Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012511-16692-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03052000 PsLoadedModuleList = 0xfffff800`0328fe50
Debug session time: Tue Jan 25 17:18:20.911 2011 (UTC - 5:00)
System Uptime: 0 days 4:05:25.972
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1, {fffff800033b4e96, 0, fffd, 0}
Probably caused by : ntkrnlmp.exe ( nt!KeUserModeCallback+e6 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->KernelApcDisable field. A negative value indicates that a driver
has disabled APC calls without re-enabling them. A positive value indicates
that the reverse is true. This check is made on exit from a system call.
Arguments:
Arg1: fffff800033b4e96, address of system function (system call)
Arg2: 0000000000000000, Thread->ApcStateIndex << 8 | Previous ApcStateIndex
Arg3: 000000000000fffd, Thread->KernelApcDisable
Arg4: 0000000000000000, Previous KernelApcDisable
Debugging Details:
------------------
FAULTING_IP:
nt!KeUserModeCallback+e6
fffff800`033b4e96 8bd8 mov ebx,eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800030ba2ed to fffff800030c2740
STACK_TEXT:
fffff880`0735a4a8 fffff800`030ba2ed : 00000000`00000001 fffff800`033b4e96 00000000`00000000 00000000`0000fffd : nt!KeBugCheckEx
fffff880`0735a4b0 fffff800`033b4e96 : 7fffffff`7fffffff fffff800`03010b7f 00000000`0032de48 fffff880`0735ac20 : nt!KiCallUserMode+0x26d
fffff880`0735a5f0 fffff960`001e8e46 : 00000000`0000004e fffff880`0735a6a0 fffff900`c268b6c0 fffff900`c1e3ac30 : nt!KeUserModeCallback+0xe6
fffff880`0735a670 fffff960`001af242 : fffff900`c268b6c0 000003a7`00000114 00000000`00000064 00000000`00000002 : win32k!xxxClientCallWinEventProc+0x76
fffff880`0735a6e0 fffff960`001af324 : 00000000`00000e04 00000000`00000001 fffff900`c0b5b810 00000000`00000066 : win32k!xxxProcessNotifyWinEvent+0x172
fffff880`0735a760 fffff960`00136afe : fffff900`c28419f0 00000000`00000001 fffff900`c0b5b810 fffff900`c0224378 : win32k!xxxFlushDeferredWindowEvents+0x30
fffff880`0735a790 fffff960`00135c27 : 00000000`00000000 fffff960`00000000 000003a7`00000114 00000000`00000000 : win32k!zzzSetFMouseMoved+0x3e2
fffff880`0735a900 fffff960`001ca3d7 : fffff900`c0b5b810 00000000`ffffffff 00000000`00000001 00000000`00000000 : win32k!zzzLockDisplayAreaAndInvalidateDCCache+0x53
fffff880`0735a950 fffff960`0017bb38 : 00000000`00000000 00000000`ffffffff 00000000`00000001 00000000`00000001 : win32k!xxxScrollWindowEx+0x787
fffff880`0735aae0 fffff800`030c1993 : fffffa80`0d5593c0 00000000`0032dee8 00000000`0032fd20 fffff880`0735ab68 : win32k!NtUserScrollWindowEx+0x140
fffff880`0735abb0 00000000`749a07aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0032de40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x749a07aa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeUserModeCallback+e6
fffff800`033b4e96 8bd8 mov ebx,eax
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KeUserModeCallback+e6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1_SysCallNum_10be_nt!KeUserModeCallback+e6
BUCKET_ID: X64_0x1_SysCallNum_10be_nt!KeUserModeCallback+e6
Followup: MachineOwner
---------