Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-31090-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c1c000 PsLoadedModuleList = 0xfffff800`02e59e50
Debug session time: Tue Apr 19 11:57:09.418 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:18.869
Loading Kernel Symbols
................................................
Loading User Symbols
Loading unloaded module list
.......Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
....Missing image name, possible paged-out or corrupt data.
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 116, {fffffa800a5ee4e0, fffff8800cdaff08, ffffffffc000009a, 4}
Unable to load image Unknown_Module_00000000`000000b0, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Unknown_Module_00000000`000000b0
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_00000000`000000b0
Unknown module 'Unknown_Module_00000000_000000b0' found on stack, using vad to reload module.
!vad_reload -1 0xb0
fffffa80`09b772c0: Unable to get VAD.PrivateMemory
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa800a5ee4e0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff8800cdaff08, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000004, Optional internal context dependent data.
Debugging Details:
------------------
Unknown module 'Unknown_Module_00000000_000000b0' found on stack, using vad to reload module.
!vad_reload -1 0xb0
fffffa80`09b772c0: Unable to get VAD.PrivateMemory
FAULTING_IP:
+3537303537613334
fffff880`0cdaff08 4883ec28 sub rsp,28h
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: Óystem
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`026ceb88 fffff880`04262000 : 00000000`00000116 fffffa80`0a5ee4e0 fffff880`0cdaff08 ffffffff`c000009a : nt!KeBugCheckEx
fffff880`026ceb90 00000000`00000116 : fffffa80`0a5ee4e0 fffff880`0cdaff08 ffffffff`c000009a 00000000`00000004 : 0xfffff880`04262000
fffff880`026ceb98 fffffa80`0a5ee4e0 : fffff880`0cdaff08 ffffffff`c000009a 00000000`00000004 00000000`00000001 : Unknown_Module_00000000_000000b0+0x66
fffff880`026ceba0 fffff880`0cdaff08 : ffffffff`c000009a 00000000`00000004 00000000`00000001 fffffa80`0a5ee4e0 : 0xfffffa80`0a5ee4e0
fffff880`026ceba8 ffffffff`c000009a : 00000000`00000004 00000000`00000001 fffffa80`0a5ee4e0 fffff880`04235867 : 0xfffff880`0cdaff08
fffff880`026cebb0 00000000`00000004 : 00000000`00000001 fffffa80`0a5ee4e0 fffff880`04235867 fffff880`0cdaff08 : 0xffffffff`c000009a
fffff880`026cebb8 00000000`00000001 : fffffa80`0a5ee4e0 fffff880`04235867 fffff880`0cdaff08 fffffa80`0a61c000 : 0x4
fffff880`026cebc0 fffffa80`0a5ee4e0 : fffff880`04235867 fffff880`0cdaff08 fffffa80`0a61c000 00000000`00000000 : 0x1
fffff880`026cebc8 fffff880`04235867 : fffff880`0cdaff08 fffffa80`0a61c000 00000000`00000000 ffffffff`c000009a : 0xfffffa80`0a5ee4e0
fffff880`026cebd0 fffff880`0cdaff08 : fffffa80`0a61c000 00000000`00000000 ffffffff`c000009a ffffffff`ff676980 : 0xfffff880`04235867
fffff880`026cebd8 fffffa80`0a61c000 : 00000000`00000000 ffffffff`c000009a ffffffff`ff676980 fffffa80`0b9e3410 : 0xfffff880`0cdaff08
fffff880`026cebe0 00000000`00000000 : ffffffff`c000009a ffffffff`ff676980 fffffa80`0b9e3410 00000000`00000000 : 0xfffffa80`0a61c000
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0x116_ANALYSIS_INCONCLUSIVE
BUCKET_ID: X64_0x116_ANALYSIS_INCONCLUSIVE
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041911-24897-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c68000 PsLoadedModuleList = 0xfffff800`02ea5e50
Debug session time: Tue Apr 19 11:51:14.015 2011 (UTC - 4:00)
System Uptime: 0 days 0:44:29.856
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3164366330623263
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f1b9f8 -- (.exr 0xfffff88002f1b9f8)
ExceptionAddress: fffff80002ce43f2 (nt!KiTimerExpiration+0x00000000000000f2)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002f1baa0 -- (.trap 0xfffff88002f1baa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=e56d695402170000 rbx=0000000000000000 rcx=fffffa800c28a060
rdx=0000000000000087 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ce43f2 rsp=fffff88002f1bc30 rbp=0000000000029c87
r8=fffffa800c402fe0 r9=00000000000000c0 r10=0000000000000087
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiTimerExpiration+0xf2:
fffff800`02ce43f2 48894808 mov qword ptr [rax+8],rcx ds:e56d6954`02170008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cd046e to fffff80002cd8710
STACK_TEXT:
fffff880`02f1aae8 fffff800`02cd046e : fffffa80`0a6aad30 fffffa80`00000001 fffff880`02f1b260 fffff800`02d05668 : nt!KeBugCheck
fffff880`02f1aaf0 fffff800`02cfe40d : fffff800`02ee6b7c fffff800`02e20ea4 fffff800`02c68000 fffff880`02f1b9f8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f1ab20 fffff800`02d05a90 : fffff800`02e27b34 fffff880`02f1ab98 fffff880`02f1b9f8 fffff800`02c68000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f1ab50 fffff800`02d129ef : fffff880`02f1b9f8 fffff880`02f1b260 fffff880`00000000 fffff880`009ea180 : nt!RtlDispatchException+0x410
fffff880`02f1b230 fffff800`02cd7d82 : fffff880`02f1b9f8 00000006`375bd239 fffff880`02f1baa0 fffff880`009ed668 : nt!KiDispatchException+0x16f
fffff880`02f1b8c0 fffff800`02cd668a : fffffa80`0b2d8000 fffff880`02f1bb00 00000000`00029c87 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02f1baa0 fffff800`02ce43f2 : 00000006`375b0ee6 fffff880`02f1bc58 00000000`00029c87 fffff880`009ed668 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f1bc30 fffff800`02ce3cb7 : 00000001`9607b7c0 00000001`00029c87 00000001`9607b7da 00000000`00000087 : nt!KiTimerExpiration+0xf2
fffff880`02f1bcd0 fffff800`02ce0eea : fffff880`009ea180 fffff880`009f4fc0 00000000`00000000 fffffa80`0b085210 : nt!KiRetireDpcList+0x277
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`02cd046e 90 nop
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050311-22963-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c18000 PsLoadedModuleList = 0xfffff800`02e5de90
Debug session time: Tue May 3 22:10:13.948 2011 (UTC - 4:00)
System Uptime: 0 days 0:56:45.259
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {60000, 2, 0, fffff80002dc26fb}
Unable to load image sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+ca7 )
Followup: Pool_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000060000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80002dc26fb, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+ca7
fffff800`02dc26fb 488b00 mov rax,qword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: shift2u.exe
TRAP_FRAME: fffff880009b0a00 -- (.trap 0xfffff880009b0a00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060000 rbx=0000000000000000 rcx=fffff80002e1fe10
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dc26fb rsp=fffff880009b0b90 rbp=0000000000000000
r8=fffffa800ae37100 r9=fffffa800ae370f8 r10=0000000000000001
r11=fffffa800ae37100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!ExDeferredFreePool+0xca7:
fffff800`02dc26fb 488b00 mov rax,qword ptr [rax] ds:9550:00000000`00060000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c97be9 to fffff80002c98640
STACK_TEXT:
fffff880`009b08b8 fffff800`02c97be9 : 00000000`0000000a 00000000`00060000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009b08c0 fffff800`02c96860 : fffffa80`0bcba220 fffffa80`0bcbaa90 fffffa80`0bd04020 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009b0a00 fffff800`02dc26fb : fffffa80`0bd21260 00000000`00000000 fffffa80`0af29530 fffff800`02c84e89 : nt!KiPageFault+0x260
fffff880`009b0b90 fffff800`02dc41a1 : 00000000`00000000 fffffa80`0d0719e0 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0xca7
fffff880`009b0c20 fffff880`0457d6f3 : fffffa80`0b823a90 fffffa80`0b7ce260 fffffa80`70627375 00000000`000003ed : nt!ExFreePoolWithTag+0x411
fffff880`009b0cd0 fffff880`0457dab7 : fffffa80`0d071902 fffffa80`0bd21260 00000000`ffffffff fffffa80`0aed4ea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xb2f
fffff880`009b0db0 fffff880`0457b64f : fffffa80`0aed4ea8 fffffa80`0aed41a0 fffffa80`0aed5040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`009b0e10 fffff880`0456cf89 : fffffa80`0aed4050 00000000`00000000 fffffa80`0aed4e02 fffffa80`0aed4ea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`009b0e50 fffff880`010e2ae8 : fffffa80`0af32000 fffffa80`0aed4ec0 fffffa80`0aed4e00 fffff880`009b0ef8 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`009b0e80 fffffa80`0af32000 : fffffa80`0aed4ec0 fffffa80`0aed4e00 fffff880`009b0ef8 00000000`00000000 : sptd+0x46ae8
fffff880`009b0e88 fffffa80`0aed4ec0 : fffffa80`0aed4e00 fffff880`009b0ef8 00000000`00000000 00000000`00000000 : 0xfffffa80`0af32000
fffff880`009b0e90 fffffa80`0aed4e00 : fffff880`009b0ef8 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`0aed4ec0
fffff880`009b0e98 fffff880`009b0ef8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`75302450 : 0xfffffa80`0aed4e00
fffff880`009b0ea0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`75302450 00000000`00000000 : 0xfffff880`009b0ef8
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+ca7
fffff800`02dc26fb 488b00 mov rax,qword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ExDeferredFreePool+ca7
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+ca7
BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+ca7
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050311-23665-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c1b000 PsLoadedModuleList = 0xfffff800`02e60e90
Debug session time: Tue May 3 22:11:45.928 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:26.613
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {403, fffff6800007a748, 85800002962ea867, fffff6800007ab00}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+330bc )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800007a748
Arg3: 85800002962ea867
Arg4: fffff6800007ab00
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_403
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002c42ca6 to fffff80002c9b640
STACK_TEXT:
fffff880`068937a8 fffff800`02c42ca6 : 00000000`0000001a 00000000`00000403 fffff680`0007a748 85800002`962ea867 : nt!KeBugCheckEx
fffff880`068937b0 fffff800`02ccd627 : 00000000`00000000 fffff680`0007aff8 fffffa80`0c681b30 fffff880`06893a00 : nt! ?? ::FNODOBFM::`string'+0x330bc
fffff880`06893960 fffff800`02c88aef : fffffa80`00000000 00000000`112f8fff 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x41f
fffff880`06893b20 fffff800`02c9a8d3 : ffffffff`ffffffff 00000000`0095e5b0 00000000`0095e578 00000000`00008000 : nt!NtFreeVirtualMemory+0x61f
fffff880`06893c20 00000000`771a14fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0095e4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771a14fa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+330bc
fffff800`02c42ca6 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+330bc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x1a_403_nt!_??_::FNODOBFM::_string_+330bc
BUCKET_ID: X64_0x1a_403_nt!_??_::FNODOBFM::_string_+330bc
Followup: MachineOwner
---------