Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0340b000 PsLoadedModuleList = 0xfffff800`03648e50
Debug session time: Wed Dec 22 04:12:49.702 2010 (GMT-5)
System Uptime: 0 days 0:00:11.169
Loading Kernel Symbols
...............................................................
.........................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {293, 2, 0, fffff8000349b436}
Unable to load image \SystemRoot\system32\DRIVERS\HECIx64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for HECIx64.sys
*** ERROR: Module load completed but symbols could not be loaded for HECIx64.sys
Probably caused by : HECIx64.sys ( HECIx64+28f0 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000293, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000349b436, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036b30e0
0000000000000293
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`0349b436 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff880031a7f20 -- (.trap 0xfffff880031a7f20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880031a7f80 rbx=0000000000000000 rcx=0000000000000293
rdx=0000000000000293 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000349b436 rsp=fffff880031a80b0 rbp=fffff880031a8200
r8=fffff880031a81b8 r9=fffff880031a81b0 r10=0000000000000002
r11=fffff8000349a7d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!IopCompleteRequest+0xc73:
fffff800`0349b436 488b09 mov rcx,qword ptr [rcx] ds:0040:00000000`00000293=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000347aca9 to fffff8000347b740
STACK_TEXT:
fffff880`031a7dd8 fffff800`0347aca9 : 00000000`0000000a 00000000`00000293 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031a7de0 fffff800`03479920 : 00000000`00000000 fffff980`027e0ee0 00000000`00000000 fffff800`034a8668 : nt!KiBugCheckDispatch+0x69
fffff880`031a7f20 fffff800`0349b436 : 00000000`00000003 00000000`00000001 fffffa80`00000000 00000000`0000000a : nt!KiPageFault+0x260
fffff880`031a80b0 fffff800`034580c7 : 00000000`00000000 fffffa80`044a6b60 fffff8a0`001d9400 00000000`00000000 : nt!IopCompleteRequest+0xc73
fffff880`031a8180 fffff800`03458487 : fffff880`031a8430 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`031a8200 fffff800`0348ce5a : ffffffff`80000048 00000000`00000002 00000000`00000100 ffffffff`ffffffff : nt!KiApcInterrupt+0xd7
fffff880`031a8390 fffff800`03583132 : 00000000`00000863 fffff880`031a8400 00000000`00000963 00000000`00000001 : nt!KeReleaseInStackQueuedSpinLock+0x5a
fffff880`031a83c0 fffff800`034e3f22 : 00000000`00000018 fffff800`49434548 00000000`000000c0 00000000`00000000 : nt!MmAllocateSpecialPool+0x6a2
fffff880`031a84d0 fffff800`03916f48 : 00000000`49434548 00000000`00000080 fffff880`031a8640 fffff880`031a8668 : nt! ?? ::FNODOBFM::`string'+0x22172
fffff880`031a8560 fffff800`0391709d : 00000000`00000000 fffffa80`04463a20 00000000`49434548 fffff880`031a86f0 : nt!VeAllocatePoolWithTagPriority+0x1d8
fffff880`031a85d0 fffff880`10bdf8f0 : 00000000`00000000 fffffa80`04463a20 fffff880`031a86f0 00000000`00000004 : nt!VerifierExAllocatePoolWithTag+0x1d
fffff880`031a8610 00000000`00000000 : fffffa80`04463a20 fffff880`031a86f0 00000000`00000004 00000000`00000000 : HECIx64+0x28f0
STACK_COMMAND: kb
FOLLOWUP_IP:
HECIx64+28f0
fffff880`10bdf8f0 ?? ???
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: HECIx64+28f0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: HECIx64
IMAGE_NAME: HECIx64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ab293e8
FAILURE_BUCKET_ID: X64_0xA_VRF_HECIx64+28f0
BUCKET_ID: X64_0xA_VRF_HECIx64+28f0
Followup: MachineOwner
---------
Debug session time: Thu Dec 23 22:57:04.954 2010 (GMT-5)
System Uptime: 0 days 0:00:20.032
Loading Kernel Symbols
...............................................................
.......................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff800034e32b3}
Probably caused by : dxgkrnl.sys ( dxgkrnl!DpiQueryBusInterface+60 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800034e32b3, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036fb0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`034e32b3 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff880031c35e0 -- (.trap 0xfffff880031c35e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880031c3f80 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800034e32b3 rsp=fffff880031c3770 rbp=fffff880031c38c0
r8=fffff880031c3878 r9=fffff880031c3870 r10=0000000000000002
r11=fffff800034e27d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!IopCompleteRequest+0xae3:
fffff800`034e32b3 488b09 mov rcx,qword ptr [rcx] ds:2910:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800034c2ca9 to fffff800034c3740
STACK_TEXT:
fffff880`031c3498 fffff800`034c2ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031c34a0 fffff800`034c1920 : 00000000`00000000 fffff980`016a4ee0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031c35e0 fffff800`034e32b3 : fffff880`0ff19986 fffff880`031c3920 fffffa80`04006618 fffff880`031c3900 : nt!KiPageFault+0x260
fffff880`031c3770 fffff800`034a00c7 : 00000000`00000001 fffff800`00003cad 00000000`00000000 fffff800`00000000 : nt!IopCompleteRequest+0xae3
fffff880`031c3840 fffff800`034a0487 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`031c38c0 fffff800`03463e77 : 00000000`0002f790 00000000`00000000 fffff880`031c3b70 00000000`0050933a : nt!KiApcInterrupt+0xd7
fffff880`031c3a50 fffff800`03463967 : fffffa80`04006798 fffff880`00000011 fffff980`00000000 fffff800`00000004 : nt!RtlpWalkFrameChain+0x4ef
fffff880`031c40f0 fffff800`03586c2b : 00000000`00000003 fffffa80`04006798 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x73
fffff880`031c4120 fffff800`0395a0dc : fffffa80`04006780 00000000`00000160 00000000`00000080 fffff800`0394ddcc : nt!RtlCaptureStackBackTrace+0x4b
fffff880`031c4150 fffff800`0395c33a : fffff880`031bf000 fffff880`031c5000 00000000`00000080 00000000`00000160 : nt!IovpLogStackCallout+0x1c
fffff880`031c4180 fffff800`0395f026 : 00000000`00000000 00000000`00000028 fffff800`0372ffef fffff880`00fbaa11 : nt!ViPoolLogStackTrace+0x8a
fffff880`031c41b0 fffff800`0395f160 : fffffa80`05c1e850 fffff800`0372ffef 00000000`2b707249 fffffa80`039e5f18 : nt!VeAllocatePoolWithTagPriority+0x2b6
fffff880`031c4220 fffff800`039683a8 : 00000000`00000001 fffff800`0395a0dc fffffa80`039e5f00 fffff800`0372ffef : nt!ViIrpAllocate+0x40
fffff880`031c4260 fffff800`039684c3 : fffffa80`05c1e850 fffff800`0372ffef fffffa80`039e5f18 fffffa80`054a1a20 : nt!ViIrpAllocateLockedPacket+0x28
fffff880`031c42a0 fffff800`03968a92 : fffffa80`05c1e850 fffffa80`039e5f18 00000000`00000000 fffff800`03977640 : nt!VfIoAllocateIrp1+0x23
fffff880`031c42d0 fffff800`034b89c6 : fffffa80`05c1e850 fffff880`040478b0 00000000`00000058 34fc1458`00000000 : nt!IovAllocateIrp+0x52
fffff880`031c4320 fffff800`0372ffef : fffffa80`05c1e850 00000000`00807805 00000000`00000058 fffffa80`05c595d0 : nt!IoBuildAsynchronousFsdRequest+0x36
fffff880`031c4370 fffff880`040b92a0 : 00000000`00000000 00000000`00000000 01140009`00000000 00000000`00000000 : nt!IoBuildSynchronousFsdRequest+0x1f
fffff880`031c43b0 fffff880`040b0d90 : 00000000`00000503 00000000`00000000 fffffa80`05c595d0 ffffffff`00000014 : dxgkrnl!DpiQueryBusInterface+0x60
fffff880`031c4430 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DpiAddDevice+0x670
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgkrnl!DpiQueryBusInterface+60
fffff880`040b92a0 488bd0 mov rdx,rax
SYMBOL_STACK_INDEX: 12
SYMBOL_NAME: dxgkrnl!DpiQueryBusInterface+60
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ac5509e
FAILURE_BUCKET_ID: X64_0xA_VRF_dxgkrnl!DpiQueryBusInterface+60
BUCKET_ID: X64_0xA_VRF_dxgkrnl!DpiQueryBusInterface+60
Followup: MachineOwner
---------
Debug session time: Thu Dec 23 22:57:04.954 2010 (GMT-5)
System Uptime: 0 days 0:00:20.032
Loading Kernel Symbols
...............................................................
.......................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff800034e32b3}
Probably caused by : dxgkrnl.sys ( dxgkrnl!DpiQueryBusInterface+60 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800034e32b3, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036fb0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`034e32b3 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff880031c35e0 -- (.trap 0xfffff880031c35e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880031c3f80 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800034e32b3 rsp=fffff880031c3770 rbp=fffff880031c38c0
r8=fffff880031c3878 r9=fffff880031c3870 r10=0000000000000002
r11=fffff800034e27d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!IopCompleteRequest+0xae3:
fffff800`034e32b3 488b09 mov rcx,qword ptr [rcx] ds:2910:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800034c2ca9 to fffff800034c3740
STACK_TEXT:
fffff880`031c3498 fffff800`034c2ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031c34a0 fffff800`034c1920 : 00000000`00000000 fffff980`016a4ee0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031c35e0 fffff800`034e32b3 : fffff880`0ff19986 fffff880`031c3920 fffffa80`04006618 fffff880`031c3900 : nt!KiPageFault+0x260
fffff880`031c3770 fffff800`034a00c7 : 00000000`00000001 fffff800`00003cad 00000000`00000000 fffff800`00000000 : nt!IopCompleteRequest+0xae3
fffff880`031c3840 fffff800`034a0487 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`031c38c0 fffff800`03463e77 : 00000000`0002f790 00000000`00000000 fffff880`031c3b70 00000000`0050933a : nt!KiApcInterrupt+0xd7
fffff880`031c3a50 fffff800`03463967 : fffffa80`04006798 fffff880`00000011 fffff980`00000000 fffff800`00000004 : nt!RtlpWalkFrameChain+0x4ef
fffff880`031c40f0 fffff800`03586c2b : 00000000`00000003 fffffa80`04006798 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x73
fffff880`031c4120 fffff800`0395a0dc : fffffa80`04006780 00000000`00000160 00000000`00000080 fffff800`0394ddcc : nt!RtlCaptureStackBackTrace+0x4b
fffff880`031c4150 fffff800`0395c33a : fffff880`031bf000 fffff880`031c5000 00000000`00000080 00000000`00000160 : nt!IovpLogStackCallout+0x1c
fffff880`031c4180 fffff800`0395f026 : 00000000`00000000 00000000`00000028 fffff800`0372ffef fffff880`00fbaa11 : nt!ViPoolLogStackTrace+0x8a
fffff880`031c41b0 fffff800`0395f160 : fffffa80`05c1e850 fffff800`0372ffef 00000000`2b707249 fffffa80`039e5f18 : nt!VeAllocatePoolWithTagPriority+0x2b6
fffff880`031c4220 fffff800`039683a8 : 00000000`00000001 fffff800`0395a0dc fffffa80`039e5f00 fffff800`0372ffef : nt!ViIrpAllocate+0x40
fffff880`031c4260 fffff800`039684c3 : fffffa80`05c1e850 fffff800`0372ffef fffffa80`039e5f18 fffffa80`054a1a20 : nt!ViIrpAllocateLockedPacket+0x28
fffff880`031c42a0 fffff800`03968a92 : fffffa80`05c1e850 fffffa80`039e5f18 00000000`00000000 fffff800`03977640 : nt!VfIoAllocateIrp1+0x23
fffff880`031c42d0 fffff800`034b89c6 : fffffa80`05c1e850 fffff880`040478b0 00000000`00000058 34fc1458`00000000 : nt!IovAllocateIrp+0x52
fffff880`031c4320 fffff800`0372ffef : fffffa80`05c1e850 00000000`00807805 00000000`00000058 fffffa80`05c595d0 : nt!IoBuildAsynchronousFsdRequest+0x36
fffff880`031c4370 fffff880`040b92a0 : 00000000`00000000 00000000`00000000 01140009`00000000 00000000`00000000 : nt!IoBuildSynchronousFsdRequest+0x1f
fffff880`031c43b0 fffff880`040b0d90 : 00000000`00000503 00000000`00000000 fffffa80`05c595d0 ffffffff`00000014 : dxgkrnl!DpiQueryBusInterface+0x60
fffff880`031c4430 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DpiAddDevice+0x670
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgkrnl!DpiQueryBusInterface+60
fffff880`040b92a0 488bd0 mov rdx,rax
SYMBOL_STACK_INDEX: 12
SYMBOL_NAME: dxgkrnl!DpiQueryBusInterface+60
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ac5509e
FAILURE_BUCKET_ID: X64_0xA_VRF_dxgkrnl!DpiQueryBusInterface+60
BUCKET_ID: X64_0xA_VRF_dxgkrnl!DpiQueryBusInterface+60
Followup: MachineOwner
---------
Debug session time: Tue Dec 21 14:46:54.484 2010 (GMT-5)
System Uptime: 0 days 0:00:11.561
Loading Kernel Symbols
...............................................................
........................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff800034a7436}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+126d )
Followup: Pool_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800034a7436, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036bf0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`034a7436 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff880031a0040 -- (.trap 0xfffff880031a0040)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880031a0f80 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800034a7436 rsp=fffff880031a01d0 rbp=fffff880031a0320
r8=fffff880031a02d8 r9=fffff880031a02d0 r10=0000000000000002
r11=fffff800034a67d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!IopCompleteRequest+0xc73:
fffff800`034a7436 488b09 mov rcx,qword ptr [rcx] ds:0003:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003486ca9 to fffff80003487740
STACK_TEXT:
fffff880`0319fef8 fffff800`03486ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0319ff00 fffff800`03485920 : 00000000`0000004b fffff980`02926ee0 fffff880`00ec16e4 fffffa80`05630fb0 : nt!KiBugCheckDispatch+0x69
fffff880`031a0040 fffff800`034a7436 : 623b623a`62396238 623f623e`623d623c 00011808`40000005 00000000`00000001 : nt!KiPageFault+0x260
fffff880`031a01d0 fffff800`034640c7 : 00000000`00000000 fffff800`03427b16 00000000`0002f700 00000000`00000000 : nt!IopCompleteRequest+0xc73
fffff880`031a02a0 fffff800`03464487 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`031a0320 fffff800`034b5c5a : fffff800`036b4098 fffff800`036b4098 00000000`00000000 fffff880`00000001 : nt!KiApcInterrupt+0xd7
fffff880`031a04b0 fffff800`03427af1 : 00000000`00000000 00000000`00000000 fffffa80`03f91598 00000000`00000000 : nt!RtlpIsFrameInBoundsEx+0x26
fffff880`031a04f0 fffff800`03427967 : fffffa80`03f91598 fffff880`00000011 00000000`00000000 fffff800`00000004 : nt!RtlpWalkFrameChain+0x169
fffff880`031a0b90 fffff800`0354ac2b : 00000000`00000003 fffffa80`03f91598 00000000`00000000 00000000`00000000 : nt!RtlWalkFrameChain+0x73
fffff880`031a0bc0 fffff800`0391e0dc : fffffa80`03f91580 00000000`00000040 00000000`00000003 fffff800`0357e1d1 : nt!RtlCaptureStackBackTrace+0x4b
fffff880`031a0bf0 fffff800`0392033a : fffff880`0319c000 fffff880`031a2000 00d40204`100000d5 40000000`00002020 : nt!IovpLogStackCallout+0x1c
fffff880`031a0c20 fffff800`03922c9a : fffff8a0`005beeb0 00000000`00000004 00000000`00000001 00000000`00000003 : nt!ViPoolLogStackTrace+0x8a
fffff880`031a0c50 fffff800`035ba67c : fffff8a0`005beea0 00000000`00000040 00000000`00000003 00000000`00000001 : nt!VfFreePoolNotification+0x4a
fffff880`031a0c80 fffff800`03838d66 : fffff8a0`0057f340 00000000`00000000 fffffa80`0205ce90 00000000`000007ff : nt!ExDeferredFreePool+0x126d
fffff880`031a0d30 fffff800`037d0357 : fffff8a0`00000019 fffff880`031a0e70 fffff8a0`005bb800 fffff980`00000019 : nt!CmpCallCallBacks+0x4f6
fffff880`031a0e00 fffff800`0348c8b4 : 00000000`00000000 fffffa80`0448b130 fffffa80`044bd270 fffff8a0`005bb7d0 : nt! ?? ::NNGAKEGL::`string'+0x359b8
fffff880`031a0ed0 fffff800`0379d514 : fffffa80`0448b130 00000000`00000000 fffffa80`044a9040 00000000`00000000 : nt!ObfDereferenceObject+0xd4
fffff880`031a0f30 fffff800`0379d414 : 00000000`00000148 fffffa80`0448b130 fffff8a0`00001920 00000000`00000148 : nt!ObpCloseHandleTableEntry+0xc4
fffff880`031a0fc0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCloseHandle+0x94
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+126d
fffff800`035ba67c 90 nop
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: nt!ExDeferredFreePool+126d
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xA_VRF_nt!ExDeferredFreePool+126d
BUCKET_ID: X64_0xA_VRF_nt!ExDeferredFreePool+126d
Followup: Pool_corruption
---------
Debug session time: Thu Dec 23 16:25:28.686 2010 (GMT-5)
System Uptime: 0 days 0:00:11.764
Loading Kernel Symbols
...............................................................
.......................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {6, 2, 0, fffff800034a02b3}
Probably caused by : CI.dll ( CI!memcmp+93 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000006, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800034a02b3, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036b80e0
0000000000000006
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`034a02b3 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
IRP_ADDRESS: ffffffffffffff8e
TRAP_FRAME: fffff880031bc3d0 -- (.trap 0xfffff880031bc3d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=7cb1d27d1d7c7122 rbx=0000000000000000 rcx=fffff880031bc810
rdx=0000001ffd324110 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000c03aa3 rsp=fffff880031bc568 rbp=0000000000000188
r8=0000000000000014 r9=0000000000000002 r10=0000000000000001
r11=000000000000045c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
CI!memcmp+0x93:
fffff880`00c03aa3 483b040a cmp rax,qword ptr [rdx+rcx] ds:9068:fffff8a0`004e0920=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000347fca9 to fffff80003480740
STACK_TEXT:
fffff880`031bbca8 fffff800`0347fca9 : 00000000`0000000a 00000000`00000006 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031bbcb0 fffff800`0347e920 : 00000000`00000000 fffff980`02786ee0 fffffa80`044abb60 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031bbdf0 fffff800`034a02b3 : fffff980`02786ee0 fffff880`031bc0d0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`031bbf80 fffff800`0345d0c7 : 00000000`00000006 fffff8a0`004e0920 fffffa80`0355e100 fffff781`00000000 : nt!IopCompleteRequest+0xae3
fffff880`031bc050 fffff800`0345d487 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`031bc0d0 fffff800`03433b92 : 00000000`00000000 fffff800`0349bc44 00000000`00000000 00000000`00000000 : nt!KiApcInterrupt+0xd7
fffff880`031bc260 fffff800`0349bc44 : 00000000`00000000 00000000`00000000 fffff880`031bc2a0 fffff800`0360cb40 : nt!KiCheckForKernelApcDelivery+0x2
fffff880`031bc270 fffff800`0347e82e : 00000000`00000000 fffff8a0`004dea94 fffff880`031bc400 00001f80`00000000 : nt!MmAccessFault+0x1844
fffff880`031bc3d0 fffff880`00c03aa3 : fffff800`0346717b 00000000`00000000 00000000`00000000 000139dc`c0000012 : nt!KiPageFault+0x16e
fffff880`031bc568 fffff800`0346717b : 00000000`00000000 00000000`00000000 000139dc`c0000012 fffff880`031bc8f8 : CI!memcmp+0x93
fffff880`031bc570 fffff880`00c0d48c : 00000000`c0000428 fffff880`031bc8f8 00000000`00000001 00000000`00000000 : nt!bsearch+0xaf
fffff880`031bc5c0 fffff880`00c0b9cd : fffff880`031bc810 ffffffff`00000001 00000000`00000000 fffff880`00000000 : CI!I_FindFileOrHeaderHashInCatalogs+0x1b0
fffff880`031bc660 fffff880`00c0c381 : fffffa80`05b64970 fffff880`031bc810 00000000`00008004 00000000`00000000 : CI!CipFindFileHash+0xf9
fffff880`031bc730 fffff880`00c0afbb : 00000000`00000001 fffff880`031bc9f0 fffff880`031bc9f0 80000000`00000020 : CI!CipValidateFileHash+0x311
fffff880`031bc8a0 fffff800`036eb68e : 00000000`00000024 00000000`000fffff fffffa80`05b64970 00000000`00000000 : CI!CiValidateImageHeader+0x213
fffff880`031bc980 fffff800`036eb57c : 00000000`00000001 00000000`01000000 fffffa80`05b64410 00000000`00000000 : nt!SeValidateImageHeader+0x2e
fffff880`031bc9c0 fffff800`0377bd95 : fffffa80`05b64970 fffffa80`05b64410 00000000`00000001 00000000`00000024 : nt!MiValidateImageHeader+0xa4
fffff880`031bca80 fffff800`03771013 : fffff880`031bcce0 00000000`00000000 fffff880`031bcf98 00000000`00000000 : nt!MmCreateSection+0x8c9
fffff880`031bcc90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x162
STACK_COMMAND: kb
FOLLOWUP_IP:
CI!memcmp+93
fffff880`00c03aa3 483b040a cmp rax,qword ptr [rdx+rcx]
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: CI!memcmp+93
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: CI
IMAGE_NAME: CI.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5be01d
FAILURE_BUCKET_ID: X64_0xA_VRF_CI!memcmp+93
BUCKET_ID: X64_0xA_VRF_CI!memcmp+93
Followup: MachineOwner
---------
2: kd> lmtsmn
start end module name
fffff880`00f7e000 fffff880`00fd5000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c91000 fffff880`02d1b000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01122000 fffff880`0112d000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`010e4000 fffff880`010ed000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`010ed000 fffff880`01117000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01877000 fffff880`0187e000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03f80000 fffff880`03f91000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`01813000 fffff880`0183d000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01987000 fffff880`019b7000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d2f000 fffff880`00d8d000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`019b7000 fffff880`019c5000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03edf000 fffff880`03f62000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f62000 fffff880`03f80000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0121b000 fffff880`0122a000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01971000 fffff880`01987000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`019c5000 fffff880`019cf000 dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35)
fffff880`01800000 fffff880`01813000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`019cf000 fffff880`019ef000 dump_JRAID dump_JRAID.sys Wed Jan 27 03:58:17 2010 (4B600029)
fffff880`10ae9000 fffff880`10bdd000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`0fe00000 fffff880`0fe46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01179000 fffff880`0118d000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0112d000 fffff880`01179000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01211000 fffff880`0121b000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01937000 fffff880`01971000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0148b000 fffff880`014d5000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`039ec000 fffff800`03a35000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0192e000 fffff880`01937000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03fb7000 fffff880`03fcd000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00d8d000 fffff880`00dad000 jraid jraid.sys Wed Jan 27 03:58:17 2010 (4B600029)
fffff800`00bbc000 fffff800`00bc6000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`013d8000 fffff880`013f2000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00cd7000 fffff880`00d1b000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`010ca000 fffff880`010e4000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`0183d000 fffff880`0186e000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`01117000 fffff880`01122000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`019ef000 fffff880`019fa000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00fde000 fffff880`00fe8000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0118d000 fffff880`011eb000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02dea000 fffff880`02df5000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0191c000 fffff880`0192e000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014f9000 fffff880`015eb000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`02d8f000 fffff880`02d9e000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02d1b000 fffff880`02d60000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`015eb000 fffff880`015fc000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02c51000 fffff880`02c5d000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`03410000 fffff800`039ec000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`01235000 fffff880`013d8000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0186e000 fffff880`01877000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`10ae7000 fffff880`10ae8180 nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA)
fffff880`0fe55000 fffff880`10ae6e00 nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E)
fffff880`02d69000 fffff880`02d8f000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00e33000 fffff880`00e48000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00e00000 fffff880`00e33000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00eb9000 fffff880`00ec0000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00ddc000 fffff880`00dec000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00d1b000 fffff880`00d2f000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`02c00000 fffff880`02c51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`018c1000 fffff880`018ca000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`018ca000 fffff880`018d3000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`018d3000 fffff880`018dc000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018e2000 fffff880`0191c000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`00dad000 fffff880`00ddc000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`02d9e000 fffff880`02dbb000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`014e5000 fffff880`014ed000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01603000 fffff880`01800000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`02c84000 fffff880`02c91000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02c66000 fffff880`02c84000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02dd6000 fffff880`02dea000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`03f91000 fffff880`03fb7000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`00fe8000 fffff880`00ff5000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0187e000 fffff880`0188c000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0188c000 fffff880`018b1000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`014d5000 fffff880`014e5000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e48000 fffff880`00e5d000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e5d000 fffff880`00eb9000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01073000 fffff880`010bf000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02dbb000 fffff880`02dd6000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`018b1000 fffff880`018c1000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00ecb000 fffff880`00f6f000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f6f000 fffff880`00f7e000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d60000 fffff880`02d69000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`00fd5000 fffff880`00fde000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)