Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [H:\Windows\Minidump\111114-15428-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\mysymbol* http://msdl.microsoft.com/download/symbols;SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18526.amd64fre.win7sp1_gdr.140706-1506
Machine Name:
Kernel base = 0xfffff800`04a18000 PsLoadedModuleList = 0xfffff800`04c5b890
Debug session time: Tue Nov 11 11:41:44.994 2014 (UTC + 8:00)
System Uptime: 0 days 0:27:34.270
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck B8, {fffffa800bf8fb50, fffff80004c16cc0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!SwapContext_PatchXRstor+120 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_SWITCH_FROM_DPC (b8)
A wait operation, attach process, or yield was attempted from a DPC routine.
This is an illegal operation and the stack track will lead to the offending
code and original DPC routine.
Arguments:
Arg1: fffffa800bf8fb50, Original thread which is the cause of the failure
Arg2: fffff80004c16cc0, New thread
Arg3: 0000000000000000, Stack address of the original thread
Arg4: 0000000000000000
Debugging Details:
------------------
FAULTING_THREAD: fffffa800bf8fb50
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xB8
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80004a90fb4 to fffff80004a8dbc0
STACK_TEXT:
fffff800`00b9abf8 fffff800`04a90fb4 : 00000000`000000b8 fffffa80`0bf8fb50 fffff800`04c16cc0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9ac00 00000000`000000b8 : fffffa80`0bf8fb50 fffff800`04c16cc0 00000000`00000000 00000000`00000000 : nt!SwapContext_PatchXRstor+0x120
fffff800`00b9ac08 fffffa80`0bf8fb50 : fffff800`04c16cc0 00000000`00000000 00000000`00000000 00000000`00000201 : 0xb8
fffff800`00b9ac10 fffff800`04c16cc0 : 00000000`00000000 00000000`00000000 00000000`00000201 00000000`00000007 : 0xfffffa80`0bf8fb50
fffff800`00b9ac18 00000000`00000000 : 00000000`00000000 00000000`00000201 00000000`00000007 fffff800`04a8597d : nt!KiInitialThread
STACK_COMMAND: .thread 0xfffffa800bf8fb50 ; kb
FOLLOWUP_IP:
nt!SwapContext_PatchXRstor+120
fffff800`04a90fb4 c3 ret
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!SwapContext_PatchXRstor+120
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53b9f073
FAILURE_BUCKET_ID: X64_0xB8_nt!SwapContext_PatchXRstor+120
BUCKET_ID: X64_0xB8_nt!SwapContext_PatchXRstor+120
Followup: MachineOwner
---------
0: kd> !process
GetPointerFromAddress: unable to read from fffff80004cc5000
PROCESS fffffa8003c6c740
SessionId: none Cid: 0004 Peb: 00000000 ParentCid: 0000
DirBase: 00187000 ObjectTable: fffff8a000001170 HandleCount: <Data Not Accessible>
Image: System
VadRoot fffffa8006f4dcf0 Vads 5 Clone 0 Private 9. Modified 1134388. Locked 0.
DeviceMap fffff8a0000084a0
Token fffff8a000004520
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
fffff78000000000: Unable to get shared data
ElapsedTime 00:00:00.000
UserTime 00:00:00.000
KernelTime 00:00:00.000
QuotaPoolUsage[PagedPool] 0
QuotaPoolUsage[NonPagedPool] 0
Working Set Sizes (now,min,max) (97, 0, 0) (388KB, 0KB, 0KB)
PeakWorkingSetSize 3385
VirtualSize 3 Mb
PeakVirtualSize 16 Mb
PageFaultCount 63226
MemoryPriority BACKGROUND
BasePriority 8
CommitCharge 28
*** Error in reading nt!_ETHREAD @ fffffa8003cf2040
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [H:\Windows\Minidump\111114-15428-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\mysymbol* http://msdl.microsoft.com/download/symbols;SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18526.amd64fre.win7sp1_gdr.140706-1506
Machine Name:
Kernel base = 0xfffff800`04a18000 PsLoadedModuleList = 0xfffff800`04c5b890
Debug session time: Tue Nov 11 11:41:44.994 2014 (UTC + 8:00)
System Uptime: 0 days 0:27:34.270
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck B8, {fffffa800bf8fb50, fffff80004c16cc0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!SwapContext_PatchXRstor+120 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_SWITCH_FROM_DPC (b8)
A wait operation, attach process, or yield was attempted from a DPC routine.
This is an illegal operation and the stack track will lead to the offending
code and original DPC routine.
Arguments:
Arg1: fffffa800bf8fb50, Original thread which is the cause of the failure
Arg2: fffff80004c16cc0, New thread
Arg3: 0000000000000000, Stack address of the original thread
Arg4: 0000000000000000
Debugging Details:
------------------
FAULTING_THREAD: fffffa800bf8fb50
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xB8
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80004a90fb4 to fffff80004a8dbc0
STACK_TEXT:
fffff800`00b9abf8 fffff800`04a90fb4 : 00000000`000000b8 fffffa80`0bf8fb50 fffff800`04c16cc0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9ac00 00000000`000000b8 : fffffa80`0bf8fb50 fffff800`04c16cc0 00000000`00000000 00000000`00000000 : nt!SwapContext_PatchXRstor+0x120
fffff800`00b9ac08 fffffa80`0bf8fb50 : fffff800`04c16cc0 00000000`00000000 00000000`00000000 00000000`00000201 : 0xb8
fffff800`00b9ac10 fffff800`04c16cc0 : 00000000`00000000 00000000`00000000 00000000`00000201 00000000`00000007 : 0xfffffa80`0bf8fb50
fffff800`00b9ac18 00000000`00000000 : 00000000`00000000 00000000`00000201 00000000`00000007 fffff800`04a8597d : nt!KiInitialThread
STACK_COMMAND: .thread 0xfffffa800bf8fb50 ; kb
FOLLOWUP_IP:
nt!SwapContext_PatchXRstor+120
fffff800`04a90fb4 c3 ret
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!SwapContext_PatchXRstor+120
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53b9f073
FAILURE_BUCKET_ID: X64_0xB8_nt!SwapContext_PatchXRstor+120
BUCKET_ID: X64_0xB8_nt!SwapContext_PatchXRstor+120
Followup: MachineOwner
---------
0: kd> !process
GetPointerFromAddress: unable to read from fffff80004cc5000
PROCESS fffffa8003c6c740
SessionId: none Cid: 0004 Peb: 00000000 ParentCid: 0000
DirBase: 00187000 ObjectTable: fffff8a000001170 HandleCount: <Data Not Accessible>
Image: System
VadRoot fffffa8006f4dcf0 Vads 5 Clone 0 Private 9. Modified 1134388. Locked 0.
DeviceMap fffff8a0000084a0
Token fffff8a000004520
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
fffff78000000000: Unable to get shared data
ElapsedTime 00:00:00.000
UserTime 00:00:00.000
KernelTime 00:00:00.000
QuotaPoolUsage[PagedPool] 0
QuotaPoolUsage[NonPagedPool] 0
Working Set Sizes (now,min,max) (97, 0, 0) (388KB, 0KB, 0KB)
PeakWorkingSetSize 3385
VirtualSize 3 Mb
PeakVirtualSize 16 Mb
PageFaultCount 63226
MemoryPriority BACKGROUND
BasePriority 8
CommitCharge 28
*** Error in reading nt!_ETHREAD @ fffffa8003cf2040
