Code:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0224e000 PsLoadedModuleList = 0xfffff800`0248be50
Debug session time: Fri Dec 24 08:27:12.293 2010 (GMT-5)
System Uptime: 0 days 0:01:01.793
Loading Kernel Symbols
...............................................................
.............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {8, 2, 0, fffff8000229ad29}
Probably caused by : ataport.SYS ( ataport!IdeCompleteScsiIrp+62 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000229ad29, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800024f60e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+1e9
fffff800`0229ad29 488b5108 mov rdx,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff88001cfd880 -- (.trap 0xfffff88001cfd880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8005ae4658 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000229ad29 rsp=fffff88001cfda10 rbp=fffff88001cce180
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`0229ad29 488b5108 mov rdx,qword ptr [rcx+8] ds:6650:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800022bdca9 to fffff800022be740
STACK_TEXT:
fffff880`01cfd738 fffff800`022bdca9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`01cfd740 fffff800`022bc920 : fffffa80`00000002 fffffa80`05b26a90 fffffa80`048c1b80 fffff880`00e0be92 : nt!KiBugCheckDispatch+0x69
fffff880`01cfd880 fffff800`0229ad29 : fffffa80`048c1c50 00000000`00000200 00000000`00000000 fffff800`023720e4 : nt!KiPageFault+0x260
fffff880`01cfda10 fffff800`0229dfec : fffffa80`05b26a90 00000000`00000002 00000000`00000000 fffffa80`05ae4658 : nt!KiInsertQueueApc+0x1e9
fffff880`01cfda40 fffff800`022c155b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff880`01cfdaa0 fffff880`00e0941a : 00000000`00000200 00000000`00000001 fffffa80`039d9b80 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff880`01cfdb80 fffff880`00e09242 : fffffa80`039d9b80 fffff880`00e0bb3b fffffa80`048c1b80 fffffa80`049731b0 : ataport!IdeCompleteScsiIrp+0x62
fffff880`01cfdbb0 fffff880`00e03e32 : 00000000`00000000 00000000`00000000 fffffa80`0496b500 fffffa80`049731b0 : ataport!IdeCommonCrbCompletion+0x5a
fffff880`01cfdbe0 fffff880`00e0c7ed : fffffa80`0496a1a0 fffffa80`039d9b80 00000000`00000000 fffffa80`039d9b80 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`01cfdd10 fffff880`00e0c0ec : fffffa80`0496a1a0 00000000`00000000 fffffa80`0496a1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`01cfde40 fffff800`022c9bfc : fffff880`01cce180 fffffa80`04ee3d20 fffffa80`0496a050 fffffa80`0496a118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`01cfdf00 fffff800`022c4865 : d88b4c10`ff018b48 fffffa80`04d01060 00000000`00000000 fffff880`00e0bf44 : nt!KiRetireDpcList+0x1bc
fffff880`01cfdfb0 fffff800`022c467c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`07e06be0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!IdeCompleteScsiIrp+62
fffff880`00e0941a 8bc3 mov eax,ebx
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ataport!IdeCompleteScsiIrp+62
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118
FAILURE_BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
BUCKET_ID: X64_0xA_ataport!IdeCompleteScsiIrp+62
Followup: MachineOwner
---------
Debug session time: Fri Dec 24 09:39:51.509 2010 (GMT-5)
System Uptime: 0 days 0:00:34.366
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002ff90f3, 0, 70}
Probably caused by : ntkrnlmp.exe ( nt!ExFreePoolWithTag+43 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002ff90f3, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000070, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExFreePoolWithTag+43
fffff800`02ff90f3 418b45f0 mov eax,dword ptr [r13-10h]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000070
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030fc0e0
0000000000000070
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: conhost.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff880064793d8 -- (.exr 0xfffff880064793d8)
ExceptionAddress: fffff80002ff90f3 (nt!ExFreePoolWithTag+0x0000000000000043)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000070
Attempt to read from address 0000000000000070
TRAP_FRAME: fffff88006479480 -- (.trap 0xfffff88006479480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000080
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ff90f3 rsp=fffff88006479610 rbp=0000000000000001
r8=00000000000078f0 r9=0000000000000400 r10=fffff80002e54000
r11=0000000000000306 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!ExFreePoolWithTag+0x43:
fffff800`02ff90f3 418b45f0 mov eax,dword ptr [r13-10h] ds:ffffffff`fffffff0=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002efea39 to fffff80002ec4740
STACK_TEXT:
fffff880`06478c08 fffff800`02efea39 : 00000000`0000001e ffffffff`c0000005 fffff800`02ff90f3 00000000`00000000 : nt!KeBugCheckEx
fffff880`06478c10 fffff800`02ec3d82 : fffff880`064793d8 fffffa80`00000200 fffff880`06479480 fffffa80`03a26c90 : nt!KiDispatchException+0x1b9
fffff880`064792a0 fffff800`02ec28fa : 00000000`00000000 fffffa80`00000200 00000000`00000000 fffff880`06479501 : nt!KiExceptionDispatch+0xc2
fffff880`06479480 fffff800`02ff90f3 : fffff8a0`0176f000 fffff8a0`0176f010 fffffa80`04ab0000 fffffa80`039a5010 : nt!KiPageFault+0x23a
fffff880`06479610 fffff800`031da7d8 : fffffa80`04568a90 00000000`00000001 fffffa80`20707249 fffffa80`04568a90 : nt!ExFreePoolWithTag+0x43
fffff880`064796c0 fffff800`02ec0000 : 00000000`00000001 fffff8a0`0176f010 fffffa80`03a26c90 00000000`0000017e : nt!IopDeleteFile+0x168
fffff880`06479750 fffff800`0318113e : 00000000`00580003 fffffa80`05b087e8 fffffa80`05b087e8 fffffa80`05b087f8 : nt!KiChainedDispatch+0x10
fffffa80`05b087e0 fffffa80`05b2a898 : 00000000`00000000 00000000`00040001 00000000`0000000f 00000000`00000000 : nt!ObKillProcess+0x62
fffffa80`05b08820 00000000`00000000 : 00000000`00040001 00000000`0000000f 00000000`00000000 00000000`00000000 : 0xfffffa80`05b2a898
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExFreePoolWithTag+43
fffff800`02ff90f3 418b45f0 mov eax,dword ptr [r13-10h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!ExFreePoolWithTag+43
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_nt!ExFreePoolWithTag+43
BUCKET_ID: X64_0x1E_nt!ExFreePoolWithTag+43
Followup: MachineOwner
---------
Debug session time: Fri Dec 24 09:19:29.348 2010 (GMT-5)
System Uptime: 0 days 0:00:37.816
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {1, 2, 0, fffff80002e9f2b3}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002e9f2b3, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b70e0
0000000000000001
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02e9f2b3 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: conhost.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff88006a744f0 -- (.trap 0xfffff88006a744f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88006a74728 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e9f2b3 rsp=fffff88006a74680 rbp=0000000000000000
r8=fffffa8005c14270 r9=fffff88006a74780 r10=0000000000000002
r11=fffffa8005ca9a10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!IopCompleteRequest+0xae3:
fffff800`02e9f2b3 488b09 mov rcx,qword ptr [rcx] ds:41a0:00000000`00000001=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e7eca9 to fffff80002e7f740
STACK_TEXT:
fffff880`06a743a8 fffff800`02e7eca9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06a743b0 fffff800`02e7d920 : fffffa80`049a5500 fffffa80`03a46d60 fffffa80`0635c010 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`06a744f0 fffff800`02e9f2b3 : fffffa80`06355b60 fffff800`02e855da fffff880`00000000 fffffa80`00000001 : nt!KiPageFault+0x260
fffff880`06a74680 fffff800`02e5c0c7 : 00000000`00000001 00000000`00000000 fffff880`06a74a00 00000000`00000000 : nt!IopCompleteRequest+0xae3
fffff880`06a74750 fffff800`02e86b9d : fffffa80`06355b60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`06a747d0 fffff800`02e88cff : fffff800`0313d74c 00000000`00000000 00000000`00000000 fffffa80`04a36805 : nt!KiCommitThreadWait+0x3dd
fffff880`06a74860 fffff800`03164726 : 00000000`00000000 00000000`00000000 fffff800`0302e600 00000000`00000000 : nt!KeWaitForSingleObject+0x19f
fffff880`06a74900 fffff800`0313d635 : 00000000`00000000 fffffa80`06355b01 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x286
fffff880`06a749c0 fffff800`02e5c1db : 00000000`00000000 00000000`00000000 fffffa80`05c05720 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`06a749f0 fffff800`02e5c620 : 00000000`000b1f20 fffff880`06a74a70 fffff800`0313d74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`06a74a70 fffff800`02e7ea37 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff880`06a74bb0 00000000`776ffdba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`00edee08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776ffdba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02e7d920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
Debug session time: Fri Dec 24 08:42:24.626 2010 (GMT-5)
System Uptime: 0 days 0:00:39.483
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80002ee82b3}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002ee82b3, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031000e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`02ee82b3 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff88006ad0240 -- (.trap 0xfffff88006ad0240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880067dd778 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ee82b3 rsp=fffff88006ad03d0 rbp=fffff88006ad0520
r8=fffffa8005c3b010 r9=fffff88006ad04d0 r10=0000000000000002
r11=fffffa8005b9f830 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!IopCompleteRequest+0xae3:
fffff800`02ee82b3 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ec7ca9 to fffff80002ec8740
STACK_TEXT:
fffff880`06ad00f8 fffff800`02ec7ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06ad0100 fffff800`02ec6920 : 00000000`00000000 fffffa80`0626ba70 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`06ad0240 fffff800`02ee82b3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`06ad03d0 fffff800`02ea50c7 : 00000000`00000001 00000000`00000090 00000000`00000000 fffff800`00000000 : nt!IopCompleteRequest+0xae3
fffff880`06ad04a0 fffff800`02ea5487 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`06ad0520 fffff880`012e8ccb : fffff880`012e7075 fffff8a0`003bcc70 fffffa80`039fc300 fffff8a0`003bcb49 : nt!KiApcInterrupt+0xd7
fffff880`06ad06b8 fffff880`012e7075 : fffff8a0`003bcc70 fffffa80`039fc300 fffff8a0`003bcb49 fffff8a0`0000000e : Ntfs!NtfsCheckIndexHeader+0x6b
fffff880`06ad06c0 fffff880`012cba4d : fffff8a0`0173ddc0 00000000`00000060 fffff8a0`018bbf40 fffff8a0`003bcbc0 : Ntfs!FindFirstIndexEntry+0x24a
fffff880`06ad0750 fffff880`012c8dfe : fffffa80`060755c0 fffff8a0`018bbf40 fffff8a0`003bcbc0 fffffa80`060755c0 : Ntfs!NtfsRestartIndexEnumeration+0xed
fffff880`06ad0970 fffff880`012ca421 : fffffa80`063e2240 00000000`00000062 00000000`00000000 fffffa80`063f5810 : Ntfs!NtfsQueryDirectory+0x94e
fffff880`06ad0d10 fffff880`012cc78f : fffffa80`060755c0 00000000`00000000 00000000`00000001 00000000`00000000 : Ntfs!NtfsCommonDirectoryControl+0xa1
fffff880`06ad0d50 fffff880`010e96af : fffffa80`04aa82c0 fffffa80`063f5810 fffffa80`060755c0 fffff880`06ad0d78 : Ntfs!NtfsFsdDirectoryControl+0x10f
fffff880`06ad0dc0 fffff800`031e5cad : fffffa80`063f5810 fffff880`06ad0ff0 fffff880`06ad1128 fffff880`06ad0f18 : fltmgr!FltpDispatch+0x9f
fffff880`06ad0e20 fffff800`02ec7993 : fffffa80`063e4060 fffff880`06ad0ff0 fffff880`06ad1128 fffff880`06ad0f18 : nt!NtQueryDirectoryFile+0x1ad
fffff880`06ad0f00 fffff800`02ec3f30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`06ad1108 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02ec6920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------
1: kd> lmtsmn
start end module name
fffff880`00e7f000 fffff880`00ed6000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02c10000 fffff880`02c9a000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0483b000 fffff880`04851000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`019df000 fffff880`019f4000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00e2a000 fffff880`00e35000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03e2a000 fffff880`03e32000 ASACPI ASACPI.sys Mon Oct 30 22:09:12 2006 (4546B048)
fffff880`00fe0000 fffff880`00fe9000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e2a000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`0188b000 fffff880`01893000 AtiPcie AtiPcie.sys Mon Nov 06 11:59:54 2006 (454F6A0A)
fffff960`008b0000 fffff960`00911000 ATMFD ATMFD.DLL Thu May 27 00:11:31 2010 (4BFDF0F3)
fffff880`018fc000 fffff880`01903000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`019a8000 fffff880`019b9000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`055a6000 fffff880`055c4000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00780000 fffff960`007a7000 cdd cdd.dll unavailable (00000000)
fffff880`018c9000 fffff880`018f3000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0185b000 fffff880`0188b000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ce6000 fffff880`00d44000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`053e8000 fffff880`053f8000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`041ca000 fffff880`041d8000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`061cd000 fffff880`061df000 dc3d dc3d.sys Thu Jul 01 06:07:45 2010 (4C2C68F1)
fffff880`02de0000 fffff880`02dfe000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02dd1000 fffff880`02de0000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0120a000 fffff880`01220000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04800000 fffff880`0482c000 dne64x dne64x.sys Mon Nov 10 20:01:24 2008 (4918D964)
fffff880`0617c000 fffff880`0619e000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`061f6000 fffff880`061ff000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`041d8000 fffff880`041e4000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`041e4000 fffff880`041f7000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`061a4000 fffff880`061b0000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03e4f000 fffff880`03f43000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03f43000 fffff880`03f89000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`03e00000 fffff880`03e0d000 fdc fdc.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`01134000 fffff880`01148000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`010e8000 fffff880`01134000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01200000 fffff880`0120a000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`00e35000 fffff880`00e6f000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02e0f000 fffff800`02e58000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03fd5000 fffff880`03ff9000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`06000000 fffff880`06019000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`061df000 fffff880`061e7080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`061e8000 fffff880`061f6000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`054de000 fffff880`055a6000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0148f000 fffff880`01498000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`040d8000 fffff880`040e7000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`041bc000 fffff880`041ca000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bc3000 fffff800`00bc6000 kdcom kdcom.dll Tue Nov 30 09:40:39 2010 (4CF50CE7)
fffff880`040f8000 fffff880`0413b000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013ce000 fffff880`013e8000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0619e000 fffff880`061a3200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0544b000 fffff880`05460000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`01893000 fffff880`018b6000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cc5000 fffff880`00cd2000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`0482c000 fffff880`0483b000 modem modem.sys Mon Jul 13 20:10:48 2009 (4A5BCD08)
fffff880`02c00000 fffff880`02c0e000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`040e7000 fffff880`040f6000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`04071000 fffff880`0407e000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00fc6000 fffff880`00fe0000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`055c4000 fffff880`055dc000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`0688f000 fffff880`068bc000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`068bc000 fffff880`0690a000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0690a000 fffff880`0692d000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`01961000 fffff880`0196c000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00edf000 fffff880`00ee9000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01154000 fffff880`011b2000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02dc6000 fffff880`02dd1000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0147d000 fffff880`0148f000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0149d000 fffff880`0158f000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`04851000 fffff880`0485d000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`054b3000 fffff880`054c6000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`01824000 fffff880`01853000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`041a7000 fffff880`041bc000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d0e000 fffff880`02d1d000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c9a000 fffff880`02cdf000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`0158f000 fffff880`015ef000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`05380000 fffff880`053e8000 netr6164 netr6164.sys Wed Jun 10 02:38:31 2009 (4A2F54E7)
fffff880`0196c000 fffff880`0197d000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02dba000 fffff880`02dc6000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02e58000 fffff800`03434000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0122b000 fffff880`013ce000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`06019000 fffff880`06025000 NuidFltr NuidFltr.sys Tue Jun 29 04:54:32 2010 (4C29B4C8)
fffff880`018f3000 fffff880`018fc000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`05328000 fffff880`05329180 nvBridge nvBridge.kmd Sun Sep 27 19:46:14 2009 (4ABFF946)
fffff880`04864000 fffff880`05327a80 nvlddmkm nvlddmkm.sys Sun Sep 27 20:12:06 2009 (4ABFFF56)
fffff880`05460000 fffff880`054b3000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02ce8000 fffff880`02d0e000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`03e0d000 fffff880`03e2a000 parport parport.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00f29000 fffff880`00f3e000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00ee9000 fffff880`00f1c000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00faf000 fffff880`00fb6000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fb6000 fffff880`00fc6000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013e8000 fffff880`013f9000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0407e000 fffff880`0408e000 point64 point64.sys Tue Jun 29 04:54:31 2010 (4C29B4C7)
fffff880`0613f000 fffff880`0617c000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cd2000 fffff880`00ce6000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`01148000 fffff880`01153380 PxHlpa64 PxHlpa64.sys Fri Feb 02 16:24:22 2007 (45C3AC06)
fffff880`01800000 fffff880`01824000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`010bf000 fffff880`010da000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`04095000 fffff880`040b6000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`040b6000 fffff880`040d0000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d69000 fffff880`02dba000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`01946000 fffff880`0194f000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0194f000 fffff880`01958000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01958000 fffff880`01961000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`011b2000 fffff880`011ec000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`040d0000 fffff880`040d7c00 RimSerial_AMD64 RimSerial_AMD64.sys Mon Nov 24 12:01:01 2008 (492ADDCD)
fffff880`03e47000 fffff880`03e4f000 RootMdm RootMdm.sys Mon Jul 13 20:10:47 2009 (4A5BCD07)
fffff880`054c6000 fffff880`054de000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03f89000 fffff880`03fb9000 Rtlh64 Rtlh64.sys Fri Oct 03 13:17:29 2008 (48E653A9)
fffff880`03e32000 fffff880`03e3e000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02d1d000 fffff880`02d3a000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01475000 fffff880`0147d000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`040f6000 fffff880`040f7480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`0199b000 fffff880`019a8000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0197d000 fffff880`0199b000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d55000 fffff880`02d69000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004b0000 fffff960`004ba000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019b9000 fffff880`019df000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`04000000 fffff880`04054000 udfs udfs.sys Mon Jul 13 19:23:37 2009 (4A5BC1F9)
fffff880`0413b000 fffff880`0414d000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04054000 fffff880`04071000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`061cb000 fffff880`061ccf00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03fc4000 fffff880`03fd5000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0414d000 fffff880`041a7000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03fb9000 fffff880`03fc4000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`0532a000 fffff880`05380000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`061b0000 fffff880`061cb000 USBSTOR USBSTOR.SYS Mon Jul 13 20:06:34 2009 (4A5BCC0A)
fffff880`00f1c000 fffff880`00f29000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01903000 fffff880`01911000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`06026000 fffff880`0613f000 viahduaa viahduaa.sys Sun Feb 15 21:27:48 2009 (4998CF24)
fffff880`01911000 fffff880`01936000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`00f3e000 fffff880`00f53000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f53000 fffff880`00faf000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01073000 fffff880`010bf000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d3a000 fffff880`02d55000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01936000 fffff880`01946000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00d44000 fffff880`00de8000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00de8000 fffff880`00df7000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02cdf000 fffff880`02ce8000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003ef000 win32k win32k.sys Tue Aug 31 22:58:04 2010 (4C7DC13C)
fffff880`03e3e000 fffff880`03e47000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00ed6000 fffff880`00edf000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`0542a000 fffff880`0544b000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)
Unloaded modules:
fffff880`01893000 fffff880`018a1000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018a1000 fffff880`018ad000 dump_ataport
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018ad000 fffff880`018b6000 dump_atapi.s
Timestamp: unavailable (00000000)
Checksum: 00000000
fffff880`018b6000 fffff880`018c9000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000