Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012611-45427-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c54000 PsLoadedModuleList = 0xfffff800`02e91e50
Debug session time: Wed Jan 26 11:06:58.574 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:05.510
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff8a0030a903e, 2, 1, fffff80002faa901}
Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+4ed )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0030a903e, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002faa901, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efc0e0
fffff8a0030a903e
CURRENT_IRQL: 2
FAULTING_IP:
nt!ObpQueryNameString+4ed
fffff800`02faa901 668939 mov word ptr [rcx],di
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: conhost.exe
TRAP_FRAME: fffff880083b3200 -- (.trap 0xfffff880083b3200)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=fffff8a0030a903e
rdx=fffff8a00000ce60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002faa901 rsp=fffff880083b3390 rbp=fffff880083b3740
r8=0000000000002000 r9=fffff880083b3590 r10=0000000000000000
r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
nt!ObpQueryNameString+0x4ed:
fffff800`02faa901 668939 mov word ptr [rcx],di ds:88b0:fffff8a0`030a903e=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cc3ca9 to fffff80002cc4740
STACK_TEXT:
fffff880`083b30b8 fffff800`02cc3ca9 : 00000000`0000000a fffff8a0`030a903e 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`083b30c0 fffff800`02cc2920 : fffffa80`053bd010 fffffa80`04a47900 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`083b3200 fffff800`02faa901 : fffff880`083b3740 fffff8a0`0000ce80 00000000`00000001 fffffa80`06c62000 : nt!KiPageFault+0x260
fffff880`083b3390 fffff800`02fab56a : fffffa80`04a47950 fffff8a0`030a9000 fffffa80`00002000 fffff880`083b3590 : nt!ObpQueryNameString+0x4ed
fffff880`083b3490 fffff800`02faaecf : 00000000`00000004 fffffa80`05215bc0 fffff8a0`030a9000 00000000`08712075 : nt!ObQueryNameString+0xe
fffff880`083b34d0 fffff800`02fab612 : fffffa80`05215bc0 00000000`00401802 00000000`00000000 fffffa80`06c62000 : nt!IopQueryNameInternal+0x9f
fffff880`083b3570 fffff800`02faa4c4 : 00000000`00000000 fffff800`00401802 00000000`00000000 fffffa80`06c62000 : nt!IopQueryName+0x26
fffff880`083b35c0 fffff800`02f1fda3 : fffffa80`05215bc0 fffffa80`06c62000 fffff8a0`00002000 fffff880`083b3758 : nt!ObpQueryNameString+0xb0
fffff880`083b36c0 fffff800`02f8143e : fffffa80`06c53060 00000000`00000000 fffffa80`06c5a060 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x210a4
fffff880`083b3860 fffff800`02fa9cd4 : 000007ff`fffd9000 fffff880`083b3be0 00000000`00000000 fffffa80`06b15d60 : nt!PspExitProcess+0x4e
fffff880`083b38c0 fffff800`02f82635 : 00000000`00000000 fffffa80`06c5a001 000007ff`fffd9000 fffffa80`06c5ab60 : nt!PspExitThread+0x834
fffff880`083b3980 fffff800`02ca11db : 00000000`00000000 00000000`00000000 fffffa80`0514bfb0 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`083b39b0 fffff800`02ca1620 : 00000000`001ebc90 fffff880`083b3a30 fffff800`02f8274c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`083b3a30 fffff800`02cc3a37 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff880`083b3b70 00000000`7740ff1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`009bf358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7740ff1a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ObpQueryNameString+4ed
fffff800`02faa901 668939 mov word ptr [rcx],di
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ObpQueryNameString+4ed
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!ObpQueryNameString+4ed
BUCKET_ID: X64_0xA_nt!ObpQueryNameString+4ed
Followup: MachineOwner
---------