Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031011-20748-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c02000 PsLoadedModuleList = 0xfffff800`02e47e90
Debug session time: Thu Mar 10 18:00:04.104 2011 (UTC - 4:00)
System Uptime: 0 days 1:22:59.368
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {22, fffffa8007a40000, 0, 0}
GetPointerFromAddress: unable to read from fffff80002eb30e8
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+72d6 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022,
Arg2: fffffa8007a40000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x19_22
POOL_ADDRESS: fffffa8007a40000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002c0ed6e to fffff80002c82640
STACK_TEXT:
fffff880`0a71da28 fffff800`02c0ed6e : 00000000`00000019 00000000`00000022 fffffa80`07a40000 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a71da30 fffff800`02dae1fa : 00000000`00000000 fffff880`0a71db80 fffff880`0a71db00 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x72d6
fffff880`0a71dac0 fffff800`030d09ae : 00000000`00000000 fffffa80`0818e000 fffffa80`0666f730 fffffa80`00000000 : nt!ExFreePoolWithTag+0x46a
fffff880`0a71db70 fffff800`030f2090 : fffffa80`06c5bb01 00000000`00000080 fffffa80`03669890 fffff800`02e076e8 : nt!PfpFlushBuffers+0x23e
fffff880`0a71dc10 fffff800`02f1fcce : ffffffff`ff676980 fffffa80`06c5bb60 fffff880`0a71ddb0 fffffa80`06c5bb60 : nt!PfTLoggingWorker+0xe0
fffff880`0a71dd40 fffff800`02c73fe6 : fffff880`037d3180 fffffa80`06c5bb60 fffffa80`06328060 fffff880`01069cb0 : nt!PspSystemThreadStartup+0x5a
fffff880`0a71dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+72d6
fffff800`02c0ed6e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+72d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0x19_22_nt!_??_::FNODOBFM::_string_+72d6
BUCKET_ID: X64_0x19_22_nt!_??_::FNODOBFM::_string_+72d6
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031011-23290-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c1c000 PsLoadedModuleList = 0xfffff800`02e61e90
Debug session time: Thu Mar 10 16:36:37.110 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:59.374
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FC, {fffff88009938db0, 800000004f84a963, fffffa800381b500, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4443c )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff88009938db0, Virtual address for the attempted execute.
Arg2: 800000004f84a963, PTE contents.
Arg3: fffffa800381b500, (reserved)
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: System
CURRENT_IRQL: 2
TRAP_FRAME: fffffa800381b500 -- (.trap 0xfffffa800381b500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8004ee0050
rdx=fffffa8004ee0b98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88009938db0 rsp=fffffa800381b690 rbp=fffff88009938680
r8=000000004f444602 r9=0000000000000000 r10=00000000ffffffff
r11=fffffa800381b660 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
fffff880`09938db0 0090930980f8 add byte ptr [rax-77FF66Dh],dl ds:0002:ffffffff`f8800995=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c46870 to fffff80002c9c640
STACK_TEXT:
fffffa80`0381b398 fffff800`02c46870 : 00000000`000000fc fffff880`09938db0 80000000`4f84a963 fffffa80`0381b500 : nt!KeBugCheckEx
fffffa80`0381b3a0 fffff800`02c9a76e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`09933000 : nt! ?? ::FNODOBFM::`string'+0x4443c
fffffa80`0381b500 fffff880`09938db0 : fffff880`09933000 fffff880`09938680 00000000`00000000 00002001`00000101 : nt!KiPageFault+0x16e
fffffa80`0381b690 fffff880`09933000 : fffff880`09938680 00000000`00000000 00002001`00000101 fffffa80`0381b6b0 : 0xfffff880`09938db0
fffffa80`0381b698 fffff880`09938680 : 00000000`00000000 00002001`00000101 fffffa80`0381b6b0 fffffa80`0381b6b0 : 0xfffff880`09933000
fffffa80`0381b6a0 00000000`00000000 : 00002001`00000101 fffffa80`0381b6b0 fffffa80`0381b6b0 fffffa80`0381b6c0 : 0xfffff880`09938680
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+4443c
fffff800`02c46870 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4443c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
FAILURE_BUCKET_ID: X64_0xFC_nt!_??_::FNODOBFM::_string_+4443c
BUCKET_ID: X64_0xFC_nt!_??_::FNODOBFM::_string_+4443c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031711-33883-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c16000 PsLoadedModuleList = 0xfffff800`02e5be90
Debug session time: Thu Mar 17 15:31:41.848 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:32.487
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff88000c06e18, fffff8800ac98e00, 0}
Probably caused by : fltmgr.sys ( fltmgr!TreeFindNodeOrParent+8 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88000c06e18, Address of the instruction which caused the bugcheck
Arg3: fffff8800ac98e00, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
fltmgr!TreeFindNodeOrParent+8
fffff880`00c06e18 488b4820 mov rcx,qword ptr [rax+20h]
CONTEXT: fffff8800ac98e00 -- (.cxr 0xfffff8800ac98e00)
rax=006e007500540069 rbx=fffff8a00be1a028 rcx=006e007500540069
rdx=fffffa8003d0d930 rsi=fffff8a00be1a028 rdi=0000000000000000
rip=fffff88000c06e18 rsp=fffff8800ac997e8 rbp=fffffa8006d57188
r8=ffffffffffffffff r9=fffff8800ac99838 r10=fffff880009e8dc0
r11=fffff8a00be1a028 r12=fffffa8003d0d930 r13=fffff8a00be1a028
r14=fffff8a00be1a028 r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
fltmgr!TreeFindNodeOrParent+0x8:
fffff880`00c06e18 488b4820 mov rcx,qword ptr [rax+20h] ds:002b:006e0075`00540089=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: avp.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88000c06e18
STACK_TEXT:
fffff880`0ac997e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!TreeFindNodeOrParent+0x8
FOLLOWUP_IP:
fltmgr!TreeFindNodeOrParent+8
fffff880`00c06e18 488b4820 mov rcx,qword ptr [rax+20h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: fltmgr!TreeFindNodeOrParent+8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fltmgr
IMAGE_NAME: fltmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7929c
STACK_COMMAND: .cxr 0xfffff8800ac98e00 ; kb
FAILURE_BUCKET_ID: X64_0x3B_fltmgr!TreeFindNodeOrParent+8
BUCKET_ID: X64_0x3B_fltmgr!TreeFindNodeOrParent+8
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031711-26114-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c4a000 PsLoadedModuleList = 0xfffff800`02e8fe90
Debug session time: Thu Mar 17 15:48:29.625 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:25.889
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {10000002f, 2, 1, fffff80002cfbe12}
Probably caused by : PCIIDEX.SYS ( PCIIDEX!BmFlush+25 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000010000002f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cfbe12, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efb0e8
000000010000002f
CURRENT_IRQL: 2
FAULTING_IP:
nt!KxWaitForLockOwnerShip+12
fffff800`02cfbe12 48890a mov qword ptr [rdx],rcx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff880037fb7d0 -- (.trap 0xfffff880037fb7d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffff880037fba00
rdx=000000010000002f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cfbe12 rsp=fffff880037fb960 rbp=fffffa8004120ea0
r8=fffff880037fba00 r9=fffff80002c2cc60 r10=00000000000fffff
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0x12:
fffff800`02cfbe12 48890a mov qword ptr [rdx],rcx ds:0022:00000001`0000002f=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cc9be9 to fffff80002cca640
STACK_TEXT:
fffff880`037fb688 fffff800`02cc9be9 : 00000000`0000000a 00000001`0000002f 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`037fb690 fffff800`02cc8860 : fffffa80`04745790 fffffa80`077f6910 fffffa80`04734530 fffffa80`04120e00 : nt!KiBugCheckDispatch+0x69
fffff880`037fb7d0 fffff800`02cfbe12 : fffffa80`00000002 fffffa80`036536a8 00000000`00000001 fffff800`02c047d8 : nt!KiPageFault+0x260
fffff880`037fb960 fffff800`02cd466d : fffffa80`04120e00 fffffa00`001200b0 fffffa80`074d9680 fffff800`02c03354 : nt!KxWaitForLockOwnerShip+0x12
fffff880`037fb990 fffff800`02c05b98 : fffffa80`04120ea0 fffffa80`04120ea0 00000000`00000001 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x8d
fffff880`037fb9e0 fffff800`02c05825 : fffffa80`074d9720 00000000`00000000 00000000`00000001 fffffa80`074fe0d0 : hal!IoFreeMapRegisters+0x78
fffff880`037fba50 fffff880`00fcf199 : fffffa80`074d9680 fffffa80`0412f1b0 fffffa80`074d9680 fffffa80`040a8cc0 : hal!HalPutScatterGatherList+0xd5
fffff880`037fbab0 fffff880`00e15453 : 00000000`00000000 00000000`00000001 fffff800`02cc6063 00000000`0000000b : PCIIDEX!BmFlush+0x25
fffff880`037fbae0 fffff880`00e15104 : fffffa80`036521a0 00000000`00000000 fffffa80`036521a0 fffffa80`074d9680 : ataport!IdeProcessCompletedRequests+0x123
fffff880`037fbc10 fffff800`02cd5b1c : fffff880`037d3180 00000000`0e1d90f6 fffffa80`03652050 fffffa80`03652118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`037fbcd0 fffff800`02cc236a : fffff880`037d3180 fffff880`037ddfc0 00000000`00000000 fffff880`00e14f5c : nt!KiRetireDpcList+0x1bc
fffff880`037fbd80 00000000`00000000 : fffff880`037fc000 fffff880`037f6000 fffff880`037fbd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
PCIIDEX!BmFlush+25
fffff880`00fcf199 4883a3e003000000 and qword ptr [rbx+3E0h],0
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: PCIIDEX!BmFlush+25
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: PCIIDEX
IMAGE_NAME: PCIIDEX.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc114
FAILURE_BUCKET_ID: X64_0xA_PCIIDEX!BmFlush+25
BUCKET_ID: X64_0xA_PCIIDEX!BmFlush+25
Followup: MachineOwner
---------