Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051011-20748-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03258000 PsLoadedModuleList = 0xfffff800`0349de90
Debug session time: Mon May 9 04:06:36.660 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:40.581
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff8000368a3bf, 0, ffffffffffffffff}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8000368a3bf, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!WdipSemWriteEvent+4f
fffff800`0368a3bf cb retf
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035090e8
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: winlogon.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003324028 to fffff800032d8640
STACK_TEXT:
fffff880`061b63c8 fffff800`03324028 : 00000000`0000001e ffffffff`c0000005 fffff800`0368a3bf 00000000`00000000 : nt!KeBugCheckEx
fffff880`061b63d0 fffff800`032d7cc2 : fffff880`061b6ba8 fffff8a0`002196f0 fffff880`061b6c50 00000000`00000005 : nt! ?? ::FNODOBFM::`string'+0x4987d
fffff880`061b6a70 fffff800`032d65ca : 00000000`00000000 00000000`00000000 fffffa80`00000000 fffff880`061b6cc8 : nt!KiExceptionDispatch+0xc2
fffff880`061b6c50 fffff800`0368a3bf : fffff800`0369d17d 00000000`0000000c 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`061b6de8 fffff8a0`002196c0 : 00000000`00000010 fffff8a0`002196d0 00000000`00000002 fffff880`061b7a40 : nt!WdipSemWriteEvent+0x4f
fffff880`061b6e28 00000000`00000010 : fffff8a0`002196d0 00000000`00000002 fffff880`061b7a40 00000000`00000004 : 0xfffff8a0`002196c0
fffff880`061b6e30 fffff8a0`002196d0 : 00000000`00000002 fffff880`061b7a40 00000000`00000004 fffff8a0`002196f0 : 0x10
fffff880`061b6e38 00000000`00000002 : fffff880`061b7a40 00000000`00000004 fffff8a0`002196f0 00000000`00000004 : 0xfffff8a0`002196d0
fffff880`061b6e40 fffff880`061b7a40 : 00000000`00000004 fffff8a0`002196f0 00000000`00000004 fffff8a0`0022ae70 : 0x2
fffff880`061b6e48 00000000`00000004 : fffff8a0`002196f0 00000000`00000004 fffff8a0`0022ae70 00000000`00000028 : 0xfffff880`061b7a40
fffff880`061b6e50 fffff8a0`002196f0 : 00000000`00000004 fffff8a0`0022ae70 00000000`00000028 fffff8a0`0022ae40 : 0x4
fffff880`061b6e58 00000000`00000004 : fffff8a0`0022ae70 00000000`00000028 fffff8a0`0022ae40 00000000`00000028 : 0xfffff8a0`002196f0
fffff880`061b6e60 fffff8a0`0022ae70 : 00000000`00000028 fffff8a0`0022ae40 00000000`00000028 fffff8a0`0022ae10 : 0x4
fffff880`061b6e68 00000000`00000028 : fffff8a0`0022ae40 00000000`00000028 fffff8a0`0022ae10 00000000`00000028 : 0xfffff8a0`0022ae70
fffff880`061b6e70 fffff8a0`0022ae40 : 00000000`00000028 fffff8a0`0022ae10 00000000`00000028 fffff8a0`0022ade0 : 0x28
fffff880`061b6e78 00000000`00000028 : fffff8a0`0022ae10 00000000`00000028 fffff8a0`0022ade0 00000000`00000028 : 0xfffff8a0`0022ae40
fffff880`061b6e80 fffff8a0`0022ae10 : 00000000`00000028 fffff8a0`0022ade0 00000000`00000028 fffff8a0`0022adb0 : 0x28
fffff880`061b6e88 00000000`00000028 : fffff8a0`0022ade0 00000000`00000028 fffff8a0`0022adb0 00000000`00000028 : 0xfffff8a0`0022ae10
fffff880`061b6e90 fffff8a0`0022ade0 : 00000000`00000028 fffff8a0`0022adb0 00000000`00000028 00000000`00000000 : 0x28
fffff880`061b6e98 00000000`00000028 : fffff8a0`0022adb0 00000000`00000028 00000000`00000000 00000000`00000000 : 0xfffff8a0`0022ade0
fffff880`061b6ea0 fffff8a0`0022adb0 : 00000000`00000028 00000000`00000000 00000000`00000000 00000000`00000000 : 0x28
fffff880`061b6ea8 00000000`00000028 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff8a0`0022adb0
fffff880`061b6eb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x28
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8000368a3bf - nt!WdipSemWriteEvent+4f
[ c3:cb ]
1 error : !nt (fffff8000368a3bf)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051011-58359-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03257000 PsLoadedModuleList = 0xfffff800`0349ce90
Debug session time: Tue May 10 23:25:26.491 2011 (UTC - 4:00)
System Uptime: 0 days 10:03:57.412
Loading Kernel Symbols
...............................................................
................................................................
..........................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff8a00fcde000, 2, 8, fffff8a00fcde000}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8a00fcde000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff8a00fcde000, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035080e8
fffff8a00fcde000
CURRENT_IRQL: 2
FAULTING_IP:
+6266383862326566
fffff8a0`0fcde000 0002 add byte ptr [rdx],al
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80004846bf0 -- (.trap 0xfffff80004846bf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000609b00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8a00fcde000 rsp=fffff80004846d80 rbp=fffff8a0224b7000
r8=fffffa800c603850 r9=0000000000000000 r10=0000000000000000
r11=fffff80003449e80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
fffff8a0`0fcde000 0002 add byte ptr [rdx],al ds:d000:0000609b`00000000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032d6be9 to fffff800032d7640
FAILED_INSTRUCTION_ADDRESS:
+6266383862326566
fffff8a0`0fcde000 0002 add byte ptr [rdx],al
STACK_TEXT:
fffff800`04846aa8 fffff800`032d6be9 : 00000000`0000000a fffff8a0`0fcde000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff800`04846ab0 fffff800`032d5860 : 00000000`00000000 ffffffff`fffffffe fffff800`03449e80 fffff800`03449e80 : nt!KiBugCheckDispatch+0x69
fffff800`04846bf0 fffff8a0`0fcde000 : fffff8a0`0fa8d000 fffff8a0`0f921000 fffff8a0`00003000 fffff8a0`1018a000 : nt!KiPageFault+0x260
fffff800`04846d80 fffff8a0`0fa8d000 : fffff8a0`0f921000 fffff8a0`00003000 fffff8a0`1018a000 fffff8a0`0008e000 : 0xfffff8a0`0fcde000
fffff800`04846d88 fffff8a0`0f921000 : fffff8a0`00003000 fffff8a0`1018a000 fffff8a0`0008e000 fffff8a0`20268000 : 0xfffff8a0`0fa8d000
fffff800`04846d90 fffff8a0`00003000 : fffff8a0`1018a000 fffff8a0`0008e000 fffff8a0`20268000 fffff8a0`1297a000 : 0xfffff8a0`0f921000
fffff800`04846d98 fffff8a0`1018a000 : fffff8a0`0008e000 fffff8a0`20268000 fffff8a0`1297a000 fffff800`04841000 : 0xfffff8a0`00003000
fffff800`04846da0 fffff8a0`0008e000 : fffff8a0`20268000 fffff8a0`1297a000 fffff800`04841000 fffff800`04846d40 : 0xfffff8a0`1018a000
fffff800`04846da8 fffff8a0`20268000 : fffff8a0`1297a000 fffff800`04841000 fffff800`04846d40 fffff800`048472b0 : 0xfffff8a0`0008e000
fffff800`04846db0 fffff8a0`1297a000 : fffff800`04841000 fffff800`04846d40 fffff800`048472b0 fffff800`032e22a5 : 0xfffff8a0`20268000
fffff800`04846db8 fffff800`04841000 : fffff800`04846d40 fffff800`048472b0 fffff800`032e22a5 fffff800`04846db8 : 0xfffff8a0`1297a000
fffff800`04846dc0 fffff800`04846d40 : fffff800`048472b0 fffff800`032e22a5 fffff800`04846db8 fffffa80`113573c4 : 0xfffff800`04841000
fffff800`04846dc8 fffff800`048472b0 : fffff800`032e22a5 fffff800`04846db8 fffffa80`113573c4 fffff800`04846e60 : 0xfffff800`04846d40
fffff800`04846dd0 fffff800`032e22a5 : fffff800`04846db8 fffffa80`113573c4 fffff800`04846e60 00000000`00000000 : 0xfffff800`048472b0
fffff800`04846dd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIpiInterrupt+0x135
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`032d5860 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0xD1_VRF_CODE_AV_BAD_IP_nt!KiPageFault+260
BUCKET_ID: X64_0xD1_VRF_CODE_AV_BAD_IP_nt!KiPageFault+260
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050911-36753-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03253000 PsLoadedModuleList = 0xfffff800`03498e90
Debug session time: Mon May 9 04:04:29.406 2011 (UTC - 4:00)
System Uptime: 1 days 16:39:03.327
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 109, {a3a039d8a6d65576, b3b7465ef95324cc, fffff8000368a2d0, 1}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
debugger that was not attached when the system was booted. Normal breakpoints,
"bp", can only be set if the debugger is attached at boot time. Hardware
breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a039d8a6d65576, Reserved
Arg2: b3b7465ef95324cc, Reserved
Arg3: fffff8000368a2d0, Failure type dependent information
Arg4: 0000000000000001, Type of corrupted region, can be
0 : A generic data region
1 : Modification of a function or .pdata
2 : A processor IDT
3 : A processor GDT
4 : Type 1 process list corruption
5 : Type 2 process list corruption
6 : Debug routine modification
7 : Critical MSR modification
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'WUDFRd' and 'spsys.sys' overlap
BUGCHECK_STR: 0x109
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800032d3640
STACK_TEXT:
fffff880`0337e5d8 00000000`00000000 : 00000000`00000109 a3a039d8`a6d65576 b3b7465e`f95324cc fffff800`0368a2d0 : nt!KeBugCheckEx
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8000368a3bf - nt!IopSetLegacyDeviceInstance+ef
[ 03:0b ]
1 error : !nt (fffff8000368a3bf)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051011-24866-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03260000 PsLoadedModuleList = 0xfffff800`034a5e90
Debug session time: Tue May 10 12:51:58.104 2011 (UTC - 4:00)
System Uptime: 0 days 0:10:05.025
Loading Kernel Symbols
...............................................................
................................................................
..........................................
Loading User Symbols
Loading unloaded module list
.......................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : rdyboost.sys ( rdyboost!SmdReadVolumeRangesDpc+47 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+6266383862326566
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff800048412f8 -- (.exr 0xfffff800048412f8)
ExceptionAddress: fffff800032ffbf4 (nt!ExfAcquireRundownProtection)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff800048413a0 -- (.trap 0xfffff800048413a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0800000000000028
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032ffbf4 rsp=fffff80004841538 rbp=0000000000000002
r8=fffffa800f4351b8 r9=0000000000000000 r10=fffff80003260000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExfAcquireRundownProtection:
fffff800`032ffbf4 488b01 mov rax,qword ptr [rcx] ds:4001:08000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032d7ffe to fffff800032e0610
STACK_TEXT:
fffff800`048403d8 fffff800`032d7ffe : fffffa80`00000001 fffff880`0144fc82 fffff800`04840b50 fffff800`0330c2a0 : nt!KeBugCheck
fffff800`048403e0 fffff800`0330bf6d : fffff800`034e7a10 fffff800`03423c78 fffff800`03260000 fffff800`048412f8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`04840410 fffff800`0330ad45 : fffff800`034270fc fffff800`04840488 fffff800`048412f8 fffff800`03260000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`04840440 fffff800`0331bdc1 : fffff800`048412f8 fffff800`04840b50 fffff800`00000000 08000000`00000000 : nt!RtlDispatchException+0x415
fffff800`04840b20 fffff800`032dfcc2 : fffff800`048412f8 fffff880`019ba3b8 fffff800`048413a0 00000000`0000003a : nt!KiDispatchException+0x135
fffff800`048411c0 fffff800`032de5ca : fffffa80`0c7f0050 fffff880`04bb0406 00000000`00000206 fffff800`03338c4f : nt!KiExceptionDispatch+0xc2
fffff800`048413a0 fffff800`032ffbf4 : fffff880`019a28f7 00000000`0000003b fffffa80`0d5f4960 fffffa80`0f435190 : nt!KiGeneralProtectionFault+0x10a
fffff800`04841538 fffff880`019a28f7 : 00000000`0000003b fffffa80`0d5f4960 fffffa80`0f435190 fffff880`019ba3b0 : nt!ExfAcquireRundownProtection
fffff800`04841540 fffff800`032ec062 : fffff800`04841600 00000000`00000003 00000000`00000000 00000000`00000000 : rdyboost!SmdReadVolumeRangesDpc+0x47
fffff800`04841570 fffff800`032ebf06 : fffffa80`0f2928e0 fffffa80`0f2928e0 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`048415e0 fffff800`032ebdee : 00000001`689f89f2 fffff800`04841c58 00000000`0000977f fffff800`03456268 : nt!KiProcessExpiredTimerList+0xc6
fffff800`04841c30 fffff800`032ebbd7 : 00000000`67520dc4 00000000`0000977f 00000000`67520dbd 00000000`0000007f : nt!KiTimerExpiration+0x1be
fffff800`04841cd0 fffff800`032d836a : fffff800`03452e80 fffff800`03460cc0 00000000`00000000 fffff800`033f7e00 : nt!KiRetireDpcList+0x277
fffff800`04841d80 00000000`00000000 : fffff800`04842000 fffff800`0483c000 fffff800`04841d40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
rdyboost!SmdReadVolumeRangesDpc+47
fffff880`019a28f7 84c0 test al,al
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: rdyboost!SmdReadVolumeRangesDpc+47
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7982e
FAILURE_BUCKET_ID: X64_0x1E_0_rdyboost!SmdReadVolumeRangesDpc+47
BUCKET_ID: X64_0x1E_0_rdyboost!SmdReadVolumeRangesDpc+47
Followup: MachineOwner
---------