jesterdvine
New Member
- Joined
- Nov 5, 2009
Hi guys. I am having a couple BSODs tonight. The reason? Apparently the same. Dumps are attached. So please help me! Thanks..
Attachments
Last edited:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\013111-28672-01 - Copy.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c61000 PsLoadedModuleList = 0xfffff800`02e9ee50
Debug session time: Mon Jan 31 10:11:07.929 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:36.271
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002fcc67c, fffff8800698a080, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+20 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002fcc67c, Address of the instruction which caused the bugcheck
Arg3: fffff8800698a080, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObDereferenceSecurityDescriptor+20
fffff800`02fcc67c 8b4610 mov eax,dword ptr [rsi+10h]
CONTEXT: fffff8800698a080 -- (.cxr 0xfffff8800698a080)
rax=fffff8800698aa88 rbx=0000000000000000 rcx=ff00000000000000
rdx=0000000000000001 rsi=feffffffffffffe0 rdi=0000000000000000
rip=fffff80002fcc67c rsp=fffff8800698aa60 rbp=fffffa8007bc1500
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff8800698ab38 r12=0000000000000001 r13=fffffa80078cd060
r14=0000000004255800 r15=fffff8a002a922c0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ObDereferenceSecurityDescriptor+0x20:
fffff800`02fcc67c 8b4610 mov eax,dword ptr [rsi+10h] ds:002b:feffffff`fffffff0=????????
Resetting default scope
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002f97bf8 to fffff80002fcc67c
STACK_TEXT:
fffff880`0698aa60 fffff800`02f97bf8 : 00000000`00000000 fffffa80`07bc1500 fffffa80`0539d200 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x20
fffff880`0698aa90 fffff800`02cd80ee : 00000000`00000000 fffffa80`078cd060 fffffa80`0539d200 00000000`00000000 : nt!SeDefaultObjectMethod+0xa8
fffff880`0698aae0 fffff800`02fe6194 : fffffa80`078cd060 00000000`00000000 fffffa80`0796d060 00000000`00000000 : nt!ObfDereferenceObject+0x10e
fffff880`0698ab40 fffff800`02fe6094 : 00000000`000006ec fffffa80`078cd060 fffff8a0`02a922c0 00000000`000006ec : nt!ObpCloseHandleTableEntry+0xc4
fffff880`0698abd0 fffff800`02cd2153 : fffffa80`0796d060 fffff880`0698aca0 00000000`042f09a0 fffffa80`07bc1500 : nt!ObpCloseHandle+0x94
fffff880`0698ac20 00000000`7757fe4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0491f758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7757fe4a
FOLLOWUP_IP:
nt!ObDereferenceSecurityDescriptor+20
fffff800`02fcc67c 8b4610 mov eax,dword ptr [rsi+10h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObDereferenceSecurityDescriptor+20
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
STACK_COMMAND: .cxr 0xfffff8800698a080 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObDereferenceSecurityDescriptor+20
BUCKET_ID: X64_0x3B_nt!ObDereferenceSecurityDescriptor+20
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\013111-16832-01 - Copy.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02e98e50
Debug session time: Mon Jan 31 11:22:20.719 2011 (UTC - 5:00)
System Uptime: 0 days 1:10:01.061
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002cd0105, fffff88009db98e0, 0}
*** WARNING: Unable to verify timestamp for win32k.syウ
*** ERROR: Module load completed but symbols could not be loaded for win32k.syウ
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002cd0105, Address of the instruction which caused the bugcheck
Arg3: fffff88009db98e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02cd0105 498b08 mov rcx,qword ptr [r8]
CONTEXT: fffff88009db98e0 -- (.cxr 0xfffff88009db98e0)
rax=000000040d0d0006 rbx=fffffa800893e3e0 rcx=fffff880009e9b20
rdx=00fffa80089fe671 rsi=fffff880009e9b20 rdi=0000000000000000
rip=fffff80002cd0105 rsp=fffff88009dba2c0 rbp=fffff80002e5a880
r8=00fffa80089fe670 r9=fffff80002c5b000 r10=fffff880009e9b20
r11=fffff88009dba498 r12=0000000000000004 r13=0000000000000000
r14=0000000000000002 r15=0000000042786454
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02cd0105 498b08 mov rcx,qword ptr [r8] ds:002b:00fffa80`089fe670=????????????????
Resetting default scope
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: uTorrent.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002dff4d3 to fffff80002cd0105
STACK_TEXT:
fffff880`09dba2c0 fffff800`02dff4d3 : 00000000`00000000 00000000`00000002 fffffa80`085ba06c 00fffa80`085ba079 : nt!ExpInterlockedPopEntrySListFault16
fffff880`09dba2d0 fffff880`02b9dd09 : fffffa80`05544810 fffffa80`0893e3e0 fffffa80`089b9a00 00fffa80`0893e3e0 : nt!ExAllocatePoolWithTag+0x103
fffff880`09dba3c0 fffffa80`05544810 : fffffa80`0893e3e0 fffffa80`089b9a00 00fffa80`0893e3e0 00000000`00000000 : 0xfffff880`02b9dd09
fffff880`09dba3c8 fffffa80`0893e3e0 : fffffa80`089b9a00 00fffa80`0893e3e0 00000000`00000000 fffffa80`078fbc00 : 0xfffffa80`05544810
fffff880`09dba3d0 fffffa80`089b9a00 : 00fffa80`0893e3e0 00000000`00000000 fffffa80`078fbc00 00000000`00000000 : 0xfffffa80`0893e3e0
fffff880`09dba3d8 00fffa80`0893e3e0 : 00000000`00000000 fffffa80`078fbc00 00000000`00000000 fffffa80`0663f5f0 : 0xfffffa80`089b9a00
fffff880`09dba3e0 00000000`00000000 : fffffa80`078fbc00 00000000`00000000 fffffa80`0663f5f0 fffffa80`084ce134 : 0xfffa80`0893e3e0
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
65 errors : !nt (fffff80002cd00b7-fffff80002cd0ea7)
fffff80002cd00b0 48 8b 11 48 8b 41 08 *00 c0 74 03 fe c8 c3 48 8b H..H.A...t....H.
fffff80002cd00c0 c2 48 25 00 00 00 fe *00 0c 48 83 f8 01 f5 48 *00 .H%......H....H.
...
fffff80002cd00f0 84 d2 74 2f eb 07 49 *00 02 49 8b 52 08 4c 8b c2 ..t/..I..I.R.L..
...
fffff80002cd0110 f0 49 0f c7 0a 75 df *00 8b c0 5b c3 41 0f 0d *00 .I...u....[.A...
...
fffff80002cd0130 81 c8 ff ff 1f 00 49 *00 c8 15 49 8b 18 48 c1 e3 ......I...I..H..
fffff80002cd0140 15 8b c8 66 ff c9 48 *00 e1 ff ff ff 01 48 0b d9 ...f..H......H..
fffff80002cd0150 f0 49 0f b1 1a 75 c9 eb be cc cc cc cc cc cc *00 .I...u..........
...
fffff80002cd0190 0a 75 e8 49 8b c0 5b *00 48 bb 00 00 00 00 80 *00 .u.I..[.H.......
...
fffff80002cd01c0 d8 49 c1 f8 14 4d 89 03 67 8d 98 01 00 01 00 *00 .I...M..g.......
fffff80002cd01d0 e3 ff ff ff 01 48 0b d9 f0 49 0f b1 1a 75 d0 *00 .....H...I...u..
fffff80002cd01e0 b2 cc cc cc cc cc cc *00 0f 1f 84 00 00 00 00 00 ................
fffff80002cd01f0 48 53 0f 0d 09 4c 8b *00 48 8b 01 48 8b 51 08 84 HS...L..H..H.Q..
fffff80002cd0200 d2 74 1f 4c 8b c2 49 ff c8 74 12 48 33 c9 fe *00 .t.L..I..t.H3...
...
fffff80002cd0220 5b c3 4c 8b c0 49 81 e0 00 00 00 fe 74 ef 8b *00 [.L..I......t...
...
fffff80002cd0260 53 08 84 d2 74 24 fe c1 4c 8b d2 41 80 e2 f0 *00 S...t$..L..A....
...
fffff80002cd04d0 08 48 8d 4d e8 48 89 *00 f0 48 89 11 48 89 08 48 .H.M.H...H..H..H
fffff80002cd04e0 89 4a 08 f0 81 27 7f ff ff ff 4c 8b ac 24 b8 *00 .J...'....L..$..
fffff80002cd04f0 00 00 48 8d 45 18 41 ff c4 48 89 45 08 48 83 *00 ..H.E.A..H.E.H..
...
fffff80002cd0530 48 03 c0 4d 89 5c c3 *00 4d 8b c8 44 8b 44 24 24 H..M.\..M..D.D$$
...
fffff80002cd0590 86 b8 fd ff ff e9 cb *00 06 00 83 c8 20 89 46 *00 ............ .F.
fffff80002cd05a0 e9 45 fe ff ff 48 0f be c2 44 38 7c 30 4a 0f *00 .E...H...D8|0J..
fffff80002cd05b0 68 06 00 00 84 d2 0f *ff c9 01 00 00 44 38 7e 4a h...........D8~J
...
fffff80002cd0620 00 00 0f 0d 0f 8b 07 *00 44 24 40 88 4c 24 43 8b [email protected]$C.
...
fffff80002cd0650 41 08 48 89 0a 48 89 *ff 08 48 89 10 48 89 51 08 A.H..H...H..H.Q.
fffff80002cd0660 f0 81 27 7f ff ff ff c6 86 64 01 00 00 02 f0 *00 ..'......d......
...
fffff80002cd06a0 83 f8 03 7d 2c 48 8b *00 18 f0 0f ba 2f 07 0f 82 ...},H....../...
...
fffff80002cd08d0 c1 24 07 3c 01 0f 85 *00 02 00 00 44 89 7b 04 49 .$.<.......D.{.I
...
fffff80002cd08f0 00 48 8d 4c 24 60 41 *00 d2 e8 b2 fd fb ff 48 8b .H.L$`A.......H.
...
fffff80002cd0930 8b d6 49 8b ce e8 96 *03 04 00 8b c3 e9 15 fc ff ..I.............
fffff80002cd0940 ff 48 b8 08 00 00 00 *00 f7 ff ff 48 8b 00 48 3b .H.........H..H;
fffff80002cd0950 86 d8 00 00 00 0f 82 bc fb ff ff f0 48 0f ba *00 ............H...
...
fffff80002cd09d0 39 01 77 eb 44 8b 94 24 b0 02 00 00 8b c2 41 *00 9.w.D..$......A.
fffff80002cd09e0 c1 4c 89 44 c4 60 45 *00 ca 72 b4 e9 8e f9 ff *00 .L.D.`E..r......
...
fffff80002cd0a10 10 48 83 c1 08 48 89 42 08 48 89 0a 48 89 10 *00 .H...H.B.H..H...
...
fffff80002cd0a50 ff 41 0f b6 86 da 21 *03 00 38 47 03 0f 84 73 fb .A....!..8G...s.
fffff80002cd0a60 ff ff e9 62 fa ff ff 48 8d 6c 24 68 45 8d 6a *00 ...b...H.l$hE.j.
...
fffff80002cd0a80 e0 0f 82 8b 6a 06 00 *00 83 c5 08 49 83 ed 01 75 ....j......I...u
...
fffff80002cd0aa0 00 4c 8b 74 24 58 4c 8b ac 24 b8 02 00 00 4c *00 .L.t$XL..$....L.
...
fffff80002cd0cb0 ff bf c0 00 00 00 e9 6b ff ff ff 41 8b ff ff *00 .......k...A....
...
fffff80002cd0ce0 00 00 00 00 72 d8 8a 8c 24 d8 02 00 00 8a 94 *00 ....r...$.......
fffff80002cd0cf0 d0 02 00 00 44 8d 40 *00 e9 fd f6 ff ff 66 44 39 [email protected]
fffff80002cd0d00 be c6 01 00 00 0f 85 f9 f6 ff ff 41 80 fe 01 *00 ...........A....
...
fffff80002cd0d20 c6 44 0f 22 c0 45 0f *00 c0 44 88 b6 66 01 00 *14 .D.".E...D..f...
fffff80002cd0d30 e9 9c f6 ff ff ff 4b *00 e9 a2 fb ff ff 90 90 90 ......K.........
fffff80002cd0d40 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 *00 ................
fffff80002cd0d50 48 89 5c 24 08 48 89 6c 24 10 48 89 74 24 18 *00 H.\$.H.l$.H.t$..
fffff80002cd0d60 41 54 41 55 41 56 41 *00 48 83 ec 30 4d 63 d0 *00 ATAUAVA.H..0Mc..
...
fffff80002cd0da0 83 7d 50 00 74 25 4c 3b c3 76 20 48 8d 05 8e *00 .}P.t%L;.v H....
fffff80002cd0db0 1a 00 49 8b d2 48 6b d2 38 48 03 d0 49 8b c0 *00 ..I..Hk.8H..I...
fffff80002cd0dc0 8b 4a 08 48 2b c3 49 3b c1 77 68 48 8b cf 4c *00 .J.H+.I;.whH..L.
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xfffff88009db98e0 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
start end module name
fffff880`13e6a000 fffff880`13ea8000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ed4000 fffff880`00f2b000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`04344000 fffff880`043ce000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04810000 fffff880`04826000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`02c00000 fffff880`02c15000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e00000 fffff880`00e0b000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`049b0000 fffff880`049b8000 ASACPI ASACPI.sys Wed May 13 21:25:17 2009 (4A0B72FD)
fffff880`00ff0000 fffff880`00ff9000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00db6000 fffff880`00de0000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01986000 fffff880`0198d000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02dbd000 fffff880`02dce000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`0295f000 fffff880`0297d000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006d0000 fffff960`006f7000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`018f6000 fffff880`01920000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cf6000 fffff880`00db6000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01890000 fffff880`018c0000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c98000 fffff880`00cf6000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`04800000 fffff880`04810000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`043dd000 fffff880`043eb000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`00f7e000 fffff880`00f95000 CSCrySec CSCrySec.sys Mon Dec 07 03:34:23 2009 (4B1CBE0F)
fffff880`02daa000 fffff880`02dbd000 CSVirtualDiskDrv CSVirtualDiskDrv.sys Mon Dec 07 03:34:27 2009 (4B1CBE13)
fffff880`02d8c000 fffff880`02daa000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02d7d000 fffff880`02d8c000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0187a000 fffff880`01890000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04bb8000 fffff880`04bda000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`02df4000 fffff880`02dfd000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`02c2f000 fffff880`02c3b000 dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`043eb000 fffff880`043fe000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`04a5c000 fffff880`04a68000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`14b0c000 fffff880`14c00000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`13e00000 fffff880`13e46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`02929000 fffff880`0295f000 fastfat fastfat.SYS Mon Jul 13 19:23:28 2009 (4A5BC1F0)
fffff880`01135000 fffff880`01149000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010e9000 fffff880`01135000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013ce000 fffff880`013d8000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01840000 fffff880`0187a000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01073000 fffff880`010bd000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02c18000 fffff800`02c61000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`13e46000 fffff880`13e6a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04a00000 fffff880`04a5c000 HdAudio HdAudio.sys Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04be0000 fffff880`04bf9000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04a84000 fffff880`04a8c080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`04a76000 fffff880`04a84000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`02800000 fffff880`028c8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015e6000 fffff880`015ef000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`049b8000 fffff880`049d6000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`049d6000 fffff880`049e5000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00bb1000 fffff800`00bbb000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`03e1b000 fffff880`04344000 kl1 kl1.sys Tue Sep 01 07:29:21 2009 (4A9D0591)
fffff880`015d8000 fffff880`015e6000 klbg klbg.sys Wed Oct 14 13:18:13 2009 (4AD607D5)
fffff880`01920000 fffff880`0197d000 klif klif.sys Thu Nov 26 04:07:11 2009 (4B0E453F)
fffff880`02cb0000 fffff880`02cba000 klim6 klim6.sys Mon Sep 14 06:46:26 2009 (4AAE1F02)
fffff880`018ea000 fffff880`018f4000 klmouflt klmouflt.sys Fri Oct 02 11:38:29 2009 (4AC61E75)
fffff880`04a8e000 fffff880`04ad1000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013a3000 fffff880`013bd000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`04bda000 fffff880`04bdf200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`028fc000 fffff880`02911000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`010bd000 fffff880`010e0000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c77000 fffff880`00c84000 mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`04a68000 fffff880`04a76000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`043ce000 fffff880`043dd000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`018dd000 fffff880`018ea000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fd6000 fffff880`00ff0000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0297d000 fffff880`02995000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`02995000 fffff880`029c2000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`05eeb000 fffff880`05f39000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`05f39000 fffff880`05f5c000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`019eb000 fffff880`019f6000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f34000 fffff880`00f3e000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01149000 fffff880`011a7000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02d72000 fffff880`02d7d000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015c6000 fffff880`015d8000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014d4000 fffff880`015c6000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0484a000 fffff880`04856000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`04856000 fffff880`04885000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04b3d000 fffff880`04b52000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02cba000 fffff880`02cc9000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c3c000 fffff880`02c81000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`01800000 fffff880`01811000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02d66000 fffff880`02d72000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c61000 fffff800`0323e000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01200000 fffff880`013a3000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0197d000 fffff880`01986000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`14b0a000 fffff880`14b0b180 nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`04b52000 fffff880`04b7b000 nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
fffff880`13eaf000 fffff880`14b09d00 nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`02c8a000 fffff880`02cb0000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`04993000 fffff880`049b0000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f95000 fffff880`00faa000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f3e000 fffff880`00f71000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fbf000 fffff880`00fc6000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fc6000 fffff880`00fd6000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013bd000 fffff880`013ce000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05e00000 fffff880`05ea6000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04b7b000 fffff880`04bb8000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c84000 fffff880`00c98000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`04826000 fffff880`0484a000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04885000 fffff880`048a0000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`048a0000 fffff880`048c1000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`02c15000 fffff880`02c2f000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d15000 fffff880`02d66000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`019d0000 fffff880`019d9000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019d9000 fffff880`019e2000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019e2000 fffff880`019eb000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01493000 fffff880`014cd000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`02911000 fffff880`02929000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`048ca000 fffff880`04921000 Rt64win7 Rt64win7.sys Thu Mar 04 08:42:52 2010 (4B8FB8DC)
fffff880`05ea6000 fffff880`05eb1000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`049e5000 fffff880`049f1000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02cc9000 fffff880`02ce6000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0148b000 fffff880`01493000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06676000 fffff880`0670c000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`05f6e000 fffff880`05fd5000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`05eb1000 fffff880`05ede000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`048c1000 fffff880`048c2480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05f5c000 fffff880`05f6e000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`0182f000 fffff880`0183c000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01811000 fffff880`0182f000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d01000 fffff880`02d15000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`00500000 fffff960`0050a000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02dce000 fffff880`02df4000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04ad1000 fffff880`04ae3000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`013d8000 fffff880`013f2c00 usbaudio usbaudio.sys Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`018c0000 fffff880`018dd000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`04bf9000 fffff880`04bfaf00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04982000 fffff880`04993000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04ae3000 fffff880`04b3d000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`04921000 fffff880`0492c000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0492c000 fffff880`04982000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`03e00000 fffff880`03e1b000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00f71000 fffff880`00f7e000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0198d000 fffff880`0199b000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0199b000 fffff880`019c0000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00faa000 fffff880`00fbf000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`011a7000 fffff880`011f3000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02ce6000 fffff880`02d01000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019c0000 fffff880`019d0000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e21000 fffff880`00ec5000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ec5000 fffff880`00ed4000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02c81000 fffff880`02c8a000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00060000 fffff960`00370000 win32k win32k.sys Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`049f1000 fffff880`049fa000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f2b000 fffff880`00f34000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`028db000 fffff880`028fc000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`018c0000 fffff880`018ce000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`018ce000 fffff880`018da000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000C000
fffff880`018da000 fffff880`018e3000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00009000
fffff880`018e3000 fffff880`018f6000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
@cybercore: okay mod, done that attached screenshots.
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-15834-01 - Copy.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03040e50
Debug session time: Tue Feb 1 09:23:01.688 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:10.436
Loading Kernel Symbols
...............................................................
..................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff800032253c0, 2, 0, fffff80002ea1f62}
Probably caused by : ntkrnlmp.exe ( nt!RtlDispatchException+122 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff800032253c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ea1f62, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ab0e0
fffff800032253c0
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlDispatchException+122
fffff800`02ea1f62 410fb60c24 movzx ecx,byte ptr [r12]
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88002faf090 -- (.trap 0xfffff88002faf090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a000493bd0 rbx=0000000000000000 rcx=0000000000000008
rdx=fffff88002faf2e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032253c0 rsp=fffff88002faf228 rbp=fffff88002faf4b0
r8=fffff8a000003001 r9=0000000000000017 r10=fffffa8003b9b660
r11=0000000000020019 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmpCallCallBacks:
fffff800`032253c0 488bc4 mov rax,rsp
Resetting default scope
EXCEPTION_RECORD: fffff88002faeb18 -- (.exr 0xfffff88002faeb18)
ExceptionAddress: fffff80002e794d8 (nt!KiTryUnwaitThread+0x0000000000000028)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
LOCK_ADDRESS: fffff80003077400 -- (!locks fffff80003077400)
Resource @ nt!PiEngineLock (0xfffff80003077400) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0xfffff80003077400
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80002e74469 to fffff80002e74f00
STACK_TEXT:
fffff880`02fad988 fffff800`02e74469 : 00000000`0000000a fffff800`032253c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02fad990 fffff800`02e730e0 : fffff880`02fadbe0 00000000`00000000 00000000`00037464 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02fadad0 fffff800`02ea1f62 : fffff800`032253c0 fffff880`02fadca8 fffff880`02faeb18 fffff800`02e03000 : nt!KiPageFault+0x260
fffff880`02fadc60 fffff800`02eaf1b5 : fffff880`02faeb18 fffff880`02fae370 fffff880`00000000 00000000`00000000 : nt!RtlDispatchException+0x122
fffff880`02fae340 fffff800`02e74542 : fffff880`02faeb18 ffff0800`00000011 fffff880`02faebc0 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`02fae9e0 fffff800`02e72e4a : 00000000`00000001 00000000`80000000 fffff880`02faed90 fffff800`02e4d6d6 : nt!KiExceptionDispatch+0xc2
fffff880`02faebc0 fffff800`02e794d8 : fffff6fc`00019128 fffff800`03000440 00000000`00000000 fffff800`032253c0 : nt!KiGeneralProtectionFault+0x10a
fffff880`02faed50 fffff800`02eef22d : fffff980`03182ee0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0x28
fffff880`02faedb0 fffff800`02e5192f : fffff6fc`00018a68 00000000`00000002 fffff800`02fffb00 fffff880`00000000 : nt! ?? ::FNODOBFM::`string'+0x3cae9
fffff880`02faee80 fffff800`02e26ba9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02faef00 fffff800`02e90424 : 00000000`00000000 fffff800`02e8efa0 00b00000`0314d121 0000007f`ffffffff : nt!KiCheckForKernelApcDelivery+0x25
fffff880`02faef30 fffff800`02e72fee : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1844
fffff880`02faf090 fffff800`032253c0 : fffff800`03191315 00400000`0321e100 00000000`00000001 fffffa80`03b9b660 : nt!KiPageFault+0x16e
fffff880`02faf228 fffff800`03191315 : 00400000`0321e100 00000000`00000001 fffffa80`03b9b660 00001f80`01080000 : nt!CmpCallCallBacks
fffff880`02faf230 fffff800`02e74153 : fffffa80`03b86b60 fffff880`02faf5e8 fffffa80`00000001 fffff980`015d6fc0 : nt! ?? ::NNGAKEGL::`string'+0x2c83e
fffff880`02faf3c0 fffff800`02e706f0 : fffff800`030e52ab ffffffff`80000138 00000000`00000001 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02faf5c8 fffff800`030e52ab : ffffffff`80000138 00000000`00000001 00000000`00000000 ffffffff`8000014c : nt!KiServiceLinkage
fffff880`02faf5d0 fffff800`0321ee99 : 00000000`00000002 00000000`00000000 00000000`00000000 fffff880`02faf700 : nt!IopGetRegistryValue+0xab
fffff880`02faf630 fffff800`0325576e : fffff880`02faf708 00000000`00000002 00080dce`00000000 fffff880`02faf700 : nt!PipGetRegistryDwordWithFallback+0x99
fffff880`02faf6b0 fffff800`0325fa03 : fffffa80`0599e9b0 fffffa80`053f8480 fffff8a0`00469e20 fffffa80`053b86e0 : nt!PipChangeDeviceObjectFromRegistryProperties+0x8e
fffff880`02faf7a0 fffff800`03260ec2 : fffffa80`053aad90 fffffa80`053b86e0 00000000`00000002 fffffa80`053b9a20 : nt!PipCallDriverAddDevice+0x733
fffff880`02faf950 fffff800`0326135c : fffffa80`05d47400 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x2b2
fffff880`02fafbc0 fffff800`02f75322 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
fffff880`02fafc10 fffff800`02e82161 : fffff800`02f75020 fffff800`0316e501 fffffa80`03b86b00 00000000`00000000 : nt!PnpDeviceActionWorker+0x302
fffff880`02fafcb0 fffff800`03118166 : 00000604`00000000 fffffa80`03b86b60 00000000`00000080 fffffa80`03b10b30 : nt!ExpWorkerThread+0x111
fffff880`02fafd40 fffff800`02e53486 : fffff880`02d64180 fffffa80`03b86b60 fffff880`02d6efc0 00000604`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fafd80 00000000`00000000 : fffff880`02fb0000 fffff880`02faa000 fffff880`02faf180 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlDispatchException+122
fffff800`02ea1f62 410fb60c24 movzx ecx,byte ptr [r12]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!RtlDispatchException+122
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!RtlDispatchException+122
BUCKET_ID: X64_0xA_nt!RtlDispatchException+122
Followup: MachineOwner
---------
start end module name
fffff880`00ee4000 fffff880`00f3b000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02b3d000 fffff880`02bc7000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03c6f000 fffff880`03c84000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00ff2000 fffff880`00ffd000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00fe9000 fffff880`00ff2000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`02a91000 fffff880`02a98000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03c38000 fffff880`03c49000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02a2d000 fffff880`02a57000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00ca4000 fffff880`00d64000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`00dc0000 fffff880`00df0000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c46000 fffff880`00ca4000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01145000 fffff880`011b8000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`013f1000 fffff880`013ff000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c1a000 fffff880`03c38000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c0b000 fffff880`03c1a000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`013db000 fffff880`013f1000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`015f5000 fffff880`015fe000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`011f2000 fffff880`011fe000 dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c13000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`1489e000 fffff880`14992000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`14992000 fffff880`149d8000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`010d3000 fffff880`010e7000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01087000 fffff880`010d3000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`013d1000 fffff880`013db000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`011b8000 fffff880`011f2000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`033e0000 fffff800`03429000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`015ec000 fffff880`015f5000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff800`00b9f000 fffff800`00ba9000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`013a6000 fffff880`013c0000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00c25000 fffff880`00c32000 mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`00fcf000 fffff880`00fe9000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a57000 fffff880`02a88000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`02af6000 fffff880`02b01000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f44000 fffff880`00f4e000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010e7000 fffff880`01145000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c00000 fffff880`03c0b000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015da000 fffff880`015ec000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01488000 fffff880`0157a000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03d46000 fffff880`03d55000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03cd2000 fffff880`03d17000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0157a000 fffff880`015da000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`02b01000 fffff880`02b12000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03df2000 fffff880`03dfe000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e03000 fffff800`033e0000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01203000 fffff880`013a6000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02a88000 fffff880`02a91000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`1489c000 fffff880`1489d180 nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`13c41000 fffff880`1489bd00 nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`03d20000 fffff880`03d46000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f8e000 fffff880`00fa3000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f4e000 fffff880`00f81000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fb8000 fffff880`00fbf000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fbf000 fffff880`00fcf000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013c0000 fffff880`013d1000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00c32000 fffff880`00c46000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03da1000 fffff880`03df2000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02adb000 fffff880`02ae4000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02ae4000 fffff880`02aed000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02aed000 fffff880`02af6000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03d55000 fffff880`03d72000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01475000 fffff880`0147d000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`02b30000 fffff880`02b3d000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02b12000 fffff880`02b30000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03d8d000 fffff880`03da1000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`03c49000 fffff880`03c6f000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`00f81000 fffff880`00f8e000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02a98000 fffff880`02aa6000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02aa6000 fffff880`02acb000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fa3000 fffff880`00fb8000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00d64000 fffff880`00dc0000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03d72000 fffff880`03d8d000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02acb000 fffff880`02adb000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e31000 fffff880`00ed5000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ed5000 fffff880`00ee4000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d17000 fffff880`03d20000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`00f3b000 fffff880`00f44000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-28860-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e1f000 PsLoadedModuleList = 0xfffff800`0305ce50
Debug session time: Tue Feb 1 12:30:06.638 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:12.386
Loading Kernel Symbols
...............................................................
..................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002e87e44, fffff88002fae828, fffff88002fae080}
Unable to load image nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+92ad0 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002e87e44, The address that the exception occurred at
Arg3: fffff88002fae828, Exception Record Address
Arg4: fffff88002fae080, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!memcpy+204
fffff800`02e87e44 488b040a mov rax,qword ptr [rdx+rcx]
EXCEPTION_RECORD: fffff88002fae828 -- (.exr 0xfffff88002fae828)
ExceptionAddress: fffff80002e87e44 (nt!memcpy+0x0000000000000204)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000011449c258
Attempt to read from address 000000011449c258
CONTEXT: fffff88002fae080 -- (.cxr 0xfffff88002fae080)
rax=fffff8a0004ebff0 rbx=0000000000000008 rcx=fffff8a0004ebff0
rdx=0000076113fb0268 rsi=fffff8a0004ebff0 rdi=0000000000000008
rip=fffff80002e87e44 rsp=fffff88002faea68 rbp=fffff88002faee30
r8=0000000000000008 r9=0000000000000001 r10=fffffa8003afe148
r11=fffff8a0004ebff0 r12=000000000000000a r13=fffff88002faeba8
r14=000000011449c258 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!memcpy+0x204:
fffff800`02e87e44 488b040a mov rax,qword ptr [rdx+rcx] ds:002b:00000001`1449c258=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000011449c258
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c70e0
000000011449c258
FOLLOWUP_IP:
nvlddmkm+92ad0
fffff880`13d8bad0 ?? ???
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80003186132 to fffff80002e87e44
STACK_TEXT:
fffff880`02faea68 fffff800`03186132 : 00000000`00000001 00000000`00000008 00000000`00000000 00000000`000007ff : nt!memcpy+0x204
fffff880`02faea70 fffff800`03185feb : fffffa80`05e00500 fffff880`02faeee0 00000000`00000001 fffff880`02faee70 : nt!ObpCaptureObjectName+0x102
fffff880`02faeaf0 fffff800`03189e35 : fffffa80`03b0ade0 fffffa80`03bd3200 00000000`0000006c 00000000`00000000 : nt!ObpCaptureObjectCreateInformation+0x279
fffff880`02faeb70 fffff800`0312719e : fffffa80`03ba8b60 fffff880`02faecf0 fffff880`02faee70 00000000`00000000 : nt!ObCreateObject+0x75
fffff880`02faebe0 fffff800`02e90153 : fffffa80`03ba8b60 00000000`c000009a 00000000`00000000 fffffa80`05810000 : nt!NtCreateSymbolicLinkObject+0xbe
fffff880`02faec70 fffff800`02e8c6f0 : fffff800`032039b6 00000000`000090de fffffa80`05dc9080 fffff980`015d0fa0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02faee08 fffff800`032039b6 : 00000000`000090de fffffa80`05dc9080 fffff980`015d0fa0 00000000`00000008 : nt!KiServiceLinkage
fffff880`02faee10 fffff880`13d8bad0 : 00000000`00000000 fffffa80`05dc9080 00000000`c000009a 00000000`000007ff : nt!IoCreateSymbolicLink+0x46
fffff880`02faee70 00000000`00000000 : fffffa80`05dc9080 00000000`c000009a 00000000`000007ff 00000000`00000100 : nvlddmkm+0x92ad0
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: nvlddmkm+92ad0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d27c6da
STACK_COMMAND: .cxr 0xfffff88002fae080 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nvlddmkm+92ad0
BUCKET_ID: X64_0x7E_nvlddmkm+92ad0
Loaded symbol image file: nvlddmkm.sys
Image path: nvlddmkm.sys
Image name: nvlddmkm.sys
Timestamp: Fri Jan 07 21:07:22 2011 (4D27C6DA)
CheckSum: 00C5F2DA
ImageSize: 00C5AD00
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-21122-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02e07000 PsLoadedModuleList = 0xfffff800`03044e50
Debug session time: Tue Feb 1 16:31:57.688 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:10.436
Loading Kernel Symbols
...............................................................
...................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002e98c06}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e98c06, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030af0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`02e98c06 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff88002fadeb0 -- (.trap 0xfffff88002fadeb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002faeef0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e98c06 rsp=fffff88002fae040 rbp=fffff88002fae190
r8=fffff88002fae148 r9=fffff88002fae140 r10=0000000000000002
r11=fffff80002e97fa0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!IopCompleteRequest+0xc73:
fffff800`02e98c06 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LOCK_ADDRESS: fffff8000307b400 -- (!locks fffff8000307b400)
Resource @ nt!PiEngineLock (0xfffff8000307b400) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0xfffff8000307b400
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80002e78469 to fffff80002e78f00
STACK_TEXT:
fffff880`02fadd68 fffff800`02e78469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02fadd70 fffff800`02e770e0 : 00000000`00000000 fffff980`028beee0 00000000`80000000 fffffa80`03ba7b60 : nt!KiBugCheckDispatch+0x69
fffff880`02fadeb0 fffff800`02e98c06 : 00000000`00000000 fffff880`02faf0e0 fffff800`00000000 fffffa80`00000000 : nt!KiPageFault+0x260
fffff880`02fae040 fffff800`02e5592f : 00000000`00000000 00000000`00000000 ffffffff`80000100 fffff880`00000000 : nt!IopCompleteRequest+0xc73
fffff880`02fae110 fffff800`02e55ce7 : fffff800`0307f000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02fae190 fffff800`02e5191f : 00000000`00000000 00001f80`00000000 00000000`00000043 00000000`0000fffe : nt!KiApcInterrupt+0xd7
fffff880`02fae320 fffff800`02e516d6 : fffff800`02e17a04 fffff880`02fae530 fffffa80`04a5db10 fffff880`02fae510 : nt!RtlLookupFunctionTable+0x12f
fffff880`02fae380 fffff800`02e17af2 : 00000000`0002f880 00000000`00000000 fffff880`02fae510 00000000`00000000 : nt!RtlpLookupFunctionEntryForStackWalks+0x32
fffff880`02fae3f0 fffff800`02e17943 : fffffa80`04a5db10 fffff880`00000011 00000000`00000000 fffff8a0`00000004 : nt!RtlpWalkFrameChain+0x18e
fffff880`02faea90 fffff800`0323521c : fffffa80`04800000 00000000`000001e8 fffffa80`03ba7b60 0053002b`002b0010 : nt!RtlWalkFrameChain+0x73
fffff880`02faeac0 fffff800`03198f75 : fffff8a0`00001ae0 fffffa80`03ba7b60 00000000`000001e8 fffff8a0`00000001 : nt!ExpUpdateDebugInfo+0x1ec
fffff880`02faeb30 fffff800`03174968 : fffffa80`00000000 fffff8a0`01708e60 00000000`00000000 fffffa80`03bbc600 : nt! ?? ::NNGAKEGL::`string'+0x309aa
fffff880`02faec40 fffff800`03116594 : 00000000`00000000 00000000`00000000 f88002fa`00000000 00000000`00000003 : nt!ObOpenObjectByName+0x3f8
fffff880`02faed10 fffff800`0311666e : fffff880`02faf128 fffff880`000f003f fffff880`02faf140 00000000`00000000 : nt!CmCreateKey+0x2e1
fffff880`02faee80 fffff800`02e78153 : 00000000`00000000 00000000`00000000 00000000`00000008 00000001`000000f0 : nt!NtCreateKey+0x2e
fffff880`02faeed0 fffff800`02e746f0 : fffff800`030e940a 00000000`00000003 00000000`00000000 fffff980`015bafd0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02faf0d8 fffff800`030e940a : 00000000`00000003 00000000`00000000 fffff980`015bafd0 00000000`0000002c : nt!KiServiceLinkage
fffff880`02faf0e0 fffff800`0325e8fb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000f003f : nt!IopCreateRegistryKeyEx+0x7e
fffff880`02faf1b0 fffff800`0325fa33 : 00000000`00000000 fffff980`015fcfd0 fffff880`02faf278 ffffffff`80000200 : nt!PnpIsAnyDeviceInstanceEnabled+0x1eb
fffff880`02faf250 fffff800`03260579 : fffffa80`05f2a300 fffffa80`05dee000 fffffa80`20206f49 00000000`00000000 : nt!PnpDriverStarted+0x33
fffff880`02faf280 fffff800`032f3780 : 00000000`00000001 00000000`00000000 fffff880`02faf828 ffffffff`8000013c : nt!IopLoadDriver+0xb09
fffff880`02faf550 fffff800`03131cdc : fffff880`02faf860 00000000`00000000 00000000`c0000023 00000000`00000000 : nt!PipCallDriverAddDeviceQueryRoutine+0x390
fffff880`02faf650 fffff800`03131fea : 00000000`00000000 00000000`00000000 fffff880`02faf860 fffff880`02faf828 : nt!RtlpCallQueryRegistryRoutine+0xf4
fffff880`02faf6d0 fffff800`0326372c : fffffa80`057847e0 00000000`00000000 00000000`c0000034 fffff880`02faf828 : nt!RtlQueryRegistryValues+0x17e
fffff880`02faf7a0 fffff800`03264ec2 : fffffa80`057836e0 fffffa80`057847e0 00000000`00000001 fffff980`0000004c : nt!PipCallDriverAddDevice+0x45c
fffff880`02faf950 fffff800`0326535c : fffffa80`05d3a2f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x2b2
fffff880`02fafbc0 fffff800`02f79322 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
fffff880`02fafc10 fffff800`02e86161 : fffff800`02f79020 fffff800`032cf901 fffffa80`03ba7b00 00000000`00000000 : nt!PnpDeviceActionWorker+0x302
fffff880`02fafcb0 fffff800`0311c166 : 00000000`00000000 fffffa80`03ba7b60 00000000`00000080 fffffa80`03b10b30 : nt!ExpWorkerThread+0x111
fffff880`02fafd40 fffff800`02e57486 : fffff880`02d64180 fffffa80`03ba7b60 fffff880`02d6efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fafd80 00000000`00000000 : fffff880`02fb0000 fffff880`02faa000 fffff880`02fae340 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02e770e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
start end module name
fffff880`00ee7000 fffff880`00f3e000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02a00000 fffff880`02a8a000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03ccc000 fffff880`03ce1000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00ec0000 fffff880`00ecb000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e8d000 fffff880`00e96000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e96000 fffff880`00ec0000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`02b1f000 fffff880`02b26000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03c95000 fffff880`03ca6000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`02abb000 fffff880`02ae5000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d2c000 fffff880`00dec000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01086000 fffff880`010b6000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cce000 fffff880`00d2c000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0117d000 fffff880`011f0000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`015f2000 fffff880`01600000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03c77000 fffff880`03c95000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03c68000 fffff880`03c77000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01235000 fffff880`0124b000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010b6000 fffff880`010bf000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`013f3000 fffff880`013ff000 dump_ataport dump_ataport.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00ecb000 fffff880`00ede000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`148cd000 fffff880`149c1000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`13c00000 fffff880`13c46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0110b000 fffff880`0111f000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010bf000 fffff880`0110b000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00fbb000 fffff880`00ff5000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`033e4000 fffff800`0342d000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`13c46000 fffff880`13c6a000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`015e9000 fffff880`015f2000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff800`00b96000 fffff800`00ba0000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`015ac000 fffff880`015d7000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00cad000 fffff880`00cba000 mcupdate mcupdate.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`00e73000 fffff880`00e8d000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02ae5000 fffff880`02b16000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`02b84000 fffff880`02b8f000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f47000 fffff880`00f51000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0111f000 fffff880`0117d000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03c5d000 fffff880`03c68000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015d7000 fffff880`015e9000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0145a000 fffff880`0154c000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03d68000 fffff880`03d77000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03cf4000 fffff880`03d39000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0154c000 fffff880`015ac000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`02b8f000 fffff880`02ba0000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03c51000 fffff880`03c5d000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e07000 fffff800`033e4000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01250000 fffff880`013f3000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02b16000 fffff880`02b1f000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`148cb000 fffff880`148cc180 nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`13c70000 fffff880`148cad00 nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`03d42000 fffff880`03d68000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f91000 fffff880`00fa6000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f51000 fffff880`00f84000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00e63000 fffff880`00e73000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00cba000 fffff880`00cce000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03c00000 fffff880`03c51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`02b69000 fffff880`02b72000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b72000 fffff880`02b7b000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02b7b000 fffff880`02b84000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`0104c000 fffff880`01086000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`03d77000 fffff880`03d94000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0144a000 fffff880`01452000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01602000 fffff880`017ff000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`02bbe000 fffff880`02bcb000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02ba0000 fffff880`02bbe000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03daf000 fffff880`03dc3000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`03ca6000 fffff880`03ccc000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`00f84000 fffff880`00f91000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02b26000 fffff880`02b34000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02b34000 fffff880`02b59000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00fa6000 fffff880`00fbb000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03d94000 fffff880`03daf000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02b59000 fffff880`02b69000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00c00000 fffff880`00ca4000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00dec000 fffff880`00dfb000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03d39000 fffff880`03d42000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)