Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031311-15078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`01c4d000 PsLoadedModuleList = 0xfffff800`01e8ae50
Debug session time: Sun Mar 13 11:02:05.468 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:03.968
Loading Kernel Symbols
...............................................................
.................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80001cdd436}
Probably caused by : pci.sys ( pci!PciDevice_QueryCapabilities+dc )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001cdd436, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001ef50e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c73
fffff800`01cdd436 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: fffff880023a5fb0 -- (.trap 0xfffff880023a5fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0034ef630 rbx=0000000000000000 rcx=fffff880023a6190
rdx=0000000000000010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001ffeffc rsp=fffff880023a6140 rbp=fffff880023a63c0
r8=fffff8a000003000 r9=00000000000001f0 r10=fffffa8005544420
r11=0000000000020019 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt! ?? ::NNGAKEGL::`string'+0x2b705:
fffff800`01ffeffc 488d4c2468 lea rcx,[rsp+68h]
Resetting default scope
LOCK_ADDRESS: fffff80001ec1400 -- (!locks fffff80001ec1400)
Resource @ nt!PiEngineLock (0xfffff80001ec1400) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0xfffff80001ec1400
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80001cbcca9 to fffff80001cbd740
STACK_TEXT:
fffff880`023a59f8 fffff800`01cbcca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`023a5a00 fffff800`01cbb920 : 00000000`00000010 fffff980`03e0eee0 fffff880`023a5b60 00000000`00000018 : nt!KiBugCheckDispatch+0x69
fffff880`023a5b40 fffff800`01cdd436 : 00600000`01ffe121 fffff800`01cede60 00000000`00000010 00000000`00000202 : nt!KiPageFault+0x260
fffff880`023a5cd0 fffff800`01c9a0b7 : 00000000`00000000 fffff880`023a5ee0 00000000`00000000 fffff880`00000000 : nt!IopCompleteRequest+0xc73
fffff880`023a5da0 fffff800`01c9a477 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`023a5e20 fffff800`01cbb7bf : 00000000`00000008 00000000`00000000 00000000`00000000 00001f80`010877c0 : nt!KiApcInterrupt+0xd7
fffff880`023a5fb0 fffff800`01ffeffc : fffffa80`05588000 00000000`00000001 fffffa80`05544420 00001f80`01080000 : nt!KiPageFault+0xff
fffff880`023a6140 fffff800`01cbc993 : fffffa80`05588040 fffff880`023a64f8 fffffa80`00000001 fffff980`01590e90 : nt! ?? ::NNGAKEGL::`string'+0x2b705
fffff880`023a62d0 fffff800`01cb8f30 : fffff800`01f2d8bf ffffffff`800001f0 00000000`00000001 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`023a64d8 fffff800`01f2d8bf : ffffffff`800001f0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff880`023a64e0 fffff800`01f2de4b : fffffa80`05536060 fffff800`01fc3300 00000000`00000000 00000000`00000000 : nt!IopGetRegistryValue+0xab
fffff880`023a6540 fffff800`01f2dd78 : fffff880`023a6a30 00000000`00000004 fffffa80`06df1d90 00000000`00000000 : nt!PiGetDeviceRegistryProperty+0x9f
fffff880`023a66a0 fffff880`00e1dac4 : 00000000`00000010 fffff880`023a6a30 00000000`00000010 00000000`00010293 : nt!IoGetDeviceProperty+0xbc
fffff880`023a6780 fffff880`00e049d5 : fffff980`017e6ea0 fffff800`021512a7 00000000`00000004 fffff980`017e6ea0 : pci!PciDevice_QueryCapabilities+0xdc
fffff880`023a67c0 fffff800`02164c16 : fffff980`017e6ea0 00000000`00000002 fffffa80`07142a20 fffff800`0216037e : pci!PciDispatchPnpPower+0xd9
fffff880`023a6800 fffff800`0216752a : fffff980`017e6f70 fffffa80`07142a20 fffffa80`09117200 fffffa80`08f2eda0 : nt!IovCallDriver+0x566
fffff880`023a6860 fffff800`02164c16 : fffff980`017e6ea0 00000000`00000002 fffffa80`09117200 fffffa80`08f2ee70 : nt!ViFilterDispatchPnp+0x13a
fffff880`023a6890 fffff800`01f28a09 : fffffa80`09117200 00000000`c00000bb fffff880`023a6990 fffffa80`08f2ee70 : nt!IovCallDriver+0x566
fffff880`023a68f0 fffff800`0207d207 : fffff880`023a6a30 fffffa80`071416e0 00000000`00000040 00000000`00000004 : nt!IopSynchronousCall+0xc5
fffff880`023a6960 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpIrpQueryCapabilities+0x87
STACK_COMMAND: kb
FOLLOWUP_IP:
pci!PciDevice_QueryCapabilities+dc
fffff880`00e1dac4 488b8790000000 mov rax,qword ptr [rdi+90h]
SYMBOL_STACK_INDEX: d
SYMBOL_NAME: pci!PciDevice_QueryCapabilities+dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: pci
IMAGE_NAME: pci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc117
FAILURE_BUCKET_ID: X64_0xA_VRF_pci!PciDevice_QueryCapabilities+dc
BUCKET_ID: X64_0xA_VRF_pci!PciDevice_QueryCapabilities+dc
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\031311-10296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`01c5a000 PsLoadedModuleList = 0xfffff800`01e97e50
Debug session time: Sun Mar 13 17:38:13.562 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:04.078
Loading Kernel Symbols
...............................................................
..................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff80001cea2b3}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+d3d )
Followup: Pool_corruption
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001cea2b3, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001f020e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+ae3
fffff800`01cea2b3 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
IRP_ADDRESS: ffffffffffffff89
TRAP_FRAME: fffff88002392050 -- (.trap 0xfffff88002392050)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002391d10 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001cea2b3 rsp=fffff880023921e0 rbp=fffff88002392330
r8=fffff880023922e8 r9=fffff880023922e0 r10=0000000000000002
r11=fffff80001ce97d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!IopCompleteRequest+0xae3:
fffff800`01cea2b3 488b09 mov rcx,qword ptr [rcx] ds:ed10:00000000`00000000=????????????????
Resetting default scope
LOCK_ADDRESS: fffff80001ece400 -- (!locks fffff80001ece400)
Resource @ nt!PiEngineLock (0xfffff80001ece400) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0xfffff80001ece400
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80001cc9ca9 to fffff80001cca740
STACK_TEXT:
fffff880`02391f08 fffff800`01cc9ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02391f10 fffff800`01cc8920 : 00000000`00000040 fffff980`040daee0 fffff8a0`03500df0 00000000`00000040 : nt!KiBugCheckDispatch+0x69
fffff880`02392050 fffff800`01cea2b3 : 00000000`00000000 0000007f`fffffff8 fffff880`02392380 fffff800`01ce6d26 : nt!KiPageFault+0x260
fffff880`023921e0 fffff800`01ca70b7 : 00000000`00000001 00000000`00000000 fffff8a0`00535d00 fffff800`00000000 : nt!IopCompleteRequest+0xae3
fffff880`023922b0 fffff800`01ca7477 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`02392330 fffff800`01d6fd31 : fffff980`015a2fa0 00000000`00000060 fffff880`02392708 fffff980`015a2fa0 : nt!KiApcInterrupt+0xd7
fffff880`023924c0 fffff800`02165624 : 00000000`00000060 ffffffff`800001d4 fffff980`015a2f00 fffff980`015a2fa0 : nt!VfAvlUnlockShared+0x41
fffff880`023924f0 fffff800`01dc10df : 00000000`00000060 fffff980`015a2fa0 fffff800`01f9b6f0 00000000`000007ff : nt!VfCheckForLookaside+0x94
fffff880`02392530 fffff800`01dfd1c1 : 00000000`00000060 00000000`00000000 00000000`0000001c fffff8a0`03500e00 : nt!ExpCheckForLookaside+0x1f
fffff880`02392560 fffff800`02075b7b : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000100 : nt!ExDeferredFreePool+0xd3d
fffff880`02392610 fffff800`020ac611 : fffff880`02392708 00000000`00000002 00000000`00000001 fffff980`015a2fa0 : nt!PipGetRegistrySecurityWithFallback+0x12b
fffff880`023926b0 fffff800`020b67d3 : fffffa80`08fafe00 fffffa80`08f75480 fffff8a0`03427260 fffffa80`07122750 : nt!PipChangeDeviceObjectFromRegistryProperties+0x161
fffff880`023927a0 fffff800`020b7c92 : fffffa80`07115750 fffffa80`07122750 00000000`00000002 fffffa80`07122a20 : nt!PipCallDriverAddDevice+0x733
fffff880`02392950 fffff800`020b812c : fffffa80`08f0b000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x2b2
fffff880`02392bc0 fffff800`01dcc3a2 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
fffff880`02392c10 fffff800`01cd7961 : fffff800`01dcc0a0 fffff800`01fc4901 fffffa80`05507000 00000000`00000000 : nt!PnpDeviceActionWorker+0x302
fffff880`02392cb0 fffff800`01f6d7c6 : 00000000`00000000 fffffa80`05507040 00000000`00000080 fffffa80`054c3890 : nt!ExpWorkerThread+0x111
fffff880`02392d40 fffff800`01ca8c26 : fffff880`022a4180 fffffa80`05507040 fffff880`022af0c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02392d80 00000000`00000000 : fffff880`02393000 fffff880`0238d000 fffff880`02391f90 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+d3d
fffff800`01dfd1c1 8b05792b0700 mov eax,dword ptr [nt!ExpPoolFlags (fffff800`01e6fd40)]
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: nt!ExDeferredFreePool+d3d
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xA_VRF_nt!ExDeferredFreePool+d3d
BUCKET_ID: X64_0xA_VRF_nt!ExDeferredFreePool+d3d
Followup: Pool_corruption
---------