New
#11
Tried it, didn't work. Removing the driver did help a bit, though. Now they occur much less often, but they still continue to come. That means that there is still something causing them. Latest dumps included. I really hope the reason is found, I keep losing my work.
Code:MODULE_NAME: nt FAULTING_MODULE: fffff80003008000 nt DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aa44 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!NtSetInformationThread+e94 fffff800`03346034 80be380b000001 cmp byte ptr [rsi+0B38h],1 CONTEXT: fffff8800843c040 -- (.cxr 0xfffff8800843c040) rax=fffff8a01c144700 rbx=fffff8a01c144700 rcx=fffff8a01f01c6f8 rdx=0000000000000000 rsi=ffdff8a00b62a010 rdi=fffff8a01f01c6f8 rip=fffff80003346034 rsp=fffff8800843ca10 rbp=fffffa800a1de000 r8=0000000000000000 r9=00000000ffffffff r10=000000000000000e r11=0000000000000011 r12=fffff8a01c1446d0 r13=fffffa800a1de060 r14=0000000000000000 r15=fffff8a011319a80 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!NtSetInformationThread+0xe94: fffff800`03346034 80be380b000001 cmp byte ptr [rsi+0B38h],1 ds:002b:ffdff8a0`0b62ab48=?? Resetting default scope DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff8000307d754 to fffff80003346034 STACK_TEXT: fffff880`0843ca10 fffff800`0307d754 : 00000000`00000000 fffffa80`0a1de060 fffffa80`06d44510 fffff8a0`1c1446d0 : nt!NtSetInformationThread+0xe94 fffff880`0843cae0 fffff800`0338b394 : fffffa80`0a1de060 00000000`00000000 fffffa80`0be46950 00000000`00000000 : nt!ObfDereferenceObject+0xd4 fffff880`0843cb40 fffff800`0338b294 : 00000000`00000340 fffffa80`0a1de060 fffff8a0`11319a80 00000000`00000340 : nt!SeAssignSecurityEx+0x754 fffff880`0843cbd0 fffff800`03077813 : fffffa80`0be46950 fffff880`0843cca0 00000000`00000000 00000000`00000001 : nt!SeAssignSecurityEx+0x654 fffff880`0843cc20 00000000`7700f7aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeSynchronizeExecution+0x3a43 00000000`0261d1c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7700f7aa FOLLOWUP_IP: nt!NtSetInformationThread+e94 fffff800`03346034 80be380b000001 cmp byte ptr [rsi+0B38h],1 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!NtSetInformationThread+e94 FOLLOWUP_NAME: MachineOwner IMAGE_NAME: ntkrnlmp.exe STACK_COMMAND: .cxr 0xfffff8800843c040 ; kb BUCKET_ID: WRONG_SYMBOLS Followup: MachineOwner --------- 1: kd> lmvm nt start end module name fffff800`03008000 fffff800`035e4000 nt (export symbols) ntkrnlmp.exe Loaded symbol image file: ntkrnlmp.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Timestamp: Thu Jun 23 05:51:48 2011 (4E02AA44) CheckSum: 00542941 ImageSize: 005DC000 File version: 6.1.7600.16841 Product version: 6.1.7600.16841 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 6.1.7600.16841 FileVersion: 6.1.7600.16841 (win7_gdr.110622-1503) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved. 1: kd> .cxr 0xfffff8800843c040 rax=fffff8a01c144700 rbx=fffff8a01c144700 rcx=fffff8a01f01c6f8 rdx=0000000000000000 rsi=ffdff8a00b62a010 rdi=fffff8a01f01c6f8 rip=fffff80003346034 rsp=fffff8800843ca10 rbp=fffffa800a1de000 r8=0000000000000000 r9=00000000ffffffff r10=000000000000000e r11=0000000000000011 r12=fffff8a01c1446d0 r13=fffffa800a1de060 r14=0000000000000000 r15=fffff8a011319a80 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!NtSetInformationThread+0xe94: fffff800`03346034 80be380b000001 cmp byte ptr [rsi+0B38h],1 ds:002b:ffdff8a0`0b62ab48=??