Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032911-30654-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e15000 PsLoadedModuleList = 0xfffff800`0305ae90
Debug session time: Tue Mar 29 06:01:38.479 2011 (UTC - 4:00)
System Uptime: 0 days 7:56:14.212
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {c08a5, 0, 0, 0}
Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000000c08a5
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x24
PROCESS_NAME: AvastUI.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880099e5930 -- (.trap 0xfffff880099e5930)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000003804000
rdx=0000000003801000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000317ebc2 rsp=fffff880099e5ac0 rbp=fffff880099e5ca0
r8=fffffa8008745760 r9=0000000000013f0a r10=fffffa8006a0e7b0
r11=0000000000120089 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!NtReadFile+0x142:
fffff800`0317ebc2 0fb602 movzx eax,byte ptr [rdx] ds:00000000`03801000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8800120d1d5 to fffff80002e95640
STACK_TEXT:
fffff880`099e53c8 fffff880`0120d1d5 : 00000000`00000024 00000000`000c08a5 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`099e53d0 fffff880`0120ce28 : 00000001`00000000 00000000`00000000 00000000`00000000 00000008`00000000 : Ntfs!NtfsPagingFileIo+0x155
fffff880`099e54d0 fffff880`00e02bcf : fffffa80`0b748fb0 fffffa80`0b748c10 fffffa80`0ba56c30 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x8ba9
fffff880`099e5580 fffff880`00e016df : fffffa80`0799d8e0 fffffa80`06bba801 fffffa80`0799d800 fffffa80`0b748c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`099e5610 fffff800`02ebd635 : fffffa80`0b748c30 fffffa80`08760f20 fffffa80`06bdd890 fffff880`02f64180 : fltmgr!FltpDispatch+0xcf
fffff880`099e5670 fffff800`02ebd109 : 00000000`00000000 00000000`00000000 fffffa80`06bdd7d0 fffffa80`06bdd7d0 : nt!IoPageRead+0x255
fffff880`099e5700 fffff800`02ea3a8a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff680`0001c000 : nt!MiIssueHardFault+0x255
fffff880`099e57d0 fffff800`02e9376e : 00000000`00000000 00000000`03801000 fffffa80`06efbb00 fffffa80`0b71d380 : nt!MmAccessFault+0x146a
fffff880`099e5930 fffff800`0317ebc2 : fffffa80`0b71d300 fffffa80`00000001 fffffa80`06a0e7b0 00000000`00014001 : nt!KiPageFault+0x16e
fffff880`099e5ac0 fffff800`02e948d3 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x142
fffff880`099e5bb0 00000000`74892e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0238f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74892e09
STACK_COMMAND: kb
FOLLOWUP_IP:
Ntfs!NtfsPagingFileIo+155
fffff880`0120d1d5 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!NtfsPagingFileIo+155
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce792f9
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsPagingFileIo+155
BUCKET_ID: X64_0x24_Ntfs!NtfsPagingFileIo+155
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032611-29702-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c66000 PsLoadedModuleList = 0xfffff800`02ea3e50
Debug session time: Sat Mar 26 22:02:20.835 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:32.614
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {c08a2, 0, 0, 0}
Probably caused by : Ntfs.sys ( Ntfs!NtfsPagingFileIo+155 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000000c08a2
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x24
PROCESS_NAME: dllhost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff88001250e95 to fffff80002cd6740
STACK_TEXT:
fffff880`093fc6b8 fffff880`01250e95 : 00000000`00000024 00000000`000c08a2 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`093fc6c0 fffff880`01250ae8 : 00000001`00000000 00000000`00000000 00000000`00000000 00000008`00000000 : Ntfs!NtfsPagingFileIo+0x155
fffff880`093fc7c0 fffff880`0106323f : fffffa80`08a03830 fffffa80`08a03490 fffffa80`08801c30 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x9e89
fffff880`093fc870 fffff880`010616df : fffffa80`07911c50 fffffa80`08a03490 fffffa80`07911c00 fffffa80`08a03490 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`093fc900 fffff800`02cc81f2 : fffffa80`08a034b0 fffffa80`095be580 00000000`00000043 fffff680`00001f48 : fltmgr!FltpDispatch+0xcf
fffff880`093fc960 fffff800`02cc84f5 : 00000000`00000001 00000000`00000001 fffff880`093fca60 00000000`00000000 : nt!IoPageRead+0x252
fffff880`093fc9f0 fffff800`02cf18bb : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff680`00017e18 : nt!MiIssueHardFault+0x255
fffff880`093fcac0 fffff800`02cd482e : 00000000`00000001 00000000`025b7510 00000000`0225c101 00000000`00000001 : nt!MmAccessFault+0x14bb
fffff880`093fcc20 000007fe`f691e9d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0225c0e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f691e9d4
STACK_COMMAND: kb
FOLLOWUP_IP:
Ntfs!NtfsPagingFileIo+155
fffff880`01250e95 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!NtfsPagingFileIo+155
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsPagingFileIo+155
BUCKET_ID: X64_0x24_Ntfs!NtfsPagingFileIo+155
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032611-38594-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02e49000 PsLoadedModuleList = 0xfffff800`03086e50
Debug session time: Sat Mar 26 22:43:32.566 2011 (UTC - 4:00)
System Uptime: 0 days 0:07:43.345
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031bcd6a, fffff88006b4bf70, 0}
Probably caused by : ntkrnlmp.exe ( nt!FsRtlOplockIsFastIoPossible+a )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031bcd6a, Address of the instruction which caused the bugcheck
Arg3: fffff88006b4bf70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!FsRtlOplockIsFastIoPossible+a
fffff800`031bcd6a f6426840 test byte ptr [rdx+68h],40h
CONTEXT: fffff88006b4bf70 -- (.cxr 0xfffff88006b4bf70)
rax=fffffa8007de8b01 rbx=fffffa8007be5f00 rcx=fffff8a009f731c8
rdx=0080000000000000 rsi=fffff8a009f73010 rdi=fffff88006b4cb58
rip=fffff800031bcd6a rsp=fffff88006b4c948 rbp=fffff88006b4cb30
r8=fffffa8009305c80 r9=fffffa8007e0cb30 r10=fffffa8009305b10
r11=fffff880068d7834 r12=fffffa8007be5f20 r13=fffffa8007e0cb30
r14=fffffa8007e0cb30 r15=fffff88006b4cb38
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!FsRtlOplockIsFastIoPossible+0xa:
fffff800`031bcd6a f6426840 test byte ptr [rdx+68h],40h ds:002b:00800000`00000068=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Setup.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff800031bcd6a
STACK_TEXT:
fffff880`06b4c948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!FsRtlOplockIsFastIoPossible+0xa
FOLLOWUP_IP:
nt!FsRtlOplockIsFastIoPossible+a
fffff800`031bcd6a f6426840 test byte ptr [rdx+68h],40h
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!FsRtlOplockIsFastIoPossible+a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff88006b4bf70 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!FsRtlOplockIsFastIoPossible+a
BUCKET_ID: X64_0x3B_nt!FsRtlOplockIsFastIoPossible+a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032911-21465-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1e000 PsLoadedModuleList = 0xfffff800`03063e90
Debug session time: Tue Mar 29 22:11:23.047 2011 (UTC - 4:00)
System Uptime: 0 days 0:42:21.639
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {5002, fffff70001080000, 11e8, 8011f5fffffffe}
Probably caused by : win32k.sys ( win32k!vAlphaPerPixelOnly+26 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005002, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 00000000000011e8
Arg4: 008011f5fffffffe
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_5002
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880089d68d0 -- (.trap 0xfffff880089d68d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000f rbx=0000000000000000 rcx=fffff900c20d19c0
rdx=00000000037bb788 rsi=0000000000000000 rdi=0000000000000000
rip=fffff960000698f6 rsp=fffff880089d6a68 rbp=fffff880089d6c6c
r8=00000000000000ac r9=0000000001ff0000 r10=fffff900c20d19c0
r11=00000000000000ac r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
win32k!vAlphaPerPixelOnly+0x26:
fffff960`000698f6 8b03 mov eax,dword ptr [rbx] ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e31fe7 to fffff80002e9e640
STACK_TEXT:
fffff880`089d6768 fffff800`02e31fe7 : 00000000`0000001a 00000000`00005002 fffff700`01080000 00000000`000011e8 : nt!KeBugCheckEx
fffff880`089d6770 fffff800`02e9c76e : 00000000`00000000 00000000`037bb788 fffff900`c204e800 00000000`037bb788 : nt! ?? ::FNODOBFM::`string'+0x46ff8
fffff880`089d68d0 fffff960`000698f6 : fffff960`00076387 00000000`00000000 fffff900`c20d19c0 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`089d6a68 fffff960`00076387 : 00000000`00000000 fffff900`c20d19c0 00000000`00000000 00000000`00000000 : win32k!vAlphaPerPixelOnly+0x26
fffff880`089d6a70 fffff960`00075f74 : fffff900`c220f2b0 00000000`000000ac 00000000`00001e00 00000000`000000e2 : win32k!AlphaScanLineBlend+0x303
fffff880`089d6b30 fffff960`001ef757 : fffff900`000000e2 00000000`00000004 fffff900`00000000 fffff900`c0712ab0 : win32k!EngAlphaBlend+0x4dc
fffff880`089d6df0 fffff800`02e9d8d3 : ffffffff`da010af7 00000000`000000e2 00000000`00000004 fffff900`000000ac : win32k!NtGdiAlphaBlend+0x15ff
fffff880`089d71f0 00000000`74c3038a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`000bb458 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74c3038a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!vAlphaPerPixelOnly+26
fffff960`000698f6 8b03 mov eax,dword ptr [rbx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!vAlphaPerPixelOnly+26
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d2415ea
FAILURE_BUCKET_ID: X64_0x1a_5002_win32k!vAlphaPerPixelOnly+26
BUCKET_ID: X64_0x1a_5002_win32k!vAlphaPerPixelOnly+26
Followup: MachineOwner
---------