Loading Dump File [F:\a\Minidump\D M P\DMP\031311-15880-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump does not have process information
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03252000 PsLoadedModuleList = 0xfffff800`03497e90
Debug session time: Sun Mar 13 12:12:41.624 2011 (UTC - 5:00)
System Uptime: 0 days 0:15:47.608
Loading Kernel Symbols
.................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa80240c6bb0, 2, 1, fffff800032c4d24}
Probably caused by : ntkrnlmp.exe ( nt!KiInsertQueueApc+74 )
Followup: MachineOwner
---------
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa80240c6bb0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032c4d24, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800035030e8
fffffa80240c6bb0
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+74
fffff800`032c4d24 488910 mov qword ptr [rax],rdx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
TRAP_FRAME: fffff88008fec960 -- (.trap 0xfffff88008fec960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80240c6bb0 rbx=0000000000000000 rcx=fffffa80040c6bb0
rdx=fffffa80040c6df0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032c4d24 rsp=fffff88008fecaf0 rbp=fffff88003383180
r8=fffff8a00d746000 r9=fffffa80040c6bb0 r10=fffffa800396fc01
r11=0000000000000800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiInsertQueueApc+0x74:
fffff800`032c4d24 488910 mov qword ptr [rax],rdx ds:fffffa80`240c6bb0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032d1be9 to fffff800032d2640
STACK_TEXT:
fffff880`08fec818 fffff800`032d1be9 : 00000000`0000000a fffffa80`240c6bb0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`08fec820 fffff800`032d0860 : 00000000`000004d8 fffff8a0`0d5e7060 ffffed82`b281e754 fffffa80`040c6b60 : nt!KiBugCheckDispatch+0x69
fffff880`08fec960 fffff800`032c4d24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`08fecaf0 fffff800`032c5961 : fffffa80`040c6b60 00000000`00000002 fffffa80`040c6b60 fffff880`03383180 : nt!KiInsertQueueApc+0x74
fffff880`08fecb20 fffff800`03521a55 : 00000000`0038f8a8 fffff880`08fecca0 fffffa80`040c6b60 00000000`00000000 : nt!KeSuspendThread+0xa1
fffff880`08fecb60 fffff800`035219b2 : fffffa80`040c6b60 fffff880`08fecc30 fffffa80`03d0c6d0 00000000`0019e801 : nt!PsSuspendThread+0x71
fffff880`08fecbd0 fffff800`032d18d3 : fffffa80`03d0c6d0 00000000`0024002c fffffa80`03f44b30 fffffa80`040c6b60 : nt!NtSuspendThread+0x82
fffff880`08fecc20 00000000`749d2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0019e7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x749d2e09
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiInsertQueueApc+74
fffff800`032c4d24 488910 mov qword ptr [rax],rdx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiInsertQueueApc+74
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0xA_nt!KiInsertQueueApc+74
BUCKET_ID: X64_0xA_nt!KiInsertQueueApc+74
Followup: MachineOwner
---------
Loading Dump File [F:\a\Minidump\D M P\DMP\031211-16988-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03254000 PsLoadedModuleList = 0xfffff800`03499e90
Debug session time: Sat Mar 12 12:06:39.795 2011 (UTC - 5:00)
System Uptime: 0 days 1:01:37.966
Loading Kernel Symbols
.................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa8066623980, 0, fffff800033ffdd3, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+43 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8066623980, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800033ffdd3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035050e8
fffffa8066623980
FAULTING_IP:
nt!ExFreePoolWithTag+43
fffff800`033ffdd3 418b45f0 mov eax,dword ptr [r13-10h]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800032ddf09 to fffff88002d619c2
STACK_TEXT:
fffff800`00b9cc98 fffff800`032ddf09 : 00000000`0027b58e fffffa80`053c10a8 fffff800`03454cc0 00000000`00000001 : 0xfffff880`02d619c2
fffff800`00b9cca0 fffff800`032cc33c : fffff800`03446e80 fffff800`00000000 00000000`00000000 fffff800`033ebe00 : nt!PoIdle+0x52a
fffff800`00b9cd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!ExFreePoolWithTag+43
fffff800`033ffdd3 418b45f0 mov eax,dword ptr [r13-10h]
SYMBOL_NAME: nt!ExFreePoolWithTag+43
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x50_nt!ExFreePoolWithTag+43
BUCKET_ID: X64_0x50_nt!ExFreePoolWithTag+43
Followup: MachineOwner
---------