Microsoft (R) Windows Debugger Version 6.11.0001.402 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\kdfe_Dump_Analize\DumpS\Mini060209-05.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is: srv*symbols *
http://msdl.microsoft.com/download/symbols
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18063.x86fre.vistasp1_gdr.080425-1930
Machine Name:
Kernel base = 0x8204a000 PsLoadedModuleList = 0x82161c70
Debug session time: Tue Jun 2 17:35:05.110 2009 (GMT+6)
System Uptime: 0 days 0:07:03.905
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {2e312f50, 2, 8, 2e312f50}
Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+2ac )
Followup: MachineOwner
---------
0: kd> kd: Reading initial command '!analyze -v; q'
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 2e312f50, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000008, value 0 = read operation, 1 = write operation
Arg4: 2e312f50, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82181868
Unable to read MiSystemVaType memory at 82161420
2e312f50
CURRENT_IRQL: 2
FAULTING_IP:
+1ad952f0006db1c
2e312f50 ?? ???
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 5
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: 8213fa98 -- (.trap 0xffffffff8213fa98)
ErrCode = 00000010
eax=01ffffff ebx=00000000 ecx=8213fa78 edx=8213f864 esi=88004908 edi=87dcfaa0
eip=2e312f50 esp=8213fb0c ebp=87fe1858 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
2e312f50 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from 2e312f50 to 820a4d84
FAILED_INSTRUCTION_ADDRESS:
+1ad952f0006db1c
2e312f50 ?? ???
STACK_TEXT:
8213fa98 2e312f50 badb0d00 8213f864 8213faf0 nt!KiTrap0E+0x2ac
WARNING: Frame IP not in any known module. Following frames may be wrong.
8213fb08 480a0d31 3a74736f 3046465b 433a3a32 0x2e312f50
8213fb0c 3a74736f 3046465b 433a3a32 39313a5d 0x480a0d31
8213fb10 3046465b 433a3a32 39313a5d 0a0d3030 0x3a74736f
8213fb14 433a3a32 39313a5d 0a0d3030 753a544e 0x3046465b
8213fb18 39313a5d 0a0d3030 753a544e 3a646975 0x433a3a32
8213fb1c 0a0d3030 753a544e 3a646975 62373463 0x39313a5d
8213fb20 753a544e 3a646975 62373463 62613565 0xa0d3030
8213fb24 3a646975 62373463 62613565 3834322d 0x753a544e
8213fb28 62373463 62613565 3834322d 36342d31 0x3a646975
8213fb2c 62613565 3834322d 36342d31 382d6236 0x62373463
8213fb30 3834322d 36342d31 382d6236 2d383031 0x62613565
8213fb34 36342d31 382d6236 2d383031 65643564 0x3834322d
8213fb38 382d6236 2d383031 65643564 37326434 0x36342d31
8213fb3c 2d383031 65643564 37326434 34326131 0x382d6236
8213fb40 65643564 37326434 34326131 544e0a0d 0x2d383031
8213fb44 37326434 34326131 544e0a0d 73733a53 0x65643564
8213fb48 34326131 544e0a0d 73733a53 623a7064 0x37326434
8213fb4c 544e0a0d 73733a53 623a7064 79626579 0x34326131
8213fb50 73733a53 623a7064 79626579 4c0a0d65 0x544e0a0d
8213fb54 623a7064 79626579 4c0a0d65 7461636f 0x73733a53
8213fb58 79626579 4c0a0d65 7461636f 3a6e6f69 0x623a7064
8213fb5c 4c0a0d65 7461636f 3a6e6f69 70747468 0x79626579
8213fb60 7461636f 3a6e6f69 70747468 5b2f2f3a 0x4c0a0d65
8213fb64 3a6e6f69 70747468 5b2f2f3a 30386566 0x7461636f
8213fb68 70747468 5b2f2f3a 30386566 63343a3a 0x3a6e6f69
8213fb6c 5b2f2f3a 30386566 63343a3a 64383a62 0x70747468
8213fb70 30386566 63343a3a 64383a62 393a3535 0x5b2f2f3a
8213fb74 63343a3a 64383a62 393a3535 3a336136 0x30386566
8213fb78 64383a62 393a3535 3a336136 61363561 0x63343a3a
8213fb7c 393a3535 3a336136 61363561 38323a5d 0x64383a62
8213fb80 3a336136 61363561 38323a5d 752f3936 0x393a3535
8213fb84 61363561 38323a5d 752f3936 68706e70 0x3a336136
8213fb88 38323a5d 752f3936 68706e70 2f74736f 0x61363561
8213fb8c 752f3936 68706e70 2f74736f 69686475 0x38323a5d
8213fb90 68706e70 2f74736f 69686475 69706173 0x752f3936
8213fb94 2f74736f 69686475 69706173 6c6c642e 0x68706e70
8213fb98 69686475 69706173 6c6c642e 6e6f633f 0x2f74736f
8213fb9c 69706173 6c6c642e 6e6f633f 746e6574 0x69686475
8213fba0 6c6c642e 6e6f633f 746e6574 6975753d 0x69706173
8213fba4 6e6f633f 746e6574 6975753d 35363a64 0x6c6c642e
8213fba8 746e6574 6975753d 35363a64 63646664 0x6e6f633f
8213fbac 6975753d 35363a64 63646664 652d3835 0x746e6574
8213fbb0 35363a64 63646664 652d3835 2d353761 0x6975753d
8213fbb4 63646664 652d3835 2d353761 63336134 0x35363a64
8213fbb8 652d3835 2d353761 63336134 6137382d 0x63646664
8213fbbc 2d353761 63336134 6137382d 33612d62 0x652d3835
8213fbc0 63336134 6137382d 33612d62 61356665 0x2d353761
8213fbc4 6137382d 33612d62 61356665 38323830 0x63336134
8213fbc8 33612d62 61356665 38323830 0a0d3433 0x6137382d
8213fbcc 61356665 38323830 0a0d3433 3a4e5355 0x33612d62
8213fbd0 38323830 0a0d3433 3a4e5355 64697575 0x61356665
8213fbd4 0a0d3433 3a4e5355 64697575 3734633a 0x38323830
8213fbd8 3a4e5355 64697575 3734633a 61356562 0xa0d3433
8213fbdc 64697575 3734633a 61356562 34322d62 0x3a4e5355
8213fbe0 3734633a 61356562 34322d62 342d3138 0x64697575
8213fbe4 61356562 34322d62 342d3138 2d623636 0x3734633a
8213fbe8 34322d62 342d3138 2d623636 38303138 0x61356562
8213fce8 82100510 87460080 00460058 2ca0061f 0x34322d62
8213fd50 820fef9d 00000000 0000000e 00000000
nt!KiRetireDpcList+0x147
8213fd54 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x49
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiTrap0E+2ac
820a4d84 833d648c178200 cmp dword ptr [nt!KiFreezeFlag (82178c64)],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiTrap0E+2ac
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4812bd71
FAILURE_BUCKET_ID: 0xD1_CODE_AV_BAD_IP_nt!KiTrap0E+2ac
BUCKET_ID: 0xD1_CODE_AV_BAD_IP_nt!KiTrap0E+2ac
Followup: MachineOwner
---------
quit:
F:\kdfe_Dump_Analize>echo off
Microsoft (R) Windows Debugger Version 6.11.0001.402 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\kdfe_Dump_Analize\DumpS\Mini060209-06.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is: srv*symbols *
http://msdl.microsoft.com/download/symbols
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18063.x86fre.vistasp1_gdr.080425-1930
Machine Name:
Kernel base = 0x82000000 PsLoadedModuleList = 0x82117c70
Debug session time: Tue Jun 2 18:11:10.464 2009 (GMT+6)
System Uptime: 0 days 0:26:56.317
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {2f505454, 2, 8, 2f505454}
Unable to load image \SystemRoot\system32\DRIVERS\glausb.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for glausb.sys
*** ERROR: Module load completed but symbols could not be loaded for glausb.sys
Probably caused by : glausb.sys ( glausb+6611 )
Followup: MachineOwner
---------
1: kd> kd: Reading initial command '!analyze -v; q'
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 2f505454, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000008, value 0 = read operation, 1 = write operation
Arg4: 2f505454, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82137868
Unable to read MiSystemVaType memory at 82117420
2f505454
CURRENT_IRQL: 2
FAULTING_IP:
+1ad952f0006db1c
2f505454 ?? ???
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 6
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: 803eca98 -- (.trap 0xffffffff803eca98)
ErrCode = 00000010
eax=01ffffff ebx=00000000 ecx=803eca78 edx=803ec864 esi=87c18940 edi=87f444a0
eip=2f505454 esp=803ecb0c ebp=87efa600 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
2f505454 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from 2f505454 to 8205ad84
FAILED_INSTRUCTION_ADDRESS:
+1ad952f0006db1c
2f505454 ?? ???
STACK_TEXT:
803eca98 2f505454 badb0d00 803ec864 803ecaf0 nt!KiTrap0E+0x2ac
WARNING: Frame IP not in any known module. Following frames may be wrong.
803ecb08 0d312e31 736f480a 465b3a74 3a323046 0x2f505454
803ecbb0 82740ba0 0255d0e8 803ecbf4 00000001 0xd312e31
803ecbec 82766bfc 856c4dd8 87636020 87636012 ndis!ndisLWM5IndicateReceive+0x31d
803ecc10 918c7611 875548c0 87636020 87636012 ndis!EthIndicateReceive+0x1f
803ecc44 918c84e3 875ab6f0 8744d540 87574908 glausb+0x6611
803ecc98 918c152a 87556008 87574908 8744d540 glausb+0x74e3
803eccb8 827332bf 00000000 8755604c 00000000 glausb+0x52a
803ecce8 820b6510 87556080 00556058 3746e6bd
ndis!ndisMTimerDpcX+0xb6
803ecd50 820b4f9d 00000000 0000000e 00000000
nt!KiRetireDpcList+0x147
803ecd54 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x49
STACK_COMMAND: kb
FOLLOWUP_IP:
glausb+6611
918c7611 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: glausb+6611
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: glausb
IMAGE_NAME: glausb.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 43330bcd
FAILURE_BUCKET_ID: 0xD1_CODE_AV_BAD_IP_glausb+6611
BUCKET_ID: 0xD1_CODE_AV_BAD_IP_glausb+6611
Followup: MachineOwner
---------
quit:
F:\kdfe_Dump_Analize>echo off
Microsoft (R) Windows Debugger Version 6.11.0001.402 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\kdfe_Dump_Analize\DumpS\Mini060309-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is: srv*symbols *
http://msdl.microsoft.com/download/symbols
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18063.x86fre.vistasp1_gdr.080425-1930
Machine Name:
Kernel base = 0x82242000 PsLoadedModuleList = 0x82359c70
Debug session time: Wed Jun 3 04:23:56.817 2009 (GMT+6)
System Uptime: 0 days 2:33:49.120
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FC, {2f505454, 22ddb867, 803f0d38, 0}
Unable to load image \SystemRoot\system32\DRIVERS\glausb.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for glausb.sys
*** ERROR: Module load completed but symbols could not be loaded for glausb.sys
Probably caused by : glausb.sys ( glausb+6611 )
Followup: MachineOwner
---------
1: kd> kd: Reading initial command '!analyze -v; q'
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 2f505454, Virtual address for the attempted execute.
Arg2: 22ddb867, PTE contents.
Arg3: 803f0d38, (reserved)
Arg4: 00000000, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xFC
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 2
TRAP_FRAME: 803f0d38 -- (.trap 0xffffffff803f0d38)
ErrCode = 00000011
eax=01ffffff ebx=00000000 ecx=803f0d18 edx=803f0b04 esi=9ff3d570 edi=a1bd5d10
eip=2f505454 esp=803f0dac ebp=a1b330a0 iopl=0 nv up ei ng nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282
2f505454 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from 8229cbb4 to 822e7155
STACK_TEXT:
803f0d20 8229cbb4 00000008 2f505454 00000000 nt!MmAccessFault+0x10a
803f0d20 2f505454 00000008 2f505454 00000000 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
803f0da8 0d312e31 736f480a 465b3a74 3a323046 0x2f505454
803f0e50 84b4dba0 0287a0e8 803f0e94 00000001 0xd312e31
803f0e8c 84b73bfc 87b71dd8 81963020 81963012 ndis!ndisLWM5IndicateReceive+0x31d
803f0eb0 92bd5611 a1a0c710 81963020 81963012 ndis!EthIndicateReceive+0x1f
803f0ee4 92bd64e3 9ffef7d0 9c0e7720 818848c8 glausb+0x6611
803f0f38 92bcf52a 81880008 818848c8 9c0e7720 glausb+0x74e3
803f0f58 84b402bf 00000000 8188004c 00000000 glausb+0x52a
803f0f88 822f8510 81880080 00880058 d1bafb6b
ndis!ndisMTimerDpcX+0xb6
803f0ff4 822f69f5 b12abd10 00000000 00000000
nt!KiRetireDpcList+0x147
803f0ff8 b12abd10 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x45
803f0ffc 00000000 00000000 00000000 00000000 0xb12abd10
STACK_COMMAND: kb
FOLLOWUP_IP:
glausb+6611
92bd5611 ?? ???
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: glausb+6611
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: glausb
IMAGE_NAME: glausb.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 43330bcd
FAILURE_BUCKET_ID: 0xFC_VRF_glausb+6611
BUCKET_ID: 0xFC_VRF_glausb+6611
Followup: MachineOwner
---------
quit: