Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123010-27830-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a66000 PsLoadedModuleList = 0xfffff800`02ca3e50
Debug session time: Thu Dec 30 01:08:06.944 2010 (UTC - 5:00)
System Uptime: 0 days 2:54:34.019
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa7f98f831b3, 0, fffff80002ae3ae0, 7}
Could not read faulting driver name
Probably caused by : win32k.sys ( win32k!FreeSMS+20 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa7f98f831b3, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002ae3ae0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0e0e0
fffffa7f98f831b3
FAULTING_IP:
nt!ExQueryDepthSList+0
fffff800`02ae3ae0 668b01 mov ax,word ptr [rcx]
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: TabTip.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800904ac50 -- (.trap 0xfffff8800904ac50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800867a0f0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ae3ae0 rsp=fffff8800904ade8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffffffffffffffe
r11=fffff80002c50e00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExQueryDepthSList:
fffff800`02ae3ae0 668b01 mov ax,word ptr [rcx] ds:ec60:fffffa80`0867a0f0=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b55b19 to fffff80002ad7f00
STACK_TEXT:
fffff880`0904aae8 fffff800`02b55b19 : 00000000`00000050 fffffa7f`98f831b3 00000000`00000000 fffff880`0904ac50 : nt!KeBugCheckEx
fffff880`0904aaf0 fffff800`02ad5fee : 00000000`00000000 fffffa80`0867a0f0 fffff800`02c50e00 fffffa80`096dcc68 : nt! ?? ::FNODOBFM::`string'+0x40edb
fffff880`0904ac50 fffff800`02ae3ae0 : fffff960`000e30e8 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`0904ade8 fffff960`000e30e8 : 00000000`00000000 00000000`00000002 00000000`00000000 fffff880`0904ad90 : nt!ExQueryDepthSList
fffff880`0904adf0 fffff960`000e2fe3 : fffff900`c295b4e0 00000000`00000000 00000000`00000200 00000000`00000000 : win32k!FreeSMS+0x20
fffff880`0904ae20 fffff960`000ee6b6 : 00000000`00000000 00000000`00000000 00000000`00000200 fffff880`0904afd8 : win32k!xxxInterSendMsgEx+0x13c6
fffff880`0904af30 fffff960`0016ddd5 : 00000000`00000020 00000000`00000000 00000000`00000200 fffff880`0904b100 : win32k!xxxCallHook2+0x652
fffff880`0904b0a0 fffff960`0014465c : 00000000`00000000 00000000`0266f638 00000000`00000200 fffff800`00000000 : win32k!xxxCallNextHookEx+0x41
fffff880`0904b0e0 fffff960`001447e7 : 00000000`00000000 00000000`00000001 00000000`00000200 00000000`00000000 : win32k!NtUserfnHkINLPMSLLHOOKSTRUCT+0x40
fffff880`0904b130 fffff800`02ad7153 : fffffa80`096dcb60 fffff880`0904b1e0 00000000`00000000 00000000`00000020 : win32k!NtUserCallNextHookEx+0x13b
fffff880`0904b160 00000000`76e91c1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0266f3b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e91c1a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!FreeSMS+20
fffff960`000e30e8 663b4310 cmp ax,word ptr [rbx+10h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: win32k!FreeSMS+20
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0x50_win32k!FreeSMS+20
BUCKET_ID: X64_0x50_win32k!FreeSMS+20
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-32978-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a18000 PsLoadedModuleList = 0xfffff800`02c55e50
Debug session time: Fri Dec 31 00:54:17.505 2010 (UTC - 5:00)
System Uptime: 0 days 21:39:16.581
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 0, fffff880014fc391}
Probably caused by : NETIO.SYS ( NETIO!RtlCopyMdlToMdlIndirect+81 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880014fc391, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'IDSvia64' and 'IDSvia64.sys' overlap
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc00e0
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyMdlToMdlIndirect+81
fffff880`014fc391 448b6928 mov r13d,dword ptr [rcx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800318ab80 -- (.trap 0xfffff8800318ab80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000002dc rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800318aec8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880014fc391 rsp=fffff8800318ad10 rbp=fffff8800318ae80
r8=fffff8800318aee8 r9=fffff8800318aeb0 r10=fffff8800179c3c0
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!RtlCopyMdlToMdlIndirect+0x81:
fffff880`014fc391 448b6928 mov r13d,dword ptr [rcx+28h] ds:ad78:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a89469 to fffff80002a89f00
STACK_TEXT:
fffff880`0318aa38 fffff800`02a89469 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0318aa40 fffff800`02a880e0 : fffff880`00000001 fffff880`0318aeb0 00000001`00000000 00000001`00001400 : nt!KiBugCheckDispatch+0x69
fffff880`0318ab80 fffff880`014fc391 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`0a953930 : nt!KiPageFault+0x260
fffff880`0318ad10 fffff880`01642fe4 : fffff880`0318aef8 fffff880`0318aec8 fffff880`0318aee8 fffff880`0318aeb0 : NETIO!RtlCopyMdlToMdlIndirect+0x81
fffff880`0318adb0 fffff880`016797e6 : 00000000`00000000 fffffa80`0bf90960 00000000`00000000 00000000`00000000 : tcpip!TcpSatisfyReceiveRequests+0x1f4
fffff880`0318b090 fffff880`0167a2f9 : fffffa80`07555d40 fffff880`0151fafb 00000000`000005b4 00000000`00000000 : tcpip!TcpDeliverDataToClient+0x106
fffff880`0318b210 fffff880`017311bf : fffffa80`0bf90960 fffff880`0318b600 00000000`000005b4 fffff880`0318b600 : tcpip!TcpDeliverReceive+0xa9
fffff880`0318b310 fffff880`016b98b0 : 00000000`daca6269 fffffa80`0bf90960 fffffa80`0816be20 fffffa80`0816be20 : tcpip!TcpInspectReceive+0xaf
fffff880`0318b360 fffff880`016746f5 : 00000000`00000006 00000000`00000002 00000000`000071c4 fffff880`02dc5000 : tcpip! ?? ::FNODOBFM::`string'+0x3d9b5
fffff880`0318b520 fffff880`016790ca : fffffa80`076b9f00 fffffa80`0abe9010 fffffa80`0755be98 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
fffff880`0318b6d0 fffff880`01678c17 : fffffa80`09561108 fffffa80`076b5000 00000000`00000000 fffff880`0165c400 : tcpip!TcpMatchReceive+0x1fa
fffff880`0318b820 fffff880`0165b3c7 : fffffa80`076b5000 fffffa80`075871c4 fffffa80`076b5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`0318b8d0 fffff880`0165b499 : fffff880`0318ba50 fffff880`0176b9a0 fffff880`0318ba60 00000000`6950e8c0 : tcpip!IppDeliverListToProtocol+0x97
fffff880`0318b990 fffff880`0165b990 : fffffa80`076ab000 fffffa80`09bdbe00 00000000`00000011 fffff880`0318ba50 : tcpip!IppProcessDeliverList+0x59
fffff880`0318ba00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x231
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyMdlToMdlIndirect+81
fffff880`014fc391 448b6928 mov r13d,dword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!RtlCopyMdlToMdlIndirect+81
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyMdlToMdlIndirect+81
BUCKET_ID: X64_0xD1_NETIO!RtlCopyMdlToMdlIndirect+81
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-36660-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1a000 PsLoadedModuleList = 0xfffff800`02c57e50
Debug session time: Fri Dec 31 01:07:23.927 2010 (UTC - 5:00)
System Uptime: 0 days 0:11:19.003
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff8800ba75fb0, 0, 0}
Probably caused by : volsnap.sys ( volsnap!ExAllocateFromNPagedLookasideList+27 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800ba75fb0, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
+6333383139656130
fffff880`0ba75fb0 d86ea7 fsubr dword ptr [rsi-59h]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc20e0
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: javaw.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff8800ba76ed8 -- (.exr 0xfffff8800ba76ed8)
ExceptionAddress: 0000030d0000030c
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000008
Parameter[1]: 0000030d0000030c
Attempt to execute non-executable address 0000030d0000030c
TRAP_FRAME: fffff8800ba76f80 -- (.trap 0xfffff8800ba76f80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000000030d
rdx=0000000000000308 rsi=0000000000000000 rdi=0000000000000000
rip=0000030d0000030c rsp=fffff8800ba77118 rbp=fffff8800ba773a0
r8=0000000000000301 r9=0000000000000003 r10=fffffa8006731c80
r11=fffff8800ba772d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
0000030d`0000030c ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b1cb2b to fffff80002a8bf00
STACK_TEXT:
fffff880`0ba75ef8 fffff800`02b1cb2b : 00000000`0000001e ffffffff`c0000005 fffff880`0ba75fb0 00000000`00000000 : nt!KeBugCheckEx
fffff880`0ba75f00 fffff800`02adf390 : fffff880`0ba764e0 fffff880`0ba768e0 fffff880`0ba76078 fffff880`0ba76068 : nt!KipFatalFilter+0x1b
fffff880`0ba75f40 fffff800`02aba4dc : 00000000`521cf158 00000000`521cf0d0 00000000`00000030 fffff880`0ba76078 : nt! ?? ::FNODOBFM::`string'+0x95d
fffff880`0ba75f80 fffff800`02ab1bed : fffff800`02bd2470 fffff880`0ba771b0 00000000`00000000 fffff800`02a1a000 : nt!_C_specific_handler+0x8c
fffff880`0ba75ff0 fffff800`02ab9250 : fffff800`02bd2470 fffff880`0ba76068 fffff880`0ba76ed8 fffff800`02a1a000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0ba76020 fffff800`02ac61b5 : fffff880`0ba76ed8 fffff880`0ba76730 fffff880`00000000 fffffa80`06baec10 : nt!RtlDispatchException+0x410
fffff880`0ba76700 fffff800`02a8b542 : fffff880`0ba76ed8 fffffa80`06731c80 fffff880`0ba76f80 fffff880`0ba66000 : nt!KiDispatchException+0x135
fffff880`0ba76da0 fffff800`02a8a0ba : 00000000`00000008 fffffa80`06731c80 4051a8ca`c0691800 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0ba76f80 0000030d`0000030c : fffff880`0188f4c7 fffff880`0ba771b0 fffff800`02a8a0ba 00000000`00000000 : nt!KiPageFault+0x23a
fffff880`0ba77118 fffff880`0188f4c7 : fffff880`0ba771b0 fffff800`02a8a0ba 00000000`00000000 fffff880`0ba77330 : 0x30d`0000030c
fffff880`0ba77120 fffff880`0188ccaa : fffffa80`09572410 00001f80`01002ba0 000007ff`ffff0000 00000000`6e3f82f4 : volsnap!ExAllocateFromNPagedLookasideList+0x27
fffff880`0ba77150 fffff880`0124e54a : fffff880`0ba772c8 00000000`00000200 fffff8a0`03f9a680 00000000`00004000 : volsnap! ?? ::FNODOBFM::`string'+0x471
fffff880`0ba77180 fffff800`02a9b64a : fffff880`0ba77350 fffff880`0124ce26 fffff880`0ba776a0 fffff8a0`03f9a680 : Ntfs!NtfsStorageDriverCallout+0x16
fffff880`0ba771b0 fffff880`0124cb69 : fffff880`0124e534 fffff880`0ba772c8 00000000`00004000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`0ba77290 fffff880`0124c036 : fffffa80`088e56b0 00000000`00000000 fffff8a0`03f9a680 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xa9
fffff880`0ba77300 fffff880`0124f526 : fffff880`0ba776a0 fffffa80`06baec10 fffff8a0`03f9a680 0002ffff`00001fb3 : Ntfs!NtfsNonCachedIo+0x216
fffff880`0ba774d0 fffff880`01251f78 : fffff880`0ba776a0 fffffa80`06baec10 fffff880`0ba77701 fffffa80`07ed3301 : Ntfs!NtfsCommonRead+0x7a6
fffff880`0ba77670 fffff880`010af23f : fffffa80`06baefb0 fffffa80`06baec10 fffffa80`07ed33e0 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8
fffff880`0ba77870 fffff880`010ad6df : fffffa80`088e5040 fffffa80`06baec10 fffffa80`088e5000 fffffa80`06baec10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0ba77900 fffff800`02a7da52 : fffffa80`06baec30 fffffa80`09fa5070 00000000`00000043 fffff880`02fd5180 : fltmgr!FltpDispatch+0xcf
fffff880`0ba77960 fffff800`02a7dd55 : 00000000`00000001 00000000`00000001 fffff880`0ba77a60 fffffa80`09772850 : nt!IoPageRead+0x252
fffff880`0ba779f0 fffff800`02aa709b : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiIssueHardFault+0x255
fffff880`0ba77ac0 fffff800`02a89fee : 00000000`00000000 00000000`0048af45 00000000`00000001 fffffa80`06a1af60 : nt!MmAccessFault+0x14bb
fffff880`0ba77c20 00000000`77cd548f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`521cdc10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77cd548f
STACK_COMMAND: kb
FOLLOWUP_IP:
volsnap!ExAllocateFromNPagedLookasideList+27
fffff880`0188f4c7 4883c420 add rsp,20h
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: volsnap!ExAllocateFromNPagedLookasideList+27
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: volsnap
IMAGE_NAME: volsnap.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc128
FAILURE_BUCKET_ID: X64_0x1E_c0000005_volsnap!ExAllocateFromNPagedLookasideList+27
BUCKET_ID: X64_0x1E_c0000005_volsnap!ExAllocateFromNPagedLookasideList+27
Followup: MachineOwner
---------