Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\011311-9671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c4e000 PsLoadedModuleList = 0xfffff800`02e8be50
Debug session time: Thu Jan 13 13:23:12.535 2011 (UTC - 5:00)
System Uptime: 0 days 0:17:54.003
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 76, {0, fffffa8006d33b30, ffffffffffffffee, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+18126 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PROCESS_HAS_LOCKED_PAGES (76)
Caused by a driver not cleaning up correctly after an I/O.
Arguments:
Arg1: 0000000000000000, Locked memory pages found in process being terminated.
Arg2: fffffa8006d33b30, Process address.
Arg3: ffffffffffffffee, Number of locked pages.
Arg4: 0000000000000000, Pointer to driver stacks (if enabled) or 0 if not.
Issue a !search over all of physical memory for the current process pointer.
This will yield at least one MDL which points to it. Then do another !search
for each MDL found, this will yield the IRP(s) that point to it, revealing
which driver is leaking the pages.
Otherwise, set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory
Management\TrackLockedPages to a DWORD 1 value and reboot. Then the system
will save stack traces so the guilty driver can be easily identified.
When you enable this flag, if the driver commits the error again you will
see a different bugcheck - DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS (0xCB) -
which can identify the offending driver(s).
Debugging Details:
------------------
PROCESS_NAME: Cubase5.exe
DEFAULT_BUCKET_ID: DRIVER_FAULT_0x76
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x76
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002f60c25 to fffff80002cbe740
STACK_TEXT:
fffff880`035d2a98 fffff800`02f60c25 : 00000000`00000076 00000000`00000000 fffffa80`06d33b30 ffffffff`ffffffee : nt!KeBugCheckEx
fffff880`035d2aa0 fffff800`02f7bd27 : fffffa80`06d33b30 00000000`00000008 fffffa80`00000000 fffffa80`00000002 : nt! ?? ::NNGAKEGL::`string'+0x18126
fffff880`035d2ae0 fffff800`02cc38b4 : 00000000`00000000 fffffa80`06d33b30 fffffa80`06d33b00 00000000`0000000a : nt!PspProcessDelete+0x177
fffff880`035d2b40 fffff800`02fa3f43 : fffffa80`06d33b30 00000000`00000001 fffffa80`06a1ab60 00000000`00000012 : nt!ObfDereferenceObject+0xd4
fffff880`035d2ba0 fffff800`02fa76b8 : fffffa80`07427630 fffffa80`07427660 fffffa80`06a07080 fffffa80`07427660 : nt!PspThreadDelete+0xe3
fffff880`035d2be0 fffff800`02cd0523 : 00000000`00000000 00000000`00000000 fffffa80`07427660 00000000`00000001 : nt!ObpRemoveObjectRoutine+0x8c
fffff880`035d2c40 fffff800`02c9f5c9 : 00000000`00000000 fffffa80`06a1ab60 fffffa80`074279f0 fffffa80`06a1ab60 : nt!ObfDereferenceObjectWithTag+0x93
fffff880`035d2c80 fffff800`02ccb961 : fffff800`02c9f530 fffff800`02e63650 fffffa80`06a1ab60 00000000`00000000 : nt!PspReaper+0x99
fffff880`035d2cb0 fffff800`02f62c06 : 00000000`00000000 fffffa80`06a1ab60 00000000`00000080 fffffa80`06a07890 : nt!ExpWorkerThread+0x111
fffff880`035d2d40 fffff800`02c9cc26 : fffff880`03364180 fffffa80`06a1ab60 fffff880`0336efc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`035d2d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::NNGAKEGL::`string'+18126
fffff800`02f60c25 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::NNGAKEGL::`string'+18126
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x76_Cubase5.exe_nt!_??_::NNGAKEGL::_string_+18126
BUCKET_ID: X64_0x76_Cubase5.exe_nt!_??_::NNGAKEGL::_string_+18126
Followup: MachineOwner
---------