- Thread Author
- #1
BSOD Win 7 64bit 3-5time a day!! Help please!!
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\Temp\Rar$DI00.759\100110-16754-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a4c000 PsLoadedModuleList = 0xfffff800`02c89e50
Debug session time: Fri Oct 1 09:49:25.021 2010 (UTC - 4:00)
System Uptime: 0 days 0:01:14.050
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88002f458d8, fffff88002f45140, fffff880012ff72f}
Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonClose+26f )
Followup: MachineOwner
---------
0: kd> lmtn
start end module name
fffff800`00ba6000 fffff800`00bb0000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff800`02a03000 fffff800`02a4c000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff800`02a4c000 fffff800`03028000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`00c81000 fffff880`00c8e000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`00c8e000 fffff880`00ca2000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`00ca2000 fffff880`00d00000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d00000 fffff880`00dc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00dc0000 fffff880`00dfa000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`00e00000 fffff880`00e2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`00e2a000 fffff880`00e35000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e37000 fffff880`00edb000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00edb000 fffff880`00eea000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00eea000 fffff880`00f41000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`00f41000 fffff880`00f4a000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f4a000 fffff880`00f54000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`00f54000 fffff880`00f87000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00f87000 fffff880`00f94000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`00f94000 fffff880`00fa9000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00fa9000 fffff880`00fbe000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00fbe000 fffff880`00fc5000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fc5000 fffff880`00fd5000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`00fd5000 fffff880`00fef000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00fef000 fffff880`00ff8000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`01000000 fffff880`01030000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`01039000 fffff880`01085000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01085000 fffff880`01099000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01099000 fffff880`010f7000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`010f7000 fffff880`0116a000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0116a000 fffff880`011b6000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`011b6000 fffff880`011f0000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01235000 fffff880`0124b000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0124b000 fffff880`01253000 AtiPcie AtiPcie.sys Tue May 05 11:00:22 2009 (4A005486)
fffff880`01255000 fffff880`013f8000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`01475000 fffff880`01485000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`01486000 fffff880`01578000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01578000 fffff880`015d8000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`015d8000 fffff880`015e0000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`015e0000 fffff880`015f2000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`015f2000 fffff880`015fb000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`02a0b000 fffff880`02a35000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a35000 fffff880`02a3e000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`02a3e000 fffff880`02a45000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02a45000 fffff880`02a53000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02a53000 fffff880`02a78000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`02a78000 fffff880`02a88000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`02a88000 fffff880`02a91000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02a91000 fffff880`02a9a000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02a9a000 fffff880`02aa3000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`02aa3000 fffff880`02aae000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02aae000 fffff880`02abf000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02abf000 fffff880`02add000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02add000 fffff880`02aea000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02aea000 fffff880`02b74000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02b74000 fffff880`02bb9000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`02bb9000 fffff880`02bc2000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02bc2000 fffff880`02be8000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`02be8000 fffff880`02bf7000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03e21000 fffff880`03e3e000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`03e3e000 fffff880`03e59000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`03e59000 fffff880`03e6d000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`03e6d000 fffff880`03ebe000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03ebe000 fffff880`03eca000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff880`03eca000 fffff880`03ed5000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`03ed5000 fffff880`03ee4000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`03ee4000 fffff880`03f67000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f67000 fffff880`03f85000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03f85000 fffff880`03f96000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`03f96000 fffff880`03f9e000 BIOS64 BIOS64.sys Sat Jun 07 20:12:00 2003 (3EE27F50)
fffff880`03f9e000 fffff880`03fc4000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03fc4000 fffff880`03fd9000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`03fd9000 fffff880`03fe8000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04000000 fffff880`040c8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`040cf000 fffff880`04112000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`04112000 fffff880`04124000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04124000 fffff880`0417e000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0417e000 fffff880`04193000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`04193000 fffff880`041c0000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`04200000 fffff880`0420c000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0420c000 fffff880`0423b000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0423b000 fffff880`04256000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04256000 fffff880`04277000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`04277000 fffff880`04291000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`04291000 fffff880`0429c000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0429c000 fffff880`042f2000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`042f2000 fffff880`042ff000 usbfilter usbfilter.sys Wed Oct 07 03:44:08 2009 (4ACC46C8)
fffff880`042ff000 fffff880`04300f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04301000 fffff880`04312000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04312000 fffff880`04336000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04336000 fffff880`04353000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`04353000 fffff880`0435f000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`0435f000 fffff880`043b6000 Rt64win7 Rt64win7.sys Mon Mar 22 05:57:14 2010 (4BA73EFA)
fffff880`043b6000 fffff880`043c6000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`043c6000 fffff880`043dc000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`043dc000 fffff880`04400000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05800000 fffff880`05818000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05818000 fffff880`05836000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff880`05836000 fffff880`0584e000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05854000 fffff880`05a81d80 RTKVHD64 RTKVHD64.sys Fri Mar 12 16:47:03 2010 (4B9AB657)
fffff880`05a82000 fffff880`05abf000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`05abf000 fffff880`05ae1000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05ae1000 fffff880`05ae6200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`05ae7000 fffff880`05af3000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`05af3000 fffff880`05b01000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`05b01000 fffff880`05b1e000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05b1e000 fffff880`05b2c000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`05b2c000 fffff880`05b45000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05b45000 fffff880`05b4d080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05b4e000 fffff880`05b5c000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`05b5c000 fffff880`05b68000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05b68000 fffff880`05b71000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05b71000 fffff880`05b84000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05b84000 fffff880`05b91000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`05b91000 fffff880`05b9f000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`05b9f000 fffff880`05bc2000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`05bc2000 fffff880`05be3000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`05be3000 fffff880`05bf8000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`05c2c000 fffff880`05c7a000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05c7a000 fffff880`05c9d000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`05c9d000 fffff880`05d43000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05d43000 fffff880`05d4e000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`05d4e000 fffff880`05d7b000 srvnet srvnet.sys Mon Jun 21 23:20:32 2010 (4C202C00)
fffff880`05d7b000 fffff880`05d8d000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`05d8d000 fffff880`05df5000 srv2 srv2.sys Mon Jun 21 23:20:47 2010 (4C202C0F)
fffff880`06c95000 fffff880`06d2b000 srv srv.sys Mon Jun 21 23:21:11 2010 (4C202C27)
fffff880`11c00000 fffff880`11c46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`11c46000 fffff880`11c53000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff880`11c53000 fffff880`11c5e000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`11c5e000 fffff880`11c6d000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`11c6d000 fffff880`11c6e480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`11c71000 fffff880`12902e00 nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`12903000 fffff880`12904180 nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`12905000 fffff880`129f9000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff960`00080000 fffff960`0038f000 win32k win32k.sys unavailable (00000000)
fffff960`00510000 fffff960`0051a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00690000 fffff960`006b7000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`011f0000 fffff880`011fe000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`00c5c000 fffff880`00c68000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`01030000 fffff880`01039000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`00c68000 fffff880`00c7b000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100510-23259-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a66000 PsLoadedModuleList = 0xfffff800`02ca3e50
System Uptime: 0 days 0:09:05.966
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+14fad )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - .
FAULTING_IP:
+0
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f1b8a8 -- (.exr 0xfffff88002f1b8a8)
ExceptionAddress: fffff80002a2176c (hal!HalPutScatterGatherList+0x000000000000001c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002f1b950 -- (.trap 0xfffff88002f1b950)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80002a44e00 rbx=0000000000000000 rcx=fffffa80057b2a70
rdx=ff00fa80057b5730 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a2176c rsp=fffff88002f1bae0 rbp=fffffa80057785a0
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=000000000000fffb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
hal!HalPutScatterGatherList+0x1c:
fffff800`02a2176c 488b5a08 mov rbx,qword ptr [rdx+8] ds:2a70:ff00fa80`057b5738=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ace46e to fffff80002ad6710
STACK_TEXT:
fffff880`02f1a998 fffff800`02ace46e : 00000000`a000000c 00000000`00000000 fffff880`02f1b110 fffff800`02b03668 : nt!KeBugCheck
fffff880`02f1a9a0 fffff800`02afc40d : fffff800`02ce4b7c fffff800`02c1ee84 fffff800`02a66000 fffff880`02f1b8a8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f1a9d0 fffff800`02b03a90 : fffff800`02c25b14 fffff880`02f1aa48 fffff880`02f1b8a8 fffff800`02a66000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f1aa00 fffff800`02b109ef : fffff880`02f1b8a8 fffff880`02f1b110 fffff880`00000000 fffffa80`056065a0 : nt!RtlDispatchException+0x410
fffff880`02f1b0e0 fffff800`02ad5d82 : fffff880`02f1b8a8 fffffa80`03b87a80 fffff880`02f1b950 fffffa80`03c75030 : nt!KiDispatchException+0x16f
fffff880`02f1b770 fffff800`02ad468a : fffffa80`03ba9a70 fffff880`01455a47 00000000`00000000 fffffa80`07038c60 : nt!KiExceptionDispatch+0xc2
fffff880`02f1b950 fffff800`02a2176c : fffffa80`057b5540 00000000`00000a00 00000000`00000000 fffffa80`0462d550 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f1bae0 fffff880`014568a1 : fffffa80`03b87a80 fffffa80`057785a0 fffffa80`03c75030 00000000`00000000 : hal!HalPutScatterGatherList+0x1c
fffff880`02f1bb40 fffff880`12b6cfad : fffffa80`05778000 fffffa80`03c75030 fffffa80`05778000 00000000`00000000 : ndis!NdisMFreeNetBufferSGList+0x31
fffff880`02f1bb80 fffffa80`05778000 : fffffa80`03c75030 fffffa80`05778000 00000000`00000000 fffffa80`03ba9a70 : Rt64win7+0x14fad
fffff880`02f1bb88 fffffa80`03c75030 : fffffa80`05778000 00000000`00000000 fffffa80`03ba9a70 00000000`00000000 : 0xfffffa80`05778000
fffff880`02f1bb90 fffffa80`05778000 : 00000000`00000000 fffffa80`03ba9a70 00000000`00000000 00000000`00000000 : 0xfffffa80`03c75030
fffff880`02f1bb98 00000000`00000000 : fffffa80`03ba9a70 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`05778000
STACK_COMMAND: kb
FOLLOWUP_IP:
Rt64win7+14fad
fffff880`12b6cfad ?? ???
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: Rt64win7+14fad
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Rt64win7
IMAGE_NAME: Rt64win7.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ba73efa
FAILURE_BUCKET_ID: X64_0x1E_Rt64win7+14fad
BUCKET_ID: X64_0x1E_Rt64win7+14fad
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100510-17815-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Invalid directory table base value 0x0
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a54000 PsLoadedModuleList = 0xfffff800`02c91e50
System Uptime: 0 days 2:35:40.743
Loading Kernel Symbols
..............................................Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5002, fffff780c0000000, 6dd, ff248cfffffffe}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2a1c7 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005002, The subtype of the bugcheck.
Arg2: fffff780c0000000
Arg3: 00000000000006dd
Arg4: 00ff248cfffffffe
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5002
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b340a9 to fffff80002ac4740
STACK_TEXT:
fffff880`08b8d368 fffff800`02b340a9 : 00000000`0000001a 00000000`00005002 fffff780`c0000000 00000000`000006dd : nt!KeBugCheckEx
fffff880`08b8d370 fffff800`02ae168f : fffff6fc`c0090f78 00000000`00000001 fffff880`00000010 ffffffff`ffffffff : nt! ?? ::FNODOBFM::`string'+0x2a1c7
fffff880`08b8d4e0 fffff800`02b08cae : fffff980`121ce000 00000000`00030000 00000000`00000000 fffffa80`03e4ad10 : nt!MmCheckCachedPageStates+0x3ef
fffff880`08b8d690 fffff800`02de195b : 00000000`315c0000 00000000`315ce200 fffffa80`03f37390 00000000`004a89ae : nt!CcFetchDataForRead+0x10e
fffff880`08b8d6f0 fffff880`012e9c48 : fffff880`00000000 00000000`00000005 fffffa80`00031e00 fffffa80`0002f001 : nt!CcCopyRead+0x16b
fffff880`08b8d7b0 fffff880`010530c8 : fffffa80`03f37390 fffffa80`03e4aca8 00000000`00000000 fffffa80`03f37301 : Ntfs!NtfsCopyReadA+0x1a8
fffff880`08b8d980 fffff880`01056c2a : fffff880`08b8da50 00000000`004a8903 00000000`004a8900 fffffa80`03f37300 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`08b8d9e0 fffff880`010745f0 : fffffa80`03f37390 00000000`00000000 fffff880`08b8db40 00000000`0002f000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`08b8da20 fffff800`02de2289 : fffffa80`03f37390 00000000`00000001 fffffa80`03a0d750 fffffa80`03f37390 : fltmgr!FltpFastIoRead+0x1d0
fffff880`08b8dac0 fffff800`02ac3993 : 00000000`0000042f 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`08b8dbb0 00000000`740f2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008ebf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x740f2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+2a1c7
fffff800`02b340a9 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+2a1c7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1a_5002_nt!_??_::FNODOBFM::_string_+2a1c7
BUCKET_ID: X64_0x1a_5002_nt!_??_::FNODOBFM::_string_+2a1c7
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\100510-19921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a52000 PsLoadedModuleList = 0xfffff800`02c8fe50
System Uptime: 0 days 16:43:15.010
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3D, {fffff88002eaf100, 0, 0, fffff88000fbccee}
Probably caused by : ataport.SYS ( ataport!AtaPortReadPortBufferUshort+e )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: fffff88002eaf100
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: fffff88000fbccee
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3D
PROCESS_NAME: System
CURRENT_IRQL: 8
EXCEPTION_RECORD: fffff88002eaf898 -- (.exr 0xfffff88002eaf898)
ExceptionAddress: fffff88000fbccee (ataport!AtaPortReadPortBufferUshort+0x000000000000000e)
ExceptionCode: c0000096
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff88002eaf940 -- (.trap 0xfffff88002eaf940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000008000 rbx=0000000000000000 rcx=0000000000000004
rdx=000000000000a000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000fbccee rsp=fffff88002eafad8 rbp=fffffa80049c26a8
r8=0000000000000004 r9=fffffa80049c2658 r10=00000000000160a7
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ataport!AtaPortReadPortBufferUshort+0xe:
fffff880`00fbccee 66f36d rep ins word ptr [rdi],dx
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ac1ca9 to fffff80002ac2740
STACK_TEXT:
fffff880`02eae848 fffff800`02ac1ca9 : 00000000`0000003d fffff880`02eaf100 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`02eae850 fffff800`02abdfe9 : fffffa80`069adf10 fffff880`0149d831 fffff880`02eaf100 fffff800`02aef668 : nt!KiBugCheckDispatch+0x69
fffff880`02eae990 fffff800`02ae840d : fffff800`02cd0120 fffff800`02c118f4 fffff800`02a52000 fffff880`02eaf898 : nt!KiInterruptHandler+0x29
fffff880`02eae9c0 fffff800`02aefa90 : fffff800`02c118ec fffff880`02eaea38 fffff880`02eaf898 fffff800`02a52000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02eae9f0 fffff800`02afc9ef : fffff880`02eaf898 fffff880`02eaf100 fffff880`00000000 ff00fa80`05017380 : nt!RtlDispatchException+0x410
fffff880`02eaf0d0 fffff800`02ac1d82 : fffff880`02eaf898 fffffa80`0441ec00 fffff880`02eaf940 fffffa80`0453df68 : nt!KiDispatchException+0x16f
fffff880`02eaf760 fffff800`02ac068a : fffffa80`0453db80 fffff880`00fb87ef fffffa80`04bd39e0 00000000`00000001 : nt!KiExceptionDispatch+0xc2
fffff880`02eaf940 fffff880`00fbccee : fffff880`00fb08ff 00000000`00000008 fffffa80`0453db80 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`02eafad8 fffff880`00fb08ff : 00000000`00000008 fffffa80`0453db80 00000000`00000000 fffffa80`0453db80 : ataport!AtaPortReadPortBufferUshort+0xe
fffff880`02eafae0 fffff880`00faf83a : fffffa80`0441ec04 fffffa80`0441ec04 fffff880`02eafc70 fffffa80`0453df68 : atapi!AtapiProcessInterrupt+0x19b
fffff880`02eafb40 fffff800`02abe339 : fffffa80`0441ec58 fffffa80`0441ecc8 fffff880`02eafc70 fffffa80`0441ecc0 : atapi!AtapiHwInterrupt+0x156
fffff880`02eafba0 fffff800`02abe118 : 00000000`00000001 fffffa80`0453db80 00000000`00000000 fffff880`00fc30fc : nt!KiScanInterruptObjectList+0x69
fffff880`02eafbf0 fffff800`02acaec2 : fffff880`02e87180 fffff880`00000001 00000000`00000001 fffff880`00000000 : nt!KiChainedDispatch+0x128
fffff880`02eafd80 00000000`00000000 : fffff880`02eb0000 fffff880`02eaa000 fffff880`02eafd40 00000000`00000000 : nt!KiIdleLoop+0x32
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!AtaPortReadPortBufferUshort+e
fffff880`00fbccee 66f36d rep ins word ptr [rdi],dx
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: ataport!AtaPortReadPortBufferUshort+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0x3D_ataport!AtaPortReadPortBufferUshort+e
BUCKET_ID: X64_0x3D_ataport!AtaPortReadPortBufferUshort+e
Followup: MachineOwner
---------
start end module name
fffff800`00bb4000 fffff800`00bbe000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02a09000 fffff800`02a52000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff800`02a52000 fffff800`0302e000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff880`00c00000 fffff880`00ca4000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00ca9000 fffff880`00cb6000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00cb6000 fffff880`00cca000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00cca000 fffff880`00d28000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d28000 fffff880`00de8000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00de8000 fffff880`00df7000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00e00000 fffff880`00e4c000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`00e4d000 fffff880`00ea4000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00ea4000 fffff880`00ead000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00ead000 fffff880`00eb7000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00eb7000 fffff880`00eea000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00eea000 fffff880`00ef7000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00ef7000 fffff880`00f0c000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00f0c000 fffff880`00f21000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00f21000 fffff880`00f7d000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00f7d000 fffff880`00f84000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00f84000 fffff880`00f94000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00f94000 fffff880`00fae000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00fae000 fffff880`00fb7000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00fb7000 fffff880`00fe1000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00fe1000 fffff880`00fec000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00fec000 fffff880`01000000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`01000000 fffff880`01030000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01055000 fffff880`011f8000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`01200000 fffff880`01216000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`01216000 fffff880`0121e000 AtiPcie AtiPcie.sys Tue May 05 18:00:22 2009 (4A005486)
fffff880`0122a000 fffff880`01288000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`01288000 fffff880`012a2000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`012a2000 fffff880`01315000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`01315000 fffff880`01326000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`01326000 fffff880`01330000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01330000 fffff880`0137c000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`0137c000 fffff880`013b6000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`013b6000 fffff880`013f0000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`01475000 fffff880`01485000 vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`01485000 fffff880`0148d000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`0148d000 fffff880`01496000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`0149b000 fffff880`0158d000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`0158d000 fffff880`015ed000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`015ed000 fffff880`015ff000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`02a00000 fffff880`02a45000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02a45000 fffff880`02a4e000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02a4e000 fffff880`02a74000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`02a77000 fffff880`02aa1000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`02aa1000 fffff880`02aaa000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`02aaa000 fffff880`02ab1000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`02ab1000 fffff880`02abf000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`02abf000 fffff880`02ae4000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`02ae4000 fffff880`02af4000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02af4000 fffff880`02afd000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02afd000 fffff880`02b06000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02b06000 fffff880`02b0f000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`02b0f000 fffff880`02b1a000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02b1a000 fffff880`02b2b000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`02b2b000 fffff880`02b49000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`02b49000 fffff880`02b56000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`02b56000 fffff880`02be0000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02be0000 fffff880`02bef000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03e2d000 fffff880`03e4a000 serial serial.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`03e4a000 fffff880`03e65000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`03e65000 fffff880`03e79000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`03e79000 fffff880`03eca000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03eca000 fffff880`03ed6000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03ed6000 fffff880`03ee1000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03ee1000 fffff880`03ef0000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03ef0000 fffff880`03f73000 csc csc.sys Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`03f73000 fffff880`03f91000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03f91000 fffff880`03fa2000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03fa2000 fffff880`03fc8000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`03fc8000 fffff880`03fdd000 amdppm amdppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`03fdd000 fffff880`03fec000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`03fec000 fffff880`03ffb000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04000000 fffff880`04024000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04024000 fffff880`04030000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`04030000 fffff880`0403b000 rdpbus rdpbus.sys Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`0403b000 fffff880`0403c480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`04042000 fffff880`04088000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`04088000 fffff880`04095000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`04095000 fffff880`040a0000 usbohci usbohci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`040a0000 fffff880`040f6000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`040f6000 fffff880`04103000 usbfilter usbfilter.sys Wed Oct 07 10:44:08 2009 (4ACC46C8)
fffff880`04103000 fffff880`04104f00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`04105000 fffff880`04116000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`04116000 fffff880`0413a000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`0413a000 fffff880`04157000 parport parport.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`04157000 fffff880`04163000 serenum serenum.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`041ba000 fffff880`041ca000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`041ca000 fffff880`041e0000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`041e0000 fffff880`041fb000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04200000 fffff880`042c8000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`042c8000 fffff880`042f5000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`042f6000 fffff880`04339000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`04339000 fffff880`0434b000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`0434b000 fffff880`043a5000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`043a5000 fffff880`043ba000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`05800000 fffff880`0580e000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`0580e000 fffff880`05831000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`05831000 fffff880`05852000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`05852000 fffff880`05867000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`05867000 fffff880`0587f000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`0587f000 fffff880`0589d000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`0589d000 fffff880`058b5000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`058c2000 fffff880`05aefd80 RTKVHD64 RTKVHD64.sys Fri Mar 12 23:47:03 2010 (4B9AB657)
fffff880`05af0000 fffff880`05b2d000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`05b2d000 fffff880`05b4f000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`05b4f000 fffff880`05b54200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`05b55000 fffff880`05b61000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`05b61000 fffff880`05b7e000 usbccgp usbccgp.sys Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`05b7e000 fffff880`05b8c000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`05b8c000 fffff880`05ba5000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`05ba5000 fffff880`05bad080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`05bae000 fffff880`05bbc000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`05bbc000 fffff880`05bc8000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05bc8000 fffff880`05bd1000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05bd1000 fffff880`05be4000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`05be4000 fffff880`05bf1000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`05bf1000 fffff880`05bff000 kbdhid kbdhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`05c00000 fffff880`05c2d000 srvnet srvnet.sys Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`05c2d000 fffff880`05c3f000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`05c3f000 fffff880`05ca7000 srv2 srv2.sys Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`05cbd000 fffff880`05d0b000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`05d0b000 fffff880`05d2e000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`05d2e000 fffff880`05dd4000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`05dd4000 fffff880`05ddf000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`06031000 fffff880`06067000 fastfat fastfat.SYS Tue Jul 14 02:23:28 2009 (4A5BC1F0)
fffff880`060a7000 fffff880`0613d000 srv srv.sys Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`0613d000 fffff880`06194000 Rt64win7 Rt64win7.sys Mon Mar 22 11:57:14 2010 (4BA73EFA)
fffff880`061ae000 fffff880`061b9000 asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
fffff880`11c00000 fffff880`11c21000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`11c21000 fffff880`11c3b000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`11c45000 fffff880`128d6e00 nvlddmkm nvlddmkm.sys Sat Jul 10 00:15:58 2010 (4C37918E)
fffff880`128d7000 fffff880`128d8180 nvBridge nvBridge.kmd Sat Jul 10 00:07:54 2010 (4C378FAA)
fffff880`128d9000 fffff880`129cd000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`129cd000 fffff880`129fc000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff960`000e0000 fffff960`003ef000 win32k win32k.sys unavailable (00000000)
fffff960`00520000 fffff960`0052a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00710000 fffff960`00737000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`0613d000 fffff880`06194000 Rt64win7.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`04163000 fffff880`041ba000 Rt64win7.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0613d000 fffff880`0616e000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`06067000 fffff880`06082000 USBSTOR.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`06000000 fffff880`06031000 WUDFRd.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`061b9000 fffff880`061d4000 USBSTOR.SYS
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0613d000 fffff880`061ae000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`013f0000 fffff880`013fe000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0121e000 fffff880`0122a000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01030000 fffff880`01039000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`01039000 fffff880`0104c000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
fffffa80`03e4aca8 00000000`00000000 fffffa80`03f37301 : Ntfs!NtfsCopyReadA+0x1a8
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa80007ac2b0
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: left4dead2.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002af9f9e to fffff80002a86740
STACK_TEXT:
fffff880`05328358 fffff800`02af9f9e : 00000000`0000001a 00000000`00041790 fffffa80`007ac2b0 00000000`0000ffff : nt!KeBugCheckEx
fffff880`05328360 fffff800`02ab9df9 : 00000000`00000000 00000000`5732bfff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33906
fffff880`05328520 fffff800`02d9f1d0 : fffffa80`06a98430 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`05328640 fffff880`12bca548 : 00000000`00000000 fffffa80`03b87b30 00000980`00000001 00000000`57080000 : nt!MiUnmapViewOfSection+0x1b0
fffff880`05328700 fffff880`12bbe9fa : fffff8a0`07a501a0 fffff8a0`07a501a0 fffffa80`03dd7101 fffff8a0`07a501a0 : dxgmms1!VIDMM_PROCESS_HEAP::UnmapViewOfAllocation+0x78
fffff880`05328730 fffff880`12bc7d99 : fffffa80`04542000 00000000`00000000 00000000`00000001 00000000`00000006 : dxgmms1!VidMmUnmapViewOfAllocation+0x56
fffff880`05328760 fffff880`12bc6bbc : fffffa80`06122d30 fffff8a0`07a501a0 00000000`000000d8 00000000`002ac000 : dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x59d
fffff880`053287f0 fffff880`12bc16a0 : fffff8a0`07a501a0 fffff8a0`07a501a0 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_SEGMENT::LockAllocationBackingStore+0x80
fffff880`05328860 fffff880`12bb5af3 : fffffa80`03fc8bc0 fffffa80`06119000 fffffa80`06119001 fffff880`12bb5600 : dxgmms1!VIDMM_APERTURE_SEGMENT::CommitResource+0x1c4
fffff880`053288b0 fffff880`12bb2763 : 00000000`00000000 fffffa80`03dd7000 00000000`00000000 fffffa80`03c795c0 : dxgmms1!VIDMM_GLOBAL::PageInAllocations+0xbb
fffff880`05328910 fffff880`12bcc65d : 00000000`00000000 fffff8a0`022f03f0 fffffa80`00000000 fffffa80`03defc30 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0xccf
fffff880`05328ae0 fffff880`12bcc398 : fffff880`0308bfc0 fffff880`12bcbd00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`05328cd0 fffff880`12bcbe96 : 00000000`00000000 fffffa80`03cab820 00000000`00000080 fffffa80`05fcb010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`05328d00 fffff800`02d2ac06 : 00000000`0c48c96d fffffa80`060e2060 fffffa80`03973890 fffffa80`060e2060 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`05328d40 fffff800`02a64c26 : fffff880`03087180 fffffa80`060e2060 fffff880`03092040 fffff880`01263534 : nt!PspSystemThreadStartup+0x5a
fffff880`05328d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_PROCESS_HEAP::UnmapViewOfAllocation+78
fffff880`12bca548 8327fd and dword ptr [rdi],0FFFFFFFDh
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms1!VIDMM_PROCESS_HEAP::UnmapViewOfAllocation+78
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
FAILURE_BUCKET_ID: X64_0x1a_41790_dxgmms1!VIDMM_PROCESS_HEAP::UnmapViewOfAllocation+78
BUCKET_ID: X64_0x1a_41790_dxgmms1!VIDMM_PROCESS_HEAP::UnmapViewOfAllocation+78
Followup: MachineOwner
---------
0: kd> lmvm dxgmms1
start end module name
fffff880`12b94000 fffff880`12bda000 dxgmms1 (pdb symbols) c:\symcache\dxgmms1.pdb\685AF9F266284BE19008B39B739A572B1\dxgmms1.pdb
Loaded symbol image file: dxgmms1.sys
Mapped memory image file: c:\symcache\dxgmms1.sys\4A5BC57846000\dxgmms1.sys
Image path: \SystemRoot\System32\drivers\dxgmms1.sys
Image name: dxgmms1.sys
Timestamp: Tue Jul 14 05:08:32 2009 (4A5BC578)
CheckSum: 0004AD44
ImageSize: 00046000
File version: 6.1.7600.16385
Product version: 6.1.7600.16385
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: dxgmms1.sys
OriginalFilename: dxgmms1.sys
ProductVersion: 6.1.7600.16385
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
FileDescription: DirectX Graphics MMS
LegalCopyright: © Microsoft Corporation. All rights reserved.
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100810-17050-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5e000 PsLoadedModuleList = 0xfffff800`02c9be50
Debug session time: Sat Oct 9 03:34:55.784 2010 (GMT-5)
System Uptime: 0 days 6:04:30.126
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002ad1cdc, fffff8800ad1c810, 0}
Probably caused by : ntkrnlmp.exe ( nt!KeWaitForMultipleObjects+202 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ad1cdc, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800ad1c810, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KeWaitForMultipleObjects+202
fffff800`02ad1cdc 488908 mov qword ptr [rax],rcx
CONTEXT: fffff8800ad1c810 -- (.cxr 0xfffff8800ad1c810)
rax=ff00fa800719b388 rbx=fffffa8006fb7168 rcx=fffffa8006fb7198
rdx=fffffa800719b388 rsi=fffffa8006fb7060 rdi=fffffa800719b380
rip=fffff80002ad1cdc rsp=fffff8800ad1d1e0 rbp=fffffa8006fb71b0
r8=0000000000000000 r9=0000000000000001 r10=0000000000000002
r11=0000000000000006 r12=0000000000000001 r13=fffff8800ad1d520
r14=fffff880009e9180 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!KeWaitForMultipleObjects+0x202:
fffff800`02ad1cdc 488908 mov qword ptr [rax],rcx ds:002b:ff00fa80`0719b388=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002ad1cdc
STACK_TEXT:
fffff880`0ad1d1e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeWaitForMultipleObjects+0x202
FOLLOWUP_IP:
nt!KeWaitForMultipleObjects+202
fffff800`02ad1cdc 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeWaitForMultipleObjects+202
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff8800ad1c810 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KeWaitForMultipleObjects+202
BUCKET_ID: X64_0x3B_nt!KeWaitForMultipleObjects+202
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100610-16411-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Thu Oct 7 01:38:12.118 2010 (GMT-5)
System Uptime: 0 days 0:01:42.460
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904fb, fffff88009ace398, fffff88009acdc00, fffff8800123269d}
Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonRead+91d )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff88009ace398
Arg3: fffff88009acdc00
Arg4: fffff8800123269d
Debugging Details:
------------------
EXCEPTION_RECORD: fffff88009ace398 -- (.exr 0xfffff88009ace398)
ExceptionAddress: fffff8800123269d (Ntfs!NtfsCommonRead+0x000000000000091d)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88009acdc00 -- (.cxr 0xfffff88009acdc00)
rax=0000000000000000 rbx=fffff8a0036a5c70 rcx=f8800127e1840000
rdx=0000000000000000 rsi=0000000000000001 rdi=fffff8a0036a5b08
rip=fffff8800123269d rsp=fffff88009ace5d0 rbp=fffff88009ace8f0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=fffff88009ace700 r12=0000000000060001 r13=ff00fa8003af8c10
r14=0000000000004000 r15=fffff88009ace7a0
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010293
Ntfs!NtfsCommonRead+0x91d:
fffff880`0123269d 418b7530 mov esi,dword ptr [r13+30h] ds:002b:ff00fa80`03af8c40=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc10e0
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsCommonRead+91d
fffff880`0123269d 418b7530 mov esi,dword ptr [r13+30h]
FAULTING_IP:
Ntfs!NtfsCommonRead+91d
fffff880`0123269d 418b7530 mov esi,dword ptr [r13+30h]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff88001234f78 to fffff8800123269d
STACK_TEXT:
fffff880`09ace5d0 fffff880`01234f78 : fffff880`09ace7a0 fffffa80`03af8c10 fffff880`09ace801 fffffa80`06f11001 : Ntfs!NtfsCommonRead+0x91d
fffff880`09ace770 fffff880`0105923f : fffffa80`03af8fb0 fffffa80`03af8c10 fffffa80`06f11010 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
fffff880`09ace970 fffff880`010576df : fffffa80`04937900 fffffa80`03af8c10 fffffa80`04937900 fffffa80`03af8c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`09acea00 fffff800`02a7b1f2 : fffffa80`03af8c30 fffffa80`051c8320 00000000`00000043 00000000`77688ba8 : fltmgr!FltpDispatch+0xcf
fffff880`09acea60 fffff800`02a7b4f5 : 00000000`00000001 00000000`00000001 fffff880`09aceb20 00000000`00000000 : nt!IoPageRead+0x252
fffff880`09aceaf0 fffff800`02aa48bb : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x255
fffff880`09aceb80 fffff800`02a8782e : 00000000`00000000 00000000`000143fc 00000000`17050e01 00000000`00000000 : nt!MmAccessFault+0x14bb
fffff880`09acece0 00000000`778451df : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`036fc000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778451df
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Ntfs!NtfsCommonRead+91d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
STACK_COMMAND: .cxr 0xfffff88009acdc00 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCommonRead+91d
BUCKET_ID: X64_0x24_Ntfs!NtfsCommonRead+91d
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100710-21325-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a51000 PsLoadedModuleList = 0xfffff800`02c8ee50
Debug session time: Fri Oct 8 05:17:40.329 2010 (GMT-5)
System Uptime: 0 days 1:09:58.311
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff88011e634c3, fffff8800951f3e0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+1b54c3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88011e634c3, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800951f3e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nvlddmkm+1b54c3
fffff880`11e634c3 493b5008 cmp rdx,qword ptr [r8+8]
CONTEXT: fffff8800951f3e0 -- (.cxr 0xfffff8800951f3e0)
rax=ff00f8800811fa20 rbx=fffff8800951fe40 rcx=fffff8800951fe70
rdx=fffffa8004239060 rsi=0000000000000000 rdi=fffff8800951fe70
rip=fffff88011e634c3 rsp=fffff8800951fdb0 rbp=fffffa80041df470
r8=ff00f8800811fa20 r9=fffff880128de730 r10=fffffa8004239060
r11=000003d17e1d8500 r12=fffff88009520870 r13=0000000040200000
r14=0000000000184000 r15=fffffa8005585000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nvlddmkm+0x1b54c3:
fffff880`11e634c3 493b5008 cmp rdx,qword ptr [r8+8] ds:002b:ff00f880`0811fa28=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: left4dead2.exe
CURRENT_IRQL: e
LAST_CONTROL_TRANSFER: from fffff8800951fe40 to fffff88011e634c3
STACK_TEXT:
fffff880`0951fdb0 fffff880`0951fe40 : fffff900`c08b9910 00000000`00000000 fffff880`11e2ca68 fffff880`0951fe70 : nvlddmkm+0x1b54c3
fffff880`0951fdb8 fffff900`c08b9910 : 00000000`00000000 fffff880`11e2ca68 fffff880`0951fe70 fffff880`11e8c758 : 0xfffff880`0951fe40
fffff880`0951fdc0 00000000`00000000 : fffff880`11e2ca68 fffff880`0951fe70 fffff880`11e8c758 000003d1`7e1d8500 : 0xfffff900`c08b9910
FOLLOWUP_IP:
nvlddmkm+1b54c3
fffff880`11e634c3 493b5008 cmp rdx,qword ptr [r8+8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nvlddmkm+1b54c3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c37918e
STACK_COMMAND: .cxr 0xfffff8800951f3e0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nvlddmkm+1b54c3
BUCKET_ID: X64_0x3B_nvlddmkm+1b54c3
Followup: MachineOwner
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100510-19921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a52000 PsLoadedModuleList = 0xfffff800`02c8fe50
Debug session time: Tue Oct 5 23:42:42.668 2010 (GMT-5)
System Uptime: 0 days 16:43:15.010
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3D, {fffff88002eaf100, 0, 0, fffff88000fbccee}
Probably caused by : ataport.SYS ( ataport!AtaPortReadPortBufferUshort+e )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: fffff88002eaf100
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: fffff88000fbccee
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3D
PROCESS_NAME: System
CURRENT_IRQL: 8
EXCEPTION_RECORD: fffff88002eaf898 -- (.exr 0xfffff88002eaf898)
ExceptionAddress: fffff88000fbccee (ataport!AtaPortReadPortBufferUshort+0x000000000000000e)
ExceptionCode: c0000096
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff88002eaf940 -- (.trap 0xfffff88002eaf940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000008000 rbx=0000000000000000 rcx=0000000000000004
rdx=000000000000a000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000fbccee rsp=fffff88002eafad8 rbp=fffffa80049c26a8
r8=0000000000000004 r9=fffffa80049c2658 r10=00000000000160a7
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ataport!AtaPortReadPortBufferUshort+0xe:
fffff880`00fbccee 66f36d rep ins word ptr [rdi],dx
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ac1ca9 to fffff80002ac2740
STACK_TEXT:
fffff880`02eae848 fffff800`02ac1ca9 : 00000000`0000003d fffff880`02eaf100 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`02eae850 fffff800`02abdfe9 : fffffa80`069adf10 fffff880`0149d831 fffff880`02eaf100 fffff800`02aef668 : nt!KiBugCheckDispatch+0x69
fffff880`02eae990 fffff800`02ae840d : fffff800`02cd0120 fffff800`02c118f4 fffff800`02a52000 fffff880`02eaf898 : nt!KiInterruptHandler+0x29
fffff880`02eae9c0 fffff800`02aefa90 : fffff800`02c118ec fffff880`02eaea38 fffff880`02eaf898 fffff800`02a52000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02eae9f0 fffff800`02afc9ef : fffff880`02eaf898 fffff880`02eaf100 fffff880`00000000 ff00fa80`05017380 : nt!RtlDispatchException+0x410
fffff880`02eaf0d0 fffff800`02ac1d82 : fffff880`02eaf898 fffffa80`0441ec00 fffff880`02eaf940 fffffa80`0453df68 : nt!KiDispatchException+0x16f
fffff880`02eaf760 fffff800`02ac068a : fffffa80`0453db80 fffff880`00fb87ef fffffa80`04bd39e0 00000000`00000001 : nt!KiExceptionDispatch+0xc2
fffff880`02eaf940 fffff880`00fbccee : fffff880`00fb08ff 00000000`00000008 fffffa80`0453db80 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`02eafad8 fffff880`00fb08ff : 00000000`00000008 fffffa80`0453db80 00000000`00000000 fffffa80`0453db80 : ataport!AtaPortReadPortBufferUshort+0xe
fffff880`02eafae0 fffff880`00faf83a : fffffa80`0441ec04 fffffa80`0441ec04 fffff880`02eafc70 fffffa80`0453df68 : atapi!AtapiProcessInterrupt+0x19b
fffff880`02eafb40 fffff800`02abe339 : fffffa80`0441ec58 fffffa80`0441ecc8 fffff880`02eafc70 fffffa80`0441ecc0 : atapi!AtapiHwInterrupt+0x156
fffff880`02eafba0 fffff800`02abe118 : 00000000`00000001 fffffa80`0453db80 00000000`00000000 fffff880`00fc30fc : nt!KiScanInterruptObjectList+0x69
fffff880`02eafbf0 fffff800`02acaec2 : fffff880`02e87180 fffff880`00000001 00000000`00000001 fffff880`00000000 : nt!KiChainedDispatch+0x128
fffff880`02eafd80 00000000`00000000 : fffff880`02eb0000 fffff880`02eaa000 fffff880`02eafd40 00000000`00000000 : nt!KiIdleLoop+0x32
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!AtaPortReadPortBufferUshort+e
fffff880`00fbccee 66f36d rep ins word ptr [rdi],dx
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: ataport!AtaPortReadPortBufferUshort+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0x3D_ataport!AtaPortReadPortBufferUshort+e
BUCKET_ID: X64_0x3D_ataport!AtaPortReadPortBufferUshort+e
Followup: MachineOwner
start end module name
fffff880`11cae000 fffff880`1293fe00 nvlddmkm T (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\system32\DRIVERS\nvlddmkm.sys
Image name: nvlddmkm.sys
Timestamp: Sat Jul 10 00:15:58 2010 (4C37918E)
CheckSum: 00CA10CD
ImageSize: 00C91E00
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\100810-21621- 01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a07000 PsLoadedModuleList = 0xfffff800`02c44e50
Debug session time: Fri Oct 8 19:45:15.298 2010 (GMT-5)
System Uptime: 0 days 0:20:13.641
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff960001696ea, fffff8800a29f0a0, 0}
Probably caused by : win32k.sys ( win32k!xxxRealInternalGetMessage+2aa )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960001696ea, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800a29f0a0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
win32k!xxxRealInternalGetMessage+2aa
fffff960`001696ea 488b8b70010000 mov rcx,qword ptr [rbx+170h]
CONTEXT: fffff8800a29f0a0 -- (.cxr 0xfffff8800a29f0a0)
rax=0000000000000001 rbx=ff00f900c1f7bc30 rcx=0000000000000000
rdx=8000000000040000 rsi=0000000000000001 rdi=0000000000000000
rip=fffff960001696ea rsp=fffff8800a29fa70 rbp=fffff8800a29fca0
r8=00000000001284c8 r9=0000000000000000 r10=fffffffffffffffe
r11=00000000000ab8af r12=0000000000000001 r13=fffff8800a29fbd8
r14=00000000000025ff r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
win32k!xxxRealInternalGetMessage+0x2aa:
fffff960`001696ea 488b8b70010000 mov rcx,qword ptr [rbx+170h] ds:002b:ff00f900`c1f7bda0=????????????????
Resetting default scope
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: taskmgr.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff96000169d21 to fffff960001696ea
STACK_TEXT:
fffff880`0a29fa70 fffff960`00169d21 : 00000000`00000000 fffff800`000025ff 00000000`00000000 fffffa80`ffffffff : win32k!xxxRealInternalGetMessage+0x2aa
fffff880`0a29fb50 fffff960`0016b725 : 00000000`00000020 fffff960`0017956e 00ff0000`0020f288 fffff880`0a29fca0 : win32k!xxxInternalGetMessage+0x35
fffff880`0a29fb90 fffff800`02a76993 : fffffa80`04093b60 00000000`ff7d0000 00000000`00000020 00000000`00387ea0 : win32k!NtUserGetMessage+0x75
fffff880`0a29fc20 00000000`779fc92a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0020f1f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779fc92a
FOLLOWUP_IP:
win32k!xxxRealInternalGetMessage+2aa
fffff960`001696ea 488b8b70010000 mov rcx,qword ptr [rbx+170h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!xxxRealInternalGetMessage+2aa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c483f
STACK_COMMAND: .cxr 0xfffff8800a29f0a0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_win32k!xxxRealInternalGetMessage+2aa
BUCKET_ID: X64_0x3B_win32k!xxxRealInternalGetMessage+2aa
Followup: MachineOwner
start end module name
fffff800`00ba6000 fffff800`00bb0000 kdcom kdcom.dll Tue Jul 14 04:31:07 2009 (4A5BDFDB)
fffff800`02a07000 fffff800`02fe3000 nt ntkrnlmp.exe Sat Jun 19 07:16:41 2010 (4C1C44A9)
fffff800`02fe3000 fffff800`0302c000 hal hal.dll Tue Jul 14 04:27:36 2009 (4A5BDF08)
fffff880`00c00000 fffff880`00c2a000 ataport ataport.SYS Tue Jul 14 02:19:52 2009 (4A5BC118)
fffff880`00c2a000 fffff880`00c35000 amdxata amdxata.sys Tue May 19 20:56:59 2009 (4A12F2EB)
fffff880`00c35000 fffff880`00c81000 fltmgr fltmgr.sys Tue Jul 14 02:19:59 2009 (4A5BC11F)
fffff880`00c8c000 fffff880`00c99000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 04:29:09 2009 (4A5BDF65)
fffff880`00c99000 fffff880`00cad000 PSHED PSHED.dll Tue Jul 14 04:32:23 2009 (4A5BE027)
fffff880`00cad000 fffff880`00d0b000 CLFS CLFS.SYS Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00d0b000 fffff880`00dcb000 CI CI.dll Tue Jul 14 04:32:13 2009 (4A5BE01D)
fffff880`00dcb000 fffff880`00de5000 mountmgr mountmgr.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00de5000 fffff880`00dee000 atapi atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e0d000 vdrvroot vdrvroot.sys Tue Jul 14 03:01:31 2009 (4A5BCADB)
fffff880`00e0d000 fffff880`00e22000 partmgr partmgr.sys Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`00e22000 fffff880`00e37000 volmgr volmgr.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`00e37000 fffff880`00e93000 volmgrx volmgrx.sys Tue Jul 14 02:20:33 2009 (4A5BC141)
fffff880`00e93000 fffff880`00e9a000 pciide pciide.sys Tue Jul 14 02:19:49 2009 (4A5BC115)
fffff880`00e9a000 fffff880`00eaa000 PCIIDEX PCIIDEX.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`00eae000 fffff880`00f52000 Wdf01000 Wdf01000.sys Tue Jul 14 02:22:07 2009 (4A5BC19F)
fffff880`00f52000 fffff880`00f61000 WDFLDR WDFLDR.SYS Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`00f61000 fffff880`00fb8000 ACPI ACPI.sys Tue Jul 14 02:19:34 2009 (4A5BC106)
fffff880`00fb8000 fffff880`00fc1000 WMILIB WMILIB.SYS Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`00fc1000 fffff880`00fcb000 msisadrv msisadrv.sys Tue Jul 14 02:19:26 2009 (4A5BC0FE)
fffff880`00fcb000 fffff880`00ffe000 pci pci.sys Tue Jul 14 02:19:51 2009 (4A5BC117)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Tue Jul 14 02:20:08 2009 (4A5BC128)
fffff880`0104c000 fffff880`01086000 rdyboost rdyboost.sys Tue Jul 14 02:34:34 2009 (4A5BC48A)
fffff880`01086000 fffff880`010c0000 fvevol fvevol.sys Sat Sep 26 05:34:26 2009 (4ABD7DB2)
fffff880`010c0000 fffff880`010d6000 disk disk.sys Tue Jul 14 02:19:57 2009 (4A5BC11D)
fffff880`010eb000 fffff880`010ff000 fileinfo fileinfo.sys Tue Jul 14 02:34:25 2009 (4A5BC481)
fffff880`010ff000 fffff880`0115d000 msrpc msrpc.sys Tue Jul 14 02:21:32 2009 (4A5BC17C)
fffff880`0115d000 fffff880`011d0000 cng cng.sys Tue Jul 14 02:49:40 2009 (4A5BC814)
fffff880`011d0000 fffff880`01200000 CLASSPNP CLASSPNP.SYS Tue Jul 14 02:19:58 2009 (4A5BC11E)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Tue Jul 14 02:20:54 2009 (4A5BC156)
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Tue Jul 14 02:19:27 2009 (4A5BC0FF)
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Tue Jul 14 02:19:45 2009 (4A5BC111)
fffff880`01235000 fffff880`0123d000 AtiPcie AtiPcie.sys Tue May 05 18:00:22 2009 (4A005486)
fffff880`01248000 fffff880`013eb000 Ntfs Ntfs.sys Tue Jul 14 02:20:47 2009 (4A5BC14F)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Tue Jul 14 02:21:08 2009 (4A5BC164)
fffff880`0144a000 fffff880`0145a000 vmstorfl vmstorfl.sys Tue Jul 14 02:42:54 2009 (4A5BC67E)
fffff880`0145e000 fffff880`01550000 ndis ndis.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`01550000 fffff880`015b0000 NETIO NETIO.SYS Tue Jul 14 02:21:46 2009 (4A5BC18A)
fffff880`015b0000 fffff880`015db000 ksecpkg ksecpkg.sys Fri Dec 11 08:03:32 2009 (4B21E0B4)
fffff880`015db000 fffff880`015e3000 spldr spldr.sys Mon May 11 19:56:27 2009 (4A0858BB)
fffff880`015e3000 fffff880`015f5000 mup mup.sys Tue Jul 14 02:23:45 2009 (4A5BC201)
fffff880`015f5000 fffff880`015fe000 hwpolicy hwpolicy.sys Tue Jul 14 02:19:22 2009 (4A5BC0FA)
fffff880`01603000 fffff880`01800000 tcpip tcpip.sys Mon Jun 14 06:39:04 2010 (4C15A458)
fffff880`02a00000 fffff880`02a8a000 afd afd.sys Tue Jul 14 02:21:40 2009 (4A5BC184)
fffff880`02a8a000 fffff880`02acf000 netbt netbt.sys Tue Jul 14 02:21:28 2009 (4A5BC178)
fffff880`02acf000 fffff880`02ad8000 wfplwf wfplwf.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`02b02000 fffff880`02b2c000 cdrom cdrom.sys Tue Jul 14 02:19:54 2009 (4A5BC11A)
fffff880`02b2c000 fffff880`02b35000 Null Null.SYS Tue Jul 14 02:19:37 2009 (4A5BC109)
fffff880`02b35000 fffff880`02b3c000 Beep Beep.SYS Tue Jul 14 03:00:13 2009 (4A5BCA8D)
fffff880`02b3c000 fffff880`02b4a000 vga vga.sys Tue Jul 14 02:38:47 2009 (4A5BC587)
fffff880`02b4a000 fffff880`02b6f000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:38:51 2009 (4A5BC58B)
fffff880`02b6f000 fffff880`02b7f000 watchdog watchdog.sys Tue Jul 14 02:37:35 2009 (4A5BC53F)
fffff880`02b7f000 fffff880`02b88000 RDPCDD RDPCDD.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02b88000 fffff880`02b91000 rdpencdd rdpencdd.sys Tue Jul 14 03:16:34 2009 (4A5BCE62)
fffff880`02b91000 fffff880`02b9a000 rdprefmp rdprefmp.sys Tue Jul 14 03:16:35 2009 (4A5BCE63)
fffff880`02b9a000 fffff880`02ba5000 Msfs Msfs.SYS Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`02ba5000 fffff880`02bb6000 Npfs Npfs.SYS Tue Jul 14 02:19:48 2009 (4A5BC114)
fffff880`02bb6000 fffff880`02bd4000 tdx tdx.sys Tue Jul 14 02:21:15 2009 (4A5BC16B)
fffff880`02bd4000 fffff880`02be1000 TDI TDI.SYS Tue Jul 14 02:21:18 2009 (4A5BC16E)
fffff880`03e00000 fffff880`03e83000 csc csc.sys Tue Jul 14 02:24:26 2009 (4A5BC22A)
fffff880`03e83000 fffff880`03ea1000 dfsc dfsc.sys Tue Jul 14 02:23:44 2009 (4A5BC200)
fffff880`03ea1000 fffff880`03eb2000 blbdrive blbdrive.sys Tue Jul 14 02:35:59 2009 (4A5BC4DF)
fffff880`03ec8000 fffff880`03eee000 pacer pacer.sys Tue Jul 14 03:09:41 2009 (4A5BCCC5)
fffff880`03eee000 fffff880`03efd000 netbios netbios.sys Tue Jul 14 03:09:26 2009 (4A5BCCB6)
fffff880`03efd000 fffff880`03f1a000 serial serial.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`03f1a000 fffff880`03f35000 wanarp wanarp.sys Tue Jul 14 03:10:21 2009 (4A5BCCED)
fffff880`03f35000 fffff880`03f49000 termdd termdd.sys Tue Jul 14 03:16:36 2009 (4A5BCE64)
fffff880`03f49000 fffff880`03f9a000 rdbss rdbss.sys Tue Jul 14 02:24:09 2009 (4A5BC219)
fffff880`03f9a000 fffff880`03fa6000 nsiproxy nsiproxy.sys Tue Jul 14 02:21:02 2009 (4A5BC15E)
fffff880`03fa6000 fffff880`03fb1000 mssmbios mssmbios.sys Tue Jul 14 02:31:10 2009 (4A5BC3BE)
fffff880`03fb1000 fffff880`03fc0000 discache discache.sys Tue Jul 14 02:37:18 2009 (4A5BC52E)
fffff880`03fc0000 fffff880`03fe2000 avipbb avipbb.sys Mon Feb 22 12:08:50 2010 (4B8257B2)
fffff880`03fe2000 fffff880`03ffd000 raspppoe raspppoe.sys Tue Jul 14 03:10:17 2009 (4A5BCCE9)
fffff880`04007000 fffff880`0402d000 tunnel tunnel.sys Tue Jul 14 03:09:37 2009 (4A5BCCC1)
fffff880`0402d000 fffff880`04042000 amdppm amdppm.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
fffff880`04042000 fffff880`04136000 dxgkrnl dxgkrnl.sys Fri Oct 02 04:00:14 2009 (4AC5509E)
fffff880`04136000 fffff880`0418d000 Rt64win7 Rt64win7.sys Mon Mar 22 11:57:14 2010 (4BA73EFA)
fffff880`0418d000 fffff880`041b1000 rasl2tp rasl2tp.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`041b1000 fffff880`041bd000 ndistapi ndistapi.sys Tue Jul 14 03:10:00 2009 (4A5BCCD8)
fffff880`041bd000 fffff880`041ec000 ndiswan ndiswan.sys Tue Jul 14 03:10:11 2009 (4A5BCCE3)
fffff880`04235000 fffff880`04256000 raspptp raspptp.sys Tue Jul 14 03:10:18 2009 (4A5BCCEA)
fffff880`04256000 fffff880`04270000 rassstp rassstp.sys Tue Jul 14 03:10:25 2009 (4A5BCCF1)
fffff880`04270000 fffff880`0427b000 rdpbus rdpbus.sys Tue Jul 14 03:17:46 2009 (4A5BCEAA)
fffff880`0427b000 fffff880`0428a000 kbdclass kbdclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`0428a000 fffff880`04299000 mouclass mouclass.sys Tue Jul 14 02:19:50 2009 (4A5BC116)
fffff880`04299000 fffff880`0429a480 swenum swenum.sys Tue Jul 14 03:00:18 2009 (4A5BCA92)
fffff880`0429b000 fffff880`042de000 ks ks.sys Thu Mar 04 06:32:25 2010 (4B8F37D9)
fffff880`042de000 fffff880`042f0000 umbus umbus.sys Tue Jul 14 03:06:56 2009 (4A5BCC20)
fffff880`042f0000 fffff880`0434a000 usbhub usbhub.sys Tue Jul 14 03:07:09 2009 (4A5BCC2D)
fffff880`0434a000 fffff880`0435f000 NDProxy NDProxy.SYS Tue Jul 14 03:10:05 2009 (4A5BCCDD)
fffff880`0435f000 fffff880`043f5000 srv srv.sys Tue Jun 22 06:21:11 2010 (4C202C27)
fffff880`04600000 fffff880`04611000 usbehci usbehci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`04611000 fffff880`04635000 HDAudBus HDAudBus.sys Tue Jul 14 03:06:13 2009 (4A5BCBF5)
fffff880`04635000 fffff880`04652000 parport parport.sys Tue Jul 14 03:00:40 2009 (4A5BCAA8)
fffff880`04652000 fffff880`0465e000 serenum serenum.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`0465e000 fffff880`0466e000 CompositeBus CompositeBus.sys Tue Jul 14 03:00:33 2009 (4A5BCAA1)
fffff880`0466e000 fffff880`04684000 AgileVpn AgileVpn.sys Tue Jul 14 03:10:24 2009 (4A5BCCF0)
fffff880`04684000 fffff880`05147a80 nvlddmkm nvlddmkm.sys Mon Sep 28 03:12:06 2009 (4ABFFF56)
fffff880`05149000 fffff880`0514a180 nvBridge nvBridge.kmd Mon Sep 28 02:46:14 2009 (4ABFF946)
fffff880`0514b000 fffff880`05191000 dxgmms1 dxgmms1.sys Tue Jul 14 02:38:32 2009 (4A5BC578)
fffff880`05191000 fffff880`0519e000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 15:17:04 2009 (4A1151C0)
fffff880`0519e000 fffff880`051a9000 usbohci usbohci.sys Tue Jul 14 03:06:30 2009 (4A5BCC06)
fffff880`051a9000 fffff880`051ff000 USBPORT USBPORT.SYS Tue Jul 14 03:06:31 2009 (4A5BCC07)
fffff880`05200000 fffff880`0524e000 mrxsmb10 mrxsmb10.sys Sat Feb 27 09:52:28 2010 (4B88CF3C)
fffff880`05252000 fffff880`0531a000 HTTP HTTP.sys Tue Jul 14 02:22:16 2009 (4A5BC1A8)
fffff880`0531a000 fffff880`05328000 crashdmp crashdmp.sys Tue Jul 14 03:01:01 2009 (4A5BCABD)
fffff880`05328000 fffff880`05334000 dump_dumpata dump_dumpata.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`05334000 fffff880`0533d000 dump_atapi dump_atapi.sys Tue Jul 14 02:19:47 2009 (4A5BC113)
fffff880`0533d000 fffff880`05350000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
fffff880`05350000 fffff880`0536e000 bowser bowser.sys Tue Jul 14 02:23:50 2009 (4A5BC206)
fffff880`0536e000 fffff880`05386000 mpsdrv mpsdrv.sys Tue Jul 14 03:08:25 2009 (4A5BCC79)
fffff880`05386000 fffff880`053b3000 mrxsmb mrxsmb.sys Sat Feb 27 09:52:19 2010 (4B88CF33)
fffff880`053b3000 fffff880`053d6000 mrxsmb20 mrxsmb20.sys Sat Feb 27 09:52:26 2010 (4B88CF3A)
fffff880`06600000 fffff880`0660e000 kbdhid kbdhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`0660e000 fffff880`0662b000 cdfs cdfs.sys Tue Jul 14 02:19:46 2009 (4A5BC112)
fffff880`0662b000 fffff880`0664e000 luafv luafv.sys Tue Jul 14 02:26:13 2009 (4A5BC295)
fffff880`0664e000 fffff880`0666b000 avgntflt avgntflt.sys Thu Feb 11 17:12:02 2010 (4B741E42)
fffff880`0666b000 fffff880`0668c000 WudfPf WudfPf.sys Tue Jul 14 03:05:37 2009 (4A5BCBD1)
fffff880`0668c000 fffff880`066a1000 lltdio lltdio.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`066a1000 fffff880`066b9000 rspndr rspndr.sys Tue Jul 14 03:08:50 2009 (4A5BCC92)
fffff880`066c4000 fffff880`0691fd80 RTKVHD64 RTKVHD64.sys Fri Sep 03 11:02:27 2010 (4C80AB93)
fffff880`06920000 fffff880`0695d000 portcls portcls.sys Tue Jul 14 03:06:27 2009 (4A5BCC03)
fffff880`0695d000 fffff880`0697f000 drmk drmk.sys Tue Jul 14 04:01:25 2009 (4A5BD8E5)
fffff880`0697f000 fffff880`06984200 ksthunk ksthunk.sys Tue Jul 14 03:00:19 2009 (4A5BCA93)
fffff880`06985000 fffff880`06991000 Dxapi Dxapi.sys Tue Jul 14 02:38:28 2009 (4A5BC574)
fffff880`0699f000 fffff880`069bc000 usbccgp usbccgp.sys Tue Jul 14 03:06:45 2009 (4A5BCC15)
fffff880`069bc000 fffff880`069bdf00 USBD USBD.SYS Tue Jul 14 03:06:23 2009 (4A5BCBFF)
fffff880`069be000 fffff880`069cc000 hidusb hidusb.sys Tue Jul 14 03:06:22 2009 (4A5BCBFE)
fffff880`069cc000 fffff880`069e5000 HIDCLASS HIDCLASS.SYS Tue Jul 14 03:06:21 2009 (4A5BCBFD)
fffff880`069e5000 fffff880`069ed080 HIDPARSE HIDPARSE.SYS Tue Jul 14 03:06:17 2009 (4A5BCBF9)
fffff880`069ee000 fffff880`069fb000 mouhid mouhid.sys Tue Jul 14 03:00:20 2009 (4A5BCA94)
fffff880`07e71000 fffff880`07e7c000 asyncmac asyncmac.sys Tue Jul 14 03:10:13 2009 (4A5BCCE5)
fffff880`07e7c000 fffff880`07e8a000 monitor monitor.sys Tue Jul 14 02:38:52 2009 (4A5BC58C)
fffff880`07e95000 fffff880`07f3b000 peauth peauth.sys Tue Jul 14 04:01:19 2009 (4A5BD8DF)
fffff880`07f3b000 fffff880`07f46000 secdrv secdrv.SYS Wed Sep 13 16:18:38 2006 (4508052E)
fffff880`07f46000 fffff880`07f73000 srvnet srvnet.sys Tue Jun 22 06:20:32 2010 (4C202C00)
fffff880`07f73000 fffff880`07f85000 tcpipreg tcpipreg.sys Tue Jul 14 03:09:49 2009 (4A5BCCCD)
fffff880`07f85000 fffff880`07fed000 srv2 srv2.sys Tue Jun 22 06:20:47 2010 (4C202C0F)
fffff880`07fed000 fffff880`07ffb000 NTACCESS_64 NTACCESS_64.sys Wed Apr 27 12:55:40 2005 (426F619C)
fffff960`000a0000 fffff960`003af000 win32k win32k.sys Sat Jun 19 07:31:59 2010 (4C1C483F)
fffff960`00580000 fffff960`0058a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00660000 fffff960`00687000 cdd cdd.dll Wed May 19 22:48:26 2010 (4BF4408A)
Unloaded modules:
fffff880`07e00000 fffff880`07e71000 spsys.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`04685000 fffff880`05149000 nvlddmkm.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`06991000 fffff880`0699f000 monitor.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`013eb000 fffff880`013f9000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`010d6000 fffff880`010e2000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`0123d000 fffff880`01246000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`02aef000 fffff880`02b02000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
i think the problem is been solved,bsod 2 days didn't appear. thanks everyone's help