Sorry for the late reply.. I was on vacation. Just got back and got the auto restart on. I had the computer boot to the last safe boot or whatever its called. I got the minidump files. Seems its something with the hardware.. but I don't know how to figure out what. I really need to figure it out as I use this for school! Thanks for the help!
I looked at the files in windbg.. here's what it showed me.. 2 different errors
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini112412-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18327.amd64fre.vistasp2_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`0204d000 PsLoadedModuleList = 0xfffff800`02211dd0
Debug session time: Sat Nov 24 10:52:46.121 2012 (UTC - 5:00)
System Uptime: 0 days 0:09:14.016
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 8, 1, fffff800020a9c7b}
Probably caused by : hardware ( nt!KiSwapContext+7b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000008, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800020a9c7b, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002274080
GetUlongFromAddress: unable to read from fffff80002274160
0000000000000000 Nonpaged pool
CURRENT_IRQL: c
FAULTING_IP:
nt!KiSwapContext+7b
fffff800`020a9c7b d102 rol dword ptr [rdx],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: chrome.exe
TRAP_FRAME: fffffa6007b3e800 -- (.trap 0xfffffa6007b3e800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000007ef6b000 rbx=0000000000000000 rcx=00000000c0000102
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800020a9c7b rsp=fffffa6007b3e990 rbp=fffffa80055db060
r8=0000000000000000 r9=0000000000007e00 r10=0000000000000009
r11=fffffa8004f14ca2 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiSwapContext+0x7b:
fffff800`020a9c7b d102 rol dword ptr [rdx],1 ds:00000000`00000000=????????
Resetting default scope
MISALIGNED_IP:
nt!KiSwapContext+7b
fffff800`020a9c7b d102 rol dword ptr [rdx],1
LAST_CONTROL_TRANSFER: from fffff800020a722e to fffff800020a7490
STACK_TEXT:
fffffa60`07b3e6b8 fffff800`020a722e : 00000000`0000000a 00000000`00000000 00000000`00000008 00000000`00000001 : nt!KeBugCheckEx
fffffa60`07b3e6c0 fffff800`020a610b : 00000000`00000001 fffffa80`05b2d890 fffffa60`00000000 fffff800`021c0680 : nt!KiBugCheckDispatch+0x6e
fffffa60`07b3e800 fffff800`020a9c7b : fffffa80`05b2d890 fffffa60`00000000 fffffa60`07b3e9c0 fffffa60`00000150 : nt!KiPageFault+0x20b
fffffa60`07b3e990 fffff800`020a96fa : 00000000`8000fbc0 00000000`00000000 00000000`00000000 fffffa60`02ccf4eb : nt!KiSwapContext+0x7b
fffffa60`07b3ead0 fffff800`020afc05 : 00000001`00000000 fffffa80`055db060 00000000`00000000 00000000`0000000a : nt!KiSwapThread+0x13a
fffffa60`07b3eb40 fffff800`02307c4d : fffffa80`055db060 fffffa80`055db060 00000000`00000001 00000000`00000020 : nt!KeDelayExecutionThread+0x575
fffffa60`07b3ebf0 fffff800`020a6f33 : fffffa80`055db060 00000000`00000000 ffffffff`ffffd8f0 fffffa80`054f6730 : nt!NtDelayExecution+0x5c
fffffa60`07b3ec20 00000000`754c3d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0393ede8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x754c3d09
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSwapContext+7b
fffff800`020a9c7b d102 rol dword ptr [rdx],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiSwapContext+7b
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
0: kd> lmvm hardware
start end module name
SECOND ERROR
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini112212-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18538.amd64fre.vistasp1_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`0205d000 PsLoadedModuleList = 0xfffff800`02222db0
Debug session time: Thu Nov 22 10:07:30.276 2012 (UTC - 5:00)
System Uptime: 0 days 0:14:27.155
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5003, fffff70001080000, 5b3e, 5b400000b678}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+14ab7 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 0000000000005b3e
Arg4: 00005b400000b678
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000210db37 to fffff800020b2410
STACK_TEXT:
fffffa60`08b1e368 fffff800`0210db37 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`00005b3e : nt!KeBugCheckEx
fffffa60`08b1e370 fffff800`020c26c7 : 00000000`0016f94c fffffa80`0894ef00 fffffa80`044ebe40 fffffa80`054d6bb0 : nt! ?? ::FNODOBFM::`string'+0x14ab7
fffffa60`08b1e3c0 fffff800`020b0f99 : 00000000`00000001 00000000`027b0780 fffffa80`054d6b01 00000000`07a0b918 : nt!MmAccessFault+0x26c7
fffffa60`08b1e4b0 00000000`66e58954 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x119
00000000`003bf548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x66e58954
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+14ab7
fffff800`0210db37 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+14ab7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cb71b96
FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+14ab7
BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+14ab7
Followup: MachineOwner
---------