Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032711-23493-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c0a000 PsLoadedModuleList = 0xfffff800`02e47e50
Debug session time: Sun Mar 27 15:34:54.497 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:50.074
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 44, {fffffa80070a2010, eae, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\Svk2pl64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Svk2pl64.sys
*** ERROR: Module load completed but symbols could not be loaded for Svk2pl64.sys
Probably caused by : Svk2pl64.sys ( Svk2pl64+7d61 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MULTIPLE_IRP_COMPLETE_REQUESTS (44)
A driver has requested that an IRP be completed (IoCompleteRequest()), but
the packet has already been completed. This is a tough bug to find because
the easiest case, a driver actually attempted to complete its own packet
twice, is generally not what happened. Rather, two separate drivers each
believe that they own the packet, and each attempts to complete it. The
first actually works, and the second fails. Tracking down which drivers
in the system actually did this is difficult, generally because the trails
of the first driver have been covered by the second. However, the driver
stack for the current request can be found by examining the DeviceObject
fields in each of the stack locations.
Arguments:
Arg1: fffffa80070a2010, Address of the IRP
Arg2: 0000000000000eae
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
IRP_ADDRESS: fffffa80070a2010
FOLLOWUP_IP:
Svk2pl64+7d61
fffff880`079ced61 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x44
PROCESS_NAME: System
CURRENT_IRQL: 2
DEVICE_OBJECT: fffffa800a5d4e20
LAST_CONTROL_TRANSFER: from fffff80002c64365 to fffff80002c7a740
STACK_TEXT:
fffff800`00b9c218 fffff800`02c64365 : 00000000`00000044 fffffa80`070a2010 00000000`00000eae 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c220 fffff880`00ef0a52 : 00000000`00000000 fffffa80`0a5bf740 00000000`00000001 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3ec7e
fffff800`00b9c300 fffff880`00ee113e : fffffa80`070a2010 fffff800`00000001 00000000`00000002 fffffa80`070a2010 : Wdf01000!FxRequest::CompleteInternal+0x646
fffff800`00b9c3b0 fffff880`079ced61 : fffffa80`086b8a40 fffffa80`0a5c0d20 fffffa80`086b8a40 0000057f`f5a3f2d8 : Wdf01000!imp_WdfRequestCompleteWithInformation+0x1aa
fffff800`00b9c420 fffffa80`086b8a40 : fffffa80`0a5c0d20 fffffa80`086b8a40 0000057f`f5a3f2d8 fffffa80`086b89d0 : Svk2pl64+0x7d61
fffff800`00b9c428 fffffa80`0a5c0d20 : fffffa80`086b8a40 0000057f`f5a3f2d8 fffffa80`086b89d0 fffff880`079cee51 : 0xfffffa80`086b8a40
fffff800`00b9c430 fffffa80`086b8a40 : 0000057f`f5a3f2d8 fffffa80`086b89d0 fffff880`079cee51 fffffa80`0a5c0eb0 : 0xfffffa80`0a5c0d20
fffff800`00b9c438 0000057f`f5a3f2d8 : fffffa80`086b89d0 fffff880`079cee51 fffffa80`0a5c0eb0 00000000`00000000 : 0xfffffa80`086b8a40
fffff800`00b9c440 fffffa80`086b89d0 : fffff880`079cee51 fffffa80`0a5c0eb0 00000000`00000000 fffffa80`086b8a40 : 0x57f`f5a3f2d8
fffff800`00b9c448 fffff880`079cee51 : fffffa80`0a5c0eb0 00000000`00000000 fffffa80`086b8a40 fffff800`02df4e80 : 0xfffffa80`086b89d0
fffff800`00b9c450 fffffa80`0a5c0eb0 : 00000000`00000000 fffffa80`086b8a40 fffff800`02df4e80 fffffa80`086b89d0 : Svk2pl64+0x7e51
fffff800`00b9c458 00000000`00000000 : fffffa80`086b8a40 fffff800`02df4e80 fffffa80`086b89d0 00000000`00000000 : 0xfffffa80`0a5c0eb0
STACK_COMMAND: kb
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: Svk2pl64+7d61
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Svk2pl64
IMAGE_NAME: Svk2pl64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bb4512d
FAILURE_BUCKET_ID: X64_0x44_Svk2pl64+7d61
BUCKET_ID: X64_0x44_Svk2pl64+7d61
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032711-184533-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c02000 PsLoadedModuleList = 0xfffff800`02e3fe50
Debug session time: Sun Mar 27 18:24:44.696 2011 (UTC - 4:00)
System Uptime: 0 days 0:20:44.319
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C9, {23e, fffff88000ecf19c, fffff98015f0cc60, 0}
Unable to load image \SystemRoot\system32\DRIVERS\Svk2pl64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Svk2pl64.sys
*** ERROR: Module load completed but symbols could not be loaded for Svk2pl64.sys
Probably caused by : Svk2pl64.sys ( Svk2pl64+7d61 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_IOMANAGER_VIOLATION (c9)
The IO manager has caught a misbehaving driver.
Arguments:
Arg1: 000000000000023e, A driver has marked an IRP pending but didn't return STATUS_PENDING.
Arg2: fffff88000ecf19c, The address in the driver's code where the error was detected.
Arg3: fffff98015f0cc60, IRP address.
Arg4: 0000000000000000, Status code.
Debugging Details:
------------------
BUGCHECK_STR: 0xc9_23e
DRIVER_VERIFIER_IO_VIOLATION_TYPE: 23e
FAULTING_IP:
Wdf01000!FxDevice::Dispatch+0
fffff880`00ecf19c 4883ec28 sub rsp,28h
FOLLOWUP_IP:
Svk2pl64+7d61
fffff880`07948d61 ?? ???
IRP_ADDRESS: fffff98015f0cc60
DEVICE_OBJECT: fffffa8009b84960
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800030fd3dc to fffff80002c72740
STACK_TEXT:
fffff880`02d1b6b8 fffff800`030fd3dc : 00000000`000000c9 00000000`0000023e fffff880`00ecf19c fffff980`15f0cc60 : nt!KeBugCheckEx
fffff880`02d1b6c0 fffff800`0310747a : fffff800`030fb9f0 fffff880`00ecf19c fffff980`15f0cc60 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`02d1b700 fffff800`0310834e : 00000000`0000023e 00000000`00000000 fffff980`15f0cc60 00000000`ffffffff : nt!ViErrorFinishReport+0xda
fffff880`02d1b750 fffff800`03109b64 : fffffa80`09460ba0 fffffa80`083b9010 fffff980`15f0cc60 fffff980`15f0cc60 : nt!VfErrorReport6+0x6e
fffff880`02d1b820 fffff800`0311b50d : fffff980`15f0cf70 fffff880`02d1ba00 00000000`00000000 fffff980`15f0cf70 : nt!IovpCompleteRequest2+0xe4
fffff880`02d1b890 fffff800`02c74d26 : fffff980`15f0cf73 fffff800`00000000 00000000`00000000 fffff880`00000005 : nt!IovpLocalCompletionRoutine+0x9d
fffff880`02d1b8f0 fffff800`0311319f : fffff980`15f0cc60 00000000`00000002 00000000`00000002 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02d1b9d0 fffff880`00ec9a52 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IovCompleteRequest+0x19f
fffff880`02d1baa0 fffff880`00eba13e : fffff980`15f0cc60 00000000`00000000 00000000`00000002 fffff980`15f0cc60 : Wdf01000!FxRequest::CompleteInternal+0x646
fffff880`02d1bb50 fffff880`07948d61 : fffffa80`09b81cd0 fffffa80`0a1e4860 fffffa80`09b81cd0 0000057f`f5e1b798 : Wdf01000!imp_WdfRequestCompleteWithInformation+0x1aa
fffff880`02d1bbc0 fffffa80`09b81cd0 : fffffa80`0a1e4860 fffffa80`09b81cd0 0000057f`f5e1b798 fffffa80`09b81c60 : Svk2pl64+0x7d61
fffff880`02d1bbc8 fffffa80`0a1e4860 : fffffa80`09b81cd0 0000057f`f5e1b798 fffffa80`09b81c60 fffff880`07948e51 : 0xfffffa80`09b81cd0
fffff880`02d1bbd0 fffffa80`09b81cd0 : 0000057f`f5e1b798 fffffa80`09b81c60 fffff880`07948e51 fffffa80`0a1e49f0 : 0xfffffa80`0a1e4860
fffff880`02d1bbd8 0000057f`f5e1b798 : fffffa80`09b81c60 fffff880`07948e51 fffffa80`0a1e49f0 00000000`00000000 : 0xfffffa80`09b81cd0
fffff880`02d1bbe0 fffffa80`09b81c60 : fffff880`07948e51 fffffa80`0a1e49f0 00000000`00000000 fffffa80`09b81cd0 : 0x57f`f5e1b798
fffff880`02d1bbe8 fffff880`07948e51 : fffffa80`0a1e49f0 00000000`00000000 fffffa80`09b81cd0 fffff880`0411cf79 : 0xfffffa80`09b81c60
fffff880`02d1bbf0 fffffa80`0a1e49f0 : 00000000`00000000 fffffa80`09b81cd0 fffff880`0411cf79 fffffa80`09b81c60 : Svk2pl64+0x7e51
fffff880`02d1bbf8 00000000`00000000 : fffffa80`09b81cd0 fffff880`0411cf79 fffffa80`09b81c60 00000000`00000000 : 0xfffffa80`0a1e49f0
STACK_COMMAND: kb
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: Svk2pl64+7d61
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Svk2pl64
IMAGE_NAME: Svk2pl64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bb4512d
FAILURE_BUCKET_ID: X64_0xc9_23e_VRF_Svk2pl64+7d61
BUCKET_ID: X64_0xc9_23e_VRF_Svk2pl64+7d61
Followup: MachineOwner
---------