1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Random BSOD [dump data]

Discussion in 'Windows XP' started by spotta, 2005/01/29.

Thread Status:
Not open for further replies.
  1. 2005/01/29
    spotta

    spotta Inactive Thread Starter

    Joined:
    2002/12/04
    Messages:
    182
    Likes Received:
    0
    Hi all.

    I have a AMD 64bit I-mesh Matrix 900 that's giving BSOD's randomly.
    It could run for a few days no problem or give a BSOD every 10 mins for a hour.
    The error codes vary and include problems with stacks, irq's and page faults.
    Debug information below
    Can anyone help me track down the cause of this problem?

    Spotta



    Microsoft (R) Windows Debugger Version 6.4.0007.2
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [E:\Docs\Jeremy\Mini012705-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: *** Invalid ***
    ****************************************************************************
    * Symbol loading may be unreliable without a symbol search path. *
    * Use .symfix to have the debugger choose a symbol path. *
    * After setting your symbol path, use .reload to refresh symbol locations. *
    ****************************************************************************
    Executable search path is:
    *********************************************************************
    * Symbols can not be loaded because symbol path is not initialized. *
    * *
    * The Symbol Path can be set by: *
    * using the _NT_SYMBOL_PATH environment variable. *
    * using the -y <symbol_path> argument when starting the debugger. *
    * using .sympath and .sympath+ *
    *********************************************************************
    Unable to load image ntoskrnl.exe, Win32 error 2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
    Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x805531a0
    Debug session time: Thu Jan 27 16:15:55.203 2005 (GMT+0)
    System Uptime: 0 days 0:08:34.795
    *********************************************************************
    * Symbols can not be loaded because symbol path is not initialized. *
    * *
    * The Symbol Path can be set by: *
    * using the _NT_SYMBOL_PATH environment variable. *
    * using the -y <symbol_path> argument when starting the debugger. *
    * using .sympath and .sympath+ *
    *********************************************************************
    Unable to load image ntoskrnl.exe, Win32 error 2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    *** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
    Loading Kernel Symbols
    ....................................................................................................................................................................................
    Loading unloaded module list
    ...........
    Loading User Symbols
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000008E, {c0000005, 805c6f02, ef517c00, 0}

    ***** Kernel symbols are WRONG. Please fix symbols to do analysis.


    Followup: MachineOwner
    ---------

    kd> gn
    ^ No runnable debuggees error in 'gn'
    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck. Usually the exception address pinpoints
    the driver/function that caused the problem. Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003. This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG. This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG. This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 805c6f02, The address that the exception occurred at
    Arg3: ef517c00, Trap Frame
    Arg4: 00000000

    Debugging Details:
    ------------------

    ***** Kernel symbols are WRONG. Please fix symbols to do analysis.


    MODULE_NAME: nt

    FAULTING_MODULE: 804d7000 nt

    DEBUG_FLR_IMAGE_TIMESTAMP: 41107b0c

    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx ". The memory could not be "%s ".

    FAULTING_IP:
    nt+eff02
    805c6f02 ff7304 push dword ptr [ebx+0x4]

    TRAP_FRAME: ef517c00 -- (.trap ffffffffef517c00)
    ErrCode = 00000000
    eax=ef517c84 ebx=681be8e0 ecx=83706403 edx=01c5048b esi=85bc6ca8 edi=837063e0
    eip=805c6f02 esp=ef517c74 ebp=ef517d14 iopl=0 nv up ei pl nz ac po nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010216
    nt+0xeff02:
    805c6f02 ff7304 push dword ptr [ebx+0x4] ds:0023:681be8e4=????????
    Resetting default scope

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0x8E

    LAST_CONTROL_TRANSFER: from 805c73f2 to 805c6f02

    STACK_TEXT:
    WARNING: Stack unwind information not available. Following frames may be wrong.
    ef517d14 805c73f2 00000000 00000000 85bc6ca8 nt+0xeff02
    ef517d34 805c7732 85bc6ca8 00000000 ef517d64 nt+0xf03f2
    ef517d54 8053c808 00000000 00000000 02c8ffb4 nt+0xf0732
    ef517d64 7c90eb94 badb0d00 02c8ff7c 00007f61 nt+0x65808
    02c8ffb4 00000000 00000000 00000000 00000000 0x7c90eb94


    STACK_COMMAND: .bugcheck ; kb

    FOLLOWUP_NAME: MachineOwner

    BUCKET_ID: WRONG_SYMBOLS

    Followup: MachineOwner
    ---------
     
    Last edited: 2005/01/30
  2. 2005/01/29
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
    If you arent comfortable using my tool, i understand, but it sets up a complex series of switches, enviroment variables and preselected commands to give us the information we need, so youll need to either use it, or use this command line, modified for your environment.

     

  3. to hide this advert.

  4. 2005/01/29
    spotta

    spotta Inactive Thread Starter

    Joined:
    2002/12/04
    Messages:
    182
    Likes Received:
    0
    Sorry

    I misread the instructions.

    Spotta

    Opened log file 'c:\debuglog.txt'

    Microsoft (R) Windows Debugger Version 6.4.0007.2
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [E:\Docs\Jeremy\Mini012705-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: C:\WINDOWS;C:\WINDOWS\system32;C:\WINDOWS\system32\drivers
    *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlpa.exe -
    Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_rtm.040803-2158
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x805531a0
    Debug session time: Thu Jan 27 16:15:55.203 2005 (GMT+0)
    System Uptime: 0 days 0:08:34.795
    *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlpa.exe -
    Loading Kernel Symbols
    ....................................................................................................................................................................................
    Loading unloaded module list
    ...........
    Loading User Symbols
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000008E, {c0000005, 805c6f02, ef517c00, 0}

    ***** Kernel symbols are WRONG. Please fix symbols to do analysis.


    Followup: MachineOwner
    ---------

    kd> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck. Usually the exception address pinpoints
    the driver/function that caused the problem. Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003. This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG. This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG. This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 805c6f02, The address that the exception occurred at
    Arg3: ef517c00, Trap Frame
    Arg4: 00000000

    Debugging Details:
    ------------------

    ***** Kernel symbols are WRONG. Please fix symbols to do analysis.


    MODULE_NAME: nt

    FAULTING_MODULE: 804d7000 nt

    DEBUG_FLR_IMAGE_TIMESTAMP: 41107b0c

    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx ". The memory could not be "%s ".

    FAULTING_IP:
    nt!PsGetProcessExitTime+4a2
    805c6f02 ff7304 push dword ptr [ebx+0x4]

    TRAP_FRAME: ef517c00 -- (.trap ffffffffef517c00)
    .trap ffffffffef517c00
    ErrCode = 00000000
    eax=ef517c84 ebx=681be8e0 ecx=83706403 edx=01c5048b esi=85bc6ca8 edi=837063e0
    eip=805c6f02 esp=ef517c74 ebp=ef517d14 iopl=0 nv up ei pl nz ac po nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010216
    nt!PsGetProcessExitTime+0x4a2:
    805c6f02 ff7304 push dword ptr [ebx+0x4] ds:0023:681be8e4=????????
    .trap
    Resetting default scope

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0x8E

    LAST_CONTROL_TRANSFER: from 805c73f2 to 805c6f02

    STACK_TEXT:
    WARNING: Stack unwind information not available. Following frames may be wrong.
    ef517d14 805c73f2 00000000 00000000 85bc6ca8 nt!PsGetProcessExitTime+0x4a2
    ef517d34 805c7732 85bc6ca8 00000000 ef517d64 nt!PsGetProcessExitTime+0x992
    ef517d54 8053c808 00000000 00000000 02c8ffb4 nt!PsGetProcessExitTime+0xcd2
    ef517d64 7c90eb94 badb0d00 02c8ff7c 00007f61 nt!KeReleaseInStackQueuedSpinLockFromDpcLevel+0xb14
    02c8ffb4 00000000 00000000 00000000 00000000 0x7c90eb94


    STACK_COMMAND: .bugcheck ; kb

    FOLLOWUP_NAME: MachineOwner

    BUCKET_ID: WRONG_SYMBOLS

    Followup: MachineOwner
    ---------

    cont -
     
  5. 2005/01/29
    spotta

    spotta Inactive Thread Starter

    Joined:
    2002/12/04
    Messages:
    182
    Likes Received:
    0
    eax=ef517c84 ebx=681be8e0 ecx=83706403 edx=01c5048b esi=85bc6ca8 edi=837063e0
    eip=805c6f02 esp=ef517c74 ebp=ef517d14 iopl=0 nv up ei pl nz ac po nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010216
    nt!PsGetProcessExitTime+0x4a2:
    805c6f02 ff7304 push dword ptr [ebx+0x4] ds:0023:681be8e4=????????
    ChildEBP RetAddr Args to Child
    WARNING: Stack unwind information not available. Following frames may be wrong.
    ef517d14 805c73f2 00000000 00000000 85bc6ca8 nt!PsGetProcessExitTime+0x4a2
    ef517d34 805c7732 85bc6ca8 00000000 ef517d64 nt!PsGetProcessExitTime+0x992
    ef517d54 8053c808 00000000 00000000 02c8ffb4 nt!PsGetProcessExitTime+0xcd2
    ef517d64 7c90eb94 badb0d00 02c8ff7c 00007f61 nt!KeReleaseInStackQueuedSpinLockFromDpcLevel+0xb14
    02c8ffb4 00000000 00000000 00000000 00000000 0x7c90eb94
    start end module name
    804d7000 806cd280 nt ntkrnlpa.exe Wed Aug 04 06:58:36 2004 (41107B0C)
    806ce000 806ee380 hal halaacpi.dll Wed Aug 04 06:59:05 2004 (41107B29)
    bf000000 bf011580 dxg dxg.sys Wed Aug 04 07:00:51 2004 (41107B93)
    bf012000 bf3a3180 nv4_disp nv4_disp.dll Fri Jul 02 01:02:27 2004 (40E4A613)
    bf800000 bf9c0380 win32k win32k.sys Wed Aug 04 07:17:30 2004 (41107F7A)
    eb006000 eb02ed00 HSFHWBS2 HSFHWBS2.sys Thu Jan 09 10:40:21 2003 (3E1D5195)
    eb02f000 eb05b100 yk51x86 yk51x86.sys Wed Jun 16 14:45:16 2004 (40D04EEC)
    eb05c000 eb0878e0 ctoss2k ctoss2k.sys Wed Oct 08 03:06:48 2003 (3F837138)
    eb088000 eb0aa680 ks ks.sys Wed Aug 04 07:15:20 2004 (41107EF8)
    eb0ab000 eb0ce980 portcls portcls.sys Wed Aug 04 07:15:47 2004 (41107F13)
    eb0cf000 eb1299a0 ctaud2k ctaud2k.sys Wed Jun 23 10:36:16 2004 (40D94F10)
    eb12e000 eb131b00 usbscan usbscan.sys Wed Aug 04 06:58:44 2004 (41107B14)
    eb132000 eb134900 Dxapi Dxapi.sys Fri Aug 17 21:53:19 2001 (3B7D843F)
    eb15a000 eb179be0 ctsfm2k ctsfm2k.sys Wed Oct 08 03:09:07 2003 (3F8371C3)
    eb17a000 eb19b660 emupia2k emupia2k.sys Mon Oct 13 10:42:10 2003 (3F8A7372)
    eb19c000 eb278d40 ha10kx2k ha10kx2k.sys Tue Feb 24 04:17:00 2004 (403AD03C)
    eb279000 eb29d2c0 hap16v2k hap16v2k.sys Tue Oct 21 10:23:40 2003 (3F94FB1C)
    eb39e000 eb3d1200 update update.sys Wed Aug 04 06:58:32 2004 (41107B08)
    eb3d2000 eb402100 rdpdr rdpdr.sys Wed Aug 04 07:01:10 2004 (41107BA6)
    eb403000 eb413e00 psched psched.sys Wed Aug 04 07:04:16 2004 (41107C60)
    eb414000 eb42a680 ndiswan ndiswan.sys Wed Aug 04 07:14:30 2004 (41107EC6)
    eb42b000 eb43e900 parport parport.sys Wed Aug 04 06:59:04 2004 (41107B28)
    eb43f000 eb461e80 USBPORT USBPORT.SYS Wed Aug 04 07:08:34 2004 (41107D62)
    eb462000 eb4f8c80 HSF_CNXT HSF_CNXT.sys Thu Jan 09 10:39:31 2003 (3E1D5163)
    eb4f9000 eb5fdc00 HSF_DP HSF_DP.sys Thu Jan 09 10:38:14 2003 (3E1D5116)
    eb62a000 eb62c580 hidusb hidusb.sys Fri Aug 17 22:02:16 2001 (3B7D8658)
    eb632000 eb645000 SAVRTPEL SAVRTPEL.SYS Sat Jul 24 03:26:47 2004 (4101C8E7)
    eb645000 eb697000 SPBBCDrv SPBBCDrv.sys Thu Jul 22 00:08:26 2004 (40FEF76A)
    eb697000 eb6b8d00 afd afd.sys Wed Aug 04 07:14:13 2004 (41107EB5)
    eb6b9000 eb6fbdc0 vsdatant vsdatant.sys Sun Nov 28 10:24:51 2004 (41A9A773)
    eb6fc000 eb723c00 netbt netbt.sys Wed Aug 04 07:14:36 2004 (41107ECC)
    eb724000 eb73c240 SYMEVENT SYMEVENT.SYS Fri Aug 27 23:51:09 2004 (412FBADD)
    eb73d000 eb77cbe0 SYMTDI SYMTDI.SYS Sat Oct 16 00:18:05 2004 (41705AAD)
    eb77d000 eb7d4a80 tcpip tcpip.sys Wed Aug 04 07:14:39 2004 (41107ECF)
    eb7d5000 eb7e7400 ipsec ipsec.sys Wed Aug 04 07:14:27 2004 (41107EC3)
    eb7e8000 eb7fdd80 InCDfs InCDfs.SYS Tue Apr 06 18:39:18 2004 (4072EB46)
    eb81e000 eb8bb7e0 ctac32k ctac32k.sys Mon Feb 23 07:16:09 2004 (4039A8B9)
    ed974000 ed977780 dump_scsiport dump_scsiport.sys Wed Aug 04 06:59:51 2004 (41107B57)
    ed99e000 eda0b680 mrxsmb mrxsmb.sys Thu Oct 28 02:14:16 2004 (418047E8)
    eda0c000 eda36a00 rdbss rdbss.sys Thu Oct 28 02:13:57 2004 (418047D5)
    eda37000 eda38580 InCDrec InCDrec.SYS Tue Apr 06 18:43:22 2004 (4072EC3A)
    eda39000 eda3a080 RDPCDD RDPCDD.sys Fri Aug 17 21:46:56 2001 (3B7D82C0)
    eda3b000 eda3c080 mnmdd mnmdd.SYS Fri Aug 17 21:57:28 2001 (3B7D8538)
    eda3d000 eda3e080 Beep Beep.SYS Fri Aug 17 21:47:33 2001 (3B7D82E5)
    eda3f000 eda40f00 Fs_Rec Fs_Rec.SYS Fri Aug 17 21:49:37 2001 (3B7D8361)
    eda41000 eda43000 i2omgmt i2omgmt.SYS Wed Aug 04 07:00:50 2004 (41107B92)
    eda43000 eda44280 USBD USBD.SYS Fri Aug 17 22:02:58 2001 (3B7D8682)
    eda45000 eda46100 swenum swenum.sys Wed Aug 04 06:58:41 2004 (41107B11)
    eda47000 eda486c0 ctprxy2k ctprxy2k.sys Wed Oct 08 03:08:11 2003 (3F83718B)
    eda8e000 edae0180 srv srv.sys Wed Aug 04 07:14:44 2004 (41107ED4)
    edb81000 edba4000 Fastfat Fastfat.SYS Wed Aug 04 07:14:15 2004 (41107EB7)
    edbd4000 edbd7da0 PfModNT PfModNT.sys Wed Mar 05 04:19:28 2003 (3E657AD0)
    edbdc000 edbde6c0 mdmxsdk mdmxsdk.sys Wed Dec 11 18:22:03 2002 (3DF7824B)
    edcbc000 edce8400 mrxdav mrxdav.sys Wed Aug 04 07:00:49 2004 (41107B91)
    eddd9000 ede195a0 symidsco symidsco.sys Fri Dec 10 01:17:28 2004 (41B8F928)
    ede1a000 ede428c0 SYMFW SYMFW.SYS Sat Oct 16 00:18:20 2004 (41705ABC)
    edef3000 edef6280 ndisuio ndisuio.sys Wed Aug 04 07:03:10 2004 (41107C1E)
    ee0a0000 ee0c7000 dump_fasttx2k dump_fasttx2k.sys Wed Aug 06 03:43:02 2003 (3F306B36)
    ee0c7000 ee1c9000 lvsvf2 lvsvf2.sys Sat Feb 14 19:00:58 2004 (402E706A)
    ee1c9000 ee204980 CamDrL21 CamDrL21.sys Sat Feb 14 19:09:18 2004 (402E725E)
    ee205000 ee225f00 ipnat ipnat.sys Wed Sep 29 23:28:36 2004 (415B3714)
    ee49a000 ee49ce80 secdrv secdrv.sys Fri Jan 16 13:16:04 2004 (4007E414)
    ee65a000 ee65e080 raspti raspti.sys Fri Aug 17 21:55:32 2001 (3B7D84C4)
    ee7a4000 ee7b2d80 sysaudio sysaudio.sys Wed Aug 04 07:15:54 2004 (41107F1A)
    ee816000 ee8168a0 MAPMEM MAPMEM.sys Fri May 08 22:25:04 1998 (35537830)
    eea61000 eea61740 BCMNTIO BCMNTIO.sys Sat Jun 20 01:25:06 1998 (358B0162)
    eeadc000 eeaec960 NAVENG NAVENG.Sys Thu Dec 30 21:46:10 2004 (41D47722)
    eeaed000 eeb44000 SAVRT SAVRT.SYS Sat Jul 24 03:26:42 2004 (4101C8E2)
    eebb4000 eebbc8a0 NPDRIVER NPDRIVER.SYS Tue Aug 31 05:38:34 2004 (413400CA)
    eed2a000 eedc2a60 NavEx15 NavEx15.Sys Thu Dec 30 21:45:19 2004 (41D476EF)
    eede4000 eede7720 pclepci pclepci.sys Fri Sep 07 10:09:39 2001 (3B988ED3)
    eee04000 eee0cd80 HIDCLASS HIDCLASS.SYS Wed Aug 04 07:08:18 2004 (41107D52)
    eee14000 eee22780 usbaudio usbaudio.sys Wed Aug 04 07:07:52 2004 (41107D38)
    eee24000 eee33900 Cdfs Cdfs.SYS Wed Aug 04 07:14:09 2004 (41107EB1)
    eee44000 eee52d80 arp1394 arp1394.sys Wed Aug 04 06:58:28 2004 (41107B04)
    eee54000 eee5c700 wanarp wanarp.sys Wed Aug 04 07:04:57 2004 (41107C89)
    eee64000 eee6c880 Fips Fips.SYS Sat Aug 18 02:31:49 2001 (3B7DC585)
    eee74000 eee7cf20 PQIMount PQIMount.SYS Tue Nov 23 00:08:52 2004 (41A27F94)
    eeff8000 ef00c400 wdmaud wdmaud.sys Wed Aug 04 07:15:03 2004 (41107EE7)
    ef025000 ef031180 cdrom cdrom.sys Wed Aug 04 06:59:52 2004 (41107B58)
    ef035000 ef03f380 imapi imapi.sys Wed Aug 04 07:00:12 2004 (41107B6C)
    ef045000 ef050e00 STREAM STREAM.SYS Wed Aug 04 07:07:58 2004 (41107D3E)
    ef100000 ef140380 HTTP HTTP.sys Wed Aug 04 07:00:09 2004 (41107B69)
    ef97d000 ef97e000 nebvideo nebvideo.sys unavailable (00000000)
    ef981000 ef983980 gameenum gameenum.sys Wed Aug 04 07:08:20 2004 (41107D54)
    efa28000 efa36b80 drmk drmk.sys Wed Aug 04 07:07:54 2004 (41107D3A)
    f0253000 f0256a60 ASNDIS5 ASNDIS5.SYS Mon Sep 09 12:54:05 2002 (3D7C8BDD)
    f05ac000 f05b7d00 raspptp raspptp.sys Wed Aug 04 07:14:26 2004 (41107EC2)
    f05bc000 f05c6200 raspppoe raspppoe.sys Wed Aug 04 07:05:06 2004 (41107C92)
    f06f5000 f06fd000 Asapiw2k Asapiw2k.sys Fri Nov 28 17:34:39 2003 (3FC7872F)
    f06fd000 f0704580 Modem Modem.SYS Wed Aug 04 07:08:04 2004 (41107D44)
    f074b000 f074bc00 audstub audstub.sys Fri Aug 17 21:59:40 2001 (3B7D85BC)
    f075b000 f075d580 ndistapi ndistapi.sys Fri Aug 17 21:55:29 2001 (3B7D84C1)
    f075f000 f0762c80 serenum serenum.sys Wed Aug 04 06:59:06 2004 (41107B2A)
    f0763000 f0765dc0 itchfltr itchfltr.sys Sun Nov 09 06:24:17 2003 (3FADDD91)
    f076f000 f0771880 pfc pfc.sys Tue Sep 02 08:24:46 2003 (3F5445BE)
    f0773000 f0774000 nebaudio nebaudio.sys unavailable (00000000)
    f0996000 f09a2880 rasl2tp rasl2tp.sys Wed Aug 04 07:14:21 2004 (41107EBD)
    f09a6000 f09b4000 AmdK8 AmdK8.sys Fri Oct 31 01:21:53 2003 (3FA1B931)
    f09b6000 f09c5d80 serial serial.sys Wed Aug 04 07:15:51 2004 (41107F17)
    f09c6000 f09d5b60 LMouKE LMouKE.Sys Mon Apr 26 15:09:41 2004 (408D1825)
    f09d6000 f09e23e0 L8042mou L8042mou.Sys Mon Apr 26 15:09:51 2004 (408D182F)
    f09e6000 f09f2e00 i8042prt i8042prt.sys Wed Aug 04 07:14:36 2004 (41107ECC)
    f09f6000 f0a04080 redbook redbook.sys Wed Aug 04 06:59:34 2004 (41107B46)
    f0b9e000 f0ba0280 rasacd rasacd.sys Fri Aug 17 21:55:39 2001 (3B7D84CB)
    f0bb6000 f0bb9f00 MODEMCSA MODEMCSA.sys Fri Aug 17 21:57:37 2001 (3B7D8541)
    f0c93000 f0c97580 ptilink ptilink.sys Fri Aug 17 21:49:53 2001 (3B7D8371)
    f0c9b000 f0c9f880 TDI TDI.SYS Wed Aug 04 07:07:47 2004 (41107D33)
    f0ca3000 f0ca4000 fdc fdc.sys unavailable (00000000)
    f0cab000 f0cb0a00 mouclass mouclass.sys Wed Aug 04 06:58:32 2004 (41107B08)
    f0cb3000 f0cb9000 kbdclass kbdclass.sys Wed Aug 04 06:58:32 2004 (41107B08)
    f0cbb000 f0cc1800 usbehci usbehci.sys Wed Aug 04 07:08:34 2004 (41107D62)
    f0cc3000 f0cc8000 usbuhci usbuhci.sys Wed Aug 04 07:08:34 2004 (41107D62)
    f0ccb000 f0cd1400 InCDPass InCDPass.sys Tue Apr 06 18:40:10 2004 (4072EB7A)
    f0cd3000 f0cda000 GearAspiWDM GearAspiWDM.SYS Tue Mar 23 18:44:48 2004 (406085A0)
    f0cdb000 f0ce1400 MxlW2k MxlW2k.SYS Wed Jun 30 14:12:01 2004 (40E2BC21)
    f0d67000 f0d6ac80 mssmbios mssmbios.sys Wed Aug 04 07:07:47 2004 (41107D33)
    f0e7e000 f0e86700 netbios netbios.sys Wed Aug 04 07:03:19 2004 (41107C27)
    f0e9e000 f0eac100 usbhub usbhub.sys Wed Aug 04 07:08:40 2004 (41107D68)
    f0ebe000 f0ec7480 NDProxy NDProxy.SYS Fri Aug 17 21:55:30 2001 (3B7D84C2)
    f0ece000 f0ed7f00 termdd termdd.sys Wed Aug 04 06:58:52 2004 (41107B1C)
    f0ede000 f0ee6900 msgpc msgpc.sys Wed Aug 04 07:04:11 2004 (41107C5B)
    f3a0d000 f3a13000 symlcbrd symlcbrd.sys Sun Aug 22 09:10:18 2004 (412854EA)
    f5df7000 f5e0a780 VIDEOPRT VIDEOPRT.SYS Wed Aug 04 07:07:04 2004 (41107D08)
    f5e0b000 f60638c0 nv4_mini nv4_mini.sys Fri Jul 02 01:06:41 2004 (40E4A711)
    f7211000 f722b580 Mup Mup.sys Wed Aug 04 07:15:20 2004 (41107EF8)
    f722c000 f7258a80 NDIS NDIS.sys Wed Aug 04 07:14:27 2004 (41107EC3)
    f7259000 f72e5480 Ntfs Ntfs.sys Wed Aug 04 07:15:06 2004 (41107EEA)
    f72e6000 f72fc780 KSecDD KSecDD.sys Wed Aug 04 06:59:45 2004 (41107B51)
    f72fd000 f7312360 PQV2i PQV2i.sys Mon Nov 22 23:51:56 2004 (41A27B9C)
    f7313000 f733ca80 GoBack2K GoBack2K.sys Tue Dec 21 18:05:32 2004 (41C865EC)
    f733d000 f734ef00 sr sr.sys Wed Aug 04 07:06:22 2004 (41107CDE)
    f734f000 f736d780 fltMgr fltMgr.sys Wed Aug 04 07:01:17 2004 (41107BAD)
    f736e000 f7395000 fasttx2k fasttx2k.sys Wed Aug 06 03:43:02 2003 (3F306B36)
    f7395000 f73ac800 SCSIPORT SCSIPORT.SYS Wed Aug 04 06:59:39 2004 (41107B4B)
    f73ad000 f73bef80 viamraid viamraid.sys Fri Mar 26 08:00:04 2004 (4063E304)
    f73bf000 f73d6480 atapi atapi.sys Wed Aug 04 06:59:41 2004 (41107B4D)
    f73d7000 f73fc700 dmio dmio.sys Wed Aug 04 07:07:13 2004 (41107D11)
    f73fd000 f741b880 ftdisk ftdisk.sys Fri Aug 17 21:52:41 2001 (3B7D8419)
    f741c000 f742ca80 pci pci.sys Wed Aug 04 07:07:45 2004 (41107D31)
    f742d000 f745ad80 ACPI ACPI.sys Wed Aug 04 07:07:35 2004 (41107D27)
    f755c000 f7564c00 isapnp isapnp.sys Fri Aug 17 21:58:01 2001 (3B7D8559)
    f756c000 f7576500 MountMgr MountMgr.sys Wed Aug 04 06:58:29 2004 (41107B05)
    f757c000 f7588c80 VolSnap VolSnap.sys Wed Aug 04 07:00:14 2004 (41107B6E)
    f758c000 f7594e00 disk disk.sys Wed Aug 04 06:59:53 2004 (41107B59)
    f759c000 f75a8200 CLASSPNP CLASSPNP.SYS Wed Aug 04 07:14:26 2004 (41107EC2)
    f75ac000 f75b6880 sbp2port sbp2port.sys Wed Aug 04 06:59:54 2004 (41107B5A)
    f75bc000 f75cae80 ohci1394 ohci1394.sys Wed Aug 04 07:10:05 2004 (41107DBD)
    f75cc000 f75d9000 1394BUS 1394BUS.SYS Wed Aug 04 07:10:03 2004 (41107DBB)
    f75dc000 f75e7580 gagp30kx gagp30kx.sys Wed Aug 04 07:07:43 2004 (41107D2F)
    f77bc000 f77cb180 nic1394 nic1394.sys Wed Aug 04 06:58:28 2004 (41107B04)
    f77cc000 f77d5fa0 SYMNDIS SYMNDIS.SYS Sat Oct 16 00:18:14 2004 (41705AB6)
    f77dc000 f77e2200 PCIIDEX PCIIDEX.SYS Wed Aug 04 06:59:40 2004 (41107B4C)
    f77e4000 f77e8900 PartMgr PartMgr.sys Sat Aug 18 02:32:23 2001 (3B7DC5A7)
    f77ec000 f77f0c60 PxHelp20 PxHelp20.sys Wed Mar 03 23:56:31 2004 (404670AF)
    f77f4000 f77fad00 viaagp1 viaagp1.sys Wed Jul 02 11:08:01 2003 (3F02AF01)
    f7824000 f782a780 USBSTOR USBSTOR.SYS Wed Aug 04 07:08:44 2004 (41107D6C)
    f782c000 f7833b80 usbccgp usbccgp.sys Wed Aug 04 07:08:45 2004 (41107D6D)
    f7834000 f7839d00 USBCAMD USBCAMD.SYS Fri Aug 17 22:03:37 2001 (3B7D86A9)
    f783c000 f7842180 HIDPARSE HIDPARSE.SYS Wed Aug 04 07:08:15 2004 (41107D4F)
    f784c000 f7850500 watchdog watchdog.sys Wed Aug 04 07:07:32 2004 (41107D24)
    f78cc000 f78d1000 SYMREDRV SYMREDRV.SYS Sat Oct 16 00:18:24 2004 (41705AC0)
    f78d4000 f78db1e0 SYMIDS SYMIDS.SYS Sat Oct 16 00:18:29 2004 (41705AC5)
    f78dc000 f78e1680 strmdisp strmdisp.sys Thu Jan 09 10:42:42 2003 (3E1D5222)
    f7934000 f7939000 flpydisk flpydisk.sys Wed Aug 04 06:59:24 2004 (41107B3C)
    f7944000 f7949200 vga vga.sys Wed Aug 04 07:07:06 2004 (41107D0A)
    f794c000 f7950a80 Msfs Msfs.SYS Wed Aug 04 07:00:37 2004 (41107B85)
    f7954000 f795b880 Npfs Npfs.SYS Wed Aug 04 07:00:38 2004 (41107B86)
    f796c000 f796f000 BOOTVID BOOTVID.dll Fri Aug 17 21:49:09 2001 (3B7D8345)
    f7970000 f7972480 compbatt compbatt.sys Fri Aug 17 21:57:58 2001 (3B7D8556)
    f7974000 f7977700 BATTC BATTC.SYS Fri Aug 17 21:57:52 2001 (3B7D8550)
    f7a4c000 f7a4f980 mxofwfp mxofwfp.sys Tue May 21 23:46:38 2002 (3CEACE4E)
    f7a5c000 f7a5db80 kdcom kdcom.dll Fri Aug 17 21:49:10 2001 (3B7D8346)
    f7a5e000 f7a5f100 WMILIB WMILIB.SYS Fri Aug 17 22:07:23 2001 (3B7D878B)
    f7a60000 f7a61500 viaide viaide.sys Wed Aug 04 06:59:42 2004 (41107B4E)
    f7a62000 f7a63700 dmload dmload.sys Fri Aug 17 21:58:15 2001 (3B7D8567)
    f7a94000 f7a95640 SYMDNS SYMDNS.SYS Sat Oct 16 00:18:07 2004 (41705AAF)
    f7b24000 f7b24fa0 GBDevice GBDevice.sys Tue Dec 21 18:06:18 2004 (41C8661A)
    f7c09000 f7c09d00 dxgthk dxgthk.sys Fri Aug 17 21:53:12 2001 (3B7D8438)
    f7c3a000 f7c3ab80 Null Null.SYS Fri Aug 17 21:47:39 2001 (3B7D82EB)
    f7c51000 f7c51a80 PQNTDrv PQNTDrv.SYS Thu May 06 04:48:39 2004 (4099B597)

    Unloaded modules:
    eefab000 eefd5000 kmixer.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f7c9a000 f7c9b000 drmkaud.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    eec24000 eec31000 DMusic.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    eefd5000 eeff8000 aec.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ee8bc000 ee8ca000 swmidi.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ed98e000 ed990000 splitter.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ef0d8000 ef0dc000 ASNDIS5.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    edca0000 edca4000 GBFSHook.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f0e6e000 f0e77000 processr.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f793c000 f7941000 Cdaudio.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f7978000 f797b000 SiWinAcc.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    Closing open log file c:\debuglog.txt
     
  6. 2005/01/29
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
    well shucks. Still no good. It didnt pull down symbols. Were you connected to the internet when you ran it? Do you have some tinfoil hat paranoid firewall that blocks outgoing internet requests? The debugger goes out to the internet and retrives symbols to make itself work. Did you run it on the same machine it was generated on?
     
  7. 2005/01/30
    spotta

    spotta Inactive Thread Starter

    Joined:
    2002/12/04
    Messages:
    182
    Likes Received:
    0
    Hi.

    Yep - was online, running Norton net sceurity but cdb.exe is permitted to access net.
    And I am not running it on the machine is was generated on -it's a friends machine, I was round there the other day to help him out but couldn't find the reason for his BSOD's so I emailed some dump files to myself for further investigation.
    Your tool is being run on my machine with his dump file.

    Spotta
     
    Last edited: 2005/01/30
  8. 2005/01/30
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
    Ahh, you cant do that with minidumps unless you have an EXACT clone of the machine, or a way to map a drive so that the debugger can see his system32 directory.
    Microsoft gets away with this because they have a SRV* setup with every binary that ever left the building, you and I have no such luck.
     
  9. 2005/01/31
    spotta

    spotta Inactive Thread Starter

    Joined:
    2002/12/04
    Messages:
    182
    Likes Received:
    0
    Well

    I have emailed him the microsoft tools, your debugwiz and instructions.
    If he sends me his debuglog.txt I will post it here.
    That's about as much as I can do for him

    Thanks for the help

    Spotta
     
  10. 2005/02/13
    Ez-Toyz

    Ez-Toyz Inactive

    Joined:
    2005/02/13
    Messages:
    1
    Likes Received:
    0
    Looks like this post was abandoned a while back, but I have run into a similar problem on one of my PCs...It is a PC running Alnet CCTV DVR Software, with an Alnet 4-channel PCI DVR Card, and a USB Dongle. At times, the PC will go weeks without rebooting, but then might reboot 4 times in one day. The PC only runs the Alnet DVR Software, which automatically restarts on reboot.

    Please find the WinDbg output below:


    Microsoft (R) Windows Debugger Version 6.4.0007.2
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\WINDOWS\Minidump\Mini021305-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: C:\WINDOWS\Symbols
    Executable search path is:
    Unable to load image ntoskrnl.exe, Win32 error 2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    Windows XP Kernel Version 2600 (Service Pack 1) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Kernel base = 0x804d4000 PsLoadedModuleList = 0x8054be30
    Debug session time: Sun Feb 13 18:07:19.922 2005 (GMT-6)
    System Uptime: 0 days 0:22:28.859
    Unable to load image ntoskrnl.exe, Win32 error 2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    Loading Kernel Symbols
    ............................................................................................................
    Loading unloaded module list
    ........
    Loading User Symbols
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000008E, {c0000005, 804da2f1, f4736cf0, 0}

    Probably caused by : hardware ( nt!KiServiceExit2+0 )

    Followup: MachineOwner
    ---------






    One time out of 20...it gave this as an output (out of 20 different mini-dumps):

    Microsoft (R) Windows Debugger Version 6.4.0007.2
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\WINDOWS\Minidump\Mini020405-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: C:\WINDOWS\Symbols
    Executable search path is:
    Unable to load image ntoskrnl.exe, Win32 error 2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    Windows XP Kernel Version 2600 (Service Pack 1) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Kernel base = 0x804d4000 PsLoadedModuleList = 0x8054be30
    Debug session time: Fri Feb 4 14:01:59.977 2005 (GMT-6)
    System Uptime: 0 days 19:26:33.111
    Unable to load image ntoskrnl.exe, Win32 error 2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    Loading Kernel Symbols
    ............................................................................................................
    Loading unloaded module list
    .........
    Loading User Symbols
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {4, 2, 1, f77e8b25}

    Unable to load image usbuhci.sys, Win32 error 2
    *** WARNING: Unable to verify timestamp for usbuhci.sys
    Probably caused by : usbuhci.sys ( usbuhci!UhciBulkOrInterruptTransfer+b3 )

    Followup: MachineOwner
    ---------


    Any assistance would be appreciated!

    Thank you!
     
  11. 2005/02/13
    JoeHobart

    JoeHobart Inactive Alumni

    Joined:
    2004/05/19
    Messages:
    919
    Likes Received:
    1
    Ez, start a new thread and include the entire debug log from each of those dumps, you may have to split it into multiple replies, thats fine.
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.