Microsoft (R) Windows Debugger Version 6.8.0004.0 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\Mini050108-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*c:\programfiler\Debugging Tools for Windows\symbols*http://msdl.microsoft.com/downloads/symbols Executable search path is: Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible Product: WinNt Built by: 2600.xpsp_sp2_gdr.070227-2254 Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a620 Debug session time: Thu May 1 13:32:17.297 2008 (GMT+2) System Uptime: 0 days 3:27:53.328 Loading Kernel Symbols .......................................................................................................................................... Loading User Symbols Loading unloaded module list .............. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {80000c, 2, 0, 804dc406} Probably caused by : ntoskrnl.exe ( nt!KiTimerListExpire+ab ) Followup: MachineOwner --------- kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0080000c, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 804dc406, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 0080000c CURRENT_IRQL: 2 FAULTING_IP: nt!KiTimerListExpire+ab 804dc406 8b470c mov eax,dword ptr [edi+0Ch] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0xA TRAP_FRAME: f8b14e2c -- (.trap 0xfffffffff8b14e2c) ErrCode = 00000000 eax=00000000 ebx=f8b14eb0 ecx=f8b14e88 edx=82580da8 esi=82d27e98 edi=00800000 eip=804dc406 esp=f8b14ea0 ebp=f8b14fa4 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 nt!KiTimerListExpire+0xab: 804dc406 8b470c mov eax,dword ptr [edi+0Ch] ds:0023:0080000c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 804dc406 to 804e187f STACK_TEXT: f8b14e2c 804dc406 badb0d00 82580da8 f8b14e50 nt!KiTrap0E+0x233 f8b14fa4 804dc378 0aaed3e2 0000001d ffdff000 nt!KiTimerListExpire+0xab f8b14fd0 804dbbd4 80559480 00000000 000c2e55 nt!KiTimerExpiration+0xaf f8b14ff4 804db89e edf55b38 00000000 00000000 nt!KiRetireDpcList+0x46 f8b14ff8 edf55b38 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2a WARNING: Frame IP not in any known module. Following frames may be wrong. f8b14ffc 00000000 00000000 00000000 00000000 0xedf55b38 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiTimerListExpire+ab 804dc406 8b470c mov eax,dword ptr [edi+0Ch] SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!KiTimerListExpire+ab FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntoskrnl.exe DEBUG_FLR_IMAGE_TIMESTAMP: 45e54711 FAILURE_BUCKET_ID: 0xA_nt!KiTimerListExpire+ab BUCKET_ID: 0xA_nt!KiTimerListExpire+ab Followup: MachineOwner ---------