Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032811-20202-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e17000 PsLoadedModuleList = 0xfffff800`0305ce90
Debug session time: Mon Mar 28 14:44:09.244 2011 (UTC - 4:00)
System Uptime: 0 days 0:10:03.212
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a02017f824, 0, fffff800031643de, 2}
Could not read faulting driver name
Probably caused by : ks.sys ( ks!ReadNodeNameValue+18f )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a02017f824, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800031643de, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c80e8
fffff8a02017f824
FAULTING_IP:
nt!CmpKcbCacheLookup+1de
fffff800`031643de 418b45f4 mov eax,dword ptr [r13-0Ch]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800b2376a0 -- (.trap 0xfffff8800b2376a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a000062000 rbx=0000000000000000 rcx=0000000000000b22
rdx=00000000053a01fb rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031643de rsp=fffff8800b237830 rbp=fffff8a000024010
r8=0000000000000007 r9=0000000000000000 r10=0000000000000008
r11=fffff8800b2379e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!CmpKcbCacheLookup+0x1de:
fffff800`031643de 418b45f4 mov eax,dword ptr [r13-0Ch] ds:ffff:ffffffff`fffffff4=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e41ca0 to fffff80002e97640
STACK_TEXT:
fffff880`0b237538 fffff800`02e41ca0 : 00000000`00000050 fffff8a0`2017f824 00000000`00000000 fffff880`0b2376a0 : nt!KeBugCheckEx
fffff880`0b237540 fffff800`02e9576e : 00000000`00000000 fffff8a0`2017f824 00000000`00dcff00 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x448c6
fffff880`0b2376a0 fffff800`031643de : fffff8a0`00010690 00000000`659a7ef2 fffff880`0b237db8 fffff800`03166aa9 : nt!KiPageFault+0x16e
fffff880`0b237830 fffff800`031650e5 : fffff880`0b2379e0 fffff880`00000004 fffff880`0b237dc8 fffff880`0b237dc0 : nt!CmpKcbCacheLookup+0x1de
fffff880`0b237920 fffff800`03161794 : fffff8a0`0001aca0 fffff880`0b237dc0 fffff880`0b237e10 fffff880`0b237df0 : nt!CmpBuildHashStackAndLookupCache+0x335
fffff880`0b237d00 fffff800`03191d38 : fffffa80`07e51708 fffff800`02e17000 fffffa80`07e51550 fffff880`00000000 : nt!CmpParseKey+0x294
fffff880`0b238000 fffff800`03192f56 : 00000000`00000000 fffffa80`07e51550 fffff8a0`000017e0 fffffa80`036c8420 : nt!ObpLookupObjectName+0x588
fffff880`0b2380f0 fffff800`0316682c : fffff880`0b238100 00000000`00000000 fffff8a0`00001700 fffff8a0`07d5ef00 : nt!ObOpenObjectByName+0x306
fffff880`0b2381c0 fffff800`03171922 : fffff880`0b238528 00000000`00020019 fffff880`0b238550 67727453`00000000 : nt!CmOpenKey+0x28a
fffff880`0b238310 fffff800`02e968d3 : fffff8a0`07d7e9b8 fffff8a0`08fa3170 00000000`00000027 fffff8a0`08fa3170 : nt!NtOpenKey+0x12
fffff880`0b238350 fffff800`02e92e70 : fffff880`078ac5eb fffffa80`03a79c60 fffffa80`0391c010 fffffa80`03a79c60 : nt!KiSystemServiceCopyEnd+0x13
fffff880`0b2384e8 fffff880`078ac5eb : fffffa80`03a79c60 fffffa80`0391c010 fffffa80`03a79c60 00000000`000007ff : nt!KiServiceLinkage
fffff880`0b2384f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ks!ReadNodeNameValue+0x18f
STACK_COMMAND: kb
FOLLOWUP_IP:
ks!ReadNodeNameValue+18f
fffff880`078ac5eb 413bc4 cmp eax,r12d
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: ks!ReadNodeNameValue+18f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ks
IMAGE_NAME: ks.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a3f3
FAILURE_BUCKET_ID: X64_0x50_ks!ReadNodeNameValue+18f
BUCKET_ID: X64_0x50_ks!ReadNodeNameValue+18f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032711-25147-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e05000 PsLoadedModuleList = 0xfffff800`0304ae90
Debug session time: Sat Mar 26 20:12:35.667 2011 (UTC - 4:00)
System Uptime: 0 days 0:05:11.620
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff880070ba970, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\Rt64win7.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt64win7.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt64win7.sys
Probably caused by : Rt64win7.sys ( Rt64win7+118d2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880070ba970, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
+3363613162636263
fffff880`070ba970 98 cwde
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b60e8
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff880070bb898 -- (.exr 0xfffff880070bb898)
ExceptionAddress: fffff80002e87810 (nt!RtlCopyMemoryNonTemporal+0x0000000000000110)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff880070bb940 -- (.trap 0xfffff880070bb940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000ac0 rbx=0000000000000000 rcx=fffff880079d8ac0
rdx=010001fffc018000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e87810 rsp=fffff880070bbad8 rbp=0000000000000002
r8=0000000000000001 r9=fffff880070bbb18 r10=fffffa80063db4f0
r11=fffff880070bbac0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!RtlCopyMemoryNonTemporal+0x110:
fffff800`02e87810 8a0411 mov al,byte ptr [rcx+rdx] ds:bc08:00fffa80`039f0ac0=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002f0d76b to fffff80002e85640
STACK_TEXT:
fffff880`070ba8b8 fffff800`02f0d76b : 00000000`0000001e ffffffff`c0000005 fffff880`070ba970 00000000`00000000 : nt!KeBugCheckEx
fffff880`070ba8c0 fffff800`02ed95bc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KipFatalFilter+0x1b
fffff880`070ba900 fffff800`02eb14ec : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x83d
fffff880`070ba940 fffff800`02eb0f6d : fffff800`02fc4d00 fffff880`070bd210 00000000`00000000 fffff800`02e05000 : nt!_C_specific_handler+0x8c
fffff880`070ba9b0 fffff800`02eafd45 : fffff800`02fc4d00 fffff880`070baa28 fffff880`070bb898 fffff800`02e05000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`070ba9e0 fffff800`02ec0dc1 : fffff880`070bb898 fffff880`070bb0f0 fffff880`00000000 00000000`00000005 : nt!RtlDispatchException+0x415
fffff880`070bb0c0 fffff800`02e84cc2 : fffff880`070bb898 00fffa80`039f0ac0 fffff880`070bb940 00000000`00000001 : nt!KiDispatchException+0x135
fffff880`070bb760 fffff800`02e835ca : fffffa80`07737f30 fffff880`0175a5e2 fffff880`070b0014 fffff880`070bbf40 : nt!KiExceptionDispatch+0xc2
fffff880`070bb940 fffff800`02e87810 : fffff800`033f1e08 00fffa80`039f0ac0 00000000`00000002 fffffa80`06ab2680 : nt!KiGeneralProtectionFault+0x10a
fffff880`070bbad8 fffff800`033f1e08 : 00fffa80`039f0ac0 00000000`00000002 fffffa80`06ab2680 fffff880`070bbbc0 : nt!RtlCopyMemoryNonTemporal+0x110
fffff880`070bbae0 fffff800`033f1593 : fffffa80`063db4f0 fffffa80`063db400 00000000`00000ac0 00000000`00000000 : hal!HalpDmaSyncMapBuffers+0x1b0
fffff880`070bbb90 fffff800`033f44fb : fffffa80`063f6868 fffffa80`063db4f0 fffffa80`06ab2680 fffffa80`06ba1d90 : hal!HalpDmaMapScatterTransfer+0xa3
fffff880`070bbbe0 fffff800`033f4472 : fffffa80`063f6868 fffffa80`063f6860 00000000`00000001 00000000`00000000 : hal!HalpMapTransfer+0x7b
fffff880`070bbc70 fffff800`033f394f : 00000000`00000000 fffff800`033f0fb9 00000000`00000000 00000000`0000000b : hal!IoMapTransfer+0x8e
fffff880`070bbcb0 fffff800`033f413d : fffffa80`06195050 fffffa80`063db4f0 00000000`00000001 fffff880`00000000 : hal!HalpAllocateAdapterCallback+0xc7
fffff880`070bbd50 fffff800`033f371f : fffffa80`063f6730 00000000`00000082 fffffa80`063db4f0 fffffa80`04319e30 : hal!HalAllocateAdapterChannel+0x101
fffff880`070bbd90 fffff880`016637c1 : fffffa80`04319d60 00000000`00000001 00000006`00000148 00000000`00000050 : hal!HalBuildScatterGatherList+0x2f3
fffff880`070bbe00 fffff880`0771d8d2 : fffffa80`061951a0 00000000`00000100 fffffa80`063b8570 00000000`00000001 : ndis!NdisMAllocateNetBufferSGList+0x181
fffff880`070bbea0 fffffa80`061951a0 : 00000000`00000100 fffffa80`063b8570 00000000`00000001 fffffa80`063f6730 : Rt64win7+0x118d2
fffff880`070bbea8 00000000`00000100 : fffffa80`063b8570 00000000`00000001 fffffa80`063f6730 00000000`00000358 : 0xfffffa80`061951a0
fffff880`070bbeb0 fffffa80`063b8570 : 00000000`00000001 fffffa80`063f6730 00000000`00000358 00000103`00000014 : 0x100
fffff880`070bbeb8 00000000`00000001 : fffffa80`063f6730 00000000`00000358 00000103`00000014 fffffa80`60000000 : 0xfffffa80`063b8570
fffff880`070bbec0 fffffa80`063f6730 : 00000000`00000358 00000103`00000014 fffffa80`60000000 fffffa80`04319d60 : 0x1
fffff880`070bbec8 00000000`00000358 : 00000103`00000014 fffffa80`60000000 fffffa80`04319d60 00000000`00000000 : 0xfffffa80`063f6730
fffff880`070bbed0 00000103`00000014 : fffffa80`60000000 fffffa80`04319d60 00000000`00000000 00000001`00000014 : 0x358
fffff880`070bbed8 fffffa80`60000000 : fffffa80`04319d60 00000000`00000000 00000001`00000014 fffffa80`00000002 : 0x103`00000014
fffff880`070bbee0 fffffa80`04319d60 : 00000000`00000000 00000001`00000014 fffffa80`00000002 00000000`00000004 : 0xfffffa80`60000000
fffff880`070bbee8 00000000`00000000 : 00000001`00000014 fffffa80`00000002 00000000`00000004 00000000`00000002 : 0xfffffa80`04319d60
STACK_COMMAND: kb
FOLLOWUP_IP:
Rt64win7+118d2
fffff880`0771d8d2 ?? ???
SYMBOL_STACK_INDEX: 12
SYMBOL_NAME: Rt64win7+118d2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Rt64win7
IMAGE_NAME: Rt64win7.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c21cf95
FAILURE_BUCKET_ID: X64_0x1E_c0000005_Rt64win7+118d2
BUCKET_ID: X64_0x1E_c0000005_Rt64win7+118d2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032811-19422-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e12000 PsLoadedModuleList = 0xfffff800`03057e90
Debug session time: Mon Mar 28 15:19:23.506 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:21.474
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002e886e8, fffff880085fe110, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiInsertQueue+a8 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002e886e8, Address of the instruction which caused the bugcheck
Arg3: fffff880085fe110, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiInsertQueue+a8
fffff800`02e886e8 49890f mov qword ptr [r15],rcx
CONTEXT: fffff880085fe110 -- (.cxr 0xfffff880085fe110)
rax=27fffa8006aad458 rbx=fffffa80079fa3b0 rcx=fffffa80079fa3b8
rdx=fffffa80079fac10 rsi=0000000000000000 rdi=fffffa8006b28880
rip=fffff80002e886e8 rsp=fffff880085feaf0 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffffa8003779900
r11=00000000000f00ff r12=fffff80003004e80 r13=fffffa80079fa3b8
r14=fffffa80079fc678 r15=27fffa8006aad458
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!KiInsertQueue+0xa8:
fffff800`02e886e8 49890f mov qword ptr [r15],rcx ds:002b:27fffa80`06aad458=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000317ae64 to fffff80002e886e8
STACK_TEXT:
fffff880`085feaf0 fffff800`0317ae64 : 00000000`00000000 fffffa80`079fac10 00000000`002a2c00 fffff880`00000000 : nt!KiInsertQueue+0xa8
fffff880`085feb70 fffff800`02e7ec42 : 00000000`00000000 00000000`00000001 fffffa80`06b28060 fffffa80`06b28060 : nt!IoSetIoCompletionEx+0x58
fffff880`085feba0 fffff800`02e918d3 : fffffa80`06b28880 fffffa80`06b28060 fffff880`085feca0 00000000`002a2c90 : nt!NtReleaseWorkerFactoryWorker+0x196
fffff880`085fec20 00000000`777426ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00d5f3f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777426ca
FOLLOWUP_IP:
nt!KiInsertQueue+a8
fffff800`02e886e8 49890f mov qword ptr [r15],rcx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiInsertQueue+a8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
STACK_COMMAND: .cxr 0xfffff880085fe110 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KiInsertQueue+a8
BUCKET_ID: X64_0x3B_nt!KiInsertQueue+a8
Followup: MachineOwner
---------
Loading Dump File [F:\DMP\032811-18673-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e0e000 PsLoadedModuleList = 0xfffff800`03053e90
Debug session time: Mon Mar 28 05:05:52.219 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:56.172
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
...
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff8800f4a2939, fffff8800355ba38, fffff8800355b290}
Probably caused by : hardware ( nvlddmkm+1c7939 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800f4a2939, The address that the exception occurred at
Arg3: fffff8800355ba38, Exception Record Address
Arg4: fffff8800355b290, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nvlddmkm+1c7939
fffff880`0f4a2939 a0000000488bdaf083 mov al,byte ptr [83F0DA8B48000000h]
EXCEPTION_RECORD: fffff8800355ba38 -- (.exr 0xfffff8800355ba38)
ExceptionAddress: fffff8800f4a2939 (nvlddmkm+0x00000000001c7939)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff8800355b290 -- (.cxr 0xfffff8800355b290)
rax=fffffa8007bd8aff rbx=fffffa8006199480 rcx=fffffa8006199480
rdx=fffffa80069fd510 rsi=fffffa8003707b60 rdi=fffffa8007bd8a50
rip=fffff8800f4a2939 rsp=fffff8800355bc70 rbp=fffff8000302b658
r8=fffffa8007bd8a50 r9=0000000000000000 r10=0000000000000001
r11=fffffa800369b108 r12=fffffa8007bd8a50 r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nvlddmkm+0x1c7939:
fffff880`0f4a2939 a0000000488bdaf083 mov al,byte ptr [83F0DA8B48000000h] ds:002b:83f0da8b`48000000=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030bf0e8
ffffffffffffffff
FOLLOWUP_IP:
nvlddmkm+1c7939
fffff880`0f4a2939 a0000000488bdaf083 mov al,byte ptr [83F0DA8B48000000h]
BUGCHECK_STR: 0x7E
MISALIGNED_IP:
nvlddmkm+1c7939
fffff880`0f4a2939 a0000000488bdaf083 mov al,byte ptr [83F0DA8B48000000h]
LAST_CONTROL_TRANSFER: from fffffa8007bd8a50 to fffff8800f4a2939
STACK_TEXT:
fffff880`0355bc70 fffffa80`07bd8a50 : fffff800`03184f4d fffffa80`06199480 00000000`00000001 fffffa80`07aa4e90 : nvlddmkm+0x1c7939
fffff880`0355bc78 fffff800`03184f4d : fffffa80`06199480 00000000`00000001 fffffa80`07aa4e90 fffffa80`03707b60 : 0xfffffa80`07bd8a50
fffff880`0355bc80 fffff800`02e98a21 : fffff800`0302b600 fffff800`03184f01 fffffa80`03707b00 fffffa80`03707b60 : nt!IopProcessWorkItem+0x3d
fffff880`0355bcb0 fffff800`0312bcce : 4f90cf14`1cd30cc6 fffffa80`03707b60 00000000`00000080 fffffa80`036cfb30 : nt!ExpWorkerThread+0x111
fffff880`0355bd40 fffff800`02e7ffe6 : fffff880`03367180 fffffa80`03707b60 fffff880`033720c0 7702ba85`e555c0b3 : nt!PspSystemThreadStartup+0x5a
fffff880`0355bd80 00000000`00000000 : fffff880`0355c000 fffff880`03556000 fffff880`0355b9e0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nvlddmkm+1c7939
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff8800355b290 ; kb
FAILURE_BUCKET_ID: X64_IP_MISALIGNED_nvlddmkm.sys
BUCKET_ID: X64_IP_MISALIGNED_nvlddmkm.sys
Followup: MachineOwner
---------