Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042011-18454-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0324a000 PsLoadedModuleList = 0xfffff800`0348fe90
Debug session time: Wed Apr 20 11:03:36.652 2011 (UTC - 4:00)
System Uptime: 0 days 2:04:48.698
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff800032c86ff}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff800032c86ff
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800d163028 -- (.trap 0xfffff8800d163028)
Unable to read trap frame at fffff880`0d163028
LAST_CONTROL_TRANSFER: from fffff800032c9be9 to fffff800032ca640
STACK_TEXT:
fffff800`00ba4d28 fffff800`032c9be9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`032c80b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff800`032c86ff : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0d163028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0xff
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
32 errors : !nt (fffff800032c8643-fffff800032c87fb)
fffff800032c8640 25 88 01 *3b 00 66 83 bd f0 00 00 *ea 33 75 49 b9 %..;.f......3uI.
fffff800032c8650 02 01 00 *12 0f 32 89 45 e8 89 55 *f0 41 f6 42 03 .....2.E..U.A.B.
fffff800032c8660 80 74 35 *b4 c1 e2 20 48 0b c2 49 *04 82 b8 00 00 .t5... H..I.....
fffff800032c8670 00 74 25 *96 39 82 b0 01 00 00 74 *72 49 8b 92 b8 .t%.9.....trI...
...
fffff800032c86c0 29 4d 00 *19 29 55 10 0f 29 5d 20 *71 29 65 30 0f )M..)U..)] q)e0.
fffff800032c86d0 29 6d 40 *c1 05 e7 41 1f 00 89 85 *c2 01 00 00 8b )[email protected].........
fffff800032c86e0 85 e0 00 *9c 00 0f 20 d1 48 f7 85 *78 00 00 00 00 ...... .H..x....
fffff800032c86f0 02 00 00 *d5 01 fb 65 4c 8b 0c 25 *2b 01 00 00 41 ......eL..%+...A
...
fffff800032c8740 28 a8 08 *86 24 e8 b6 83 08 00 85 *72 0f 8d 0e 01 (...$......r....
fffff800032c8750 00 00 4c *fb 4d 80 44 8a 85 f0 00 *01 00 41 80 e0 ..L.M.D......A..
fffff800032c8760 01 48 8b *28 50 0f b6 4d aa e8 b2 *cb 00 00 85 c0 .H.(P..M........
fffff800032c8770 7c 36 80 *62 80 bb 19 00 00 74 12 *ba 8b 45 50 48 |6.b.....t...EPH
...
fffff800032c87c0 30 00 00 *14 4c 3b 45 e8 74 20 b9 *54 01 00 c0 41 0...L;E.t .T...A
fffff800032c87d0 8b c0 49 *21 e8 20 41 8b d0 0f 30 *3d 80 00 00 00 ..I!. A...0=....
fffff800032c87e0 48 8b 4d *cc 48 c1 e9 20 75 76 8b *b3 ba 02 00 00 H.M.H.. uv......
fffff800032c87f0 00 81 f9 *7c 00 00 d0 74 41 81 f9 *c8 00 00 c0 74 ...|...tA......t
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\
]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03258000 PsLoadedModuleList = 0xfffff800`0349de90
Debug session time: Sun Apr 10 10:26:01.599 2011 (UTC - 4:00)
System Uptime: 0 days 0:42:12.645
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff80003e2f594, d, 1, fffff800032cedf7}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80003e2f594, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032cedf7, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800035090e8
fffff80003e2f594
CURRENT_IRQL: d
FAULTING_IP:
nt!KeAccumulateTicks+307
fffff800`032cedf7 898314479e00 mov dword ptr [rbx+9E4714h],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c8a0 -- (.trap 0xfffff80000b9c8a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000000152c5
rdx=0000000000020e22 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032cedf7 rsp=fffff80000b9ca30 rbp=0000000000000001
r8=00000000000010d3 r9=0000000000000000 r10=0000000000000020
r11=fffff80000b9cb08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr ac po cy
nt!KeAccumulateTicks+0x307:
fffff800`032cedf7 898314479e00 mov dword ptr [rbx+9E4714h],eax ds:0001:00000000`009e4714=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032d7be9 to fffff800032d8640
STACK_TEXT:
fffff800`00b9c758 fffff800`032d7be9 : 00000000`0000000a fffff800`03e2f594 00000000`0000000d 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c760 fffff800`032d6860 : 00000000`00000006 fffffa80`0a336630 fffffa80`0595d6d0 fffff800`0344ae80 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8a0 fffff800`032cedf7 : 00000000`00000202 fffff800`03330c4f fffff880`03315180 fffff880`03317300 : nt!KiPageFault+0x260
fffff800`00b9ca30 fffff800`032e2eb7 : 00000000`00000000 fffff800`0344ae80 00000000`00002710 fffffa80`06354c00 : nt!KeAccumulateTicks+0x307
fffff800`00b9cac0 fffff800`03219895 : fffff800`0323f460 fffff800`00b9cc70 fffff800`0323f460 fffffa80`00000000 : nt!KeUpdateSystemTime+0x377
fffff800`00b9cbc0 fffff800`032d4b73 : fffffa80`00000000 fffffa80`00000000 fffff800`0344d7e0 00000000`00000006 : hal!HalpHpetClockInterrupt+0x8d
fffff800`00b9cbf0 fffff800`032d0342 : fffff800`0344ae80 fffff800`00000002 00000000`00000002 fffff880`00000000 : nt!KiInterruptDispatchNoLock+0x163
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x32
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
16 errors : !nt (fffff800032cedc3-fffff800032cee7b)
fffff800032cedc0 0f 84 f0 *48 ff ff 8b 83 24 47 00 *1f 01 bb 0c 47 ...H....$G.....G
fffff800032cedd0 00 00 85 *d0 0f 84 f6 fd ff ff 01 *9d 20 47 00 00 ............ G..
fffff800032cede0 39 83 20 *4c 00 00 0f 86 e4 fd ff *1e e9 a8 0c 06 9. L............
fffff800032cedf0 00 8b 05 *52 a3 23 00 89 83 14 47 *9e 00 8b 83 c8 ...R.#....G.....
...
fffff800032cee40 00 0f 84 *5d 0d 06 00 40 88 6b 06 *25 8b c8 21 00 ...][email protected].%..!.
fffff800032cee50 00 8b 05 *37 a4 23 00 39 83 cc 21 *af 00 0f 83 b4 ...7.#.9..!.....
fffff800032cee60 fd ff ff *35 cd 0f 86 ac fd ff ff *cd 41 ff 89 83 ...5........A...
fffff800032cee70 c8 21 00 *d3 e9 9e fd ff ff 01 bb *95 47 00 00 e9 .!..........G...
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050611-21871-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03259000 PsLoadedModuleList = 0xfffff800`0349ee90
Debug session time: Fri May 6 17:37:49.384 2011 (UTC - 4:00)
System Uptime: 0 days 0:07:02.832
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41287, 62b80560, 0, 0}
Probably caused by : hardware ( nt! ?? ::FNODOBFM::`string'+46585 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000062b80560
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41287
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800e038900 -- (.trap 0xfffff8800e038900)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800653edb0
rdx=fffffa8005b04060 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003304aed rsp=fffff8800e038a90 rbp=fffff8800e038b40
r8=fffff8800e038b98 r9=fffff6fb400018a8 r10=fffff68000315c00
r11=fffff70001080488 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!RtlUnwindEx+0x527:
fffff800`03304aed 000f add byte ptr [rdi],cl ds:00000000`00000000=??
Resetting default scope
MISALIGNED_IP:
nt!RtlUnwindEx+527
fffff800`03304aed 000f add byte ptr [rdi],cl
LAST_CONTROL_TRANSFER: from fffff8000326c62e to fffff800032d9640
STACK_TEXT:
fffff880`0e038798 fffff800`0326c62e : 00000000`0000001a 00000000`00041287 00000000`62b80560 00000000`00000000 : nt!KeBugCheckEx
fffff880`0e0387a0 fffff800`032d776e : 00000000`00000001 00000000`62b80560 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x46585
fffff880`0e038900 fffff800`03304aed : fffffa80`05b3bb60 ffffffff`ffffffff 00000000`00000000 fffff880`0e038b40 : nt!KiPageFault+0x16e
fffff880`0e038a90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlUnwindEx+0x527
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+46585
fffff800`0326c62e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+46585
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------