Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
0: kd> knL
*** Stack trace for last set context - .thread/.cxr resets it
# Child-SP RetAddr Call Site
00 fffff880`223695e0 00000000`1801220a [COLOR=#ff0000][I][B]SynTP+0x36b8[/B][/I][/COLOR]
01 fffff880`223695e8 00000000`00000001 0x1801220a
02 fffff880`223695f0 00000000`00000004 0x1
03 fffff880`223695f8 00000000`0023ae37 0x4
04 fffff880`22369600 000000d4`00040000 0x23ae37
05 fffff880`22369608 fffffa80`1bec43e0 0xd4`00040000
06 fffff880`22369610 00000004`00000001 0xfffffa80`1bec43e0
07 fffff880`22369618 00000acc`00000d53 0x4`00000001
08 fffff880`22369620 00000000`00000046 0xacc`00000d53
09 fffff880`22369628 00000000`03030024 0x46
0a fffff880`22369630 00000000`00000000 0x3030024
[/I]4: kd> .exr 0xfffff880009db1e8
ExceptionAddress: fffff8000308525f ([COLOR=#ff0000][I][B]nt!KiDeferredReadyThread[/B][/I][/COLOR]+0x000000000000034f)
ExceptionCode: [I][COLOR=#ff0000][B]c0000005 (Access violation)[/B][/COLOR]
[/I]
Have you run into many cases of either Vipre or other AV's being the cause of BSOD's?
do you have any interest in the .dmp from the latest crash or only if it crashes after enabling driver verifier?
6: kd> !process fffffa801fa71b30
PROCESS fffffa801fa71b30
SessionId: 1 Cid: 0e98 Peb: 7fffffdd000 ParentCid: 0d5c
DirBase: 77439f000 ObjectTable: fffff8a0020b3860 [COLOR=#4b0082]HandleCount: 64[/COLOR].
[COLOR=#006400] Image: rundll32.exe[/COLOR]
VadRoot fffffa801fa6e8f0 Vads 64 Clone 0 Private 929. Modified 1793. Locked 0.
DeviceMap fffff8a0008b7ed0
Token fffff8a0020b3a50
ElapsedTime 00:00:00.612
UserTime 00:00:00.000
KernelTime 00:00:00.000
QuotaPoolUsage[PagedPool] 149864
QuotaPoolUsage[NonPagedPool] 7560
Working Set Sizes (now,min,max) (1906, 50, 345) (7624KB, 200KB, 1380KB)
PeakWorkingSetSize 1906
VirtualSize 74 Mb
PeakVirtualSize 74 Mb
PageFaultCount 1926
MemoryPriority BACKGROUND
BasePriority 8
CommitCharge 1044
6: kd> !handle ac
PROCESS fffffa801fa71b30
SessionId: 1 Cid: 0e98 Peb: 7fffffdd000 ParentCid: 0d5c
DirBase: 77439f000 ObjectTable: fffff8a0020b3860 [COLOR=#4b0082]HandleCount: 64[/COLOR].
[COLOR=#006400]Image: rundll32.exe[/COLOR]
Handle table at fffff8a0020b3860 with 64 entries in use
00ac: Object: fffff8a0025b71b0 GrantedAccess: 00020019 Entry: fffff8a0020b42b0
Object: fffff8a0025b71b0 Type: (fffffa8018bb37a0) Key
ObjectHeader: fffff8a0025b7180 (new version)
HandleCount: 1 PointerCount: 1
Directory Object: 00000000 Name: \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\CLASS\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001\NVSPCAPS
6: kd> !reg findkcb \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\CLASS\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001\NVSPCAPS
Found KCB = [COLOR=#4b0082]fffff8a002041a70 [/COLOR]:: \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\CLASS\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001\NVSPCAPS
Key : \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\CONTROL\CLASS\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001\NVSPCAPS
[COLOR=#ff0000]RefCount : 1[/COLOR]
Flags : CompressedName,
ExtFlags :
Parent : 0xfffff8a000b6b258
KeyHive : 0xfffff8a000023010
KeyCell : 0x117b520 [cell index]
[COLOR=#ff0000]TotalLevels : 9[/COLOR]
MaxNameLen : 0x0
MaxValueNameLen : 0x34
MaxValueDataLen : 0x30
LastWriteTime : 0x 1cf1d79:0xee9f4a83
KeyBodyListHead : 0xfffff8a002041ae8 0xfffff8a002041ae8
SubKeyCount : 0
ValueCache.Count : 40
ValueCache.List : 0x00000000011808d8
Owner : 0x0000000000000000
KCBLock : 0xfffff8a002041b60
KeyLock : 0xfffff8a002041b70
Child-SP RetAddr : Args to Child : Call Site
fffff880`0c0e2878 fffff800`0355c4ec : 00000000`000000c4 00000000`000000f6 00000000`000000ac fffffa80`1fa71b30 : nt!KeBugCheckEx
fffff880`0c0e2880 fffff800`03571bf4 : 00000000`000000ac fffffa80`1fa71b30 00000000`00000004 00000000`0a014bb4 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`0c0e28c0 fffff800`03329890 : fffff800`033c5780 fffff880`0c0e2b10 fffff880`0c0e2c00 fffff880`0c0e2ea0 : nt!VfCheckUserHandle+0x1b4
fffff880`0c0e29a0 fffff800`0339f6b5 : 00000000`00000000 fffff880`00000001 fffffa80`18bb37a0 fffffa80`18b77000 : nt! ?? ::NNGAKEGL::`string'+0x2027e
fffff880`0c0e2a70 fffff800`030cee53 : fffffa80`1fa71620 fffff880`0c0e2e28 00000000`00000002 00000000`00000000 : nt!NtQueryValueKey+0x115
fffff880`0c0e2c00 fffff800`030cb410 : fffff800`03560d96 fffff880`0f3010a1 fffff880`0c0e2ea0 fffff880`0c0e2e98 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`0c0e2c70)
fffff880`0c0e2e08 fffff800`03560d96 : fffff880`0f3010a1 fffff880`0c0e2ea0 fffff880`0c0e2e98 fffff800`030cb410 : nt!KiServiceLinkage
fffff880`0c0e2e10 fffff880`0f3010a1 : fffff880`0c0e38ca fffff880`0c0e2ee0 fffff880`0c0e38b8 fffff880`0c0e3600 : nt!VfZwQueryValueKey+0x76
fffff880`0c0e2e60 fffff880`0f3008ea : 00000000`00000000 00000000`00000000 fffff880`0c0e2ff0 fffff880`0c0e2ff0 : nvlddmkm+0x9b0a1
fffff880`0c0e2f10 fffff880`0f34b80a : fffff880`0f30086d fffff980`013d4bd0 fffffa80`1c697000 00000000`00000000 : nvlddmkm+0x9a8ea
fffff880`0c0e2fb0 fffff880`0f319bfc : fffff880`0c0e3880 00000000`00000004 fffff880`0c0e39b8 fffffa80`1c697000 : nvlddmkm+0xe580a
fffff880`0c0e3030 fffff880`0f30c6bc : fffff880`0c0e3588 00000000`00000000 fffff880`0c0e3180 fffff880`0fb872dc : nvlddmkm+0xb3bfc
fffff880`0c0e3080 fffff880`0fb873bb : 00000000`00000010 fffff880`0fb872dc 00000000`00000010 00000000`00010286 : nvlddmkm+0xa66bc
fffff880`0c0e34a0 fffff880`0f30bb6b : fffff880`0f79b130 fffff880`0c0e3599 fffffa80`1c697000 00000000`00000000 : nvlddmkm!nvDumpConfig+0x2a2f93
fffff880`0c0e34e0 fffff880`0fb699b9 : fffff880`0c0e3810 fffff880`0c0e3669 fffff880`0c0e3810 fffff880`0c0e3810 : nvlddmkm+0xa5b6b
fffff880`0c0e3600 fffff880`0fc08a25 : 00000000`00000000 00000000`00000000 00000000`4e562a2a 00000000`01000003 : nvlddmkm!nvDumpConfig+0x285591
fffff880`0c0e36d0 fffff880`0fee3f50 : 00000000`00000000 00000000`00000000 fffff880`0c0e3810 00000000`00000018 : nvlddmkm!nvDumpConfig+0x3245fd
fffff880`0c0e3700 fffff880`0fed7093 : 00000000`00000000 00000000`00000000 fffff880`0c0e3b60 00000000`00000003 : dxgkrnl!DXGADAPTER::DdiEscape+0x50
fffff880`0c0e3730 fffff960`001e1942 : 00000000`000ef608 fffffa80`1fa71620 00000000`02703500 00000000`00000020 : dxgkrnl!DxgkEscape+0x7af
fffff880`0c0e3ab0 fffff800`030cee53 : 00000000`00000008 000007fe`f933f000 00000000`02703501 ffffffff`ffffffff : win32k!NtGdiDdDDIEscape+0x12
fffff880`0c0e3ae0 000007fe`ff2613ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`0c0e3ae0)
00000000`000eefb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`ff2613ea
Has Sysnative Forums helped you? Please consider donating to help us support the site!