Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-18704-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20738.amd64fre.win7_ldr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e08000 PsLoadedModuleList = 0xfffff800`0303ceb0
Debug session time: Thu Dec 30 23:19:42.037 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:35.052
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002e91803}
Probably caused by : msrpc.sys ( msrpc!LRPC_CASSOCIATION::OpenSecurityContext+e0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e91803, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030a70e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02e91803 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: AtBroker.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff88002b950a0 -- (.trap 0xfffff88002b950a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002b95428 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e91803 rsp=fffff88002b95230 rbp=fffff88002b95380
r8=fffffa800569d300 r9=fffff88002b95330 r10=0000000000000002
r11=fffffa80044fd710 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02e91803 488b09 mov rcx,qword ptr [rcx] ds:3f68:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e6dae9 to fffff80002e6e580
STACK_TEXT:
fffff880`02b94f58 fffff800`02e6dae9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02b94f60 fffff800`02e6c760 : 00000000`00000000 00000000`00000000 fffffa80`0450f100 fffffa80`0670c160 : nt!KiBugCheckDispatch+0x69
fffff880`02b950a0 fffff800`02e91803 : fffff880`02b95350 fffffa80`05503f68 00000000`74706d00 fffff880`00d9e6e4 : nt!KiPageFault+0x260
fffff880`02b95230 fffff800`02e4958f : 00000000`00000001 00000000`06000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3
fffff880`02b95300 fffff800`02e49957 : fffff800`02fe9e80 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02b95380 fffff800`02e7f7fb : fffff800`02fe9e80 fffff800`02fe9e80 00000000`00000000 fffffa80`06d2fbe0 : nt!KiApcInterrupt+0xd7
fffff880`02b95510 fffff800`0316ab08 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInsertQueue+0x193
fffff880`02b95580 fffff880`01174190 : 00000000`00000001 fffff8a0`02e5f7d0 00000000`00000002 fffffa80`06934480 : nt!IoSetIoCompletionEx+0x58
fffff880`02b955b0 fffff880`0117305d : fffffa80`06d3e060 fffff8a0`02e5da30 00000000`00000001 fffffa80`cd637052 : msrpc!LRPC_CASSOCIATION::OpenSecurityContext+0xe0
fffff880`02b95620 fffff880`0117337b : fffff8a0`02e62970 00000000`00000000 fffff8a0`02e62970 fffff8a0`02e5da30 : msrpc!LRPC_BASE_BINDING_HANDLE::BaseBindingCopy+0x15d
fffff880`02b95760 fffff880`011769d2 : fffff8a0`02e5da30 fffff8a0`02e5da30 00000000`00000001 00000000`00000058 : msrpc!LRPC_FAST_BINDING_HANDLE::BindingCopy+0x8b
fffff880`02b95790 fffff960`003154f3 : fffff8a0`02e55430 fffff900`c3118010 fffff800`0301e560 00000000`000007ff : msrpc!RpcBindingCopy+0x42
fffff880`02b957c0 fffff960`000924b1 : fffff900`c3118010 00000000`00000000 fffffa80`06d1f6f0 00000000`00000000 : win32k!PlaySoundPostMessage+0x77
fffff880`02b95820 fffff960`000ed081 : fffff900`c3118010 fffff880`02b95c20 00000000`00000000 fffff900`c3118010 : win32k!PostPlaySoundMessage+0x25
fffff880`02b95850 fffff960`000e421f : fffff900`c3118010 fffff880`02b95c20 00000000`ffffffff 00000000`00000000 : win32k!DestroyProcessInfo+0x125
fffff880`02b95880 fffff960`000e431a : fffffa80`0614f600 fffff900`c3118010 00020500`00000000 00000000`774eec01 : win32k!xxxUserProcessCallout+0x15f
fffff880`02b958d0 fffff800`03153455 : fffffa80`0614f660 00000000`00000000 00000000`00000000 fffffa80`06d3e060 : win32k!W32pProcessCallout+0x4e
fffff880`02b95900 fffff800`0312c0ed : 00000000`00000001 fffff800`0316cc01 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
fffff880`02b959c0 fffff800`02e496a3 : fffffa80`06701901 fffffa80`0626e4d0 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`02b959f0 fffff800`02e49af0 : 00000000`0030a8b0 fffff880`02b95a70 fffff800`0312c1fc 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`02b95a70 fffff800`02e6d877 : fffffa80`06d3a6a0 0000007f`fffffff8 00000000`00000001 00000980`00000000 : nt!KiInitiateUserApc+0x70
fffff880`02b95bb0 00000000`775301ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`023eeea8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775301ea
STACK_COMMAND: kb
FOLLOWUP_IP:
msrpc!LRPC_CASSOCIATION::OpenSecurityContext+e0
fffff880`01174190 85c0 test eax,eax
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: msrpc!LRPC_CASSOCIATION::OpenSecurityContext+e0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: msrpc
IMAGE_NAME: msrpc.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc17c
FAILURE_BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+e0
BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+e0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-20217-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20738.amd64fre.win7_ldr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e05000 PsLoadedModuleList = 0xfffff800`03039eb0
Debug session time: Thu Dec 30 23:22:32.086 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:30.101
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002e8e986}
Probably caused by : win32k.sys ( win32k!MultiUserGreCleanupHmgOwnRemoveAllLocks+5c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e8e986, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030a40e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`02e8e986 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: AtBroker.exe
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff88007991340 -- (.trap 0xfffff88007991340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88007991428 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e8e986 rsp=fffff880079914d0 rbp=fffff88007991620
r8=fffffa80066bf8e0 r9=fffff880079915d0 r10=0000000000000002
r11=fffffa80068b0360 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xc73:
fffff800`02e8e986 488b09 mov rcx,qword ptr [rcx] ds:06a8:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e6aae9 to fffff80002e6b580
STACK_TEXT:
fffff880`079911f8 fffff800`02e6aae9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`07991200 fffff800`02e69760 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`065196f0 : nt!KiBugCheckDispatch+0x69
fffff880`07991340 fffff800`02e8e986 : fffff900`c30c3350 00000000`00000003 fffff900`c30c3340 fffff800`02fa22dd : nt!KiPageFault+0x260
fffff880`079914d0 fffff800`02e4658f : 00000000`00000000 fffff900`c0200000 00000000`00000000 fffffa80`00000000 : nt!IopCompleteRequest+0xc73
fffff880`079915a0 fffff800`02e46957 : 00000000`00003f18 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`07991620 fffff800`02e94b00 : fffff960`000edd58 00000000`00000001 00000000`00000001 ffff01e0`07b7458c : nt!KiApcInterrupt+0xd7
fffff880`079917b8 fffff960`000edd58 : 00000000`00000001 00000000`00000001 ffff01e0`07b7458c 00000000`0000094c : nt!PsGetCurrentProcessId
fffff880`079917c0 fffff960`000ed5f1 : 00000000`00000000 fffff880`07991c1f 00000000`0000094c fffff900`c312c010 : win32k!MultiUserGreCleanupHmgOwnRemoveAllLocks+0x5c
fffff880`079917f0 fffff960`000e4c00 : 00000000`0000094c fffff880`07991c00 fffff900`c312c010 fffff900`00000000 : win32k!NtGdiCloseProcess+0x25d
fffff880`07991850 fffff960`000e4337 : fffffa80`06140000 fffff880`07991c20 00020500`00000000 00000000`76cdec01 : win32k!GdiProcessCallout+0x200
fffff880`079918d0 fffff800`03150455 : fffffa80`06140090 00000000`00000000 00000000`00000000 fffffa80`06ae7b60 : win32k!W32pProcessCallout+0x6b
fffff880`07991900 fffff800`031290ed : 00000000`00000001 fffff800`03169c01 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
fffff880`079919c0 fffff800`02e466a3 : fffffa80`06711b01 fffffa80`06844010 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`079919f0 fffff800`02e46af0 : 00000000`0032a3e0 fffff880`07991a70 fffff800`031291fc 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`07991a70 fffff800`02e6a877 : fffffa80`06aeb860 0000007f`fffffff8 00000000`00000001 00000980`00000000 : nt!KiInitiateUserApc+0x70
fffff880`07991bb0 00000000`76d201ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0232ed98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d201ea
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!MultiUserGreCleanupHmgOwnRemoveAllLocks+5c
fffff960`000edd58 8b4c3b08 mov ecx,dword ptr [rbx+rdi+8]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: win32k!MultiUserGreCleanupHmgOwnRemoveAllLocks+5c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cbe5d3e
FAILURE_BUCKET_ID: X64_0xA_win32k!MultiUserGreCleanupHmgOwnRemoveAllLocks+5c
BUCKET_ID: X64_0xA_win32k!MultiUserGreCleanupHmgOwnRemoveAllLocks+5c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-21543-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20738.amd64fre.win7_ldr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e1f000 PsLoadedModuleList = 0xfffff800`03053eb0
Debug session time: Thu Dec 30 12:36:45.024 2010 (UTC - 5:00)
System Uptime: 0 days 1:59:36.039
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002ea8803}
Probably caused by : win32k.sys ( win32k!GreAcquireSemaphore+1c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ea8803, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030be0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02ea8803 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: aitagent.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff88003e4a080 -- (.trap 0xfffff88003e4a080)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88003e4a428 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ea8803 rsp=fffff88003e4a210 rbp=fffff88003e4a360
r8=fffffa8003f6e010 r9=fffff88003e4a310 r10=0000000000000002
r11=fffffa8005334ad0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02ea8803 488b09 mov rcx,qword ptr [rcx] ds:e6a8:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e84ae9 to fffff80002e85580
STACK_TEXT:
fffff880`03e49f38 fffff800`02e84ae9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03e49f40 fffff800`02e83760 : 00000000`00000000 00000000`00000000 fffffa80`06701000 fffffa80`03854c60 : nt!KiBugCheckDispatch+0x69
fffff880`03e4a080 fffff800`02ea8803 : fffff800`03000e80 fffffa80`0685d720 00000000`00000000 fffffa80`06701010 : nt!KiPageFault+0x260
fffff880`03e4a210 fffff800`02e6058f : 00000000`00000001 00000000`00004443 00000000`00000000 fffffa80`00000000 : nt!IopCompleteRequest+0xae3
fffff880`03e4a2e0 fffff800`02e60957 : fffffa80`050cbbf0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`03e4a360 fffff800`02e8d525 : fffff900`c2a22580 fffff960`001343a9 fffffa80`0652a060 00000000`00000010 : nt!KiApcInterrupt+0xd7
fffff880`03e4a4f0 fffff800`02e911fb : 00000000`00000000 fffffa80`050cbbf0 00000000`00000001 00000000`00000001 : nt!ExAcquireResourceExclusiveLite+0xb5
fffff880`03e4a560 fffff960`001f6b40 : 00000000`00004fb8 fffff960`001f6c2f 00000000`00000000 00000000`00000000 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x1b
fffff880`03e4a590 fffff960`001f6bdc : fffff900`c02031b0 fffff800`02e91322 fffff900`c2a32750 00000000`00000001 : win32k!GreAcquireSemaphore+0x1c
fffff880`03e4a5c0 fffff960`00134e0b : 00000000`00004fb8 fffff960`001f6c2f fffff900`c02036d8 fffff800`02e91322 : win32k!GreAcquireHmgrSemaphore+0x10
fffff880`03e4a5f0 fffff960`00134f52 : 00000000`00000001 fffff900`c2a32750 00000000`00000001 fffff900`c2a32978 : win32k!HmgRemoveObject+0x3f
fffff880`03e4a660 fffff960`001355c9 : fffff900`c00b7010 fffff900`c2a32750 00000000`00000001 fffff900`c2a32978 : win32k!XEPALOBJ::vUnrefPalette+0x22
fffff880`03e4a6a0 fffff960`0013d65d : 00000000`00000000 fffff880`00000001 fffff900`c2a32750 fffff900`00000000 : win32k!SURFACE::bDeleteSurface+0x5c1
fffff880`03e4a7f0 fffff960`00134c00 : 00000000`00004fb8 fffff880`03e4ac00 fffff900`c2a416a0 fffff900`00000000 : win32k!NtGdiCloseProcess+0x2c9
fffff880`03e4a850 fffff960`00134337 : fffffa80`050b5a00 fffff880`03e4ac20 fffffa00`00000000 00000000`778fec01 : win32k!GdiProcessCallout+0x200
fffff880`03e4a8d0 fffff800`0316a455 : fffffa80`050b5ab0 00000000`00000000 00000000`00000000 fffffa80`04a26750 : win32k!W32pProcessCallout+0x6b
fffff880`03e4a900 fffff800`031430ed : 00000000`00000000 fffff800`03183c01 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
fffff880`03e4a9c0 fffff800`02e606a3 : fffffa80`04a09001 fffffa80`04795300 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`03e4a9f0 fffff800`02e60af0 : 00000000`00141590 fffff880`03e4aa70 fffff800`031431fc 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`03e4aa70 fffff800`02e84877 : fffffa80`049269a0 0000007f`fffffff8 00000000`00000001 00000980`00000000 : nt!KiInitiateUserApc+0x70
fffff880`03e4abb0 00000000`779401ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`00ceee28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779401ea
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!GreAcquireSemaphore+1c
fffff960`001f6b40 4883c420 add rsp,20h
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: win32k!GreAcquireSemaphore+1c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cbe5d3e
FAILURE_BUCKET_ID: X64_0xA_win32k!GreAcquireSemaphore+1c
BUCKET_ID: X64_0xA_win32k!GreAcquireSemaphore+1c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-25100-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.20738.amd64fre.win7_ldr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e0e000 PsLoadedModuleList = 0xfffff800`03042eb0
Debug session time: Fri Dec 31 03:22:56.798 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:37.813
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002e97803}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e97803, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ad0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02e97803 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: AtBroker.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff8800442da70 -- (.trap 0xfffff8800442da70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800442e428 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e97803 rsp=fffff8800442dc00 rbp=fffff8800442dd50
r8=fffffa80055b8a10 r9=fffff8800442dd00 r10=0000000000000002
r11=fffffa800658fb20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02e97803 488b09 mov rcx,qword ptr [rcx] ds:26a8:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e73ae9 to fffff80002e74580
STACK_TEXT:
fffff880`0442d928 fffff800`02e73ae9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0442d930 fffff800`02e72760 : 00000000`00000000 00000000`00000000 fffff8a0`020b4f00 fffffa80`06d69970 : nt!KiBugCheckDispatch+0x69
fffff880`0442da70 fffff800`02e97803 : fffff880`0442dde8 fffff8a0`029f0d00 fffffa80`06d75e60 fffffa80`06d73a20 : nt!KiPageFault+0x260
fffff880`0442dc00 fffff800`02e4f58f : 00000000`00000001 00008001`0074004c 00000000`00000000 fffffa80`00000000 : nt!IopCompleteRequest+0xae3
fffff880`0442dcd0 fffff800`02e4f957 : 00000000`000003fd 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`0442dd50 fffff800`02e824cc : fffff800`02fefe80 fffff800`00000001 00000000`00000000 fffff880`00000000 : nt!KiApcInterrupt+0xd7
fffff880`0442dee0 fffff800`02e8cef1 : 00000000`00000000 00000000`00000002 00000000`00000001 fffff800`030af840 : nt!KeFlushMultipleRangeTb+0x1cc
fffff880`0442dfb0 fffff800`02ea5773 : 00000000`00000002 fffff880`0442e100 fffff8a0`0a60e000 ffffffff`ffffffff : nt!MiFlushTbAsNeeded+0x1d1
fffff880`0442e0c0 fffff800`02fa7445 : 00000000`00002000 fffffa80`0365d000 00000000`00000001 fffff6fc`50053070 : nt!MiAllocatePagedPoolPages+0x1433
fffff880`0442e1f0 fffff800`02e86fc0 : 00000000`00002000 fffffa80`0365d000 00000000`00000001 fffff800`02fa734f : nt!MiAllocatePoolPages+0x35
fffff880`0442e330 00000000`00000200 : 00000001`00000080 fffff880`0442e428 fffff880`0442e428 0050e0c2`4f000000 : nt!ExpAllocateBigPool+0xb0
fffff880`0442e420 00000001`00000080 : fffff880`0442e428 fffff880`0442e428 0050e0c2`4f000000 00000000`00000000 : 0x200
fffff880`0442e428 fffff880`0442e428 : fffff880`0442e428 0050e0c2`4f000000 00000000`00000000 fffff800`02e50000 : 0x1`00000080
fffff880`0442e430 fffff880`0442e428 : 0050e0c2`4f000000 00000000`00000000 fffff800`02e50000 00000000`0029b1ac : 0xfffff880`0442e428
fffff880`0442e438 0050e0c2`4f000000 : 00000000`00000000 fffff800`02e50000 00000000`0029b1ac fffffa80`042b8000 : 0xfffff880`0442e428
fffff880`0442e440 00000000`00000000 : fffff800`02e50000 00000000`0029b1ac fffffa80`042b8000 00000000`00000000 : 0x50e0c2`4f000000
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02e72760 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c42e3
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------