Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-19094-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c11000 PsLoadedModuleList = 0xfffff800`02e4ee50
Debug session time: Sat Mar 19 08:14:08.709 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:25.552
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {1, 2, 0, fffff80002ca2c06}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ca2c06, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb90e0
0000000000000001
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`02ca2c06 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: PhotoshopEleme
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff88004d26610 -- (.trap 0xfffff88004d26610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88004adf3b8 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ca2c06 rsp=fffff88004d267a0 rbp=0000000000000000
r8=0000000000000000 r9=fffff88004d268a0 r10=0000000000000002
r11=fffffa80043af9e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!IopCompleteRequest+0xc73:
fffff800`02ca2c06 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000001=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c82469 to fffff80002c82f00
STACK_TEXT:
fffff880`04d264c8 fffff800`02c82469 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`04d264d0 fffff800`02c810e0 : 00000000`00000000 fffffa80`04deb410 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`04d26610 fffff800`02ca2c06 : fffffa80`034cc060 fffff800`02c88dda 00000202`00000023 0000002b`00e1fff0 : nt!KiPageFault+0x260
fffff880`04d267a0 fffff800`02c5f92f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xc73
fffff880`04d26870 fffff800`02c8a25d : fffffa80`034cc060 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`04d268f0 fffff800`02c8dac1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3dd
fffff880`04d26980 fffff800`02f7b6d7 : 00000000`00000000 fffff880`04d26b20 00000000`746c6644 fffff880`04d26a88 : nt!KeRemoveQueueEx+0x301
fffff880`04d26a30 fffff800`02f3cf05 : 00000000`00000000 fffff880`04d26b28 fffff880`04d26b20 ffffe008`6712cf01 : nt!IoRemoveIoCompletion+0x47
fffff880`04d26ac0 fffff800`02c82153 : fffffa80`034cc060 00000000`0077f118 fffff880`04d26b88 00000000`00000000 : nt!NtRemoveIoCompletion+0x145
fffff880`04d26b70 00000000`74292dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0077f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74292dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02c810e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-16988-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02416000 PsLoadedModuleList = 0xfffff800`02653e50
Debug session time: Sat Mar 19 08:06:29.524 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:24.382
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff800024a7c06}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800024a7c06, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800026be0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`024a7c06 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: taskhost.exe
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff88004e60300 -- (.trap 0xfffff88004e60300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88004e603b8 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800024a7c06 rsp=fffff88004e60490 rbp=0000000000000000
r8=fffffa800347ed20 r9=fffff88004e60590 r10=0000000000000002
r11=fffffa800345fc60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xc73:
fffff800`024a7c06 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002487469 to fffff80002487f00
STACK_TEXT:
fffff880`04e601b8 fffff800`02487469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`04e601c0 fffff800`024860e0 : fffffa80`0355d0e0 fffffa80`0355d0e0 00000000`00000000 fffff880`04e603b0 : nt!KiBugCheckDispatch+0x69
fffff880`04e60300 fffff800`024a7c06 : fffffa80`035f0060 fffff800`0248ddda 00000000`00000000 fffff800`02600e01 : nt!KiPageFault+0x260
fffff880`04e60490 fffff800`0246492f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000d62 : nt!IopCompleteRequest+0xc73
fffff880`04e60560 fffff800`02429720 : fffff880`009b8180 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`04e605e0 fffff800`0243cd0e : 00000000`00000000 fffff880`009b8180 00000000`00000000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x2b47d
fffff880`04e60650 fffff800`0248d0b4 : 00000000`00000000 fffff8a0`02c0f7a0 fffffa80`00ce3d50 fffffa80`00ce3ab0 : nt!KeFlushQueuedDpcs+0x1c2
fffff880`04e60700 fffff800`0279b194 : fffff8a0`02c0f7a0 00000000`00000000 fffffa80`035f0060 00000000`00000000 : nt!ObfDereferenceObject+0xd4
fffff880`04e60760 fffff800`02744870 : 00000000`000000a0 fffff8a0`02c0f7a0 fffff8a0`02c8f280 00000000`000000a0 : nt!ObpCloseHandleTableEntry+0xc4
fffff880`04e607f0 fffff800`027447e4 : 00000000`00000004 00000000`00000000 fffffa80`02955340 fffff800`0272df21 : nt!ObpCloseHandleProcedure+0x30
fffff880`04e60830 fffff800`027436ae : fffff8a0`02c91001 fffff880`04e60be0 fffffa80`02955340 fffffa80`02955401 : nt!ExSweepHandleTable+0x74
fffff880`04e60870 fffff800`0276a724 : fffff8a0`02c91060 00000000`00000000 00000000`00000000 fffffa80`02ede660 : nt!ObKillProcess+0x62
fffff880`04e608b0 fffff800`02744b3d : 00000000`00000000 fffffa80`00ce4f01 000007ff`fffd9000 00000000`00000000 : nt!PspExitThread+0x3f4
fffff880`04e60980 fffff800`02464a43 : fffffa80`0299c010 fffffa80`0299c1c8 fffff880`04e609d0 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`04e609b0 fffff800`02464e80 : 00000000`000e70d0 fffff880`04e60a30 fffff800`02745710 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`04e60a30 fffff800`024871f7 : 00000000`000002cb 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`04e60b70 00000000`772101ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`01f4ed78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772101ea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`024860e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-18096-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c1e000 PsLoadedModuleList = 0xfffff800`02e5be50
Debug session time: Sat Mar 19 08:12:45.291 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:23.134
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002cafa83}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cafa83, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec60e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02cafa83 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: PhotoshopEleme
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff88004d475d0 -- (.trap 0xfffff88004d475d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88004d2b728 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cafa83 rsp=fffff88004d47760 rbp=fffff88004d478b0
r8=fffffa8004b13d60 r9=fffff88004d47860 r10=0000000000000002
r11=fffffa8004b1b2f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02cafa83 488b09 mov rcx,qword ptr [rcx] ds:7878:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c8f469 to fffff80002c8ff00
STACK_TEXT:
fffff880`04d47488 fffff800`02c8f469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`04d47490 fffff800`02c8e0e0 : fffff880`04d47738 fffffa80`0420c5b0 00000000`00000000 fffff8a0`0402b980 : nt!KiBugCheckDispatch+0x69
fffff880`04d475d0 fffff800`02cafa83 : fffffa80`0474c2c0 fffff880`04d47878 00000000`00000001 fffff880`00c4d000 : nt!KiPageFault+0x260
fffff880`04d47760 fffff800`02c6c92f : 00000000`00000001 fffff800`02cff3cc fffffa80`036ab400 00000000`00000000 : nt!IopCompleteRequest+0xae3
fffff880`04d47830 fffff800`02c6cce7 : fffff880`009b8180 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`04d478b0 fffff800`02f5b053 : 0000003f`00000100 00000000`00000000 00000000`00000202 fffff800`02c96297 : nt!KiApcInterrupt+0xd7
fffff880`04d47a40 fffff800`02c6e5b5 : fffff880`009b8180 00000000`00000000 fffff800`02f5b040 00000000`00000000 : nt!PspUserThreadStartup+0x13
fffff880`04d47aa0 fffff800`02c6e537 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
fffff880`04d47be0 00000000`77473260 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000000`00acfcf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77473260
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02c8e0e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-16255-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`03406000 PsLoadedModuleList = 0xfffff800`03643e50
Debug session time: Sat Mar 19 08:04:45.572 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:24.554
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800034c3798, 0, ffffffffffffffff}
Probably caused by : ntkrnlmp.exe ( nt!KiDpcInterruptBypass+18 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800034c3798, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiDpcInterruptBypass+18
fffff800`034c3798 c3 ret
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036ae0e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800034b7a17 to fffff80003477f00
STACK_TEXT:
fffff880`0277a9a8 fffff800`034b7a17 : 00000000`0000001e ffffffff`c0000005 fffff800`034c3798 00000000`00000000 : nt!KeBugCheckEx
fffff880`0277a9b0 fffff800`03477542 : fffff880`0277b188 fffff900`c00003d0 fffff880`0277b230 fffffa80`00cadb40 : nt! ?? ::FNODOBFM::`string'+0x460da
fffff880`0277b050 fffff800`03475e4a : fffff880`010116e4 fffffa80`02a61fb0 fffffa80`00c396a8 fffff880`0101183a : nt!KiExceptionDispatch+0xc2
fffff880`0277b230 fffff800`034c3798 : 0050e0c2`4f000000 00000000`00000000 00000000`00000000 fffffa80`00cae040 : nt!KiGeneralProtectionFault+0x10a
fffff880`0277b3c8 0050e0c2`4f000000 : 00000000`00000000 00000000`00000000 fffffa80`00cae040 fffff800`035801ee : nt!KiDpcInterruptBypass+0x18
fffff880`0277b3d0 00000000`00000000 : 00000000`00000000 fffffa80`00cae040 fffff800`035801ee fffffa80`02ab3b60 : 0x50e0c2`4f000000
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDpcInterruptBypass+18
fffff800`034c3798 c3 ret
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!KiDpcInterruptBypass+18
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiDpcInterruptBypass+18
BUCKET_ID: X64_0x1E_c0000005_nt!KiDpcInterruptBypass+18
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031911-24195-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c12000 PsLoadedModuleList = 0xfffff800`02e4fe50
Debug session time: Sat Mar 19 08:18:11.227 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:24.070
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002c884d8, fffff88004e3ba50, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiTryUnwaitThread+28 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c884d8, Address of the instruction which caused the bugcheck
Arg3: fffff88004e3ba50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiTryUnwaitThread+28
fffff800`02c884d8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
CONTEXT: fffff88004e3ba50 -- (.cxr 0xfffff88004e3ba50)
rax=fffff88004e3c3b8 rbx=5d4120c483485024 rcx=fffff80002dfce80
rdx=fffff88000ea4b7b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c884d8 rsp=fffff88004e3c430 rbp=fffff88004e3c5e0
r8=0000000000000100 r9=0000000000000000 r10=0000000000000002
r11=fffffa8004d7a520 r12=0000000000000000 r13=0000000000000000
r14=fffffa8004e35060 r15=fffff80002dfce80
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!KiTryUnwaitThread+0x28:
fffff800`02c884d8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0 ds:002b:5d4120c4`83485064=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002c884d8
STACK_TEXT:
fffff880`04e3c430 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTryUnwaitThread+0x28
FOLLOWUP_IP:
nt!KiTryUnwaitThread+28
fffff800`02c884d8 f0480fba6b4000 lock bts qword ptr [rbx+40h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiTryUnwaitThread+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
STACK_COMMAND: .cxr 0xfffff88004e3ba50 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KiTryUnwaitThread+28
BUCKET_ID: X64_0x3B_nt!KiTryUnwaitThread+28
Followup: MachineOwner
---------