*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002ca9c15, fffff88002fcb578, fffff88002fcade0}
Probably caused by : discache.sys ( discache!DispModifyObjectLru+144 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ca9c15, The address that the exception occurred at
Arg3: fffff88002fcb578, Exception Record Address
Arg4: fffff88002fcade0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiRemoveNode+205
fffff800`02ca9c15 49395808 cmp qword ptr [r8+8],rbx
EXCEPTION_RECORD: fffff88002fcb578 -- (.exr 0xfffff88002fcb578)
ExceptionAddress: fffff80002ca9c15 (nt!MiRemoveNode+0x0000000000000205)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88002fcade0 -- (.cxr 0xfffff88002fcade0)
rax=fffff8a004c69258 rbx=fffff8a00bd51770 rcx=fffff8a004c69258
rdx=fffff80002e465ff rsi=fffff8a00bd51770 rdi=fffff8a00bd51770
rip=fffff80002ca9c15 rsp=fffff88002fcb7b0 rbp=fffff80002e465c0
r8=005c00296b793030 r9=0000000000003be0 r10=0000000000003be0
r11=fffff88002fcb878 r12=0000000000000001 r13=fffffa80039d3040
r14=00000000ffffffff r15=fffff8a000001990
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!MiRemoveNode+0x205:
fffff800`02ca9c15 49395808 cmp qword ptr [r8+8],rbx ds:002b:005c0029`6b793038=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb00e0
ffffffffffffffff
FOLLOWUP_IP:
discache!DispModifyObjectLru+144
fffff880`03de6308 ba444c7275 mov edx,75724C44h
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002f0aa7b to fffff80002ca9c15
STACK_TEXT:
fffff880`02fcb7b0 fffff800`02f0aa7b : fffff8a0`0bd51790 fffffa80`039e4b60 00000000`00000000 fffff8a0`0bd51770 : nt!MiRemoveNode+0x205
fffff880`02fcb7e0 fffff800`02c7d8b4 : 00000000`00000000 fffffa80`039d3040 fffffa80`039eb660 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x324ad
fffff880`02fcb820 fffff800`02f8d264 : fffffa80`039d3040 00000000`00000000 fffffa80`039e4b60 00000000`00000000 : nt!ObfDereferenceObject+0xd4
fffff880`02fcb880 fffff800`02f8d164 : 00000000`00003be0 fffffa80`039d3040 fffff8a0`00001990 00000000`00003be0 : nt!ObpCloseHandleTableEntry+0xc4
fffff880`02fcb910 fffff800`02c77953 : fffffa80`039e4b60 fffff880`02fcb9e0 fffff8a0`0be60180 000f003f`00000000 : nt!ObpCloseHandle+0x94
fffff880`02fcb960 fffff800`02c73ef0 : fffff880`03de6308 fffff880`03deb2c0 00000000`0016d907 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02fcbaf8 fffff880`03de6308 : fffff880`03deb2c0 00000000`0016d907 00000000`00000000 00000000`0016d907 : nt!KiServiceLinkage
fffff880`02fcbb00 fffff880`03de6663 : ffffffff`ffffffff ffffffff`ffffffff fffff800`02e1d500 00000000`00000000 : discache!DispModifyObjectLru+0x144
fffff880`02fcbc20 fffff880`03de66c7 : fffff880`03de66bc fffff800`02e1d5f8 fffffa80`039e4b60 00000000`00000000 : discache!DispFlushLru+0x19b
fffff880`02fcbc80 fffff800`02c85961 : fffff800`02e1d500 fffff800`02f73820 fffffa80`039e4b60 fffff800`02e1d5f8 : discache!DispLruWorkerRoutine+0xb
fffff880`02fcbcb0 fffff800`02f1bbc6 : 00000000`00000000 fffffa80`039e4b60 00000000`00000080 fffffa80`039d3040 : nt!ExpWorkerThread+0x111
fffff880`02fcbd40 fffff800`02c56bc6 : fffff880`02d63180 fffffa80`039e4b60 fffff880`02d6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fcbd80 00000000`00000000 : fffff880`02fcc000 fffff880`02fc6000 fffff880`02fcb110 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: discache!DispModifyObjectLru+144
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: discache
IMAGE_NAME: discache.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc52e
STACK_COMMAND: .cxr 0xfffff88002fcade0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_discache!DispModifyObjectLru+144
BUCKET_ID: X64_0x7E_discache!DispModifyObjectLru+144
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002ca9c15, fffff88002fcb578, fffff88002fcade0}
Probably caused by : discache.sys ( discache!DispModifyObjectLru+144 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ca9c15, The address that the exception occurred at
Arg3: fffff88002fcb578, Exception Record Address
Arg4: fffff88002fcade0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiRemoveNode+205
fffff800`02ca9c15 49395808 cmp qword ptr [r8+8],rbx
EXCEPTION_RECORD: fffff88002fcb578 -- (.exr 0xfffff88002fcb578)
ExceptionAddress: fffff80002ca9c15 (nt!MiRemoveNode+0x0000000000000205)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88002fcade0 -- (.cxr 0xfffff88002fcade0)
rax=fffff8a004c69258 rbx=fffff8a00bd51770 rcx=fffff8a004c69258
rdx=fffff80002e465ff rsi=fffff8a00bd51770 rdi=fffff8a00bd51770
rip=fffff80002ca9c15 rsp=fffff88002fcb7b0 rbp=fffff80002e465c0
r8=005c00296b793030 r9=0000000000003be0 r10=0000000000003be0
r11=fffff88002fcb878 r12=0000000000000001 r13=fffffa80039d3040
r14=00000000ffffffff r15=fffff8a000001990
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!MiRemoveNode+0x205:
fffff800`02ca9c15 49395808 cmp qword ptr [r8+8],rbx ds:002b:005c0029`6b793038=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb00e0
ffffffffffffffff
FOLLOWUP_IP:
discache!DispModifyObjectLru+144
fffff880`03de6308 ba444c7275 mov edx,75724C44h
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002f0aa7b to fffff80002ca9c15
STACK_TEXT:
fffff880`02fcb7b0 fffff800`02f0aa7b : fffff8a0`0bd51790 fffffa80`039e4b60 00000000`00000000 fffff8a0`0bd51770 : nt!MiRemoveNode+0x205
fffff880`02fcb7e0 fffff800`02c7d8b4 : 00000000`00000000 fffffa80`039d3040 fffffa80`039eb660 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x324ad
fffff880`02fcb820 fffff800`02f8d264 : fffffa80`039d3040 00000000`00000000 fffffa80`039e4b60 00000000`00000000 : nt!ObfDereferenceObject+0xd4
fffff880`02fcb880 fffff800`02f8d164 : 00000000`00003be0 fffffa80`039d3040 fffff8a0`00001990 00000000`00003be0 : nt!ObpCloseHandleTableEntry+0xc4
fffff880`02fcb910 fffff800`02c77953 : fffffa80`039e4b60 fffff880`02fcb9e0 fffff8a0`0be60180 000f003f`00000000 : nt!ObpCloseHandle+0x94
fffff880`02fcb960 fffff800`02c73ef0 : fffff880`03de6308 fffff880`03deb2c0 00000000`0016d907 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`02fcbaf8 fffff880`03de6308 : fffff880`03deb2c0 00000000`0016d907 00000000`00000000 00000000`0016d907 : nt!KiServiceLinkage
fffff880`02fcbb00 fffff880`03de6663 : ffffffff`ffffffff ffffffff`ffffffff fffff800`02e1d500 00000000`00000000 : discache!DispModifyObjectLru+0x144
fffff880`02fcbc20 fffff880`03de66c7 : fffff880`03de66bc fffff800`02e1d5f8 fffffa80`039e4b60 00000000`00000000 : discache!DispFlushLru+0x19b
fffff880`02fcbc80 fffff800`02c85961 : fffff800`02e1d500 fffff800`02f73820 fffffa80`039e4b60 fffff800`02e1d5f8 : discache!DispLruWorkerRoutine+0xb
fffff880`02fcbcb0 fffff800`02f1bbc6 : 00000000`00000000 fffffa80`039e4b60 00000000`00000080 fffffa80`039d3040 : nt!ExpWorkerThread+0x111
fffff880`02fcbd40 fffff800`02c56bc6 : fffff880`02d63180 fffffa80`039e4b60 fffff880`02d6dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fcbd80 00000000`00000000 : fffff880`02fcc000 fffff880`02fc6000 fffff880`02fcb110 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: discache!DispModifyObjectLru+144
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: discache
IMAGE_NAME: discache.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc52e
STACK_COMMAND: .cxr 0xfffff88002fcade0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_discache!DispModifyObjectLru+144
BUCKET_ID: X64_0x7E_discache!DispModifyObjectLru+144
Followup: MachineOwner
---------