)
93400000 9340b000 fdc fdc.sys Tue Apr 21 23:44:14 2009 (49EE928E)
9340b000 93418000 CompositeBus CompositeBus.sys Tue Apr 21 23:43:54 2009 (49EE927A)
93418000 93419b80 x10hid x10hid.sys Fri Nov 17 13:20:44 2006 (455DFD7C)
9341a000 93420480 HIDPARSE HIDPARSE.SYS Tue Apr 21 23:49:24 2009 (49EE93C4)
93421000 93425880 hamachi hamachi.sys Wed Aug 15 19:05:00 2007 (46C3869C)
93426000 93427380 swenum swenum.sys Tue Apr 21 23:43:34 2009 (49EE9266)
9342a000 93f23d00 nvlddmkm nvlddmkm.sys Fri Nov 20 22:55:33 2009 (4B0764B5)
93f24000 93f25040 nvBridge nvBridge.kmd Fri Nov 20 22:41:44 2009 (4B076178)
93f26000 93fdd000 dxgkrnl dxgkrnl.sys Tue Apr 21 23:23:48 2009 (49EE8DC4)
93fdd000 93fee000 Rtnicxp Rtnicxp.sys Mon Mar 31 01:41:05 2008 (47F07971)
93fee000 93ff8000 serenum serenum.sys Tue Apr 21 23:43:55 2009 (49EE927B)
9e83f000 9e88e000 srv2 srv2.sys Wed Sep 09 23:10:12 2009 (4AA86E14)
9e88e000 9e8df000 srv srv.sys Tue Apr 21 23:12:29 2009 (49EE8B1D)
9e949000 9e952000 asyncmac asyncmac.sys Tue Apr 21 23:53:14 2009 (49EE94AA)
9e952000 9e953580 MSPQM MSPQM.sys Tue Apr 21 23:43:35 2009 (49EE9267)
9e954000 9e955700 MSPCLOCK MSPCLOCK.sys Tue Apr 21 23:43:35 2009 (49EE9267)
Unloaded modules:
9e8df000 9e949000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
926ac000 926c4000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aaa6000 8aab3000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aab3000 8aabe000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
8aabe000 8aac7000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
8aac7000 8aad8000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Closing open log file c:debuglog.txt
My System SpecsSystem Spec Edit/Delete Message Reply With Quote Multi-Quote This Message
System Manufacturer/Model Number homemade
OS windows 7
CPU pent 4 ht
Motherboard asus p4p800mx
Memory 2.5 GB
Graphics Card Nvidia GeForce 8400 gs
Sound Card sound blaster live 24 bit
Monitor(s) Displays dual stone age monitors e772p and e773p
Update your System Spec
PSU diablotek da series 400w
Case factory modded Dell 2350
Cooling air
Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
jcm2302
View Public Profile
Find More Posts by jcm2302
Add jcm2302 to Your Contacts
Unread 1 Minute Ago #3 (permalink)
jcm2302
New Member
jcm2302 is on a distinguished road
Join Date: Nov 2009
windows 7
3 posts
jcm2302 is online now Add to jcm2302's Reputation Report Post
Default
and this
Opened log file 'c:debuglog.txt'
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\112709-18812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
Machine Name:
Kernel base = 0x82808000 PsLoadedModuleList = 0x82947570
Debug session time: Fri Nov 27 00:37:26.002 2009 (GMT-5)
System Uptime: 0 days 0:48:09.393
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c000001d, 82876c42, 9d9ada78, 0}
Probably caused by : hardware ( fileinfo!FILockSharedAcquire+14 )
Followup: MachineOwner
---------
0: kd> !analyze -v;r;kv;lmtn;.logclose;q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c000001d, The exception code that was not handled
Arg2: 82876c42, The address that the exception occurred at
Arg3: 9d9ada78, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!ExfAcquirePushLockShared+7
82876c42 f083ec44 lock sub esp,44h
TRAP_FRAME: 9d9ada78 -- (.trap 0xffffffff9d9ada78)
.trap 0xffffffff9d9ada78
ErrCode = 00000000
eax=87040030 ebx=8a3bd364 ecx=8a3bd364 edx=00000000 esi=9d9adb50 edi=00000000
eip=82876c42 esp=9d9adaec ebp=9d9adaec iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!ExfAcquirePushLockShared+0x7:
82876c42 f083ec44 lock sub esp,44h
.trap
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: sidebar.exe
CURRENT_IRQL: 0
MISALIGNED_IP:
nt!ExfAcquirePushLockShared+7
82876c42 f083ec44 lock sub esp,44h
LAST_CONTROL_TRANSFER: from 8a3ba02e to 82876c42
FAILED_INSTRUCTION_ADDRESS:
nt!ExfAcquirePushLockShared+7
82876c42 f083ec44 lock sub esp,44h
STACK_TEXT:
9d9adaec 8a3ba02e 9d9adb14 8a3bef2a 8a3bd364 nt!ExfAcquirePushLockShared+0x7
9d9adaf4 8a3bef2a 8a3bd364 9d9adb50 850c8008 fileinfo!FILockSharedAcquire+0x14
9d9adb14 8a3c00f7 84faab40 9d9adb2c 9d9adb40 fileinfo!FIFileObjectGetContext+0x34
9d9adb30 8a387aeb 850c8068 9d9adb50 00010000 fileinfo!FIPreCloseCallback+0x45
9d9adb9c 8a38a9f0 9d9adbf0 84d705e0 84d70794 fltmgr!FltpPerformPreCallbacks+0x34d
9d9adbb4 8a38af01 9d9adbf0 00000000 864a1218 fltmgr!FltpPassThroughInternal+0x40
9d9adbd8 8a38b3ba 029adbf0 864a1218 84faab40 fltmgr!FltpPassThrough+0x203
9d9adc08 82841dd2 864a1218 84d705e0 864a7024 fltmgr!FltpDispatch+0xb4
9d9adc20 82a2e0a7 84bddf78 84faab28 00000000 nt!IofCallDriver+0x63
9d9adc64 82a276c8 84faab40 84faab40 84faab28 nt!IopDeleteFile+0x10c
9d9adc7c 828e64fd 00000000 87040030 84faab28 nt!ObpRemoveObjectRoutine+0x59
9d9adc90 8287fa85 84faab40 82a27baf 9ed9cd38 nt!ObfDereferenceObjectWithTag+0x88
9d9adc98 82a27baf 9ed9cd38 87040030 00000320 nt!ObfDereferenceObject+0xd
9d9adcdc 82a278d5 9ed9cd38 9edb1640 86f43030 nt!ObpCloseHandleTableEntry+0x21d
9d9add0c 82a27c0d 86f43030 87040001 020a80fc nt!ObpCloseHandle+0x7f
9d9add28 8284935a 00000320 020a8100 77cf8244 nt!NtClose+0x4e
9d9add28 77cf8244 00000320 020a8100 77cf8244 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
020a8100 00000000 00000000 00000000 00000000 0x77cf8244
STACK_COMMAND: kb
FOLLOWUP_IP:
fileinfo!FILockSharedAcquire+14
8a3ba02e 5d pop ebp
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: fileinfo!FILockSharedAcquire+14
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: IP_MISALIGNED
BUCKET_ID: IP_MISALIGNED
Followup: MachineOwner
---------
eax=87040030 ebx=8a3bd364 ecx=8a3bd364 edx=00000000 esi=9d9adb50 edi=00000000
eip=82876c42 esp=9d9adaec ebp=9d9adaec iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!ExfAcquirePushLockShared+0x7:
82876c42 f083ec44 lock sub esp,44h
ChildEBP RetAddr Args to Child
9d9adaec 8a3ba02e 9d9adb14 8a3bef2a 8a3bd364 nt!ExfAcquirePushLockShared+0x7
9d9adaf4 8a3bef2a 8a3bd364 9d9adb50 850c8008 fileinfo!FILockSharedAcquire+0x14 (FPO: [1,0,0])
9d9adb14 8a3c00f7 84faab40 9d9adb2c 9d9adb40 fileinfo!FIFileObjectGetContext+0x34 (FPO: [3,2,4])
9d9adb30 8a387aeb 850c8068 9d9adb50 00010000 fileinfo!FIPreCloseCallback+0x45 (FPO: [3,1,4])
9d9adb9c 8a38a9f0 9d9adbf0 84d705e0 84d70794 fltmgr!FltpPerformPreCallbacks+0x34d (FPO: [1,19,4])
9d9adbb4 8a38af01 9d9adbf0 00000000 864a1218 fltmgr!FltpPassThroughInternal+0x40 (FPO: [2,0,4])
9d9adbd8 8a38b3ba 029adbf0 864a1218 84faab40 fltmgr!FltpPassThrough+0x203 (FPO: [1,2,4])
9d9adc08 82841dd2 864a1218 84d705e0 864a7024 fltmgr!FltpDispatch+0xb4 (FPO: [2,6,4])
9d9adc20 82a2e0a7 84bddf78 84faab28 00000000 nt!IofCallDriver+0x63
9d9adc64 82a276c8 84faab40 84faab40 84faab28 nt!IopDeleteFile+0x10c
9d9adc7c 828e64fd 00000000 87040030 84faab28 nt!ObpRemoveObjectRoutine+0x59
9d9adc90 8287fa85 84faab40 82a27baf 9ed9cd38 nt!ObfDereferenceObjectWithTag+0x88 (FPO: [0,0,3])
9d9adc98 82a27baf 9ed9cd38 87040030 00000320 nt!ObfDereferenceObject+0xd (FPO: [0,1,0])
9d9adcdc 82a278d5 9ed9cd38 9edb1640 86f43030 nt!ObpCloseHandleTableEntry+0x21d
9d9add0c 82a27c0d 86f43030 87040001 020a80fc nt!ObpCloseHandle+0x7f
9d9add28 8284935a 00000320 020a8100 77cf8244 nt!NtClose+0x4e
9d9add28 77cf8244 00000320 020a8100 77cf8244 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ 9d9add34)
WARNING: Frame IP not in any known module. Following frames may be wrong.
020a8100 00000000 00000000 00000000 00000000 0x77cf8244
Unloaded modules:
9e4f4000 9e55e000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
93f36000 93f4e000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aaab000 8aab8000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aab8000 8aac3000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
8aac3000 8aacc000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
8aacc000 8aadd000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Closing open log file c:debuglog.txt
My System SpecsSystem Spec Edit/Delete Message Reply With Quote Multi-Quote This Message
System Manufacturer/Model Number homemade
OS windows 7
CPU pent 4 ht
Motherboard asus p4p800mx
Memory 2.5 GB
Graphics Card Nvidia GeForce 8400 gs
Sound Card sound blaster live 24 bit
Monitor(s) Displays dual stone age monitors e772p and e773p
Update your System Spec
PSU diablotek da series 400w
Case factory modded Dell 2350
Cooling air
Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
jcm2302
View Public Profile
Find More Posts by jcm2302
Add jcm2302 to Your Contacts
Unread 1 Minute Ago #4 (permalink)
jcm2302
New Member
jcm2302 is on a distinguished road
Join Date: Nov 2009
windows 7
4 posts
jcm2302 is online now Add to jcm2302's Reputation Report Post
Default
even this sometimes
Opened log file 'c:debuglog.txt'
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\112709-21312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
Machine Name:
Kernel base = 0x8283d000 PsLoadedModuleList = 0x8297c570
Debug session time: Fri Nov 27 09:19:52.006 2009 (GMT-5)
System Uptime: 0 days 1:28:39.428
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.........
0: kd> !analyze -v;r;kv;lmtn;.logclose;q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 00000099, A PTE or PFN is corrupt
Arg2: 00089140, page frame number
Arg3: 00000003, current page state
Arg4: 0008c60f, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: sidebar.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 82914500 to 828f8e94
STACK_TEXT:
a07267e0 82914500 0000004e 00000099 00089140 nt!KeBugCheckEx+0x1e
a07267f8 828dad84 c000b790 00000fff 86b58a68 nt!MiBadShareCount+0x24
a0726838 828daa70 86e65b60 00000200 86f6d090 nt!MiDeletePteList+0x2ba
a0726c84 828c2f60 c000b78c 86e65b60 e6c8320c nt!MiDecommitPages+0x38b
a0726d1c 8287e35a ffffffff 01f78f00 01f78f14 nt!NtFreeVirtualMemory+0x882
a0726d1c 77078244 ffffffff 01f78f00 01f78f14 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
01f78ed4 00000000 00000000 00000000 00000000 0x77078244
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+24
82914500 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+24
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 49ee8b48
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24
Followup: MachineOwner
---------
eax=8296b934 ebx=848d9e02 ecx=00000018 edx=00000000 esi=8295ed20 edi=00000000
eip=828f8e94 esp=a07267c8 ebp=a07267e0 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000202
nt!KeBugCheckEx+0x1e:
828f8e94 cc int 3
ChildEBP RetAddr Args to Child
a07267e0 82914500 0000004e 00000099 00089140 nt!KeBugCheckEx+0x1e
a07267f8 828dad84 c000b790 00000fff 86b58a68 nt!MiBadShareCount+0x24 (FPO: [0,0,0])
a0726838 828daa70 86e65b60 00000200 86f6d090 nt!MiDeletePteList+0x2ba
a0726c84 828c2f60 c000b78c 86e65b60 e6c8320c nt!MiDecommitPages+0x38b
a0726d1c 8287e35a ffffffff 01f78f00 01f78f14 nt!NtFreeVirtualMemory+0x882
a0726d1c 77078244 ffffffff 01f78f00 01f78f14 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ a0726d34)
WARNING: Frame IP not in any known module. Following frames may be wrong.
01f78ed4 00000000 00000000 00000000 00000000 0x77078244
Unloaded modules:
9d4a2000 9d4c3000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
93d35000 93d4c000 USBSTOR.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
93d2f000 93d35000 RimUsb.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
9d4c3000 9d52d000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
93f34000 93f4c000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aa73000 8aa80000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
8aa80000 8aa8b000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
8aa8b000 8aa94000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
8aa94000 8aaa5000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
Closing open log file c:debuglog.txt
My System SpecsSystem Spec Edit/Delete Message Reply With Quote Multi-Quote This Message
System Manufacturer/Model Number homemade
OS windows 7
CPU pent 4 ht
Motherboard asus p4p800mx
Memory 2.5 GB
Graphics Card Nvidia GeForce 8400 gs
Sound Card sound blaster live 24 bit
Monitor(s) Displays dual stone age monitors e772p and e773p
Update your System Spec
PSU diablotek da series 400w
Case factory modded Dell 2350
Cooling air
Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
jcm2302
View Public Profile
Find More Posts by jcm2302
Add jcm2302 to Your Contacts
Unread 1 Minute Ago #5 (permalink)
jcm2302
New Member
jcm2302 is on a distinguished road
Join Date: Nov 2009
windows 7
5 posts
jcm2302 is online now Add to jcm2302's Reputation Report Post
Default
and this so far
Opened log file 'c:debuglog.txt'
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\112609-26937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
Machine Name:
Kernel base = 0x82810000 PsLoadedModuleList = 0x8294f570
Debug session time: Thu Nov 26 23:48:06.587 2009 (GMT-5)
System Uptime: 0 days 1:14:21.994
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {0, 0, 0, 0}
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+5021c9 )
Followup: MachineOwner
---------
0: kd> !analyze -v;r;kv;lmtn;.logclose;q
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000000, EXCEPTION_DIVIDED_BY_ZERO
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_0
TRAP_FRAME: 80d8a7e0 -- (.trap 0xffffffff80d8a7e0)
.trap 0xffffffff80d8a7e0
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=86d2f8e0 edi=84fce530
eip=af5161c9 esp=80d8a854 ebp=80d8a85c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nvlddmkm+0x5021c9:
af5161c9 f7f1 div eax,ecx
.trap
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from af5161c9 to 828521bb
STACK_TEXT:
80d8a7e0 af5161c9 badb0d00 00000000 84fce530 nt!KiTrap00+0x8b
WARNING: Stack unwind information not available. Following frames may be wrong.
80d8a85c af2d7932 84fce530 00000001 8533603c nvlddmkm+0x5021c9
80d8a878 af51b8c3 84fce530 851f3000 86d2f8e0 nvlddmkm+0x2c3932
80d8a8a8 af51f44a 84fce530 851f3000 00000003 nvlddmkm+0x5078c3
80d8a8c8 af24c9de 84fce530 851f3000 86d2f8b8 nvlddmkm+0x50b44a
80d8a90c af33c161 00000000 86b0a1b0 86d2f8b8 nvlddmkm+0x2389de
80d8a97c af33ba4f 84fce530 850181a8 00000000 nvlddmkm+0x328161
80d8a9d0 af4345a9 00000001 850181a8 0000001a nvlddmkm+0x327a4f
80d8aa24 af42fa7d 850181a8 86c1dba0 00e00000 nvlddmkm+0x4205a9
80d8aa4c af434bf1 84fce530 86c1dba0 00e00000 nvlddmkm+0x41ba7d
80d8ab88 af3b5912 850181a8 00e00000 86b0a1b0 nvlddmkm+0x420bf1
80d8ac10 af43616e 00000001 86b0a1b0 0021704b nvlddmkm+0x3a1912
80d8ac4c af434b36 00000000 86c1dba0 00000400 nvlddmkm+0x42216e
80d8ad88 af3b521b 850181a8 ffffffff 85eae380 nvlddmkm+0x420b36
80d8ae64 af2e1b90 00000000 86b0a1b0 86b0a1b0 nvlddmkm+0x3a121b
80d8ae80 af15b642 84fce530 86b0a1b0 850bd000 nvlddmkm+0x2cdb90
80d8af00 af091f13 850bd000 00000000 850bd010 nvlddmkm+0x147642
80d8af24 af0280f0 8504edcc 80d8af3c af0f2947 nvlddmkm+0x7df13
80d8af30 af0f2947 af0280bf 80d8af48 af0633ec nvlddmkm+0x140f0
80d8af3c af0633ec 850bd000 80d8afa4 828d3f82 nvlddmkm+0xde947
80d8af48 828d3f82 850bd010 850bd000 00000000 nvlddmkm+0x4f3ec
80d8afa4 82874c10 82931d20 8504ed48 00000000 nt!KiExecuteAllDpcs+0xf9
80d8aff4 828713dc 9e59fce4 00000000 00000000 nt!KiRetireDpcList+0xd5
80d8aff8 9e59fce4 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2c
828713dc 00000000 0000001a 00d6850f bb830000 0x9e59fce4
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+5021c9
af5161c9 f7f1 div eax,ecx
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nvlddmkm+5021c9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b0764b5
FAILURE_BUCKET_ID: 0x7f_0_nvlddmkm+5021c9
BUCKET_ID: 0x7f_0_nvlddmkm+5021c9
Followup: MachineOwner
---------
eax=8293e934 ebx=80d8a802 ecx=0000001f edx=00000000 esi=82931d20 edi=00000000
eip=828521bb esp=80d8a7c8 ebp=80d8a7e0 iopl=0 nv up ei pl nz ac po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000212
nt!KiTrap00+0x8b:
828521bb 66837d6c1b cmp word ptr [ebp+6Ch],1Bh ss:0010:80d8a84c=0008
ChildEBP RetAddr Args to Child
80d8a7e0 af5161c9 badb0d00 00000000 84fce530 nt!KiTrap00+0x8b (FPO: [0,0] TrapFrame @ 80d8a7e0)
WARNING: Stack unwind information not available. Following frames may be wrong.
80d8a85c af2d7932 84fce530 00000001 8533603c nvlddmkm+0x5021c9
80d8a878 af51b8c3 84fce530 851f3000 86d2f8e0 nvlddmkm+0x2c3932
80d8a8a8 af51f44a 84fce530 851f3000 00000003 nvlddmkm+0x5078c3
80d8a8c8 af24c9de 84fce530 851f3000 86d2f8b8 nvlddmkm+0x50b44a
80d8a90c af33c161 00000000 86b0a1b0 86d2f8b8 nvlddmkm+0x2389de
80d8a97c af33ba4f 84fce530 850181a8 00000000 nvlddmkm+0x328161
80d8a9d0 af4345a9 00000001 850181a8 0000001a nvlddmkm+0x327a4f
80d8aa24 af42fa7d 850181a8 86c1dba0 00e00000 nvlddmkm+0x4205a9
80d8aa4c af434bf1 84fce530 86c1dba0 00e00000 nvlddmkm+0x41ba7d
80d8ab88 af3b5912 850181a8 00e00000 86b0a1b0 nvlddmkm+0x420bf1
80d8ac10 af43616e 00000001 86b0a1b0 0021704b nvlddmkm+0x3a1912
80d8ac4c af434b36 00000000 86c1dba0 00000400 nvlddmkm+0x42216e
80d8ad88 af3b521b 850181a8 ffffffff 85eae380 nvlddmkm+0x420b36
80d8ae64 af2e1b90 00000000 86b0a1b0 86b0a1b0 nvlddmkm+0x3a121b
80d8ae80 af15b642 84fce530 86b0a1b0 850bd000 nvlddmkm+0x2cdb90
80d8af00 af091f13 850bd000 00000000 850bd010 nvlddmkm+0x147642
80d8af24 af0280f0 8504edcc 80d8af3c af0f2947 nvlddmkm+0x7df13
80d8af30 af0f2947 af0280bf 80d8af48 af0633ec nvlddmkm+0x140f0
80d8af3c af0633ec 850bd000 80d8afa4 828d3f82 nvlddmkm+0xde947