Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021511-21340-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82a4f000 PsLoadedModuleList = 0x82b97810
Debug session time: Tue Feb 15 04:38:25.083 2011 (UTC - 5:00)
System Uptime: 0 days 0:09:15.862
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007F, {8, 801dc000, 0, 0}
Probably caused by : ntkrpamp.exe ( nt!KeAccumulateTicks+ba )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 801dc000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WoW-4.0.0-WOW-
CURRENT_IRQL: 1c
LAST_CONTROL_TRANSFER: from 82aba462 to 82abac8b
STACK_TEXT:
a68db020 82aba462 00002710 00000000 00008b00 nt!KeAccumulateTicks+0xba
a68db060 82aba30f 82a95ab7 fe25008c 00000000 nt!KeUpdateRunTime+0x145
a68db0b8 82abf67f 00000000 00000000 000000d1 nt!KeUpdateSystemTime+0x613
a68db0b8 82a95ab7 00000000 00000000 000000d1 nt!KeUpdateSystemTimeAssist+0x13
a68db140 82a9431c badb0d00 86542d48 fdb79d42 nt!KiTrap10+0x93
a68db1b4 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db228 82a9431c badb0d00 86542d48 fd0b3439 nt!KiTrap07+0xb4
a68db29c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db310 82a9431c badb0d00 86542d48 fc95feeb nt!KiTrap07+0xb4
a68db384 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db3f8 82a9431c badb0d00 86542d48 fbc5512b nt!KiTrap07+0xb4
a68db46c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db4e0 82a9431c badb0d00 86542d48 fb2c0f02 nt!KiTrap07+0xb4
a68db554 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db5c8 82a9431c badb0d00 86542d48 fb07f1dc nt!KiTrap07+0xb4
a68db63c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db6b0 82a9431c badb0d00 86542d48 fac82ed4 nt!KiTrap07+0xb4
a68db724 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db798 82a9431c badb0d00 86542d48 fa84b687 nt!KiTrap07+0xb4
a68db80c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db880 82a9431c badb0d00 86542d48 f9eb2e37 nt!KiTrap07+0xb4
a68db8f4 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68db968 82a9431c badb0d00 86542d48 f9c7fa5c nt!KiTrap07+0xb4
a68db9dc 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dba50 82a9431c badb0d00 86542d48 f9641753 nt!KiTrap07+0xb4
a68dbac4 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbb38 82a9431c badb0d00 86542d48 f8f88bfd nt!KiTrap07+0xb4
a68dbbac 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbc20 82a9431c badb0d00 86542d48 f8af1bc2 nt!KiTrap07+0xb4
a68dbc94 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbd08 82a9431c badb0d00 86542d48 f85eb4c6 nt!KiTrap07+0xb4
a68dbd7c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbdf0 82a9431c badb0d00 86542d48 f81fa059 nt!KiTrap07+0xb4
a68dbe64 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbed8 82a9431c badb0d00 86542d48 f7d7e890 nt!KiTrap07+0xb4
a68dbf4c 82a9431c badb0d00 86542d48 0000000a nt!KiTrap07+0xb4
a68dbfc0 00000000 badb0d00 86542d48 f7241c10 nt!KiTrap07+0xb4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeAccumulateTicks+ba
82abac8b 6a00 push 0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KeAccumulateTicks+ba
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78ed4
FAILURE_BUCKET_ID: 0x7f_8_nt!KeAccumulateTicks+ba
BUCKET_ID: 0x7f_8_nt!KeAccumulateTicks+ba
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021511-21606-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82c18000 PsLoadedModuleList = 0x82d60810
Debug session time: Tue Feb 15 17:33:30.862 2011 (UTC - 5:00)
System Uptime: 0 days 12:43:12.750
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 82ca9eae, 8ad3fb48, 8ad3f720}
Probably caused by : ntkrpamp.exe ( nt!IoGetAttachedDevice+c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82ca9eae, The address that the exception occurred at
Arg3: 8ad3fb48, Exception Record Address
Arg4: 8ad3f720, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!IoGetAttachedDevice+c
82ca9eae 8b4810 mov ecx,dword ptr [eax+10h]
EXCEPTION_RECORD: 8ad3fb48 -- (.exr 0xffffffff8ad3fb48)
ExceptionAddress: 82ca9eae (nt!IoGetAttachedDevice+0x0000000c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 0000002c
Attempt to read from address 0000002c
CONTEXT: 8ad3f720 -- (.cxr 0xffffffff8ad3f720)
eax=0000001c ebx=85904c18 ecx=0000001c edx=746c6644 esi=00000800 edi=85d3c9e0
eip=82ca9eae esp=8ad3fc10 ebp=8ad3fc10 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!IoGetAttachedDevice+0xc:
82ca9eae 8b4810 mov ecx,dword ptr [eax+10h] ds:0023:0000002c=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000000
EXCEPTION_PARAMETER2: 0000002c
READ_ADDRESS: GetPointerFromAddress: unable to read from 82d80718
Unable to read MiSystemVaType memory at 82d60160
0000002c
FOLLOWUP_IP:
nt!IoGetAttachedDevice+c
82ca9eae 8b4810 mov ecx,dword ptr [eax+10h]
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from 82ccb1ca to 82ca9eae
STACK_TEXT:
8ad3fc10 82ccb1ca 85d3c9e0 00000000 00000800 nt!IoGetAttachedDevice+0xc
8ad3fc24 82e5a1bd 85904c18 84cbbc58 85904c00 nt!IoGetRelatedDeviceObject+0x70
8ad3fc6c 82e39a98 85904c18 85904c18 85904c00 nt!IopDeleteFile+0x32
8ad3fc84 82c81080 00000000 000c0000 00000000 nt!ObpRemoveObjectRoutine+0x59
8ad3fc98 82c80ff0 85904c18 82e49ec5 ad521f00 nt!ObfDereferenceObjectWithTag+0x88
8ad3fca0 82e49ec5 ad521f00 ad521f28 82d82680 nt!ObfDereferenceObject+0xd
8ad3fccc 82c43f29 ad521f00 00000000 00000000 nt!MiSegmentDelete+0x191
8ad3fd28 82c43e41 84cc3c80 00000000 82e3bb02 nt!MiProcessDereferenceList+0xdb
8ad3fd50 82e269df 00000000 a955a6d3 00000000 nt!MiDereferenceSegmentThread+0xc5
8ad3fd90 82cd81d9 82c43d7a 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!IoGetAttachedDevice+c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc78ed4
STACK_COMMAND: .cxr 0xffffffff8ad3f720 ; kb
FAILURE_BUCKET_ID: 0x7E_nt!IoGetAttachedDevice+c
BUCKET_ID: 0x7E_nt!IoGetAttachedDevice+c
Followup: MachineOwner
---------