Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-25256-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a09000 PsLoadedModuleList = 0xfffff800`02c46e50
Debug session time: Fri Dec 31 11:58:15.774 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:56.522
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002a99448, 0, ffffffffffffffff}
Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a99448, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!IopCompleteRequest+c85
fffff800`02a99448 488908 mov qword ptr [rax],rcx
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb10e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: taskhost.exe
CURRENT_IRQL: 2
IRP_ADDRESS: 40c6fe40427387c8
EXCEPTION_RECORD: fffff88006280ec8 -- (.exr 0xfffff88006280ec8)
ExceptionAddress: fffff80002a99448 (nt!IopCompleteRequest+0x0000000000000c85)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88006280f70 -- (.trap 0xfffff88006280f70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=026b894466437388 rbx=0000000000000000 rcx=40c6fe4042738840
rdx=fffff80002a888b1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a99448 rsp=fffff88006281100 rbp=fffff88006281250
r8=fffffa8004150c30 r9=fffff88006281200 r10=0000000000000002
r11=fffffa8003f3a900 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!IopCompleteRequest+0xc85:
fffff800`02a99448 488908 mov qword ptr [rax],rcx ds:026b8944`66437388=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ab3a39 to fffff80002a79740
STACK_TEXT:
fffff880`062806f8 fffff800`02ab3a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02a99448 00000000`00000000 : nt!KeBugCheckEx
fffff880`06280700 fffff800`02a78d82 : fffff880`06280ec8 fffffa80`04102d30 fffff880`06280f70 00000000`00000000 : nt!KiDispatchException+0x1b9
fffff880`06280d90 fffff800`02a7768a : 0000007f`fffffff8 fffff8a0`01f5503e fffff880`06281100 fffff800`02a95ca2 : nt!KiExceptionDispatch+0xc2
fffff880`06280f70 fffff800`02a99448 : 00000015`00000000 fffffa80`018486a8 fffffa80`029fe3f8 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a
fffff880`06281100 fffff800`02a560c7 : 40c6fe40`42738840 fffffa80`029fe440 fffffa80`01848600 fffff880`00000000 : nt!IopCompleteRequest+0xc85
fffff880`062811d0 fffff800`02a56487 : fffffa80`029b1810 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`06281250 fffff800`02a7b910 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0xd7
fffff880`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!memset+0x80
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDispatchException+1b9
fffff800`02ab3a39 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiDispatchException+1b9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiDispatchException+1b9
BUCKET_ID: X64_0x1E_c0000005_nt!KiDispatchException+1b9
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-24211-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
Debug session time: Fri Dec 31 11:48:54.171 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:31.794
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
...............................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002aed448, fffff88003495ad0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002aed448, Address of the instruction which caused the bugcheck
Arg3: fffff88003495ad0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!IopCompleteRequest+c85
fffff800`02aed448 488908 mov qword ptr [rax],rcx
CONTEXT: fffff88003495ad0 -- (.cxr 0xfffff88003495ad0)
rax=f88b41b7eb07e783 rbx=fffffa8002c07ee0 rcx=30245c8b48f30348
rdx=fffff80002ae568f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002aed448 rsp=fffff880034964a0 rbp=fffff880034965f0
r8=fffffa8002b62140 r9=fffff880034965a0 r10=0000000000000002
r11=fffffa8003925850 r12=fffff880034963e0 r13=0000000000000000
r14=fffffa8003bb9a60 r15=fffff80002c47e80
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
nt!IopCompleteRequest+0xc85:
fffff800`02aed448 488908 mov qword ptr [rax],rcx ds:002b:f88b41b7`eb07e783=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: AtBroker.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002aed448
STACK_TEXT:
fffff880`03495208 fffff800`02accca9 : 00000000`0000003b 00000000`c0000005 fffff800`02aed448 fffff880`03495ad0 : nt!KeBugCheckEx
fffff880`03495210 fffff800`02acc5fc : fffff880`03496268 fffff880`03495ad0 00000000`00000000 fffff800`02afbc90 : nt!KiBugCheckDispatch+0x69
fffff880`03495350 fffff800`02af340d : fffff800`02cd8b4c fffff800`02c1cb2c fffff800`02a5d000 fffff880`03496268 : nt!KiSystemServiceHandler+0x7c
fffff880`03495390 fffff800`02afaa90 : fffff800`02c1d1a0 fffff880`03495408 fffff880`03496268 fffff800`02a5d000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`034953c0 fffff800`02b079ef : fffff880`03496268 fffff880`03495ad0 fffff880`00000000 00000000`00000004 : nt!RtlDispatchException+0x410
fffff880`03495aa0 fffff800`02accd82 : fffff880`03496268 fffffa80`02c07ee0 fffff880`03496310 00000000`00000000 : nt!KiDispatchException+0x16f
fffff880`03496130 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`02acc5fc b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-25256-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a09000 PsLoadedModuleList = 0xfffff800`02c46e50
Debug session time: Fri Dec 31 11:58:15.774 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:56.522
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002a99448, 0, ffffffffffffffff}
Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a99448, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!IopCompleteRequest+c85
fffff800`02a99448 488908 mov qword ptr [rax],rcx
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb10e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: taskhost.exe
CURRENT_IRQL: 2
IRP_ADDRESS: 40c6fe40427387c8
EXCEPTION_RECORD: fffff88006280ec8 -- (.exr 0xfffff88006280ec8)
ExceptionAddress: fffff80002a99448 (nt!IopCompleteRequest+0x0000000000000c85)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88006280f70 -- (.trap 0xfffff88006280f70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=026b894466437388 rbx=0000000000000000 rcx=40c6fe4042738840
rdx=fffff80002a888b1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a99448 rsp=fffff88006281100 rbp=fffff88006281250
r8=fffffa8004150c30 r9=fffff88006281200 r10=0000000000000002
r11=fffffa8003f3a900 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!IopCompleteRequest+0xc85:
fffff800`02a99448 488908 mov qword ptr [rax],rcx ds:026b8944`66437388=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ab3a39 to fffff80002a79740
STACK_TEXT:
fffff880`062806f8 fffff800`02ab3a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02a99448 00000000`00000000 : nt!KeBugCheckEx
fffff880`06280700 fffff800`02a78d82 : fffff880`06280ec8 fffffa80`04102d30 fffff880`06280f70 00000000`00000000 : nt!KiDispatchException+0x1b9
fffff880`06280d90 fffff800`02a7768a : 0000007f`fffffff8 fffff8a0`01f5503e fffff880`06281100 fffff800`02a95ca2 : nt!KiExceptionDispatch+0xc2
fffff880`06280f70 fffff800`02a99448 : 00000015`00000000 fffffa80`018486a8 fffffa80`029fe3f8 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a
fffff880`06281100 fffff800`02a560c7 : 40c6fe40`42738840 fffffa80`029fe440 fffffa80`01848600 fffff880`00000000 : nt!IopCompleteRequest+0xc85
fffff880`062811d0 fffff800`02a56487 : fffffa80`029b1810 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`06281250 fffff800`02a7b910 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0xd7
fffff880`00000000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!memset+0x80
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDispatchException+1b9
fffff800`02ab3a39 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiDispatchException+1b9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KiDispatchException+1b9
BUCKET_ID: X64_0x1E_c0000005_nt!KiDispatchException+1b9
Followup: MachineOwner
---------