Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032111-18236-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e04000 PsLoadedModuleList = 0xfffff800`03041e50
Debug session time: Mon Mar 21 15:48:47.449 2011 (UTC - 4:00)
System Uptime: 0 days 3:33:12.401
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002e7f2bf, fffff880097eb010, 0}
Probably caused by : ntkrnlmp.exe ( nt!KeRemoveQueueEx+31f )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002e7f2bf, Address of the instruction which caused the bugcheck
Arg3: fffff880097eb010, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KeRemoveQueueEx+31f
fffff800`02e7f2bf 4c8918 mov qword ptr [rax],r11
CONTEXT: fffff880097eb010 -- (.cxr 0xfffff880097eb010)
rax=dffff880097ebbc8 rbx=0000001deb0814f9 rcx=0000000000000000
rdx=0000000000000001 rsi=fffffa80090476a0 rdi=fffffa8008ec4060
rip=fffff80002e7f2bf rsp=fffff880097eb9e0 rbp=0000000000000000
r8=fffff80002e04000 r9=0000000000000000 r10=fffffffffffffffb
r11=fffffa80090433d0 r12=fffff880097ebbe0 r13=fffffa8008ec4168
r14=0000000000000001 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!KeRemoveQueueEx+0x31f:
fffff800`02e7f2bf 4c8918 mov qword ptr [rax],r11 ds:002b:dffff880`097ebbc8=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: spoolsv.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000316daf7 to fffff80002e7f2bf
STACK_TEXT:
fffff880`097eb9e0 fffff800`0316daf7 : 00000000`00000000 fffff880`097ebbc8 ffffffff`800041e8 fffff880`097ebb68 : nt!KeRemoveQueueEx+0x31f
fffff880`097eba90 fffff800`02e84aa6 : 00000000`00000000 fffff880`097ebba8 fffff880`097ebbc8 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`097ebb20 fffff800`02e73993 : fffffa80`08ec4060 00000000`77195270 fffff880`00000000 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`097ebc20 00000000`770e0fba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`026dfb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770e0fba
FOLLOWUP_IP:
nt!KeRemoveQueueEx+31f
fffff800`02e7f2bf 4c8918 mov qword ptr [rax],r11
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeRemoveQueueEx+31f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff880097eb010 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KeRemoveQueueEx+31f
BUCKET_ID: X64_0x3B_nt!KeRemoveQueueEx+31f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032511-19609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e66000 PsLoadedModuleList = 0xfffff800`030a3e50
Debug session time: Fri Mar 25 12:04:58.380 2011 (UTC - 4:00)
System Uptime: 0 days 0:57:32.316
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff6efffffff80, 0, fffff80002ef24be, 5}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MiDispatchFault+de )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff6efffffff80, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ef24be, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310e0e0
fffff6efffffff80
FAULTING_IP:
nt!MiDispatchFault+de
fffff800`02ef24be 488b1c29 mov rbx,qword ptr [rcx+rbp]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: vsserv.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88005464820 -- (.trap 0xfffff88005464820)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=dfffffff00000420 rbx=0000000000000000 rcx=fffff68000000000
rdx=00000000ffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ef24be rsp=fffff880054649b0 rbp=0000006fffffff80
r8=ffffdfffffff0000 r9=0000000000000000 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiDispatchFault+0xde:
fffff800`02ef24be 488b1c29 mov rbx,qword ptr [rcx+rbp] ds:18c0:fffff6ef`ffffff80=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f558c1 to fffff80002ed6740
STACK_TEXT:
fffff880`054646b8 fffff800`02f558c1 : 00000000`00000050 fffff6ef`ffffff80 00000000`00000000 fffff880`05464820 : nt!KeBugCheckEx
fffff880`054646c0 fffff800`02ed482e : 00000000`00000000 00000000`10f8ea7e fa8006c0`99400400 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`05464820 fffff800`02ef24be : 00000000`00000000 00000000`10f92eca fffff680`00087c90 fffffa80`08b0f3f8 : nt!KiPageFault+0x16e
fffff880`054649b0 fffff800`02ef0743 : ffffffff`ffffff00 00000000`10f8ea7e 00000000`00000001 fffffa80`00000000 : nt!MiDispatchFault+0xde
fffff880`05464ac0 fffff800`02ed482e : 00000000`00000000 00000000`00000000 00000000`003b9a01 00000000`0fc00e14 : nt!MmAccessFault+0x343
fffff880`05464c20 00000000`0f9e54e6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0381e4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xf9e54e6
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiDispatchFault+de
fffff800`02ef24be 488b1c29 mov rbx,qword ptr [rcx+rbp]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiDispatchFault+de
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x50_nt!MiDispatchFault+de
BUCKET_ID: X64_0x50_nt!MiDispatchFault+de
Followup: MachineOwner
---------