New
#41
All dumps don't have a meaning for happening.
Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {d0, 2, 1, fffff8000305e766} Probably caused by : ntkrnlmp.exe ( nt!KeInsertQueueApc+42 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000000000d0, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8000305e766, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032af100 GetUlongFromAddress: unable to read from fffff800032af1c0 00000000000000d0 Nonpaged pool CURRENT_IRQL: 2 FAULTING_IP: nt!KeInsertQueueApc+42 fffff800`0305e766 f0480fbaab8800000000 lock bts qword ptr [rbx+88h],0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: svchost.exe TRAP_FRAME: fffff880075e2790 -- (.trap 0xfffff880075e2790) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8005d8d0e0 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000305e766 rsp=fffff880075e2920 rbp=0000000000000000 r8=0000000000000000 r9=0000000000000000 r10=fffff88002f64c40 r11=fffff880075e2930 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nt!KeInsertQueueApc+0x42: fffff800`0305e766 f0480fbaab8800000000 lock bts qword ptr [rbx+88h],0 ds:00000000`00000088=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8000307d2e9 to fffff8000307dd40 STACK_TEXT: fffff880`075e2648 fffff800`0307d2e9 : 00000000`0000000a 00000000`000000d0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`075e2650 fffff800`0307bf60 : 0000007f`fffffff8 00000000`00000040 fffff880`075e2830 00000000`00000048 : nt!KiBugCheckDispatch+0x69 fffff880`075e2790 fffff800`0305e766 : 00000000`00000000 00000000`00000058 ffffffff`80001408 00000000`00021000 : nt!KiPageFault+0x260 fffff880`075e2920 fffffa80`04f36df3 : fffffa80`0467c440 fffff880`075e2a80 00000000`00000058 fffffa80`0467c49c : nt!KeInsertQueueApc+0x42 fffff880`075e2980 fffffa80`0467c440 : fffff880`075e2a80 00000000`00000058 fffffa80`0467c49c 00000000`00000000 : 0xfffffa80`04f36df3 fffff880`075e2988 fffff880`075e2a80 : 00000000`00000058 fffffa80`0467c49c 00000000`00000000 00000000`00020128 : 0xfffffa80`0467c440 fffff880`075e2990 00000000`00000058 : fffffa80`0467c49c 00000000`00000000 00000000`00020128 fffff880`00000001 : 0xfffff880`075e2a80 fffff880`075e2998 fffffa80`0467c49c : 00000000`00000000 00000000`00020128 fffff880`00000001 00000000`00020000 : 0x58 fffff880`075e29a0 00000000`00000000 : 00000000`00020128 fffff880`00000001 00000000`00020000 00000000`00100000 : 0xfffffa80`0467c49c STACK_COMMAND: kb FOLLOWUP_IP: nt!KeInsertQueueApc+42 fffff800`0305e766 f0480fbaab8800000000 lock bts qword ptr [rbx+88h],0 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!KeInsertQueueApc+42 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4ec79dd2 FAILURE_BUCKET_ID: X64_0xA_nt!KeInsertQueueApc+42 BUCKET_ID: X64_0xA_nt!KeInsertQueueApc+42 Followup: MachineOwner ---------