Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Preben\Desktop\Feil med PC\Mini100508-02.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols Executable search path is: Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 6001.18063.amd64fre.vistasp1_gdr.080425-1930 Kernel base = 0xfffff800`01e07000 PsLoadedModuleList = 0xfffff800`01fccdb0 Debug session time: Sun Oct 5 12:41:56.209 2008 (GMT+2) System Uptime: 0 days 0:19:17.375 Loading Kernel Symbols ...................................... Loading User Symbols ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {2b1d71255, 2, 1, fffff80001e650f7} Probably caused by : ntkrnlmp.exe ( nt!KiTimerExpiration+97 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000002b1d71255, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80001e650f7, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002030080 00000002b1d71255 CURRENT_IRQL: 2 FAULTING_IP: nt!KiTimerExpiration+97 fffff800`01e650f7 0f83e187fdff jae nt! ?? ::FNODOBFM::`string'+0x39810 (fffff800`01e3d8de) CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: fffff80002e9cb10 -- (.trap 0xfffff80002e9cb10) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=424b27f8e0c6335d rdi=fffff80001f7b680 rip=fffff80001e650f7 rsp=fffff80002e9cca0 rbp=0000000000000000 r8=00000000000121ce r9=0000000000000000 r10=fffffa8006094a80 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy nt!KiTimerExpiration+0x97: fffff800`01e650f7 0f83e187fdff jae nt! ?? ::FNODOBFM::`string'+0x39810 (fffff800`01e3d8de) [br=0] Resetting default scope LAST_CONTROL_TRANSFER: from fffff80001e5c12e to fffff80001e5c390 STACK_TEXT: fffff800`02e9c9c8 fffff800`01e5c12e : 00000000`0000000a 00000002`b1d71255 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`02e9c9d0 fffff800`01e5b00b : 00000000`00000001 fffff800`02e9cbc0 00000000`00000400 00000002`b1d98a74 : nt!KiBugCheckDispatch+0x6e fffff800`02e9cb10 fffff800`01e650f7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x20b fffff800`02e9cca0 fffff800`01e65a9f : 000001ca`ba7cdb00 00000000`00000000 fffffa80`00000010 fffff800`01f7ea80 : nt!KiTimerExpiration+0x97 fffff800`02e9cd10 fffff800`01e66b72 : fffff800`01f7b680 fffff800`01f7b680 00000000`00000000 fffff800`01f80b80 : nt!KiRetireDpcList+0x1df fffff800`02e9cd80 fffff800`020345c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62 fffff800`02e9cdb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiTimerExpiration+97 fffff800`01e650f7 0f83e187fdff jae nt! ?? ::FNODOBFM::`string'+0x39810 (fffff800`01e3d8de) SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!KiTimerExpiration+97 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4812c3f7 FAILURE_BUCKET_ID: X64_0xA_W_nt!KiTimerExpiration+97 BUCKET_ID: X64_0xA_W_nt!KiTimerExpiration+97 Followup: MachineOwner ---------