Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122810-55739-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5e000 PsLoadedModuleList = 0xfffff800`02e9be50
Debug session time: Tue Dec 28 21:50:00.633 2010 (UTC - 5:00)
System Uptime: 0 days 0:26:17.397
Loading Kernel Symbols
...............................................................
...........................Unable to load image Unknown_Module_00000000`00000000, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`00000000
Unable to add module at 00000000`00000000
Loading User Symbols
Missing image name, possible paged-out or corrupt data.
Loading unloaded module list
...Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
....Missing image name, possible paged-out or corrupt data.
....Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, fffff80002cd9e20}
Probably caused by : ntkrnlmp.exe ( nt!KiProcessExpiredTimerList+110 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cd9e20, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'ndis' and 'Unknown_Module_fffff880`020d1490' overlap
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f060e0
0000000000000000
CURRENT_IRQL: 0
FAULTING_IP:
nt!KiProcessExpiredTimerList+110
fffff800`02cd9e20 f00fba2f07 lock bts dword ptr [rdi],7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from fffff80002cdc24a to fffff880049c87f2
STACK_TEXT:
fffff800`04a08c98 fffff800`02cdc24a : 00000000`00223019 fffffa80`0564a218 fffff800`02e56c40 00000000`00000001 : 0xfffff880`049c87f2
fffff800`04a08ca0 fffff800`02cd6ebc : fffff800`02e48e80 fffff800`00000000 00000000`00000000 fffff880`0520f480 : nt!PoIdle+0x53a
fffff800`04a08d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+110
fffff800`02cd9e20 f00fba2f07 lock bts dword ptr [rdi],7
SYMBOL_NAME: nt!KiProcessExpiredTimerList+110
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiProcessExpiredTimerList+110
BUCKET_ID: X64_0xA_nt!KiProcessExpiredTimerList+110
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122810-46503-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump does not have process information
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
Debug session time: Tue Dec 28 18:55:18.519 2010 (UTC - 5:00)
System Uptime: 0 days 0:12:17.610
Loading Kernel Symbols
...............................................................
...........................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 8, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
+3332333431616164
00000000`00000000 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: fffff80000ba2600 -- (.trap 0xfffff80000ba2600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8003dbd300
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff80000ba2798 rbp=0000000000000001
r8=00000000ae3106c1 r9=0000000001cba6ea r10=0000000000000000
r11=fffff80002dfbe80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
00000000`00000000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c80ca9 to fffff80002c81740
FAILED_INSTRUCTION_ADDRESS:
+3332333431616164
00000000`00000000 ?? ???
STACK_TEXT:
fffff800`00ba24b8 fffff800`02c80ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff800`00ba24c0 fffff800`02c7f920 : 00000000`00000000 fffff800`00ba2848 fffff800`02dfbe80 fffff800`00ba2e88 : nt!KiBugCheckDispatch+0x69
fffff800`00ba2600 00000000`00000000 : fffff800`02c8d29e fffff800`00000000 00000000`00000000 00000000`40b41288 : nt!KiPageFault+0x260
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02c7f920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+260
BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122910-35427-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5a000 PsLoadedModuleList = 0xfffff800`02e97e50
Debug session time: Wed Dec 29 10:15:11.145 2010 (UTC - 5:00)
System Uptime: 0 days 0:02:30.314
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ffc, 2, 0, fffff88001e2cb85}
Unable to load image \SystemRoot\System32\DRIVERS\fvevol.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for fvevol.sys
*** ERROR: Module load completed but symbols could not be loaded for fvevol.sys
Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : fvevol.sys ( fvevol+2cb85 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000ffc, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001e2cb85, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f020e0
0000000000000ffc
CURRENT_IRQL: 2
FAULTING_IP:
fvevol+2cb85
fffff880`01e2cb85 8b040a mov eax,dword ptr [rdx+rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800391b4d0 -- (.trap 0xfffff8800391b4d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000031440 rbx=0000000000000000 rcx=000000fffffa9000
rdx=ffffff0000057ffc rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001e2cb85 rsp=fffff8800391b660 rbp=0000000000000000
r8=0000000000001000 r9=000000000000000e r10=0000000000401902
r11=000000fffffa8004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
fvevol+0x2cb85:
fffff880`01e2cb85 8b040a mov eax,dword ptr [rdx+rcx] ds:3022:00000000`00000ffc=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cc9ca9 to fffff80002cca740
STACK_TEXT:
fffff880`0391b388 fffff800`02cc9ca9 : 00000000`0000000a 00000000`00000ffc 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0391b390 fffff800`02cc8920 : 00000000`00401902 fffffa80`03839e9b 00000000`00000050 00000000`1433743f : nt!KiBugCheckDispatch+0x69
fffff880`0391b4d0 fffff880`01e2cb85 : fffff880`01e01043 fffff800`02cccd26 fffffa80`03839e0b fffffa80`04465940 : nt!KiPageFault+0x260
fffff880`0391b660 fffff880`01e01043 : fffff800`02cccd26 fffffa80`03839e0b fffffa80`04465940 fffffa80`03839bd0 : fvevol+0x2cb85
fffff880`0391b668 fffff800`02cccd26 : fffffa80`03839e0b fffffa80`04465940 fffffa80`03839bd0 fffffa80`03839bd0 : fvevol+0x1043
fffff880`0391b670 fffff880`00c018ee : 00000000`00000001 000000da`00000001 fffff880`0391bbf0 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`0391b750 fffff800`02cccd26 : 00000000`00000000 fffff880`058f91cf fffffa80`05531040 fffff800`02e59880 : CLASSPNP!TransferPktComplete+0x1ce
fffff880`0391b7d0 fffff880`0138341a : fffffa80`043ad1a0 00000000`00000001 fffffa80`03823b80 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`0391b8b0 fffff880`01383242 : fffffa80`03823b80 fffff880`00000001 00000000`d6094380 00000000`d6094380 : ataport!IdeCompleteScsiIrp+0x62
fffff880`0391b8e0 fffff880`0137de32 : 00000000`00000002 00000000`00000000 00000000`00000001 fffff880`058fe49e : ataport!IdeCommonCrbCompletion+0x5a
fffff880`0391b910 fffff880`013867ed : fffffa80`043ad1a0 fffffa80`03823b80 00000000`00000000 fffff880`0391baa8 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`0391ba40 fffff880`013860ec : fffffa80`043ad1a0 00000000`00000000 fffffa80`043ad1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`0391bb70 fffff880`011164ce : fffffa80`033da000 fffff880`0391bc58 fffffa80`043ad050 fffffa80`033da750 : ataport!IdePortCompletionDpc+0x1a8
fffff880`0391bc30 fffffa80`033da000 : fffff880`0391bc58 fffffa80`043ad050 fffffa80`033da750 fffff880`009e8180 : sptd+0x424ce
fffff880`0391bc38 fffff880`0391bc58 : fffffa80`043ad050 fffffa80`033da750 fffff880`009e8180 00000000`00000000 : 0xfffffa80`033da000
fffff880`0391bc40 fffffa80`043ad050 : fffffa80`033da750 fffff880`009e8180 00000000`00000000 fffff880`009ecec0 : 0xfffff880`0391bc58
fffff880`0391bc48 fffffa80`033da750 : fffff880`009e8180 00000000`00000000 fffff880`009ecec0 00000000`00000022 : 0xfffffa80`043ad050
fffff880`0391bc50 fffff880`009e8180 : 00000000`00000000 fffff880`009ecec0 00000000`00000022 00000000`00000000 : 0xfffffa80`033da750
fffff880`0391bc58 00000000`00000000 : fffff880`009ecec0 00000000`00000022 00000000`00000000 00000000`00000000 : 0xfffff880`009e8180
STACK_COMMAND: kb
FOLLOWUP_IP:
fvevol+2cb85
fffff880`01e2cb85 8b040a mov eax,dword ptr [rdx+rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: fvevol+2cb85
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fvevol
IMAGE_NAME: fvevol.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4abd7db2
FAILURE_BUCKET_ID: X64_0xD1_fvevol+2cb85
BUCKET_ID: X64_0xD1_fvevol+2cb85
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000ffc, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001e2cb85, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000ffc
CURRENT_IRQL: 2
FAULTING_IP:
fvevol+2cb85
fffff880`01e2cb85 8b040a mov eax,dword ptr [rdx+rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800391b4d0 -- (.trap 0xfffff8800391b4d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000031440 rbx=0000000000000000 rcx=000000fffffa9000
rdx=ffffff0000057ffc rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001e2cb85 rsp=fffff8800391b660 rbp=0000000000000000
r8=0000000000001000 r9=000000000000000e r10=0000000000401902
r11=000000fffffa8004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
fvevol+0x2cb85:
fffff880`01e2cb85 8b040a mov eax,dword ptr [rdx+rcx] ds:3022:00000000`00000ffc=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cc9ca9 to fffff80002cca740
STACK_TEXT:
fffff880`0391b388 fffff800`02cc9ca9 : 00000000`0000000a 00000000`00000ffc 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0391b390 fffff800`02cc8920 : 00000000`00401902 fffffa80`03839e9b 00000000`00000050 00000000`1433743f : nt!KiBugCheckDispatch+0x69
fffff880`0391b4d0 fffff880`01e2cb85 : fffff880`01e01043 fffff800`02cccd26 fffffa80`03839e0b fffffa80`04465940 : nt!KiPageFault+0x260
fffff880`0391b660 fffff880`01e01043 : fffff800`02cccd26 fffffa80`03839e0b fffffa80`04465940 fffffa80`03839bd0 : fvevol+0x2cb85
fffff880`0391b668 fffff800`02cccd26 : fffffa80`03839e0b fffffa80`04465940 fffffa80`03839bd0 fffffa80`03839bd0 : fvevol+0x1043
fffff880`0391b670 fffff880`00c018ee : 00000000`00000001 000000da`00000001 fffff880`0391bbf0 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`0391b750 fffff800`02cccd26 : 00000000`00000000 fffff880`058f91cf fffffa80`05531040 fffff800`02e59880 : CLASSPNP!TransferPktComplete+0x1ce
fffff880`0391b7d0 fffff880`0138341a : fffffa80`043ad1a0 00000000`00000001 fffffa80`03823b80 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`0391b8b0 fffff880`01383242 : fffffa80`03823b80 fffff880`00000001 00000000`d6094380 00000000`d6094380 : ataport!IdeCompleteScsiIrp+0x62
fffff880`0391b8e0 fffff880`0137de32 : 00000000`00000002 00000000`00000000 00000000`00000001 fffff880`058fe49e : ataport!IdeCommonCrbCompletion+0x5a
fffff880`0391b910 fffff880`013867ed : fffffa80`043ad1a0 fffffa80`03823b80 00000000`00000000 fffff880`0391baa8 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`0391ba40 fffff880`013860ec : fffffa80`043ad1a0 00000000`00000000 fffffa80`043ad1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`0391bb70 fffff880`011164ce : fffffa80`033da000 fffff880`0391bc58 fffffa80`043ad050 fffffa80`033da750 : ataport!IdePortCompletionDpc+0x1a8
fffff880`0391bc30 fffffa80`033da000 : fffff880`0391bc58 fffffa80`043ad050 fffffa80`033da750 fffff880`009e8180 : sptd+0x424ce
fffff880`0391bc38 fffff880`0391bc58 : fffffa80`043ad050 fffffa80`033da750 fffff880`009e8180 00000000`00000000 : 0xfffffa80`033da000
fffff880`0391bc40 fffffa80`043ad050 : fffffa80`033da750 fffff880`009e8180 00000000`00000000 fffff880`009ecec0 : 0xfffff880`0391bc58
fffff880`0391bc48 fffffa80`033da750 : fffff880`009e8180 00000000`00000000 fffff880`009ecec0 00000000`00000022 : 0xfffffa80`043ad050
fffff880`0391bc50 fffff880`009e8180 : 00000000`00000000 fffff880`009ecec0 00000000`00000022 00000000`00000000 : 0xfffffa80`033da750
fffff880`0391bc58 00000000`00000000 : fffff880`009ecec0 00000000`00000022 00000000`00000000 00000000`00000000 : 0xfffff880`009e8180
STACK_COMMAND: kb
FOLLOWUP_IP:
fvevol+2cb85
fffff880`01e2cb85 8b040a mov eax,dword ptr [rdx+rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: fvevol+2cb85
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fvevol
IMAGE_NAME: fvevol.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4abd7db2
FAILURE_BUCKET_ID: X64_0xD1_fvevol+2cb85
BUCKET_ID: X64_0xD1_fvevol+2cb85
Followup: MachineOwner
---------