Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022111-25147-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a61000 PsLoadedModuleList = 0xfffff800`02c9ee50
Debug session time: Mon Feb 21 06:51:08.589 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:23.478
Loading Kernel Symbols
...............................................................
................................................................
...
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002af2a83}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002af2a83, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d090e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02af2a83 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: AtBroker.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff880025153e0 -- (.trap 0xfffff880025153e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800251c408 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002af2a83 rsp=fffff88002515570 rbp=0000000000000000
r8=fffffa8002a02c70 r9=fffff88002515670 r10=0000000000000002
r11=fffffa80018d7590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!IopCompleteRequest+0xae3:
fffff800`02af2a83 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ad2469 to fffff80002ad2f00
STACK_TEXT:
fffff880`02515298 fffff800`02ad2469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`025152a0 fffff800`02ad10e0 : 00000000`00000000 fffffa80`03842ee0 00000000`00000aa4 00000000`00000003 : nt!KiBugCheckDispatch+0x69
fffff880`025153e0 fffff800`02af2a83 : fffffa80`0390b060 fffff800`02ad8dda fffff8a0`00000000 fffff8a0`00283000 : nt!KiPageFault+0x260
fffff880`02515570 fffff800`02aaf92f : 00000000`00000001 00000000`00000000 fffff8a0`078fed00 fffffa80`00000000 : nt!IopCompleteRequest+0xae3
fffff880`02515640 fffff800`02ada25d : fffff880`02f025a0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`025156c0 fffff800`02adc1af : 00000000`00000001 fffffa80`037697d0 00000000`00000001 fffffa80`01b51550 : nt!KiCommitThreadWait+0x3dd
fffff880`02515750 fffff800`02a9bb1e : fffffa80`029b8600 00000000`0000001b 00000000`00000000 fffff880`02f00100 : nt!KeWaitForSingleObject+0x19f
fffff880`025157f0 fffff800`02adb1bc : ffffffff`ffb3b4c0 fffffa80`02ac0d10 fffffa80`029b86a0 fffffa80`018e0b60 : nt!ExpWaitForResource+0xae
fffff880`02515860 fffff880`012335d3 : 00000000`c00000d8 fffff8a0`0012b5c0 fffff880`0251c390 fffff800`02b13ddc : nt!ExAcquireResourceExclusiveLite+0x14f
fffff880`025158d0 fffff880`012c78a1 : fffff8a0`0012b5c0 fffff880`0251c5e0 fffff8a0`0012b6f0 00000000`00000004 : Ntfs!NtfsAcquireExclusiveFcb+0x73
fffff880`02515920 fffff880`01236aa9 : fffff880`02121308 fffffa80`0376a900 fffff880`0251c2f0 fffffa80`0390b060 : Ntfs!NtfsCommonCleanup+0x271
fffff880`02515d30 fffff800`02acad87 : fffff880`0251c2f0 006e0069`0057005c 00730077`006f0064 00730079`0073005c : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`02515d60 fffff800`02acad41 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27
fffff880`0251c1c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02ad10e0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022111-25350-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a0e000 PsLoadedModuleList = 0xfffff800`02c4be50
Debug session time: Mon Feb 21 11:00:53.210 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:36.098
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002a9fc06}
Probably caused by : win32k.sys ( win32k!GreLockVisRgn+19 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a9fc06, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb60e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`02a9fc06 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: nwiz.exe
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff880025a4320 -- (.trap 0xfffff880025a4320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880025a4408 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a9fc06 rsp=fffff880025a44b0 rbp=0000000000000000
r8=fffffa8002da2e10 r9=fffff880025a45b0 r10=0000000000000002
r11=fffffa8002da4dd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!IopCompleteRequest+0xc73:
fffff800`02a9fc06 488b09 mov rcx,qword ptr [rcx] ds:0009:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a7f469 to fffff80002a7ff00
STACK_TEXT:
fffff880`025a41d8 fffff800`02a7f469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`025a41e0 fffff800`02a7e0e0 : 00000000`00000000 fffffa80`03c8aee0 fffff8a0`00000228 00000000`000e360e : nt!KiBugCheckDispatch+0x69
fffff880`025a4320 fffff800`02a9fc06 : 00000000`000007ff fffff800`02a0e000 00000000`00007e00 00000000`00000008 : nt!KiPageFault+0x260
fffff880`025a44b0 fffff800`02a5c92f : 00000000`00000000 00000000`00000000 00000000`00000000 fffff900`00000000 : nt!IopCompleteRequest+0xc73
fffff880`025a4580 fffff800`02a8725d : fffff880`02f02ac0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`025a4600 fffff800`02a891af : 00000000`00000000 fffffa80`03c90b30 fffffa80`0000002a fffffa80`0193a9a0 : nt!KiCommitThreadWait+0x3dd
fffff880`025a4690 fffff800`02a48b1e : fffffa80`0345de00 00000000`0000001b 00000000`ffffff00 fffff880`02f00100 : nt!KeWaitForSingleObject+0x19f
fffff880`025a4730 fffff800`02a76ad1 : ffffffff`ffb3b4c0 fffffa80`0383e800 fffffa80`0345de50 00000000`00000000 : nt!ExpWaitForResource+0xae
fffff880`025a47a0 fffff800`02a8bcab : 00000000`00000030 fffffa80`03a3f060 fffff880`025a4c20 00000000`00000000 : nt!ExAcquireResourceSharedLite+0x2c6
fffff880`025a4810 fffff960`001b67d1 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff900`00000000 : nt!ExEnterPriorityRegionAndAcquireResourceShared+0x23
fffff880`025a4840 fffff960`000f3f93 : fffff900`c2693900 fffff880`025a4c20 00000000`ffffffff fffffa80`03c90b30 : win32k!GreLockVisRgn+0x19
fffff880`025a4870 fffff960`000f4046 : fffffa80`03639900 fffff900`c2693900 00020508`00000000 fffff880`025a4a30 : win32k!xxxUserProcessCallout+0x1a7
fffff880`025a48c0 fffff800`02d625e1 : fffffa80`03639940 00000000`00000000 00000000`00000000 fffffa80`03a3f060 : win32k!W32pProcessCallout+0x4e
fffff880`025a48f0 fffff800`02d3cb3d : 00000000`00000000 fffffa80`018dc001 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x2b1
fffff880`025a49c0 fffff800`02a5ca43 : fffffa80`03b0fb10 fffffa80`03b0fcc8 fffff880`025a4a10 fffffa80`03c90630 : nt!PsExitSpecialApc+0x1d
fffff880`025a49f0 fffff800`02a5ce80 : 00000000`001c1170 fffff880`025a4a70 fffff800`02d3d710 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`025a4a70 fffff800`02a7f1f7 : 00000000`00000372 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70
fffff880`025a4bb0 00000000`770701ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0215f508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770701ea
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!GreLockVisRgn+19
fffff960`001b67d1 488b1568391500 mov rdx,qword ptr [win32k!ghsemDynamicModeChange (fffff960`0030a140)]
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: win32k!GreLockVisRgn+19
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0xA_win32k!GreLockVisRgn+19
BUCKET_ID: X64_0xA_win32k!GreLockVisRgn+19
Followup: MachineOwner
---------