Microsoft (R) Windows Debugger Version 6.9.0003.113 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Preben\Desktop\Feil med PC\Mini101108-02.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols Executable search path is: Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 6001.18063.amd64fre.vistasp1_gdr.080425-1930 Kernel base = 0xfffff800`01e11000 PsLoadedModuleList = 0xfffff800`01fd6db0 Debug session time: Sat Oct 11 23:33:14.957 2008 (GMT+2) System Uptime: 0 days 18:00:27.722 Loading Kernel Symbols ............................................................................................................................................. Loading User Symbols Loading unloaded module list .. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {96f052f173, 2, 1, fffff80001e6f0f7} Probably caused by : ntkrnlmp.exe ( nt!KiTimerExpiration+97 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000096f052f173, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80001e6f0f7, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000203a080 00000096f052f173 CURRENT_IRQL: 2 FAULTING_IP: nt!KiTimerExpiration+97 fffff800`01e6f0f7 0f83e187fdff jae nt! ?? ::FNODOBFM::`string'+0x39810 (fffff800`01e478de) CUSTOMER_CRASH_COUNT: 2 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: fffff80002faab10 -- (.trap 0xfffff80002faab10) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=fffff80001f85680 rip=fffff80001e6f0f7 rsp=fffff80002faaca0 rbp=0000000000000000 r8=00000000003f68cc r9=0000000000000000 r10=fffffa8006dfa950 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy nt!KiTimerExpiration+0x97: fffff800`01e6f0f7 0f83e187fdff jae nt! ?? ::FNODOBFM::`string'+0x39810 (fffff800`01e478de) [br=0] Resetting default scope LAST_CONTROL_TRANSFER: from fffff80001e6612e to fffff80001e66390 STACK_TEXT: fffff800`02faa9c8 fffff800`01e6612e : 00000000`0000000a 00000096`f052f173 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`02faa9d0 fffff800`01e6500b : 00000000`00000001 fffff800`02faabc0 00000000`00000400 00000096`f0556992 : nt!KiBugCheckDispatch+0x6e fffff800`02faab10 fffff800`01e6f0f7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x20b fffff800`02faaca0 fffff800`01e6fa9f : 00000204`120b5546 00000000`00000000 fffffa80`00000010 fffff800`01f88a80 : nt!KiTimerExpiration+0x97 fffff800`02faad10 fffff800`01e70b72 : fffff800`01f85680 fffff800`01f85680 00000000`00000000 fffff800`01f8ab80 : nt!KiRetireDpcList+0x1df fffff800`02faad80 fffff800`0203e5c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62 fffff800`02faadb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiTimerExpiration+97 fffff800`01e6f0f7 0f83e187fdff jae nt! ?? ::FNODOBFM::`string'+0x39810 (fffff800`01e478de) SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!KiTimerExpiration+97 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4812c3f7 FAILURE_BUCKET_ID: X64_0xA_W_nt!KiTimerExpiration+97 BUCKET_ID: X64_0xA_W_nt!KiTimerExpiration+97 Followup: MachineOwner ---------