A
atomx
Lately, I've been getting a lot of odd blue screens on my system.
Before anyone asks, yes, I've changed a LOT of new hardware and
software into the machine. I'm a bit of a hacker, so my machine is
always in flux. In an ideal world, I could just undo one change at a
time, but I honestly don't remember the sequence, so I'm stuck trying
to debug this mess "as is."
Now then. Most of the stops appear to be happening under stress, many
of them appear to be when we're doing "something" related to
multimedia. I noticed two things.
First, for a while, any time I would ActiveSync my PDA, my machine
would trap with an error in USBPORT.SYS. I noticed a hotfix on MS's
site that was available to install the latest ActiveSync, and I
installed that. My machine seemed a TAD more stable, but I think
that's just psychosomatic, since I got another BSoD tonight targeting
USBPORT.SYS.
Also, I can fairly reliably reproduce the trap. I have a copy of a
popular video production package on my system. When I load a large
video file into it (a recording of a TV show I TiVo'ed), and I am
rendering it (after removing commercials and compressing to a smaller
format), the machine will ALWAYS BSoD at some point. Not right away,
just... at some point. And it seems like anything where I'm doing
heavy multimedia processing will do this.
Here are some of the stops I've got in the past few days. I'll put
the result of all the !analyze -v's, and one good !drivers. Also,
since a lot of the bugchecks seem to be in KiTimerListExpire (maybe
some driver is leaving a DPC queued while unloading?) I'll throw in a
!timer for kicks. There's one oddity I noticed today. I have a BSoD
where it's indicating that the fault is at an instruction it couldn't
be at. Specifically in the following, note that the faulting IP
(804fa1ed) and the actual legal instruction address (804fa1ee is next)
are different. I have had random BSoD's on this machine (Athlon XP
2000+) for a long time now. I am not 100% sure the memory is good,
and now I fear for the processor.
Here's the raw data.
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED (8e)
This is a very common bugcheck. Usually the exception address
pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this
address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never
have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
An exception code of 0x80000002 (STATUS_DATATYPE_MISALIGNMENT)
indicates
that an unaligned data reference was encountered. The trap frame will
supply additional information.
Arguments:
Arg1: 80000003, The exception code that was not handled
Arg2: 804fa1ed, The address that the exception occurred at
Arg3: f794ae28, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more
arguments are invalid
FAULTING_IP:
nt!KiTimerListExpire+117
804fa1ed e8ff7604ff call 7f5418f1
TRAP_FRAME: f794ae28 -- (.trap fffffffff794ae28)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=00000002 edx=00000002 esi=f794aeb0
edi=82b46240
eip=804fa1ee esp=f794ae9c ebp=f794afa4 iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00000246
nt!KiTimerListExpire+0x118:
804fa1ee ff7604 push dword ptr [esi+0x4]
ds:0023:f794aeb4=82b46218
Resetting default scope
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x8E
LAST_CONTROL_TRANSFER: from 804fa30a to 804fa1ee
STACK_TEXT:
f794afa4 804fa30a 7b9c2f50 000000c7 ffdff000
nt!KiTimerListExpire+0x118
f794afd0 805317a9 805423e0 00000000 00828b8b nt!KiTimerExpiration+0xb0
f794aff4 8053147a b9cdcd54 00000000 00000000 nt!KiRetireDpcList+0x46
FOLLOWUP_IP:
nt!KiTimerListExpire+117
804fa1ed e8ff7604ff call 7f5418f1
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!KiTimerListExpire+117
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ea80977
STACK_COMMAND: .trap fffffffff794ae28 ; kb
BUCKET_ID: 0x8E_nt!KiTimerListExpire+117
Followup: MachineOwner
---------
***************************************************************
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid)
address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000002, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 82b4d242, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 00000002
CURRENT_IRQL: 2
FAULTING_IP:
+ffffffff82b4d242
82b4d242 0001 add [ecx],al
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from 804fa1f6 to 82b4d242
TRAP_FRAME: f794ae1c -- (.trap fffffffff794ae1c)
ErrCode = 00000002
eax=00000000 ebx=00000000 ecx=00000002 edx=00000002 esi=f794aeb0
edi=82b4d240
eip=82b4d242 esp=f794ae90 ebp=f794afa4 iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
82b4d242 0001 add [ecx],al
ds:0023:00000002=??
Resetting default scope
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be
wrong.
f794ae8c 804fa1f6 82b4d240 82b4d218 4ecedef7 0x82b4d242
f794afa4 804fa30a 47f84650 0000000f ffdff000
nt!KiTimerListExpire+0x120
f794afd0 805317a9 805423e0 00000000 000a000f nt!KiTimerExpiration+0xb0
f794aff4 8053147a f7a2ed54 00000000 00000000 nt!KiRetireDpcList+0x46
FOLLOWUP_IP:
nt!KiTrap0E+2ad
80530335 f7457000000200 test dword ptr [ebp+0x70],0x20000
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!KiTrap0E+2ad
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ea80977
STACK_COMMAND: .trap fffffffff794ae1c ; kb
BUCKET_ID: 0xD1_W_nt!KiTrap0E+2ad
Followup: MachineOwner
---------
kd> .trap fffffffff794ae1c ; kb
ErrCode = 00000002
eax=00000000 ebx=00000000 ecx=00000002 edx=00000002 esi=f794aeb0
edi=82b4d240
eip=82b4d242 esp=f794ae90 ebp=f794afa4 iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
82b4d242 0001 add [ecx],al
ds:0023:00000002=??
*** Stack trace for last set context - .thread/.cxr resets it
ChildEBP RetAddr Args to Child
WARNING: Frame IP not in any known module. Following frames may be
wrong.
f794ae8c 804fa1f6 82b4d240 82b4d218 4ecedef7 0x82b4d242
f794afa4 804fa30a 47f84650 0000000f ffdff000
nt!KiTimerListExpire+0x120
f794afd0 805317a9 805423e0 00000000 000a000f nt!KiTimerExpiration+0xb0
f794aff4 8053147a f7a2ed54 00000000 00000000 nt!KiRetireDpcList+0x46
***************************************************************
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid)
address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 4801f024, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 806abfe4, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 4801f024
CURRENT_IRQL: 2
FAULTING_IP:
hal!KfLowerIrql+4
806abfe4 803d24f0dfff02 cmp byte ptr [ffdff024],0x2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from 804fb007 to 806abfe4
TRAP_FRAME: eb140bc4 -- (.trap ffffffffeb140bc4)
ErrCode = 00000000
eax=00000000 ebx=8159b208 ecx=00000000 edx=80010031 esi=806abfe0
edi=00000000
eip=806abfe4 esp=eb140c38 ebp=eb140c6c iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
hal!KfLowerIrql+0x4:
806abfe4 803d24f0dfff02 cmp byte ptr [ffdff024],0x2
ds:0023:ffdff024=1f
Resetting default scope
STACK_TEXT:
eb140c38 804fb007 81614960 816148f0 804f50ec hal!KfLowerIrql+0x4
eb140c44 804f50ec 000025ff e123bcd8 00000000 nt!KiSwapThread+0x67
eb140c6c bf87b94a 00000001 0000000d 00000001
nt!KeWaitForSingleObject+0x1c0
eb140ca8 bf87bd0b 000025ff 00000000 00000001
win32k!xxxSleepThread+0x189
eb140cec bf87bccf eb140d18 000025ff 00000000
win32k!xxxRealInternalGetMessage+0x40f
eb140d4c 8052d571 0095a540 00000000 00000000
win32k!NtUserGetMessage+0x27
eb140d4c 7ffe0304 0095a540 00000000 00000000 nt!KiSystemService+0xc4
0012fe9c 00000000 00000000 00000000 00000000
SharedUserData!SystemCallStub+0x4
FOLLOWUP_IP:
win32k!xxxSleepThread+189
bf87b94a 8945fc mov [ebp-0x4],eax
SYMBOL_STACK_INDEX: 3
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: win32k!xxxSleepThread+189
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 3f73195d
STACK_COMMAND: .trap ffffffffeb140bc4 ; kb
BUCKET_ID: 0xA_win32k!xxxSleepThread+189
Followup: MachineOwner
---------
***************************************************************
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid)
address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 82496a80, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000000
CURRENT_IRQL: 2
FAULTING_IP:
+ffffffff82496a80
82496a80 1300 adc eax,[eax]
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from 804fa1f6 to 82496a80
TRAP_FRAME: f794ae1c -- (.trap fffffffff794ae1c)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=00000002 edx=00000002 esi=f794aeb0
edi=82496a80
eip=82496a80 esp=f794ae90 ebp=f794afa4 iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
82496a80 1300 adc eax,[eax]
ds:0023:00000000=????????
Resetting default scope
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be
wrong.
f794ae8c 804fa1f6 82537210 82537200 dff00000 0x82496a80
f794afa4 804fa30a 8746a680 0000000f ffdff000
nt!KiTimerListExpire+0x120
f794afd0 805317a9 805423e0 00000000 000a297d nt!KiTimerExpiration+0xb0
f794aff4 8053147a eb4b9d54 00000000 00000000 nt!KiRetireDpcList+0x46
FOLLOWUP_IP:
nt!KiTrap0E+2ad
80530335 f7457000000200 test dword ptr [ebp+0x70],0x20000
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!KiTrap0E+2ad
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ea80977
STACK_COMMAND: .trap fffffffff794ae1c ; kb
BUCKET_ID: 0xD1_nt!KiTrap0E+2ad
Followup: MachineOwner
---------
***************************************************************
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid)
address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 8b00f024, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 806abfe4, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 8b00f024 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
hal!KfLowerIrql+4
806abfe4 803d24f0dfff02 cmp byte ptr [ffdff024],0x2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from 804fb007 to 806abfe4
TRAP_FRAME: f777ea0c -- (.trap fffffffff777ea0c)
ErrCode = 00000000
eax=00000000 ebx=82d98a40 ecx=00000000 edx=80010031 esi=806abfe0
edi=00000002
eip=806abfe4 esp=f777ea80 ebp=f777eac4 iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
hal!KfLowerIrql+0x4:
806abfe4 803d24f0dfff02 cmp byte ptr [ffdff024],0x2
ds:0023:ffdff024=1f
Resetting default scope
STACK_TEXT:
f777ea80 804fb007 00000000 82d6b400 804f4e72 hal!KfLowerIrql+0x4
f777ea8c 804f4e72 804f8938 00000001 bf98fdf8 nt!KiSwapThread+0x67
f777eac4 bf87aeca 00000007 82bd0a20 00000001
nt!KeWaitForMultipleObjects+0x282
f777ed34 bf80bb6f f774e4e4 00000002 f777ed64
win32k!RawInputThread+0x454
f777ed44 bf875da9 f774e4e4 f777ed64 006dfff4
win32k!xxxCreateSystemThreads+0x5e
f777ed54 8052d571 00000000 00000022 00000000
win32k!NtUserCallOneParam+0x20
f777ed54 7ffe0304 00000000 00000022 00000000 nt!KiSystemService+0xc4
00000000 00000000 00000000 00000000 00000000
SharedUserData!SystemCallStub+0x4
FOLLOWUP_IP:
win32k!RawInputThread+454
bf87aeca 392db45c99bf cmp [win32k!gdwUpdateKeyboard
(bf995cb4)],ebp
SYMBOL_STACK_INDEX: 3
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: win32k!RawInputThread+454
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 3f73195d
STACK_COMMAND: .trap fffffffff777ea0c ; kb
BUCKET_ID: 0xA_win32k!RawInputThread+454
Followup: MachineOwner
---------
***************************************************************
This is from the first dump, from tonight:
kd> !drivers
System Driver and Image Summary
Base Code Size Data Size Image Name Creation
Time
804d4000 183080 (1549 k) 52c80 (332 k) ntoskrnl.exe Thu Apr 24
08:57:43 2003
806ab000 f500 ( 62 k) 3580 ( 14 k) hal.dll Thu Aug 29
01:05:02 2002
f7a2f000 1100 ( 5 k) 780 ( 2 k) KDCOM.DLL Fri Aug 17
13:49:10 2001
f793f000 1800 ( 6 k) 1500 ( 6 k) BOOTVID.dll Fri Aug 17
13:49:09 2001
f74e2000 24100 ( 145 k) 7880 ( 31 k) ACPI.sys Thu Aug 29
01:09:03 2002
f7a31000 800 ( 2 k) 600 ( 2 k) WMILIB.SYS Fri Aug 17
14:07:23 2001
f752f000 c700 ( 50 k) 2c00 ( 11 k) pci.sys Thu Aug 29
01:09:10 2002
f753f000 7200 ( 29 k) 1700 ( 6 k) isapnp.sys Fri Aug 17
13:58:01 2001
f7a33000 a80 ( 3 k) 580 ( 2 k) viaide.sys Thu Aug 29
01:27:48 2002
f77af000 4b00 ( 19 k) e00 ( 4 k) PCIIDEX.SYS Thu Aug 29
01:27:47 2002
f754f000 8300 ( 33 k) c80 ( 4 k) MountMgr.sys Fri Aug 17
13:47:36 2001
f74c3000 1b700 ( 110 k) 2e00 ( 12 k) ftdisk.sys Fri Aug 17
13:52:41 2001
f7a35000 c80 ( 4 k) 780 ( 2 k) dmload.sys Fri Aug 17
13:58:15 2001
f749f000 1cf00 ( 116 k) 6980 ( 27 k) dmio.sys Fri Aug 17
13:58:27 2001
f77b7000 3c80 ( 16 k) 980 ( 3 k) PartMgr.sys Fri Aug 17
18:32:23 2001
f755f000 9880 ( 39 k) 2480 ( 10 k) VolSnap.sys Fri Aug 17
13:53:19 2001
f7489000 12780 ( 74 k) 2880 ( 11 k) atapi.sys Thu Aug 29
01:27:48 2002
f756f000 7000 ( 28 k) 1080 ( 5 k) disk.sys Thu Aug 29
01:27:56 2002
f757f000 9d00 ( 40 k) 1480 ( 6 k) CLASSPNP.SYS Thu Aug 29
02:08:42 2002
f77bf000 3520 ( 14 k) 12a0 ( 5 k) ino_flpy.sys Wed Nov 07
15:45:34 2001
f7475000 fe80 ( 64 k) 3580 ( 14 k) KSecDD.sys Fri Aug 17
13:50:01 2001
f73eb000 7ca80 ( 499 k) c580 ( 50 k) Ntfs.sys Thu Aug 29
02:13:37 2002
f73c1000 23480 ( 142 k) 5800 ( 22 k) NDIS.sys Sat Oct 04
00:54:08 2003
f758f000 a380 ( 41 k) 3280 ( 13 k) ohci1394.sys Thu Aug 29
01:33:19 2002
f759f000 b180 ( 45 k) 1080 ( 5 k) 1394BUS.SYS Thu Aug 29
01:33:19 2002
f73a7000 15d80 ( 88 k) 3600 ( 14 k) Mup.sys Thu Aug 29
02:12:53 2002
f77c7000 5e00 ( 24 k) b00 ( 3 k) amdagp.sys Fri Aug 17
13:58:00 2001
f7887000 4b80 ( 19 k) 2880 ( 11 k) processr.sys Thu Aug 29
01:05:03 2002
f72a7000 83400 ( 525 k) 30200 (193 k) ati2mtag.sys Fri Dec 12
09:50:01 2003
f6bf4000 de00 ( 56 k) 3380 ( 13 k) VIDEOPRT.SYS Thu Aug 29
01:32:03 2002
f7897000 0 ( 0 k) 0 ( 0 k) fdc.sys unavailable
f6be1000 10300 ( 65 k) 2300 ( 9 k) parport.sys Thu Aug 29
01:27:29 2002
f75ef000 9280 ( 37 k) 3180 ( 13 k) i8042prt.sys Thu Aug 29
02:06:37 2002
f7a1b000 2160 ( 9 k) 8e0 ( 3 k) itchfltr.sys Fri Nov 15
11:32:42 2002
f789f000 4100 ( 17 k) 1780 ( 6 k) kbdclass.sys Thu Aug 29
01:26:59 2002
f75ff000 7e80 ( 32 k) 1a00 ( 7 k) imapi.sys Thu Aug 29
01:28:05 2002
f760f000 9c80 ( 40 k) 1900 ( 7 k) cdrom.sys Thu Aug 29
01:27:55 2002
f761f000 ac80 ( 44 k) 2d00 ( 12 k) redbook.sys Thu Aug 29
01:27:45 2002
f6b8a000 1b900 ( 111 k) 4080 ( 17 k) ks.sys Wed Dec 04
09:09:38 2002
f78a7000 3f80 ( 16 k) 900 ( 3 k) usbuhci.sys Thu Jul 03
17:51:44 2003
f6b68000 1f800 ( 126 k) 2280 ( 9 k) USBPORT.SYS Thu Jul 03
17:49:27 2003
f6b0e000 49a60 ( 295 k) f7e0 ( 62 k) ctaud2k.sys Tue Oct 07
19:06:01 2003
f6aed000 19580 ( 102 k) 7380 ( 29 k) portcls.sys Thu Aug 29
02:00:58 2002
f762f000 cb00 ( 51 k) 1380 ( 5 k) drmk.sys Thu Aug 29
01:32:30 2002
f6ac1000 16c00 ( 91 k) 149c0 ( 83 k) ctoss2k.sys Tue Oct 07
19:06:48 2003
f7a69000 e80 ( 4 k) 560 ( 2 k) ctprxy2k.sys Tue Oct 07
19:08:11 2003
f7a27000 1d00 ( 8 k) 680 ( 2 k) gameenum.sys Thu Aug 29
01:32:42 2002
f6a85000 23800 ( 142 k) 1c00 ( 7 k) el90xnd5.sys Fri Jun 15
15:01:39 2001
f763f000 a800 ( 42 k) 3880 ( 15 k) atibtcap.sys Tue Nov 05
16:14:42 2002
f764f000 9c00 ( 39 k) 1300 ( 5 k) STREAM.SYS Wed Dec 04
09:10:14 2002
f6a74000 e400 ( 57 k) 1c00 ( 7 k) el90xbc5.sys Mon Jul 16
16:40:19 2001
f7b8b000 400 ( 1 k) 500 ( 2 k) audstub.sys Fri Aug 17
13:59:40 2001
f766f000 ad00 ( 44 k) d00 ( 4 k) rasl2tp.sys Thu Aug 29
02:06:36 2002
f7a2b000 1900 ( 7 k) 980 ( 3 k) ndistapi.sys Fri Aug 17
13:55:29 2001
f6a5e000 12780 ( 74 k) 2b80 ( 11 k) ndiswan.sys Thu Aug 29
01:58:38 2002
f767f000 7800 ( 30 k) 1d00 ( 8 k) raspppoe.sys Fri Aug 17
13:55:33 2001
f768f000 9c00 ( 39 k) 1580 ( 6 k) raspptp.sys Tue Oct 01
17:52:28 2002
f7383000 2b00 ( 11 k) 1100 ( 5 k) TDI.SYS Fri Aug 17
13:57:25 2001
f78b7000 3780 ( 14 k) b00 ( 3 k) ptilink.sys Fri Aug 17
13:49:53 2001
f78bf000 3300 ( 13 k) a80 ( 3 k) raspti.sys Fri Aug 17
13:55:32 2001
f696c000 27a00 ( 159 k) 4b80 ( 19 k) rdpdr.sys Thu Aug 29
01:06:34 2002
f769f000 7900 ( 31 k) 1780 ( 6 k) termdd.sys Thu Aug 29
01:40:32 2002
f78c7000 3b80 ( 15 k) 1780 ( 6 k) mouclass.sys Thu Aug 29
01:27:00 2002
f7b90000 680 ( 2 k) 680 ( 2 k) swenum.sys Wed Dec 04
09:10:07 2002
f6922000 e00 ( 4 k) 20600 (130 k) update.sys Fri Aug 17
20:53:56 2001
f78d7000 1400 ( 5 k) 1c00 ( 7 k) VPCAppSv.sys Wed May 15
17:18:26 2002
f736f000 2660 ( 10 k) ca0 ( 4 k) VPCPOWER.SYS Sat Mar 31
12:37:18 2001
f76ef000 7b80 ( 31 k) 1600 ( 6 k) NDProxy.SYS Fri Aug 17
13:55:30 2001
f78ff000 3c00 ( 15 k) e00 ( 4 k) flpydisk.sys Thu Aug 29
01:27:43 2002
f7907000 3800 ( 14 k) a00 ( 3 k) ativtutw.sys Tue Nov 05
16:13:56 2002
f7a87000 d80 ( 4 k) a80 ( 3 k) atibtxbr.sys Tue Nov 05
16:13:59 2002
f790f000 5f00 ( 24 k) d00 ( 4 k) ativxstw.sys Tue Nov 05
16:13:57 2002
f7a0f000 1980 ( 7 k) 980 ( 3 k) viausb1.sys Tue Sep 18
22:28:49 2001
f69fe000 b880 ( 47 k) 1380 ( 5 k) usbhub.sys Thu Jul 03
17:52:56 2003
f7ab5000 580 ( 2 k) a00 ( 3 k) USBD.SYS Fri Aug 17
14:02:58 2001
eb82d000 877e0 ( 542 k) 55140 (341 k) ha10kx2k.sys Tue Oct 21
02:26:04 2003
eb80b000 b1a0 ( 45 k) 161c0 ( 89 k) emupia2k.sys Mon Oct 13
02:42:10 2003
eb7eb000 1e4c0 ( 122 k) 1420 ( 6 k) ctsfm2k.sys Tue Oct 07
19:09:07 2003
eb74d000 3d6a0 ( 246 k) 5fe60 (384 k) ctac32k.sys Tue Oct 21
02:22:15 2003
f7ab7000 1580 ( 6 k) 680 ( 2 k) Fs_Rec.SYS Fri Aug 17
13:49:37 2001
eb93c000 300 ( 1 k) 580 ( 2 k) Null.SYS Fri Aug 17
13:47:39 2001
f7ab9000 780 ( 2 k) 600 ( 2 k) Beep.SYS Fri Aug 17
13:47:33 2001
f781f000 4a00 ( 19 k) f00 ( 4 k) HIDPARSE.SYS Fri Aug 17
14:02:04 2001
f7827000 3c80 ( 16 k) d00 ( 4 k) vga.sys Thu Aug 29
01:32:03 2002
f7abb000 500 ( 2 k) 880 ( 3 k) mnmdd.SYS Fri Aug 17
13:57:28 2001
f7abd000 800 ( 2 k) 580 ( 2 k) RDPCDD.sys Fri Aug 17
13:46:56 2001
f782f000 3900 ( 15 k) a80 ( 3 k) Msfs.SYS Fri Aug 17
13:50:02 2001
f7837000 6380 ( 25 k) d00 ( 4 k) Npfs.SYS Fri Aug 17
13:50:03 2001
f6960000 1780 ( 6 k) 800 ( 2 k) rasacd.sys Fri Aug 17
13:55:39 2001
f69ee000 ca80 ( 51 k) 1500 ( 6 k) ipsec.sys Thu Aug 29
02:07:19 2002
f69de000 7080 ( 29 k) 1080 ( 5 k) msgpc.sys Fri Aug 17
13:54:19 2001
eb6db000 43980 ( 271 k) d780 ( 54 k) tcpip.sys Thu Aug 29
01:58:10 2002
eb6b6000 21600 ( 134 k) 2d80 ( 12 k) netbt.sys Tue Jul 08
16:48:51 2003
f69ce000 6e80 ( 28 k) 1000 ( 4 k) netbios.sys Thu Aug 29
01:35:45 2002
eb68e000 23800 ( 142 k) 4280 ( 17 k) rdbss.sys Thu Aug 29
01:58:48 2002
eb62e000 54180 ( 337 k) b800 ( 46 k) mrxsmb.sys Mon Nov 18
11:27:37 2002
ec190000 6700 ( 26 k) 1e80 ( 8 k) Fips.SYS Fri Aug 17
18:31:49 2001
ec180000 6b80 ( 27 k) 1380 ( 5 k) wanarp.sys Fri Aug 17
13:55:23 2001
f7847000 3600 ( 14 k) 9a0 ( 3 k) asuskbnt.sys Wed Apr 23
20:28:09 2003
f7857000 5f80 ( 24 k) b00 ( 3 k) usbccgp.sys Thu Jul 03
17:53:24 2003
ec140000 7660 ( 30 k) 1640 ( 6 k) LHidUsb.Sys Fri Nov 08
15:58:54 2002
ec130000 7580 ( 30 k) e00 ( 4 k) HIDCLASS.SYS Thu Aug 29
01:32:40 2002
ec248000 2560 ( 10 k) a40 ( 3 k) LCcFltr.Sys Fri Nov 08
15:58:59 2002
ec224000 2900 ( 11 k) a80 ( 3 k) kbdhid.sys Fri Aug 17
13:48:01 2001
f788f000 2c40 ( 12 k) 2ec0 ( 12 k) LHidFlt2.Sys Mon Jun 30
11:21:43 2003
ebd48000 2180 ( 9 k) b00 ( 3 k) mouhid.sys Fri Aug 17
13:47:57 2001
ec100000 9ca0 ( 40 k) 5fe0 ( 24 k) LMouFlt2.Sys Mon Jun 30
11:21:34 2003
ebb65000 d280 ( 53 k) 1380 ( 5 k) Cdfs.SYS Thu Aug 29
01:58:50 2002
eb618000 12780 ( 74 k) 2880 ( 11 k) dump_atapi.sys Thu Aug 29
01:27:48 2002
f7ae3000 800 ( 2 k) 600 ( 2 k) dump_WMILIB.SYS Fri Aug 17
14:07:23 2001
bf800000 186a00 (1563 k) 2fd80 (192 k) win32k.sys Thu Sep 25
09:35:41 2003
f735f000 3100 ( 13 k) b80 ( 3 k) watchdog.sys Thu Aug 29
01:32:20 2002
f79bf000 1d00 ( 8 k) 880 ( 3 k) Dxapi.sys Fri Aug 17
13:53:19 2001
bff80000 ef00 ( 60 k) 1b80 ( 7 k) dxg.sys Thu Aug 29
03:40:42 2002
eb96e000 100 ( 1 k) 900 ( 3 k) dxgthk.sys Fri Aug 17
13:53:12 2001
bf9b7000 4b000 ( 300 k) 12a00 ( 75 k) ati2dvag.dll Fri Dec 12
09:50:22 2003
bfa19000 ba3c0 ( 745 k) 14160 ( 81 k) ati3duag.dll Fri Dec 12
09:35:08 2003
bfae8000 69fc0 ( 424 k) 19d60 (104 k) ativvaxx.dll Fri Dec 12
09:08:32 2003
eb55d000 c000 ( 48 k) e980 ( 59 k) ino_fltr.sys Sun Sep 01
09:37:22 2002
eb474000 1cd00 ( 116 k) 3300 ( 13 k) afd.sys Thu Aug 29
02:01:13 2002
eb5a8000 2500 ( 10 k) 880 ( 3 k) ndisuio.sys Sat Aug 02
02:38:10 2003
f7a75000 e00 ( 4 k) 980 ( 3 k) ParVdm.SYS Fri Aug 17
13:49:49 2001
f792f000 3180 ( 13 k) c00 ( 3 k) aspi32.sys Wed Jul 17
09:05:08 2002
eb420000 1d60 ( 8 k) ba0 ( 3 k) secdrv.sys Thu Nov 14
03:52:30 2002
eb295000 46200 ( 281 k) 8480 ( 34 k) srv.sys Fri Mar 28
11:54:53 2003
eb191000 10700 ( 66 k) 2c80 ( 12 k) ipnat.sys Thu Aug 29
01:36:12 2002
f77f7000 4200 ( 17 k) 980 ( 3 k) TDTCP.SYS Fri Aug 17
13:46:43 2001
eb0ac000 1aa00 ( 107 k) 1700 ( 6 k) RDPWD.SYS Thu Aug 29
01:40:38 2002
eb38c000 bc00 ( 47 k) 1e80 ( 8 k) sysaudio.sys Thu Aug 29
02:01:17 2002
eb04e000 10d00 ( 68 k) 1e00 ( 8 k) wdmaud.sys Thu Aug 29
02:00:46 2002
bffa0000 32000 ( 200 k) 10680 ( 66 k) ATMFD.DLL Fri Aug 17
14:55:56 2001
b9bae000 18f80 ( 100 k) db80 ( 55 k) kmixer.sys Thu Aug 29
01:32:28 2002
f7ad5000 a80 ( 3 k) 500 ( 2 k) MSPQM.sys Fri Aug 17
13:48:42 2001
f7a43000 e00 ( 4 k) 600 ( 2 k) splitter.sys Thu Aug 29
01:32:27 2002
f7a37000 c00 ( 3 k) 580 ( 2 k) MSPCLOCK.sys Wed Dec 04
09:09:43 2002
Unloaded modules:
b9bae000 b9bd5000 kmixer.sys
b9ced000 b9d14000 kmixer.sys
f7ab3000 f7ab5000 splitter.sys
b9ced000 b9d14000 kmixer.sys
b9ced000 b9d14000 kmixer.sys
b9ced000 b9d14000 kmixer.sys
b9ced000 b9d14000 kmixer.sys
ba214000 ba23b000 kmixer.sys
f7a71000 f7a73000 MSPQM.sys
bae11000 bae38000 kmixer.sys
f7af3000 f7af5000 splitter.sys
f7ad1000 f7ad3000 MSPCLOCK.sys
f7acf000 f7ad1000 MSPQM.sys
f7aa5000 f7aa7000 splitter.sys
eb917000 eb91b000 CCDECODE.sys
f7a5b000 f7a5d000 MSTEE.sys
f7a6f000 f7a71000 splitter.sys
b34b8000 b34df000 kmixer.sys
f7a9d000 f7a9f000 splitter.sys
f7ad7000 f7ad9000 splitter.sys
bafd9000 bb000000 kmixer.sys
eba9a000 ebac1000 kmixer.sys
eba9a000 ebac1000 kmixer.sys
eba9a000 ebac1000 kmixer.sys
f7bf1000 f7bf2000 drmkaud.sys
ec160000 ec16d000 DMusic.sys
f6a4e000 f6a5c000 swmidi.sys
eb089000 eb0ac000 aec.sys
f7a5b000 f7a5d000 splitter.sys
f69be000 f69cc000 swmidi.sys
f6964000 f6968000 kbdhid.sys
f7817000 f781c000 Cdaudio.SYS
f6968000 f696b000 Sfloppy.SYS
Loading User Symbols
PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for
details
kd> !timer
Dump system timers
Interrupt time: 7b9c2f50 000000c7 [ 1/23/2004 23:04:58.657]
List Timer Interrupt Low/High Fire Time DPC/thread
1 f7e1f110 1ac7148f 7e3c1e7f [ 9/13/30828 18:48:05.474] thread
f7e1f020
2 f7e14c20 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
f7e14b30
f7e1f9a8 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
f7e1f8b8
f7e55890 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
f7e557a0
8154a928 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
8154a838
f7e1fe98 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
f7e1fda8
f7e14e98 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
f7e14da8
f7dfbb78 1ac75d6f 7e3c1e7f [ 9/13/30828 18:48:05.476] thread
f7dfba88
f7dda750 1ac8089f 7e3c1e7f [ NEVER ] thread
f7dda660
f7cfb110 1ac8089f 7e3c1e7f [ NEVER ] thread
f7cfb020
3 82e2fe98 7ddafe60 000000c7 [ 1/23/2004 23:05:02.424] thread
82e2fda8
829e8cf0 3469c950 000000c9 [ 1/23/2004 23:17:18.202]
netbt!TimerExpiry
4 eb7157f0 7ddc37e0 000000c7 [ 1/23/2004 23:05:02.432]
TDI!CTEpTimerHandler
6 82e42438 422e2130 800000bb [ NEVER ] thread
82e42348
8 82b83d08 7c5aecf0 000000c7 [ 1/23/2004 23:04:59.907] thread
82b83c18
10 82bb08e8 b3614eb0 000000c7 [ 1/23/2004 23:06:32.224] thread
82bb07f8
12 82bec998 89a9c460 000000d1 [ 1/24/2004 00:16:57.202] thread
82db8b20
15 82e37888 a04f5c20 000027d2 [ 3/13/2004 15:33:00.042]
afd!AfdTimeoutPoll
16 82e7b810 7def5c50 000000c7 [ 1/23/2004 23:05:02.558] thread
82e7b720
18 f7d51550 7df1a620 000000c7 [ 1/23/2004 23:05:02.573]
afd!AfdTimeoutPoll
23 805466e0 b2396290 000038aa [ 4/ 4/2004 01:59:59.995]
nt!ExpTimeZoneDpcRoutine
24 80540d70 P 7f816ab0 000000c7 [ 1/23/2004 23:05:05.193]
nt!IopIrpStackProfilerTimer
27 82bd84c8 7c785ef0 000000c7 [ 1/23/2004 23:05:00.100] thread
82bd83d8
28 82b51e98 7c7a0e00 000000c7 [ 1/23/2004 23:05:00.111] thread
82b51da8
29 82727c58 136022a0 80000000 [ NEVER ]
nt!ExpTimerDpcRoutine
82bcde98 136022a0 80000000 [ NEVER ] thread
82bcdda8
82bf3c20 22d93510 800000be [ NEVER ]
nt!ExpTimerDpcRoutine
f7d45510 22d93510 800000be [ NEVER ] thread
f7d45420
31 82dcba40 a8cf1e90 000000c7 [ 1/23/2004 23:06:14.488] thread
82dcb950
32 82e7a698 53731510 80000084 [ NEVER ]
nt!ExpTimerDpcRoutine
33 f7e51110 7c80be40 000000c7 [ 1/23/2004 23:05:00.155] thread
f7e51020
82bcf800 53749c40 80000084 [ NEVER ] thread
82bcf710
35 82d29eb0 P 85b060a0 000000c7 [ 1/23/2004 23:05:15.567]
NDIS!ndisMTimerDpc
37 82c0a650 65f2ae80 00000192 [ 1/24/2004 23:17:30.150] thread
82c0a560
82daf2c0 64694c20 80000000 [ NEVER ] thread
82e8ece8
38 f7408cd0 c5e1f7e0 000000c7 [ 1/23/2004 23:07:03.266]
Ntfs!NtfsUsnTimeOutDpc
44 f7da7610 27b69400 000000c8 [ 1/23/2004 23:09:47.398] thread
f7da7520
82be5758 3f5ab930 000000c9 [ 1/23/2004 23:17:36.558] thread
82be5668
45 f7dee9d0 7c93bf80 000000c7 [ 1/23/2004 23:05:00.280] thread
f7dee8e0
46 815e2898 7c949170 000000c7 [ 1/23/2004 23:05:00.285] thread
815e27a8
f7da1110 8eeb3ae0 000000c7 [ 1/23/2004 23:05:31.052] thread
f7da1020
47 82e139d0 fde92b10 80000074 [ NEVER ]
nt!ExpTimerDpcRoutine
814d8d30 fde92b10 80000074 [ NEVER ] thread
814d8c40
49 f7408c70 7e20a4b0 000000c7 [ 1/23/2004 23:05:02.881]
Ntfs!NtfsVolumeCheckpointDpc
52 eb1a12a0 P 9697fe70 000000c7 [ 1/23/2004 23:05:43.928]
ipnat!NatTimerRoutine
53 82bf78e0 7c9fdd50 000000c7 [ 1/23/2004 23:05:00.359] thread
82bf77f0
55 f7e51390 7ca31c90 000000c7 [ 1/23/2004 23:05:00.380] thread
f7e512a0
56 82be4e98 7fb23780 000000c7 [ 1/23/2004 23:05:05.512] thread
82be4da8
eb2a3fa0 7fb36500 000000c7 [ 1/23/2004 23:05:05.520]
srv!ScavengerTimerRoutine
58 f7e14730 8befd2d0 000000c7 [ 1/23/2004 23:05:26.049] thread
f7e14640
60 82eebdf0 7caa10e0 000000c7 [ 1/23/2004 23:05:00.426]
afd!AfdTimeoutPoll
82c0ae98 8a6b0690 000000c7 [ 1/23/2004 23:05:23.501] thread
82c0ada8
62 f7e0be98 876076f0 000000c7 [ 1/23/2004 23:05:18.398] thread
f7e0bda8
66 81b07488 7e3af8f0 000000c7 [ 1/23/2004 23:05:03.053] thread
81b07398
67 82d65b48 P 7cb4de50 000000c7 [ 1/23/2004 23:05:00.497]
NDIS!ndisMWakeUpDpc
82cd9b48 P 7cb4de50 000000c7 [ 1/23/2004 23:05:00.497]
NDIS!ndisMWakeUpDpcX
82d011a0 P 7cb4de50 000000c7 [ 1/23/2004 23:05:00.497]
NDIS!ndisMWakeUpDpcX
82d55bb8 7e3bee10 000000c7 [ 1/23/2004 23:05:03.060] thread
82d55ac8
68 f7e1fc20 8d85ace0 000000c7 [ 1/23/2004 23:05:28.709] thread
f7e1fb30
72 815e24e8 0952a280 000000c8 [ 1/23/2004 23:08:56.412] thread
815e23f8
79 82e28c30 0d8fca00 80000000 [ NEVER ]
nt!ExpTimerDpcRoutine
82ea6580 0d8fca00 80000000 [ NEVER ] thread
82ea6490
89 81546e28 7e5e2e10 000000c7 [ 1/23/2004 23:05:03.284]
afd!AfdTimeoutPoll
96 82b6d748 be972d20 000000c7 [ 1/23/2004 23:06:51.032] thread
82b6d658
97 81653460 1eddd0f0 000000c8 [ 1/23/2004 23:09:32.556] thread
81653370
98 82bbc230 10bb3290 80000000 [ NEVER ] thread
82b917f0
99 f7dfe110 7e6ce010 000000c7 [ 1/23/2004 23:05:03.380] thread
f7dfe020
102 82bac230 10c14f50 80000000 [ NEVER ] thread
82bab988
104 82bce330 830af7f0 000000c7 [ 1/23/2004 23:05:11.127] thread
82bce240
111 82b6ce98 7cf87ee0 000000c7 [ 1/23/2004 23:05:00.940] thread
82b6cda8
112 f7d95e98 bba0dd70 000000c7 [ 1/23/2004 23:06:46.062] thread
f7d95da8
113 f7e51c20 7cfb0b10 000000c7 [ 1/23/2004 23:05:00.957] thread
f7e51b30
114 81f48560 90daec00 000000c7 [ 1/23/2004 23:05:34.301] thread
81f48470
115 82bccd18 800c7c20 000000c7 [ 1/23/2004 23:05:06.104] thread
82bccc28
f7d87570 b4e03020 80000076 [ NEVER ]
nt!ExpTimerDpcRoutine
f7d95308 b4e03020 80000076 [ NEVER ] thread
f7d95218
f7ca7e68 b4e03020 80000076 [ NEVER ] thread
f7da1da8
117 80546660 a04e39a0 006b9025 [12/31/2099 23:59:59.996]
nt!ExpCenturyDpcRoutine
119 f7e25110 9269af70 000000c7 [ 1/23/2004 23:05:36.914] thread
f7e25020
120 82d49de0 e3d68d40 000000ce [ 1/23/2004 23:58:00.000]
121 81603d00 08166b20 000000c8 [ 1/23/2004 23:08:54.339] thread
81603c10
122 82c00220 7d08d1f0 000000c7 [ 1/23/2004 23:05:01.047] *** ERROR:
Module load completed but symbols could not be loaded for ctoss2k.sys
ctoss2k+8c7a
123 f7dfd110 7d0af690 000000c7 [ 1/23/2004 23:05:01.061] thread
f7dfd020
f7d98538 15da3160 000000c8 [ 1/23/2004 23:09:17.433] thread
f7d98448
82bd4d18 15da3160 000000c8 [ 1/23/2004 23:09:17.433] thread
82bd4c28
129 82d54b98 P 7d149d60 000000c7 [ 1/23/2004 23:05:01.124]
watchdog!WdDeferredWatchdogDpcCallback
825179a8 P 7d149d60 000000c7 [ 1/23/2004 23:05:01.124]
watchdog!WdDeferredWatchdogDpcCallback
f7de57f0 81aa6f90 000000c7 [ 1/23/2004 23:05:08.817] thread
f7de5700
130 82b6dd50 7d158580 000000c7 [ 1/23/2004 23:05:01.130]
netbt!TimerExpiry
f69f9ca8 894e7d00 000000c7 [ 1/23/2004 23:05:21.636]
ipsec!IPSecTickHandler
81ada5b0 ee294d80 000000c7 [ 1/23/2004 23:08:10.842] thread
81ada4c0
82f03760 ee2974b0 000000c7 [ 1/23/2004 23:08:10.843] thread
82f03670
131 82ab9738 991ee8a0 800000be [ NEVER ]
nt!ExpTimerDpcRoutine
f7db5110 991ee8a0 800000be [ NEVER ] thread
f7db5020
134 82e8f6a0 89549480 000000c7 [ 1/23/2004 23:05:21.676] thread
82e8f5b0
138 f7e15a60 42f80540 000000c9 [ 1/23/2004 23:17:42.622] thread
f7e15970
139 82d99c80 7b9cc5d0 000000c7 [ 1/23/2004 23:04:58.661] thread
82d99958
140 f7dabc38 7b9d70c0 000000c7 [ 1/23/2004 23:04:58.665] thread
f7dabb48
142 816127d0 98a954d0 000000c7 [ 1/23/2004 23:05:47.397] thread
816126e0
143 eb696e80 7ba247f0 000000c7 [ 1/23/2004 23:04:58.697]
rdbss!RxTimerDispatch
f7e554a8 7ba26e90 000000c7 [ 1/23/2004 23:04:58.698] thread
f7e553b8
815d06d8 98aa3ff0 000000c7 [ 1/23/2004 23:05:47.403] thread
815d05e8
805465e0 2a8d6840 000000c9 [ 1/23/2004 23:17:01.658]
nt!ExpTimeRefreshDpcRoutine
144 82be7e98 98ac5030 000000c7 [ 1/23/2004 23:05:47.417] thread
82be7da8
146 80545480 7d2e1cd0 000000c7 [ 1/23/2004 23:05:01.291]
nt!PspJobTimeLimitsDpcRoutine
82dc0990 a4e8e390 000000c7 [ 1/23/2004 23:06:07.946] thread
82dc08a0
147 f7e1c8e8 da669c50 000000c7 [ 1/23/2004 23:07:37.690] thread
f7e1c7f8
148 eb71ca70 P 7ba9c280 000000c7 [ 1/23/2004 23:04:58.746]
tcpip!TCBTimeoutdpc
149 82cd8298 P 7bab4a60 000000c7 [ 1/23/2004 23:04:58.756]
NDIS!ndisMTimerDpc
152 f7d1e480 7baf88d0 000000c7 [ 1/23/2004 23:04:58.784] thread
f7d1e390
154 82b550b8 7bb36c60 000000c7 [ 1/23/2004 23:04:58.809]
TDI!CTEpTimerHandler
81aff6b8 7bb36c60 000000c7 [ 1/23/2004 23:04:58.809]
TDI!CTEpTimerHandler
82d6af78 657e84e1 000000c8 [ 1/23/2004 23:11:31.050]
ks!SweeperDeferredRoutine
156 f7dfe730 7bb654f0 000000c7 [ 1/23/2004 23:04:58.829] thread
f7dfe640
158 82d10730 7bb97b4f 000000c7 [ 1/23/2004 23:04:58.849]
USBPORT!USBPORT_DM_TimerDpc
f7d97110 8c8897f0 000000c7 [ 1/23/2004 23:05:27.050] thread
f7d97020
f7e1baa8 8c8897f0 000000c7 [ 1/23/2004 23:05:27.050] thread
f7e1b9b8
159 8159f110 ee556380 000000c7 [ 1/23/2004 23:08:11.131] thread
8159f020
160 82d96e98 835fc9d0 000000c7 [ 1/23/2004 23:05:11.683] thread
82d96da8
161 8251a338 7bbe13a0 000000c7 [ 1/23/2004 23:04:58.879]
TDI!CTEpTimerHandler
82ba1768 P 7ecbab20 000000c7 [ 1/23/2004 23:05:04.002]
afd!AfdCheckLookasideLists
165 82474718 7bc43320 000000c7 [ 1/23/2004 23:04:58.919]
TDI!CTEpTimerHandler
82474858 7bc43320 000000c7 [ 1/23/2004 23:04:58.919]
TDI!CTEpTimerHandler
167 82b79a80 836aa420 000000c7 [ 1/23/2004 23:05:11.754] thread
82b79990
168 f7e27e98 7bc806d0 000000c7 [ 1/23/2004 23:04:58.945] thread
f7e27da8
82efee98 836c2c00 000000c7 [ 1/23/2004 23:05:11.764] thread
82efeda8
169 81636d98 7bca52a0 000000c7 [ 1/23/2004 23:04:58.960] thread
81636ca8
170 82d39818 c3f2a480 80000000 [ NEVER ] thread
82c0dda8
171 f7dac110 ce50a290 000000c7 [ 1/23/2004 23:07:17.413] thread
f7dac020
f7e03110 b85c0a60 000000d3 [ 1/24/2004 00:32:34.539] thread
f7e03020
173 82cdf730 7bcffbdf 000000c7 [ 1/23/2004 23:04:58.997]
USBPORT!USBPORT_DM_TimerDpc
80543440 fdb37240 000000c7 [ 1/23/2004 23:08:36.913]
nt!MiModifiedPageWriterTimerDispatch
176 f7e50110 7bd455b0 000000c7 [ 1/23/2004 23:04:59.025] thread
f7e50020
82e601a0 P 7bd53960 000000c7 [ 1/23/2004 23:04:59.031]
NDIS!ndisMWakeUpDpc
177 82f6fd78 7bd67a50 000000c7 [ 1/23/2004 23:04:59.039] thread
82f6fc88
82da5720 f306bb00 000000c7 [ 1/23/2004 23:08:19.004] thread
82c1ada8
178 f7e02110 7bd85090 000000c7 [ 1/23/2004 23:04:59.051] thread
f7e02020
179 f7e01e98 7bd9d870 000000c7 [ 1/23/2004 23:04:59.061] thread
f7e01da8
f7e523d8 7bd9d870 000000c7 [ 1/23/2004 23:04:59.061] thread
f7e522e8
815dda10 86ec4ee0 800000b1 [ NEVER ]
nt!ExpTimerDpcRoutine
f7de8628 86ec4ee0 800000b1 [ NEVER ] thread
f7de8538
180 f7e51e98 7d623770 000000c7 [ 1/23/2004 23:05:01.633] thread
f7e51da8
184 8151abb8 7be0bbe0 000000c7 [ 1/23/2004 23:04:59.106] thread
8151aac8
82dd05d0 P 321af1d0 00000131 [ 1/24/2004 11:41:41.990]
NDIS!ndisMWakeUpDpcX
82d02b80 P 321af1d0 00000131 [ 1/24/2004 11:41:41.990]
NDIS!ndisMWakeUpDpcX
185 82cd91a0 P 321c7900 00000131 [ 1/24/2004 11:41:42.000]
NDIS!ndisMWakeUpDpcX
82d01b48 P 321c7900 00000131 [ 1/24/2004 11:41:42.000]
NDIS!ndisMWakeUpDpcX
188 81619020 9201f8a0 800000ba [ NEVER ] thread
f7e03790
189 f7da86b0 807dcae0 000000c7 [ 1/23/2004 23:05:06.847] thread
f7da85c0
190 814ecdc8 62458db0 800000c2 [ NEVER ]
nt!ExpTimerDpcRoutine
f7e26930 62458db0 800000c2 [ NEVER ] thread
f7e26840
82bd7748 76aa1780 800000c7 [ NEVER ] thread
82bd7658
191 8053f908 7beb9a30 000000c7 [ 1/23/2004 23:04:59.178]
nt!CcScanDpc
82d83ba0 484e9610 80000071 [ NEVER ]
nt!ExpTimerDpcRoutine
81acf508 484e9610 80000071 [ NEVER ] thread
81acf418
192 f7e519a8 7bed97a0 000000c7 [ 1/23/2004 23:04:59.191] thread
f7e518b8
f7e55110 7bed97a0 000000c7 [ 1/23/2004 23:04:59.191] thread
f7e55020
193 82bba4c0 3ba8eaa0 000000c9 [ 1/23/2004 23:17:30.360] thread
82bba3d0
194 f798ad78 7bf05900 000000c7 [ 1/23/2004 23:04:59.209] thread
82fcbda8
195 f7d95c20 03f231a0 000000c8 [ 1/23/2004 23:08:47.391] thread
f7d95b30
198 80544d60 P 7bf65150 000000c7 [ 1/23/2004 23:04:59.248]
nt!PopScanIdleList
80540ea0 P 7bf65150 000000c7 [ 1/23/2004 23:04:59.248]
nt!IopTimerDispatch
200 82bd7320 8b419f70 000000c7 [ 1/23/2004 23:05:24.907] thread
82bd7230
201 82bb43c8 8834a0d0 000000c7 [ 1/23/2004 23:05:19.789] thread
82bb42d8
82b61f68 592a66e0 80000000 [ NEVER ] thread
82bcc7f0
82c1fe98 79c9ea30 800000c7 [ NEVER ] thread
82c1fda8
202 815639a0 7bfbdd80 000000c7 [ 1/23/2004 23:04:59.284]
afd!AfdTimeoutPoll
206 82cffe98 852d09c0 000000c7 [ 1/23/2004 23:05:14.706] thread
82cffda8
210 82dadf10 6571a790 80000000 [ NEVER ] thread
82ea3da8
211 f7dffc20 7c0a8610 000000c7 [ 1/23/2004 23:04:59.380] thread
f7dffb30
213 82bece98 884689c0 000000c7 [ 1/23/2004 23:05:19.906] thread
82becda8
215 f7db5e98 80a597a0 000000c7 [ 1/23/2004 23:05:07.107] thread
f7db5da8
217 82f66ce8 788a9650 80000001 [ NEVER ]
nt!ExpTimerDpcRoutine
82bc5d10 788a9650 80000001 [ NEVER ] thread
82bc5c20
218 82d81e98 86c7d900 000000c7 [ 1/23/2004 23:05:17.398] thread
82d81da8
220 f7996d7c 7c17fe90 000000c7 [ 1/23/2004 23:04:59.469] thread
82fc7da8
221 82bb0c18 86cb1ec0 000000c7 [ 1/23/2004 23:05:17.420]
nt!ExpTimerDpcRoutine
226 8161f5b8 8859fa90 000000c7 [ 1/23/2004 23:05:20.034] thread
8161f4c8
814f7110 885abe80 000000c7 [ 1/23/2004 23:05:20.039] thread
814f7020
f7dff5e8 885b3410 000000c7 [ 1/23/2004 23:05:20.042] thread
f7dff4f8
f7dfe9a8 885b3410 000000c7 [ 1/23/2004 23:05:20.042] thread
f7dfe8b8
82d7bd30 885b3410 000000c7 [ 1/23/2004 23:05:20.042] thread
82d7bc40
f7e02e98 885b3410 000000c7 [ 1/23/2004 23:05:20.042] thread
f7e02da8
227 82bdeb80 ac38c9a0 000000c8 [ 1/23/2004 23:13:29.711] thread
82bdea90
229 82e9dc28 7c263b00 000000c7 [ 1/23/2004 23:04:59.562] thread
82e9db38
231 82d93400 949c5eb0 000000c7 [ 1/23/2004 23:05:40.601]
nt!ExpTimerDpcRoutine
233 82dc22b8 8e819b80 000000c7 [ 1/23/2004 23:05:30.360] thread
82dc21c8
236 815484e0 66fad780 800000b5 [ NEVER ]
nt!ExpTimerDpcRoutine
f7c8a890 66fad780 800000b5 [ NEVER ] thread
f7c8a7a0
237 f7e52110 7c327a00 000000c7 [ 1/23/2004 23:04:59.642] thread
f7e52020
82f01ad0 eeccf0f0 000000c7 [ 1/23/2004 23:08:11.915] thread
82f019e0
f7dec748 eeccf0f0 000000c7 [ 1/23/2004 23:08:11.915] thread
f7dec658
238 82e95408 P 7c336520 000000c7 [ 1/23/2004 23:04:59.648] thread
82c71a80
8151a8e0 8f400000 800000ba [ NEVER ] thread
f7dff7a0
241 f7e2a110 7dbfc100 000000c7 [ 1/23/2004 23:05:02.246] thread
f7e2a020
243 814ff110 80d0c680 000000c7 [ 1/23/2004 23:05:07.390] thread
814ff020
244 82c10e98 91a16e30 000000c7 [ 1/23/2004 23:05:35.601] thread
82c10da8
eb71d720 94af1190 000000c7 [ 1/23/2004 23:05:40.724]
tcpip!McastTimerRoutine
249 f7de42e0 826055e0 000000c7 [ 1/23/2004 23:05:10.009] thread
f7de41f0
251 f7e45110 df9a5f90 000000c7 [ 1/23/2004 23:07:46.417] thread
f7e45020
82bd2658 df9a5f90 000000c7 [ 1/23/2004 23:07:46.417] thread
82bd2568
253 82e7ef28 3bebb2f0 000000cb [ 1/23/2004 23:31:49.791] thread
82b5ada8
255 f69f9d10 3463a9d0 000000c9 [ 1/23/2004 23:17:18.162]
ipsec!IPSecTickHandler
Total Timers: 203, Maximum List: 9
Current Hand: 139, Maximum Search: 0
Wakeable timers:
82d49de0 e3d68d40 000000ce [ 1/23/2004 23:58:00.000]
kd> !object 82d49de0
Object: 82d49de0 Type: (82fcb2e8) Timer
ObjectHeader: 82d49dc8
HandleCount: 1 PointerCount: 2
Directory Object: e17dca08 Name: PVSWakeUp
***********************************************
buggered if I can figure this one out. PVSWakeUp is part of my
snapstream BeyondTV system; I'd suspect it, but it's new (newer than
the BSoD's) and not all of the BSoD's relate to it. Some of them are
just weird -- like the win32k crashes.
I'm stumped. Anyone got suggestions as to what to check next in kd?
Before anyone asks, yes, I've changed a LOT of new hardware and
software into the machine. I'm a bit of a hacker, so my machine is
always in flux. In an ideal world, I could just undo one change at a
time, but I honestly don't remember the sequence, so I'm stuck trying
to debug this mess "as is."
Now then. Most of the stops appear to be happening under stress, many
of them appear to be when we're doing "something" related to
multimedia. I noticed two things.
First, for a while, any time I would ActiveSync my PDA, my machine
would trap with an error in USBPORT.SYS. I noticed a hotfix on MS's
site that was available to install the latest ActiveSync, and I
installed that. My machine seemed a TAD more stable, but I think
that's just psychosomatic, since I got another BSoD tonight targeting
USBPORT.SYS.
Also, I can fairly reliably reproduce the trap. I have a copy of a
popular video production package on my system. When I load a large
video file into it (a recording of a TV show I TiVo'ed), and I am
rendering it (after removing commercials and compressing to a smaller
format), the machine will ALWAYS BSoD at some point. Not right away,
just... at some point. And it seems like anything where I'm doing
heavy multimedia processing will do this.
Here are some of the stops I've got in the past few days. I'll put
the result of all the !analyze -v's, and one good !drivers. Also,
since a lot of the bugchecks seem to be in KiTimerListExpire (maybe
some driver is leaving a DPC queued while unloading?) I'll throw in a
!timer for kicks. There's one oddity I noticed today. I have a BSoD
where it's indicating that the fault is at an instruction it couldn't
be at. Specifically in the following, note that the faulting IP
(804fa1ed) and the actual legal instruction address (804fa1ee is next)
are different. I have had random BSoD's on this machine (Athlon XP
2000+) for a long time now. I am not 100% sure the memory is good,
and now I fear for the processor.
Here's the raw data.
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED (8e)
This is a very common bugcheck. Usually the exception address
pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this
address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never
have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
An exception code of 0x80000002 (STATUS_DATATYPE_MISALIGNMENT)
indicates
that an unaligned data reference was encountered. The trap frame will
supply additional information.
Arguments:
Arg1: 80000003, The exception code that was not handled
Arg2: 804fa1ed, The address that the exception occurred at
Arg3: f794ae28, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (HRESULT) 0x80000003 (2147483651) - One or more
arguments are invalid
FAULTING_IP:
nt!KiTimerListExpire+117
804fa1ed e8ff7604ff call 7f5418f1
TRAP_FRAME: f794ae28 -- (.trap fffffffff794ae28)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=00000002 edx=00000002 esi=f794aeb0
edi=82b46240
eip=804fa1ee esp=f794ae9c ebp=f794afa4 iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00000246
nt!KiTimerListExpire+0x118:
804fa1ee ff7604 push dword ptr [esi+0x4]
ds:0023:f794aeb4=82b46218
Resetting default scope
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0x8E
LAST_CONTROL_TRANSFER: from 804fa30a to 804fa1ee
STACK_TEXT:
f794afa4 804fa30a 7b9c2f50 000000c7 ffdff000
nt!KiTimerListExpire+0x118
f794afd0 805317a9 805423e0 00000000 00828b8b nt!KiTimerExpiration+0xb0
f794aff4 8053147a b9cdcd54 00000000 00000000 nt!KiRetireDpcList+0x46
FOLLOWUP_IP:
nt!KiTimerListExpire+117
804fa1ed e8ff7604ff call 7f5418f1
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!KiTimerListExpire+117
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ea80977
STACK_COMMAND: .trap fffffffff794ae28 ; kb
BUCKET_ID: 0x8E_nt!KiTimerListExpire+117
Followup: MachineOwner
---------
***************************************************************
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid)
address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000002, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 82b4d242, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 00000002
CURRENT_IRQL: 2
FAULTING_IP:
+ffffffff82b4d242
82b4d242 0001 add [ecx],al
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from 804fa1f6 to 82b4d242
TRAP_FRAME: f794ae1c -- (.trap fffffffff794ae1c)
ErrCode = 00000002
eax=00000000 ebx=00000000 ecx=00000002 edx=00000002 esi=f794aeb0
edi=82b4d240
eip=82b4d242 esp=f794ae90 ebp=f794afa4 iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
82b4d242 0001 add [ecx],al
ds:0023:00000002=??
Resetting default scope
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be
wrong.
f794ae8c 804fa1f6 82b4d240 82b4d218 4ecedef7 0x82b4d242
f794afa4 804fa30a 47f84650 0000000f ffdff000
nt!KiTimerListExpire+0x120
f794afd0 805317a9 805423e0 00000000 000a000f nt!KiTimerExpiration+0xb0
f794aff4 8053147a f7a2ed54 00000000 00000000 nt!KiRetireDpcList+0x46
FOLLOWUP_IP:
nt!KiTrap0E+2ad
80530335 f7457000000200 test dword ptr [ebp+0x70],0x20000
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!KiTrap0E+2ad
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ea80977
STACK_COMMAND: .trap fffffffff794ae1c ; kb
BUCKET_ID: 0xD1_W_nt!KiTrap0E+2ad
Followup: MachineOwner
---------
kd> .trap fffffffff794ae1c ; kb
ErrCode = 00000002
eax=00000000 ebx=00000000 ecx=00000002 edx=00000002 esi=f794aeb0
edi=82b4d240
eip=82b4d242 esp=f794ae90 ebp=f794afa4 iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
82b4d242 0001 add [ecx],al
ds:0023:00000002=??
*** Stack trace for last set context - .thread/.cxr resets it
ChildEBP RetAddr Args to Child
WARNING: Frame IP not in any known module. Following frames may be
wrong.
f794ae8c 804fa1f6 82b4d240 82b4d218 4ecedef7 0x82b4d242
f794afa4 804fa30a 47f84650 0000000f ffdff000
nt!KiTimerListExpire+0x120
f794afd0 805317a9 805423e0 00000000 000a000f nt!KiTimerExpiration+0xb0
f794aff4 8053147a f7a2ed54 00000000 00000000 nt!KiRetireDpcList+0x46
***************************************************************
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid)
address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 4801f024, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 806abfe4, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 4801f024
CURRENT_IRQL: 2
FAULTING_IP:
hal!KfLowerIrql+4
806abfe4 803d24f0dfff02 cmp byte ptr [ffdff024],0x2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from 804fb007 to 806abfe4
TRAP_FRAME: eb140bc4 -- (.trap ffffffffeb140bc4)
ErrCode = 00000000
eax=00000000 ebx=8159b208 ecx=00000000 edx=80010031 esi=806abfe0
edi=00000000
eip=806abfe4 esp=eb140c38 ebp=eb140c6c iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
hal!KfLowerIrql+0x4:
806abfe4 803d24f0dfff02 cmp byte ptr [ffdff024],0x2
ds:0023:ffdff024=1f
Resetting default scope
STACK_TEXT:
eb140c38 804fb007 81614960 816148f0 804f50ec hal!KfLowerIrql+0x4
eb140c44 804f50ec 000025ff e123bcd8 00000000 nt!KiSwapThread+0x67
eb140c6c bf87b94a 00000001 0000000d 00000001
nt!KeWaitForSingleObject+0x1c0
eb140ca8 bf87bd0b 000025ff 00000000 00000001
win32k!xxxSleepThread+0x189
eb140cec bf87bccf eb140d18 000025ff 00000000
win32k!xxxRealInternalGetMessage+0x40f
eb140d4c 8052d571 0095a540 00000000 00000000
win32k!NtUserGetMessage+0x27
eb140d4c 7ffe0304 0095a540 00000000 00000000 nt!KiSystemService+0xc4
0012fe9c 00000000 00000000 00000000 00000000
SharedUserData!SystemCallStub+0x4
FOLLOWUP_IP:
win32k!xxxSleepThread+189
bf87b94a 8945fc mov [ebp-0x4],eax
SYMBOL_STACK_INDEX: 3
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: win32k!xxxSleepThread+189
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 3f73195d
STACK_COMMAND: .trap ffffffffeb140bc4 ; kb
BUCKET_ID: 0xA_win32k!xxxSleepThread+189
Followup: MachineOwner
---------
***************************************************************
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid)
address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 82496a80, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 00000000
CURRENT_IRQL: 2
FAULTING_IP:
+ffffffff82496a80
82496a80 1300 adc eax,[eax]
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from 804fa1f6 to 82496a80
TRAP_FRAME: f794ae1c -- (.trap fffffffff794ae1c)
ErrCode = 00000000
eax=00000000 ebx=00000000 ecx=00000002 edx=00000002 esi=f794aeb0
edi=82496a80
eip=82496a80 esp=f794ae90 ebp=f794afa4 iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
82496a80 1300 adc eax,[eax]
ds:0023:00000000=????????
Resetting default scope
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be
wrong.
f794ae8c 804fa1f6 82537210 82537200 dff00000 0x82496a80
f794afa4 804fa30a 8746a680 0000000f ffdff000
nt!KiTimerListExpire+0x120
f794afd0 805317a9 805423e0 00000000 000a297d nt!KiTimerExpiration+0xb0
f794aff4 8053147a eb4b9d54 00000000 00000000 nt!KiRetireDpcList+0x46
FOLLOWUP_IP:
nt!KiTrap0E+2ad
80530335 f7457000000200 test dword ptr [ebp+0x70],0x20000
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!KiTrap0E+2ad
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 3ea80977
STACK_COMMAND: .trap fffffffff794ae1c ; kb
BUCKET_ID: 0xD1_nt!KiTrap0E+2ad
Followup: MachineOwner
---------
***************************************************************
kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid)
address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 8b00f024, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 806abfe4, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 8b00f024 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
hal!KfLowerIrql+4
806abfe4 803d24f0dfff02 cmp byte ptr [ffdff024],0x2
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
LAST_CONTROL_TRANSFER: from 804fb007 to 806abfe4
TRAP_FRAME: f777ea0c -- (.trap fffffffff777ea0c)
ErrCode = 00000000
eax=00000000 ebx=82d98a40 ecx=00000000 edx=80010031 esi=806abfe0
edi=00000002
eip=806abfe4 esp=f777ea80 ebp=f777eac4 iopl=0 nv up ei pl zr
na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010246
hal!KfLowerIrql+0x4:
806abfe4 803d24f0dfff02 cmp byte ptr [ffdff024],0x2
ds:0023:ffdff024=1f
Resetting default scope
STACK_TEXT:
f777ea80 804fb007 00000000 82d6b400 804f4e72 hal!KfLowerIrql+0x4
f777ea8c 804f4e72 804f8938 00000001 bf98fdf8 nt!KiSwapThread+0x67
f777eac4 bf87aeca 00000007 82bd0a20 00000001
nt!KeWaitForMultipleObjects+0x282
f777ed34 bf80bb6f f774e4e4 00000002 f777ed64
win32k!RawInputThread+0x454
f777ed44 bf875da9 f774e4e4 f777ed64 006dfff4
win32k!xxxCreateSystemThreads+0x5e
f777ed54 8052d571 00000000 00000022 00000000
win32k!NtUserCallOneParam+0x20
f777ed54 7ffe0304 00000000 00000022 00000000 nt!KiSystemService+0xc4
00000000 00000000 00000000 00000000 00000000
SharedUserData!SystemCallStub+0x4
FOLLOWUP_IP:
win32k!RawInputThread+454
bf87aeca 392db45c99bf cmp [win32k!gdwUpdateKeyboard
(bf995cb4)],ebp
SYMBOL_STACK_INDEX: 3
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: win32k!RawInputThread+454
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 3f73195d
STACK_COMMAND: .trap fffffffff777ea0c ; kb
BUCKET_ID: 0xA_win32k!RawInputThread+454
Followup: MachineOwner
---------
***************************************************************
This is from the first dump, from tonight:
kd> !drivers
System Driver and Image Summary
Base Code Size Data Size Image Name Creation
Time
804d4000 183080 (1549 k) 52c80 (332 k) ntoskrnl.exe Thu Apr 24
08:57:43 2003
806ab000 f500 ( 62 k) 3580 ( 14 k) hal.dll Thu Aug 29
01:05:02 2002
f7a2f000 1100 ( 5 k) 780 ( 2 k) KDCOM.DLL Fri Aug 17
13:49:10 2001
f793f000 1800 ( 6 k) 1500 ( 6 k) BOOTVID.dll Fri Aug 17
13:49:09 2001
f74e2000 24100 ( 145 k) 7880 ( 31 k) ACPI.sys Thu Aug 29
01:09:03 2002
f7a31000 800 ( 2 k) 600 ( 2 k) WMILIB.SYS Fri Aug 17
14:07:23 2001
f752f000 c700 ( 50 k) 2c00 ( 11 k) pci.sys Thu Aug 29
01:09:10 2002
f753f000 7200 ( 29 k) 1700 ( 6 k) isapnp.sys Fri Aug 17
13:58:01 2001
f7a33000 a80 ( 3 k) 580 ( 2 k) viaide.sys Thu Aug 29
01:27:48 2002
f77af000 4b00 ( 19 k) e00 ( 4 k) PCIIDEX.SYS Thu Aug 29
01:27:47 2002
f754f000 8300 ( 33 k) c80 ( 4 k) MountMgr.sys Fri Aug 17
13:47:36 2001
f74c3000 1b700 ( 110 k) 2e00 ( 12 k) ftdisk.sys Fri Aug 17
13:52:41 2001
f7a35000 c80 ( 4 k) 780 ( 2 k) dmload.sys Fri Aug 17
13:58:15 2001
f749f000 1cf00 ( 116 k) 6980 ( 27 k) dmio.sys Fri Aug 17
13:58:27 2001
f77b7000 3c80 ( 16 k) 980 ( 3 k) PartMgr.sys Fri Aug 17
18:32:23 2001
f755f000 9880 ( 39 k) 2480 ( 10 k) VolSnap.sys Fri Aug 17
13:53:19 2001
f7489000 12780 ( 74 k) 2880 ( 11 k) atapi.sys Thu Aug 29
01:27:48 2002
f756f000 7000 ( 28 k) 1080 ( 5 k) disk.sys Thu Aug 29
01:27:56 2002
f757f000 9d00 ( 40 k) 1480 ( 6 k) CLASSPNP.SYS Thu Aug 29
02:08:42 2002
f77bf000 3520 ( 14 k) 12a0 ( 5 k) ino_flpy.sys Wed Nov 07
15:45:34 2001
f7475000 fe80 ( 64 k) 3580 ( 14 k) KSecDD.sys Fri Aug 17
13:50:01 2001
f73eb000 7ca80 ( 499 k) c580 ( 50 k) Ntfs.sys Thu Aug 29
02:13:37 2002
f73c1000 23480 ( 142 k) 5800 ( 22 k) NDIS.sys Sat Oct 04
00:54:08 2003
f758f000 a380 ( 41 k) 3280 ( 13 k) ohci1394.sys Thu Aug 29
01:33:19 2002
f759f000 b180 ( 45 k) 1080 ( 5 k) 1394BUS.SYS Thu Aug 29
01:33:19 2002
f73a7000 15d80 ( 88 k) 3600 ( 14 k) Mup.sys Thu Aug 29
02:12:53 2002
f77c7000 5e00 ( 24 k) b00 ( 3 k) amdagp.sys Fri Aug 17
13:58:00 2001
f7887000 4b80 ( 19 k) 2880 ( 11 k) processr.sys Thu Aug 29
01:05:03 2002
f72a7000 83400 ( 525 k) 30200 (193 k) ati2mtag.sys Fri Dec 12
09:50:01 2003
f6bf4000 de00 ( 56 k) 3380 ( 13 k) VIDEOPRT.SYS Thu Aug 29
01:32:03 2002
f7897000 0 ( 0 k) 0 ( 0 k) fdc.sys unavailable
f6be1000 10300 ( 65 k) 2300 ( 9 k) parport.sys Thu Aug 29
01:27:29 2002
f75ef000 9280 ( 37 k) 3180 ( 13 k) i8042prt.sys Thu Aug 29
02:06:37 2002
f7a1b000 2160 ( 9 k) 8e0 ( 3 k) itchfltr.sys Fri Nov 15
11:32:42 2002
f789f000 4100 ( 17 k) 1780 ( 6 k) kbdclass.sys Thu Aug 29
01:26:59 2002
f75ff000 7e80 ( 32 k) 1a00 ( 7 k) imapi.sys Thu Aug 29
01:28:05 2002
f760f000 9c80 ( 40 k) 1900 ( 7 k) cdrom.sys Thu Aug 29
01:27:55 2002
f761f000 ac80 ( 44 k) 2d00 ( 12 k) redbook.sys Thu Aug 29
01:27:45 2002
f6b8a000 1b900 ( 111 k) 4080 ( 17 k) ks.sys Wed Dec 04
09:09:38 2002
f78a7000 3f80 ( 16 k) 900 ( 3 k) usbuhci.sys Thu Jul 03
17:51:44 2003
f6b68000 1f800 ( 126 k) 2280 ( 9 k) USBPORT.SYS Thu Jul 03
17:49:27 2003
f6b0e000 49a60 ( 295 k) f7e0 ( 62 k) ctaud2k.sys Tue Oct 07
19:06:01 2003
f6aed000 19580 ( 102 k) 7380 ( 29 k) portcls.sys Thu Aug 29
02:00:58 2002
f762f000 cb00 ( 51 k) 1380 ( 5 k) drmk.sys Thu Aug 29
01:32:30 2002
f6ac1000 16c00 ( 91 k) 149c0 ( 83 k) ctoss2k.sys Tue Oct 07
19:06:48 2003
f7a69000 e80 ( 4 k) 560 ( 2 k) ctprxy2k.sys Tue Oct 07
19:08:11 2003
f7a27000 1d00 ( 8 k) 680 ( 2 k) gameenum.sys Thu Aug 29
01:32:42 2002
f6a85000 23800 ( 142 k) 1c00 ( 7 k) el90xnd5.sys Fri Jun 15
15:01:39 2001
f763f000 a800 ( 42 k) 3880 ( 15 k) atibtcap.sys Tue Nov 05
16:14:42 2002
f764f000 9c00 ( 39 k) 1300 ( 5 k) STREAM.SYS Wed Dec 04
09:10:14 2002
f6a74000 e400 ( 57 k) 1c00 ( 7 k) el90xbc5.sys Mon Jul 16
16:40:19 2001
f7b8b000 400 ( 1 k) 500 ( 2 k) audstub.sys Fri Aug 17
13:59:40 2001
f766f000 ad00 ( 44 k) d00 ( 4 k) rasl2tp.sys Thu Aug 29
02:06:36 2002
f7a2b000 1900 ( 7 k) 980 ( 3 k) ndistapi.sys Fri Aug 17
13:55:29 2001
f6a5e000 12780 ( 74 k) 2b80 ( 11 k) ndiswan.sys Thu Aug 29
01:58:38 2002
f767f000 7800 ( 30 k) 1d00 ( 8 k) raspppoe.sys Fri Aug 17
13:55:33 2001
f768f000 9c00 ( 39 k) 1580 ( 6 k) raspptp.sys Tue Oct 01
17:52:28 2002
f7383000 2b00 ( 11 k) 1100 ( 5 k) TDI.SYS Fri Aug 17
13:57:25 2001
f78b7000 3780 ( 14 k) b00 ( 3 k) ptilink.sys Fri Aug 17
13:49:53 2001
f78bf000 3300 ( 13 k) a80 ( 3 k) raspti.sys Fri Aug 17
13:55:32 2001
f696c000 27a00 ( 159 k) 4b80 ( 19 k) rdpdr.sys Thu Aug 29
01:06:34 2002
f769f000 7900 ( 31 k) 1780 ( 6 k) termdd.sys Thu Aug 29
01:40:32 2002
f78c7000 3b80 ( 15 k) 1780 ( 6 k) mouclass.sys Thu Aug 29
01:27:00 2002
f7b90000 680 ( 2 k) 680 ( 2 k) swenum.sys Wed Dec 04
09:10:07 2002
f6922000 e00 ( 4 k) 20600 (130 k) update.sys Fri Aug 17
20:53:56 2001
f78d7000 1400 ( 5 k) 1c00 ( 7 k) VPCAppSv.sys Wed May 15
17:18:26 2002
f736f000 2660 ( 10 k) ca0 ( 4 k) VPCPOWER.SYS Sat Mar 31
12:37:18 2001
f76ef000 7b80 ( 31 k) 1600 ( 6 k) NDProxy.SYS Fri Aug 17
13:55:30 2001
f78ff000 3c00 ( 15 k) e00 ( 4 k) flpydisk.sys Thu Aug 29
01:27:43 2002
f7907000 3800 ( 14 k) a00 ( 3 k) ativtutw.sys Tue Nov 05
16:13:56 2002
f7a87000 d80 ( 4 k) a80 ( 3 k) atibtxbr.sys Tue Nov 05
16:13:59 2002
f790f000 5f00 ( 24 k) d00 ( 4 k) ativxstw.sys Tue Nov 05
16:13:57 2002
f7a0f000 1980 ( 7 k) 980 ( 3 k) viausb1.sys Tue Sep 18
22:28:49 2001
f69fe000 b880 ( 47 k) 1380 ( 5 k) usbhub.sys Thu Jul 03
17:52:56 2003
f7ab5000 580 ( 2 k) a00 ( 3 k) USBD.SYS Fri Aug 17
14:02:58 2001
eb82d000 877e0 ( 542 k) 55140 (341 k) ha10kx2k.sys Tue Oct 21
02:26:04 2003
eb80b000 b1a0 ( 45 k) 161c0 ( 89 k) emupia2k.sys Mon Oct 13
02:42:10 2003
eb7eb000 1e4c0 ( 122 k) 1420 ( 6 k) ctsfm2k.sys Tue Oct 07
19:09:07 2003
eb74d000 3d6a0 ( 246 k) 5fe60 (384 k) ctac32k.sys Tue Oct 21
02:22:15 2003
f7ab7000 1580 ( 6 k) 680 ( 2 k) Fs_Rec.SYS Fri Aug 17
13:49:37 2001
eb93c000 300 ( 1 k) 580 ( 2 k) Null.SYS Fri Aug 17
13:47:39 2001
f7ab9000 780 ( 2 k) 600 ( 2 k) Beep.SYS Fri Aug 17
13:47:33 2001
f781f000 4a00 ( 19 k) f00 ( 4 k) HIDPARSE.SYS Fri Aug 17
14:02:04 2001
f7827000 3c80 ( 16 k) d00 ( 4 k) vga.sys Thu Aug 29
01:32:03 2002
f7abb000 500 ( 2 k) 880 ( 3 k) mnmdd.SYS Fri Aug 17
13:57:28 2001
f7abd000 800 ( 2 k) 580 ( 2 k) RDPCDD.sys Fri Aug 17
13:46:56 2001
f782f000 3900 ( 15 k) a80 ( 3 k) Msfs.SYS Fri Aug 17
13:50:02 2001
f7837000 6380 ( 25 k) d00 ( 4 k) Npfs.SYS Fri Aug 17
13:50:03 2001
f6960000 1780 ( 6 k) 800 ( 2 k) rasacd.sys Fri Aug 17
13:55:39 2001
f69ee000 ca80 ( 51 k) 1500 ( 6 k) ipsec.sys Thu Aug 29
02:07:19 2002
f69de000 7080 ( 29 k) 1080 ( 5 k) msgpc.sys Fri Aug 17
13:54:19 2001
eb6db000 43980 ( 271 k) d780 ( 54 k) tcpip.sys Thu Aug 29
01:58:10 2002
eb6b6000 21600 ( 134 k) 2d80 ( 12 k) netbt.sys Tue Jul 08
16:48:51 2003
f69ce000 6e80 ( 28 k) 1000 ( 4 k) netbios.sys Thu Aug 29
01:35:45 2002
eb68e000 23800 ( 142 k) 4280 ( 17 k) rdbss.sys Thu Aug 29
01:58:48 2002
eb62e000 54180 ( 337 k) b800 ( 46 k) mrxsmb.sys Mon Nov 18
11:27:37 2002
ec190000 6700 ( 26 k) 1e80 ( 8 k) Fips.SYS Fri Aug 17
18:31:49 2001
ec180000 6b80 ( 27 k) 1380 ( 5 k) wanarp.sys Fri Aug 17
13:55:23 2001
f7847000 3600 ( 14 k) 9a0 ( 3 k) asuskbnt.sys Wed Apr 23
20:28:09 2003
f7857000 5f80 ( 24 k) b00 ( 3 k) usbccgp.sys Thu Jul 03
17:53:24 2003
ec140000 7660 ( 30 k) 1640 ( 6 k) LHidUsb.Sys Fri Nov 08
15:58:54 2002
ec130000 7580 ( 30 k) e00 ( 4 k) HIDCLASS.SYS Thu Aug 29
01:32:40 2002
ec248000 2560 ( 10 k) a40 ( 3 k) LCcFltr.Sys Fri Nov 08
15:58:59 2002
ec224000 2900 ( 11 k) a80 ( 3 k) kbdhid.sys Fri Aug 17
13:48:01 2001
f788f000 2c40 ( 12 k) 2ec0 ( 12 k) LHidFlt2.Sys Mon Jun 30
11:21:43 2003
ebd48000 2180 ( 9 k) b00 ( 3 k) mouhid.sys Fri Aug 17
13:47:57 2001
ec100000 9ca0 ( 40 k) 5fe0 ( 24 k) LMouFlt2.Sys Mon Jun 30
11:21:34 2003
ebb65000 d280 ( 53 k) 1380 ( 5 k) Cdfs.SYS Thu Aug 29
01:58:50 2002
eb618000 12780 ( 74 k) 2880 ( 11 k) dump_atapi.sys Thu Aug 29
01:27:48 2002
f7ae3000 800 ( 2 k) 600 ( 2 k) dump_WMILIB.SYS Fri Aug 17
14:07:23 2001
bf800000 186a00 (1563 k) 2fd80 (192 k) win32k.sys Thu Sep 25
09:35:41 2003
f735f000 3100 ( 13 k) b80 ( 3 k) watchdog.sys Thu Aug 29
01:32:20 2002
f79bf000 1d00 ( 8 k) 880 ( 3 k) Dxapi.sys Fri Aug 17
13:53:19 2001
bff80000 ef00 ( 60 k) 1b80 ( 7 k) dxg.sys Thu Aug 29
03:40:42 2002
eb96e000 100 ( 1 k) 900 ( 3 k) dxgthk.sys Fri Aug 17
13:53:12 2001
bf9b7000 4b000 ( 300 k) 12a00 ( 75 k) ati2dvag.dll Fri Dec 12
09:50:22 2003
bfa19000 ba3c0 ( 745 k) 14160 ( 81 k) ati3duag.dll Fri Dec 12
09:35:08 2003
bfae8000 69fc0 ( 424 k) 19d60 (104 k) ativvaxx.dll Fri Dec 12
09:08:32 2003
eb55d000 c000 ( 48 k) e980 ( 59 k) ino_fltr.sys Sun Sep 01
09:37:22 2002
eb474000 1cd00 ( 116 k) 3300 ( 13 k) afd.sys Thu Aug 29
02:01:13 2002
eb5a8000 2500 ( 10 k) 880 ( 3 k) ndisuio.sys Sat Aug 02
02:38:10 2003
f7a75000 e00 ( 4 k) 980 ( 3 k) ParVdm.SYS Fri Aug 17
13:49:49 2001
f792f000 3180 ( 13 k) c00 ( 3 k) aspi32.sys Wed Jul 17
09:05:08 2002
eb420000 1d60 ( 8 k) ba0 ( 3 k) secdrv.sys Thu Nov 14
03:52:30 2002
eb295000 46200 ( 281 k) 8480 ( 34 k) srv.sys Fri Mar 28
11:54:53 2003
eb191000 10700 ( 66 k) 2c80 ( 12 k) ipnat.sys Thu Aug 29
01:36:12 2002
f77f7000 4200 ( 17 k) 980 ( 3 k) TDTCP.SYS Fri Aug 17
13:46:43 2001
eb0ac000 1aa00 ( 107 k) 1700 ( 6 k) RDPWD.SYS Thu Aug 29
01:40:38 2002
eb38c000 bc00 ( 47 k) 1e80 ( 8 k) sysaudio.sys Thu Aug 29
02:01:17 2002
eb04e000 10d00 ( 68 k) 1e00 ( 8 k) wdmaud.sys Thu Aug 29
02:00:46 2002
bffa0000 32000 ( 200 k) 10680 ( 66 k) ATMFD.DLL Fri Aug 17
14:55:56 2001
b9bae000 18f80 ( 100 k) db80 ( 55 k) kmixer.sys Thu Aug 29
01:32:28 2002
f7ad5000 a80 ( 3 k) 500 ( 2 k) MSPQM.sys Fri Aug 17
13:48:42 2001
f7a43000 e00 ( 4 k) 600 ( 2 k) splitter.sys Thu Aug 29
01:32:27 2002
f7a37000 c00 ( 3 k) 580 ( 2 k) MSPCLOCK.sys Wed Dec 04
09:09:43 2002
Unloaded modules:
b9bae000 b9bd5000 kmixer.sys
b9ced000 b9d14000 kmixer.sys
f7ab3000 f7ab5000 splitter.sys
b9ced000 b9d14000 kmixer.sys
b9ced000 b9d14000 kmixer.sys
b9ced000 b9d14000 kmixer.sys
b9ced000 b9d14000 kmixer.sys
ba214000 ba23b000 kmixer.sys
f7a71000 f7a73000 MSPQM.sys
bae11000 bae38000 kmixer.sys
f7af3000 f7af5000 splitter.sys
f7ad1000 f7ad3000 MSPCLOCK.sys
f7acf000 f7ad1000 MSPQM.sys
f7aa5000 f7aa7000 splitter.sys
eb917000 eb91b000 CCDECODE.sys
f7a5b000 f7a5d000 MSTEE.sys
f7a6f000 f7a71000 splitter.sys
b34b8000 b34df000 kmixer.sys
f7a9d000 f7a9f000 splitter.sys
f7ad7000 f7ad9000 splitter.sys
bafd9000 bb000000 kmixer.sys
eba9a000 ebac1000 kmixer.sys
eba9a000 ebac1000 kmixer.sys
eba9a000 ebac1000 kmixer.sys
f7bf1000 f7bf2000 drmkaud.sys
ec160000 ec16d000 DMusic.sys
f6a4e000 f6a5c000 swmidi.sys
eb089000 eb0ac000 aec.sys
f7a5b000 f7a5d000 splitter.sys
f69be000 f69cc000 swmidi.sys
f6964000 f6968000 kbdhid.sys
f7817000 f781c000 Cdaudio.SYS
f6968000 f696b000 Sfloppy.SYS
Loading User Symbols
PEB is paged out (Peb.Ldr = 7ffdf00c). Type ".hh dbgerr001" for
details
kd> !timer
Dump system timers
Interrupt time: 7b9c2f50 000000c7 [ 1/23/2004 23:04:58.657]
List Timer Interrupt Low/High Fire Time DPC/thread
1 f7e1f110 1ac7148f 7e3c1e7f [ 9/13/30828 18:48:05.474] thread
f7e1f020
2 f7e14c20 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
f7e14b30
f7e1f9a8 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
f7e1f8b8
f7e55890 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
f7e557a0
8154a928 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
8154a838
f7e1fe98 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
f7e1fda8
f7e14e98 8d215d10 000000c7 [ 1/23/2004 23:05:28.051] thread
f7e14da8
f7dfbb78 1ac75d6f 7e3c1e7f [ 9/13/30828 18:48:05.476] thread
f7dfba88
f7dda750 1ac8089f 7e3c1e7f [ NEVER ] thread
f7dda660
f7cfb110 1ac8089f 7e3c1e7f [ NEVER ] thread
f7cfb020
3 82e2fe98 7ddafe60 000000c7 [ 1/23/2004 23:05:02.424] thread
82e2fda8
829e8cf0 3469c950 000000c9 [ 1/23/2004 23:17:18.202]
netbt!TimerExpiry
4 eb7157f0 7ddc37e0 000000c7 [ 1/23/2004 23:05:02.432]
TDI!CTEpTimerHandler
6 82e42438 422e2130 800000bb [ NEVER ] thread
82e42348
8 82b83d08 7c5aecf0 000000c7 [ 1/23/2004 23:04:59.907] thread
82b83c18
10 82bb08e8 b3614eb0 000000c7 [ 1/23/2004 23:06:32.224] thread
82bb07f8
12 82bec998 89a9c460 000000d1 [ 1/24/2004 00:16:57.202] thread
82db8b20
15 82e37888 a04f5c20 000027d2 [ 3/13/2004 15:33:00.042]
afd!AfdTimeoutPoll
16 82e7b810 7def5c50 000000c7 [ 1/23/2004 23:05:02.558] thread
82e7b720
18 f7d51550 7df1a620 000000c7 [ 1/23/2004 23:05:02.573]
afd!AfdTimeoutPoll
23 805466e0 b2396290 000038aa [ 4/ 4/2004 01:59:59.995]
nt!ExpTimeZoneDpcRoutine
24 80540d70 P 7f816ab0 000000c7 [ 1/23/2004 23:05:05.193]
nt!IopIrpStackProfilerTimer
27 82bd84c8 7c785ef0 000000c7 [ 1/23/2004 23:05:00.100] thread
82bd83d8
28 82b51e98 7c7a0e00 000000c7 [ 1/23/2004 23:05:00.111] thread
82b51da8
29 82727c58 136022a0 80000000 [ NEVER ]
nt!ExpTimerDpcRoutine
82bcde98 136022a0 80000000 [ NEVER ] thread
82bcdda8
82bf3c20 22d93510 800000be [ NEVER ]
nt!ExpTimerDpcRoutine
f7d45510 22d93510 800000be [ NEVER ] thread
f7d45420
31 82dcba40 a8cf1e90 000000c7 [ 1/23/2004 23:06:14.488] thread
82dcb950
32 82e7a698 53731510 80000084 [ NEVER ]
nt!ExpTimerDpcRoutine
33 f7e51110 7c80be40 000000c7 [ 1/23/2004 23:05:00.155] thread
f7e51020
82bcf800 53749c40 80000084 [ NEVER ] thread
82bcf710
35 82d29eb0 P 85b060a0 000000c7 [ 1/23/2004 23:05:15.567]
NDIS!ndisMTimerDpc
37 82c0a650 65f2ae80 00000192 [ 1/24/2004 23:17:30.150] thread
82c0a560
82daf2c0 64694c20 80000000 [ NEVER ] thread
82e8ece8
38 f7408cd0 c5e1f7e0 000000c7 [ 1/23/2004 23:07:03.266]
Ntfs!NtfsUsnTimeOutDpc
44 f7da7610 27b69400 000000c8 [ 1/23/2004 23:09:47.398] thread
f7da7520
82be5758 3f5ab930 000000c9 [ 1/23/2004 23:17:36.558] thread
82be5668
45 f7dee9d0 7c93bf80 000000c7 [ 1/23/2004 23:05:00.280] thread
f7dee8e0
46 815e2898 7c949170 000000c7 [ 1/23/2004 23:05:00.285] thread
815e27a8
f7da1110 8eeb3ae0 000000c7 [ 1/23/2004 23:05:31.052] thread
f7da1020
47 82e139d0 fde92b10 80000074 [ NEVER ]
nt!ExpTimerDpcRoutine
814d8d30 fde92b10 80000074 [ NEVER ] thread
814d8c40
49 f7408c70 7e20a4b0 000000c7 [ 1/23/2004 23:05:02.881]
Ntfs!NtfsVolumeCheckpointDpc
52 eb1a12a0 P 9697fe70 000000c7 [ 1/23/2004 23:05:43.928]
ipnat!NatTimerRoutine
53 82bf78e0 7c9fdd50 000000c7 [ 1/23/2004 23:05:00.359] thread
82bf77f0
55 f7e51390 7ca31c90 000000c7 [ 1/23/2004 23:05:00.380] thread
f7e512a0
56 82be4e98 7fb23780 000000c7 [ 1/23/2004 23:05:05.512] thread
82be4da8
eb2a3fa0 7fb36500 000000c7 [ 1/23/2004 23:05:05.520]
srv!ScavengerTimerRoutine
58 f7e14730 8befd2d0 000000c7 [ 1/23/2004 23:05:26.049] thread
f7e14640
60 82eebdf0 7caa10e0 000000c7 [ 1/23/2004 23:05:00.426]
afd!AfdTimeoutPoll
82c0ae98 8a6b0690 000000c7 [ 1/23/2004 23:05:23.501] thread
82c0ada8
62 f7e0be98 876076f0 000000c7 [ 1/23/2004 23:05:18.398] thread
f7e0bda8
66 81b07488 7e3af8f0 000000c7 [ 1/23/2004 23:05:03.053] thread
81b07398
67 82d65b48 P 7cb4de50 000000c7 [ 1/23/2004 23:05:00.497]
NDIS!ndisMWakeUpDpc
82cd9b48 P 7cb4de50 000000c7 [ 1/23/2004 23:05:00.497]
NDIS!ndisMWakeUpDpcX
82d011a0 P 7cb4de50 000000c7 [ 1/23/2004 23:05:00.497]
NDIS!ndisMWakeUpDpcX
82d55bb8 7e3bee10 000000c7 [ 1/23/2004 23:05:03.060] thread
82d55ac8
68 f7e1fc20 8d85ace0 000000c7 [ 1/23/2004 23:05:28.709] thread
f7e1fb30
72 815e24e8 0952a280 000000c8 [ 1/23/2004 23:08:56.412] thread
815e23f8
79 82e28c30 0d8fca00 80000000 [ NEVER ]
nt!ExpTimerDpcRoutine
82ea6580 0d8fca00 80000000 [ NEVER ] thread
82ea6490
89 81546e28 7e5e2e10 000000c7 [ 1/23/2004 23:05:03.284]
afd!AfdTimeoutPoll
96 82b6d748 be972d20 000000c7 [ 1/23/2004 23:06:51.032] thread
82b6d658
97 81653460 1eddd0f0 000000c8 [ 1/23/2004 23:09:32.556] thread
81653370
98 82bbc230 10bb3290 80000000 [ NEVER ] thread
82b917f0
99 f7dfe110 7e6ce010 000000c7 [ 1/23/2004 23:05:03.380] thread
f7dfe020
102 82bac230 10c14f50 80000000 [ NEVER ] thread
82bab988
104 82bce330 830af7f0 000000c7 [ 1/23/2004 23:05:11.127] thread
82bce240
111 82b6ce98 7cf87ee0 000000c7 [ 1/23/2004 23:05:00.940] thread
82b6cda8
112 f7d95e98 bba0dd70 000000c7 [ 1/23/2004 23:06:46.062] thread
f7d95da8
113 f7e51c20 7cfb0b10 000000c7 [ 1/23/2004 23:05:00.957] thread
f7e51b30
114 81f48560 90daec00 000000c7 [ 1/23/2004 23:05:34.301] thread
81f48470
115 82bccd18 800c7c20 000000c7 [ 1/23/2004 23:05:06.104] thread
82bccc28
f7d87570 b4e03020 80000076 [ NEVER ]
nt!ExpTimerDpcRoutine
f7d95308 b4e03020 80000076 [ NEVER ] thread
f7d95218
f7ca7e68 b4e03020 80000076 [ NEVER ] thread
f7da1da8
117 80546660 a04e39a0 006b9025 [12/31/2099 23:59:59.996]
nt!ExpCenturyDpcRoutine
119 f7e25110 9269af70 000000c7 [ 1/23/2004 23:05:36.914] thread
f7e25020
120 82d49de0 e3d68d40 000000ce [ 1/23/2004 23:58:00.000]
121 81603d00 08166b20 000000c8 [ 1/23/2004 23:08:54.339] thread
81603c10
122 82c00220 7d08d1f0 000000c7 [ 1/23/2004 23:05:01.047] *** ERROR:
Module load completed but symbols could not be loaded for ctoss2k.sys
ctoss2k+8c7a
123 f7dfd110 7d0af690 000000c7 [ 1/23/2004 23:05:01.061] thread
f7dfd020
f7d98538 15da3160 000000c8 [ 1/23/2004 23:09:17.433] thread
f7d98448
82bd4d18 15da3160 000000c8 [ 1/23/2004 23:09:17.433] thread
82bd4c28
129 82d54b98 P 7d149d60 000000c7 [ 1/23/2004 23:05:01.124]
watchdog!WdDeferredWatchdogDpcCallback
825179a8 P 7d149d60 000000c7 [ 1/23/2004 23:05:01.124]
watchdog!WdDeferredWatchdogDpcCallback
f7de57f0 81aa6f90 000000c7 [ 1/23/2004 23:05:08.817] thread
f7de5700
130 82b6dd50 7d158580 000000c7 [ 1/23/2004 23:05:01.130]
netbt!TimerExpiry
f69f9ca8 894e7d00 000000c7 [ 1/23/2004 23:05:21.636]
ipsec!IPSecTickHandler
81ada5b0 ee294d80 000000c7 [ 1/23/2004 23:08:10.842] thread
81ada4c0
82f03760 ee2974b0 000000c7 [ 1/23/2004 23:08:10.843] thread
82f03670
131 82ab9738 991ee8a0 800000be [ NEVER ]
nt!ExpTimerDpcRoutine
f7db5110 991ee8a0 800000be [ NEVER ] thread
f7db5020
134 82e8f6a0 89549480 000000c7 [ 1/23/2004 23:05:21.676] thread
82e8f5b0
138 f7e15a60 42f80540 000000c9 [ 1/23/2004 23:17:42.622] thread
f7e15970
139 82d99c80 7b9cc5d0 000000c7 [ 1/23/2004 23:04:58.661] thread
82d99958
140 f7dabc38 7b9d70c0 000000c7 [ 1/23/2004 23:04:58.665] thread
f7dabb48
142 816127d0 98a954d0 000000c7 [ 1/23/2004 23:05:47.397] thread
816126e0
143 eb696e80 7ba247f0 000000c7 [ 1/23/2004 23:04:58.697]
rdbss!RxTimerDispatch
f7e554a8 7ba26e90 000000c7 [ 1/23/2004 23:04:58.698] thread
f7e553b8
815d06d8 98aa3ff0 000000c7 [ 1/23/2004 23:05:47.403] thread
815d05e8
805465e0 2a8d6840 000000c9 [ 1/23/2004 23:17:01.658]
nt!ExpTimeRefreshDpcRoutine
144 82be7e98 98ac5030 000000c7 [ 1/23/2004 23:05:47.417] thread
82be7da8
146 80545480 7d2e1cd0 000000c7 [ 1/23/2004 23:05:01.291]
nt!PspJobTimeLimitsDpcRoutine
82dc0990 a4e8e390 000000c7 [ 1/23/2004 23:06:07.946] thread
82dc08a0
147 f7e1c8e8 da669c50 000000c7 [ 1/23/2004 23:07:37.690] thread
f7e1c7f8
148 eb71ca70 P 7ba9c280 000000c7 [ 1/23/2004 23:04:58.746]
tcpip!TCBTimeoutdpc
149 82cd8298 P 7bab4a60 000000c7 [ 1/23/2004 23:04:58.756]
NDIS!ndisMTimerDpc
152 f7d1e480 7baf88d0 000000c7 [ 1/23/2004 23:04:58.784] thread
f7d1e390
154 82b550b8 7bb36c60 000000c7 [ 1/23/2004 23:04:58.809]
TDI!CTEpTimerHandler
81aff6b8 7bb36c60 000000c7 [ 1/23/2004 23:04:58.809]
TDI!CTEpTimerHandler
82d6af78 657e84e1 000000c8 [ 1/23/2004 23:11:31.050]
ks!SweeperDeferredRoutine
156 f7dfe730 7bb654f0 000000c7 [ 1/23/2004 23:04:58.829] thread
f7dfe640
158 82d10730 7bb97b4f 000000c7 [ 1/23/2004 23:04:58.849]
USBPORT!USBPORT_DM_TimerDpc
f7d97110 8c8897f0 000000c7 [ 1/23/2004 23:05:27.050] thread
f7d97020
f7e1baa8 8c8897f0 000000c7 [ 1/23/2004 23:05:27.050] thread
f7e1b9b8
159 8159f110 ee556380 000000c7 [ 1/23/2004 23:08:11.131] thread
8159f020
160 82d96e98 835fc9d0 000000c7 [ 1/23/2004 23:05:11.683] thread
82d96da8
161 8251a338 7bbe13a0 000000c7 [ 1/23/2004 23:04:58.879]
TDI!CTEpTimerHandler
82ba1768 P 7ecbab20 000000c7 [ 1/23/2004 23:05:04.002]
afd!AfdCheckLookasideLists
165 82474718 7bc43320 000000c7 [ 1/23/2004 23:04:58.919]
TDI!CTEpTimerHandler
82474858 7bc43320 000000c7 [ 1/23/2004 23:04:58.919]
TDI!CTEpTimerHandler
167 82b79a80 836aa420 000000c7 [ 1/23/2004 23:05:11.754] thread
82b79990
168 f7e27e98 7bc806d0 000000c7 [ 1/23/2004 23:04:58.945] thread
f7e27da8
82efee98 836c2c00 000000c7 [ 1/23/2004 23:05:11.764] thread
82efeda8
169 81636d98 7bca52a0 000000c7 [ 1/23/2004 23:04:58.960] thread
81636ca8
170 82d39818 c3f2a480 80000000 [ NEVER ] thread
82c0dda8
171 f7dac110 ce50a290 000000c7 [ 1/23/2004 23:07:17.413] thread
f7dac020
f7e03110 b85c0a60 000000d3 [ 1/24/2004 00:32:34.539] thread
f7e03020
173 82cdf730 7bcffbdf 000000c7 [ 1/23/2004 23:04:58.997]
USBPORT!USBPORT_DM_TimerDpc
80543440 fdb37240 000000c7 [ 1/23/2004 23:08:36.913]
nt!MiModifiedPageWriterTimerDispatch
176 f7e50110 7bd455b0 000000c7 [ 1/23/2004 23:04:59.025] thread
f7e50020
82e601a0 P 7bd53960 000000c7 [ 1/23/2004 23:04:59.031]
NDIS!ndisMWakeUpDpc
177 82f6fd78 7bd67a50 000000c7 [ 1/23/2004 23:04:59.039] thread
82f6fc88
82da5720 f306bb00 000000c7 [ 1/23/2004 23:08:19.004] thread
82c1ada8
178 f7e02110 7bd85090 000000c7 [ 1/23/2004 23:04:59.051] thread
f7e02020
179 f7e01e98 7bd9d870 000000c7 [ 1/23/2004 23:04:59.061] thread
f7e01da8
f7e523d8 7bd9d870 000000c7 [ 1/23/2004 23:04:59.061] thread
f7e522e8
815dda10 86ec4ee0 800000b1 [ NEVER ]
nt!ExpTimerDpcRoutine
f7de8628 86ec4ee0 800000b1 [ NEVER ] thread
f7de8538
180 f7e51e98 7d623770 000000c7 [ 1/23/2004 23:05:01.633] thread
f7e51da8
184 8151abb8 7be0bbe0 000000c7 [ 1/23/2004 23:04:59.106] thread
8151aac8
82dd05d0 P 321af1d0 00000131 [ 1/24/2004 11:41:41.990]
NDIS!ndisMWakeUpDpcX
82d02b80 P 321af1d0 00000131 [ 1/24/2004 11:41:41.990]
NDIS!ndisMWakeUpDpcX
185 82cd91a0 P 321c7900 00000131 [ 1/24/2004 11:41:42.000]
NDIS!ndisMWakeUpDpcX
82d01b48 P 321c7900 00000131 [ 1/24/2004 11:41:42.000]
NDIS!ndisMWakeUpDpcX
188 81619020 9201f8a0 800000ba [ NEVER ] thread
f7e03790
189 f7da86b0 807dcae0 000000c7 [ 1/23/2004 23:05:06.847] thread
f7da85c0
190 814ecdc8 62458db0 800000c2 [ NEVER ]
nt!ExpTimerDpcRoutine
f7e26930 62458db0 800000c2 [ NEVER ] thread
f7e26840
82bd7748 76aa1780 800000c7 [ NEVER ] thread
82bd7658
191 8053f908 7beb9a30 000000c7 [ 1/23/2004 23:04:59.178]
nt!CcScanDpc
82d83ba0 484e9610 80000071 [ NEVER ]
nt!ExpTimerDpcRoutine
81acf508 484e9610 80000071 [ NEVER ] thread
81acf418
192 f7e519a8 7bed97a0 000000c7 [ 1/23/2004 23:04:59.191] thread
f7e518b8
f7e55110 7bed97a0 000000c7 [ 1/23/2004 23:04:59.191] thread
f7e55020
193 82bba4c0 3ba8eaa0 000000c9 [ 1/23/2004 23:17:30.360] thread
82bba3d0
194 f798ad78 7bf05900 000000c7 [ 1/23/2004 23:04:59.209] thread
82fcbda8
195 f7d95c20 03f231a0 000000c8 [ 1/23/2004 23:08:47.391] thread
f7d95b30
198 80544d60 P 7bf65150 000000c7 [ 1/23/2004 23:04:59.248]
nt!PopScanIdleList
80540ea0 P 7bf65150 000000c7 [ 1/23/2004 23:04:59.248]
nt!IopTimerDispatch
200 82bd7320 8b419f70 000000c7 [ 1/23/2004 23:05:24.907] thread
82bd7230
201 82bb43c8 8834a0d0 000000c7 [ 1/23/2004 23:05:19.789] thread
82bb42d8
82b61f68 592a66e0 80000000 [ NEVER ] thread
82bcc7f0
82c1fe98 79c9ea30 800000c7 [ NEVER ] thread
82c1fda8
202 815639a0 7bfbdd80 000000c7 [ 1/23/2004 23:04:59.284]
afd!AfdTimeoutPoll
206 82cffe98 852d09c0 000000c7 [ 1/23/2004 23:05:14.706] thread
82cffda8
210 82dadf10 6571a790 80000000 [ NEVER ] thread
82ea3da8
211 f7dffc20 7c0a8610 000000c7 [ 1/23/2004 23:04:59.380] thread
f7dffb30
213 82bece98 884689c0 000000c7 [ 1/23/2004 23:05:19.906] thread
82becda8
215 f7db5e98 80a597a0 000000c7 [ 1/23/2004 23:05:07.107] thread
f7db5da8
217 82f66ce8 788a9650 80000001 [ NEVER ]
nt!ExpTimerDpcRoutine
82bc5d10 788a9650 80000001 [ NEVER ] thread
82bc5c20
218 82d81e98 86c7d900 000000c7 [ 1/23/2004 23:05:17.398] thread
82d81da8
220 f7996d7c 7c17fe90 000000c7 [ 1/23/2004 23:04:59.469] thread
82fc7da8
221 82bb0c18 86cb1ec0 000000c7 [ 1/23/2004 23:05:17.420]
nt!ExpTimerDpcRoutine
226 8161f5b8 8859fa90 000000c7 [ 1/23/2004 23:05:20.034] thread
8161f4c8
814f7110 885abe80 000000c7 [ 1/23/2004 23:05:20.039] thread
814f7020
f7dff5e8 885b3410 000000c7 [ 1/23/2004 23:05:20.042] thread
f7dff4f8
f7dfe9a8 885b3410 000000c7 [ 1/23/2004 23:05:20.042] thread
f7dfe8b8
82d7bd30 885b3410 000000c7 [ 1/23/2004 23:05:20.042] thread
82d7bc40
f7e02e98 885b3410 000000c7 [ 1/23/2004 23:05:20.042] thread
f7e02da8
227 82bdeb80 ac38c9a0 000000c8 [ 1/23/2004 23:13:29.711] thread
82bdea90
229 82e9dc28 7c263b00 000000c7 [ 1/23/2004 23:04:59.562] thread
82e9db38
231 82d93400 949c5eb0 000000c7 [ 1/23/2004 23:05:40.601]
nt!ExpTimerDpcRoutine
233 82dc22b8 8e819b80 000000c7 [ 1/23/2004 23:05:30.360] thread
82dc21c8
236 815484e0 66fad780 800000b5 [ NEVER ]
nt!ExpTimerDpcRoutine
f7c8a890 66fad780 800000b5 [ NEVER ] thread
f7c8a7a0
237 f7e52110 7c327a00 000000c7 [ 1/23/2004 23:04:59.642] thread
f7e52020
82f01ad0 eeccf0f0 000000c7 [ 1/23/2004 23:08:11.915] thread
82f019e0
f7dec748 eeccf0f0 000000c7 [ 1/23/2004 23:08:11.915] thread
f7dec658
238 82e95408 P 7c336520 000000c7 [ 1/23/2004 23:04:59.648] thread
82c71a80
8151a8e0 8f400000 800000ba [ NEVER ] thread
f7dff7a0
241 f7e2a110 7dbfc100 000000c7 [ 1/23/2004 23:05:02.246] thread
f7e2a020
243 814ff110 80d0c680 000000c7 [ 1/23/2004 23:05:07.390] thread
814ff020
244 82c10e98 91a16e30 000000c7 [ 1/23/2004 23:05:35.601] thread
82c10da8
eb71d720 94af1190 000000c7 [ 1/23/2004 23:05:40.724]
tcpip!McastTimerRoutine
249 f7de42e0 826055e0 000000c7 [ 1/23/2004 23:05:10.009] thread
f7de41f0
251 f7e45110 df9a5f90 000000c7 [ 1/23/2004 23:07:46.417] thread
f7e45020
82bd2658 df9a5f90 000000c7 [ 1/23/2004 23:07:46.417] thread
82bd2568
253 82e7ef28 3bebb2f0 000000cb [ 1/23/2004 23:31:49.791] thread
82b5ada8
255 f69f9d10 3463a9d0 000000c9 [ 1/23/2004 23:17:18.162]
ipsec!IPSecTickHandler
Total Timers: 203, Maximum List: 9
Current Hand: 139, Maximum Search: 0
Wakeable timers:
82d49de0 e3d68d40 000000ce [ 1/23/2004 23:58:00.000]
kd> !object 82d49de0
Object: 82d49de0 Type: (82fcb2e8) Timer
ObjectHeader: 82d49dc8
HandleCount: 1 PointerCount: 2
Directory Object: e17dca08 Name: PVSWakeUp
***********************************************
buggered if I can figure this one out. PVSWakeUp is part of my
snapstream BeyondTV system; I'd suspect it, but it's new (newer than
the BSoD's) and not all of the BSoD's relate to it. Some of them are
just weird -- like the win32k crashes.
I'm stumped. Anyone got suggestions as to what to check next in kd?