Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031311-15459-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x8281f000 PsLoadedModuleList = 0x82967810
Debug session time: Sun Mar 13 17:54:25.968 2011 (UTC - 5:00)
System Uptime: 0 days 0:18:42.903
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
...........
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 00000000, Machine Check Exception
Arg2: 858a9024, Address of the WHEA_ERROR_RECORD structure.
Arg3: f6000000, High order 32-bits of the MCi_STATUS value.
Arg4: 00000181, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
BUGCHECK_STR: 0x124_AuthenticAMD
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 1f
STACK_TEXT:
807cb8cc 82c3df3f 00000124 00000000 858a9024 nt!KeBugCheckEx+0x1e
807cb908 828ee004 858a1c31 858a9024 82887610 hal!HalBugCheckSystem+0xab
807cb938 82c3e1f1 85898668 82c4be40 00000005 nt!WheaReportHwError+0x230
807cba4c 82c3e2e3 85898668 858986b8 00000000 hal!HalpMcaReportError+0x3b
807cba70 82c3e54f 00000000 858986b8 807cbb90 hal!HalpMceHandler+0x8b
807cba80 82c345f5 00000000 00000001 00000000 hal!HalpHandleMachineCheck+0x3b
807cbb90 82c31261 00000002 807c6750 3f3f7852 hal!HalpMcaExceptionHandler+0x87
807cbb90 00000000 00000002 807c6750 3f3f7852 hal!HalpMcaExceptionHandlerWrapper+0x89
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
BUCKET_ID: 0x124_AuthenticAMD_PROCESSOR_CACHE
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031311-17612-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82839000 PsLoadedModuleList = 0x82981810
Debug session time: Sun Mar 13 17:25:45.149 2011 (UTC - 5:00)
System Uptime: 0 days 0:04:49.084
Loading Kernel Symbols
................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {828be8, ff, 8, 828be8}
Probably caused by : ntkrpamp.exe ( nt!PoIdle+538 )
Followup: MachineOwner
---------
Loading Dump File [F:\a\Minidump\D M P\DMP\031311-24414-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82841000 PsLoadedModuleList = 0x82989810
Debug session time: Sun Mar 13 18:15:34.980 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:32.931
Loading Kernel Symbols
................................................
Loading User Symbols
Missing image name, possible paged-out or corrupt data.
Loading unloaded module list
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
..
*** WARNING: Unable to verify timestamp for Unknown_Module_8b2174c7
*** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_8b2174c7
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FC, {807c4a80, 27f43963, 807dfc00, 0}
Unknown module 'Unknown_Module_8b2174c7' found on stack, using vad to reload module.
!vad_reload -1 0xffffffff8b2174c7
8a01ff45: Unable to get VAD.PrivateMemory
Probably caused by : Unknown_Module_8b2174c7 ( Unknown_Module_8b2174c7+22956ef )
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031311-23181-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82849000 PsLoadedModuleList = 0x82991810
Debug session time: Sun Mar 13 18:20:10.626 2011 (UTC - 5:00)
System Uptime: 0 days 0:03:41.577
Loading Kernel Symbols
................................................
Loading User Symbols
Missing image name, possible paged-out or corrupt data.
Loading unloaded module list
..Missing image name, possible paged-out or corrupt data.
.......Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {d, 0, 0, 0}
Probably caused by : ntkrpamp.exe ( nt!PoIdle+538 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_d
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 828ce79d to 8c8e4bb6
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
8296fc98 828ce79d 86104848 8297c280 82972c00 0x8c8e4bb6
8296fd20 828b114d 00000000 0000000e 00000000 nt!PoIdle+0x538
8296fd24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0xd
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PoIdle+538
828ce79d f70588e8978200800000 test dword ptr [nt!PerfGlobalGroupMask+0x8 (8297e888)],offset <Unloaded_Unknown_Module_0000000a>+0x7ff6 (00008000)
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PoIdle+538
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78ed4
FAILURE_BUCKET_ID: 0x7f_d_nt!PoIdle+538
BUCKET_ID: 0x7f_d_nt!PoIdle+538
Followup: MachineOwner
---------