Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\011711-18688-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0301f000 PsLoadedModuleList = 0xfffff800`0325ce50
Debug session time: Mon Jan 17 06:58:08.301 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:45.706
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff8a0040a703e, 2, 1, fffff80003375901}
Probably caused by : ntkrnlmp.exe ( nt!ObpQueryNameString+4ed )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8a0040a703e, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003375901, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c70e0
fffff8a0040a703e
CURRENT_IRQL: 2
FAULTING_IP:
nt!ObpQueryNameString+4ed
fffff800`03375901 668939 mov word ptr [rcx],di
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: taskhost.exe
TRAP_FRAME: fffff8800bbf7240 -- (.trap 0xfffff8800bbf7240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000020 rbx=0000000000000000 rcx=fffff8a0040a703e
rdx=fffff8a00000c930 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003375901 rsp=fffff8800bbf73d0 rbp=fffff8800bbf7780
r8=0000000000002000 r9=fffff8800bbf75d0 r10=0000000000000000
r11=00000000000001c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
nt!ObpQueryNameString+0x4ed:
fffff800`03375901 668939 mov word ptr [rcx],di ds:28b0:fffff8a0`040a703e=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000308eca9 to fffff8000308f740
STACK_TEXT:
fffff880`0bbf70f8 fffff800`0308eca9 : 00000000`0000000a fffff8a0`040a703e 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0bbf7100 fffff800`0308d920 : 00000000`00000000 fffffa80`081e4c80 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0bbf7240 fffff800`03375901 : fffff880`0bbf7780 fffff8a0`0000c950 00000000`00000001 fffffa80`0aeb1000 : nt!KiPageFault+0x260
fffff880`0bbf73d0 fffff800`0337656a : fffffa80`081e4cd0 fffff8a0`040a7000 fffffa80`00002000 fffff880`0bbf75d0 : nt!ObpQueryNameString+0x4ed
fffff880`0bbf74d0 fffff800`03375ecf : fffff880`0bbf7798 fffffa80`09862360 fffff8a0`20206f49 00000000`00000001 : nt!ObQueryNameString+0xe
fffff880`0bbf7510 fffff800`03376612 : fffffa80`09862360 fffff960`00401802 00000000`00000000 fffffa80`0aeb1000 : nt!IopQueryNameInternal+0x9f
fffff880`0bbf75b0 fffff800`033754c4 : 00000000`00000000 fffff800`00401802 00000000`00000000 fffffa80`0aeb1000 : nt!IopQueryName+0x26
fffff880`0bbf7600 fffff800`032eada3 : fffffa80`09862360 fffffa80`0aeb1000 fffff8a0`00002000 fffff880`0bbf7798 : nt!ObpQueryNameString+0xb0
fffff880`0bbf7700 fffff800`0334c43e : fffffa80`0a235810 00000000`00000000 fffffa80`09ed5b60 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x210a4
fffff880`0bbf78a0 fffff800`03374cd4 : 000007ff`fffda000 fffff880`0bbf7c20 00000000`00000000 fffffa80`09d5d090 : nt!PspExitProcess+0x4e
fffff880`0bbf7900 fffff800`0334d635 : 00000000`00000000 fffffa80`09ed5b01 000007ff`fffda000 00000000`00000000 : nt!PspExitThread+0x834
fffff880`0bbf79c0 fffff800`0306c1db : 00000000`00000000 00000000`00000000 fffffa80`09ed5230 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`0bbf79f0 fffff800`0306c620 : 00000000`002d7270 fffff880`0bbf7a70 fffff800`0334d74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`0bbf7a70 fffff800`0308ea37 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffff880`0bbf7bb0 00000000`776efdba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`00cff508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776efdba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ObpQueryNameString+4ed
fffff800`03375901 668939 mov word ptr [rcx],di
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ObpQueryNameString+4ed
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!ObpQueryNameString+4ed
BUCKET_ID: X64_0xA_nt!ObpQueryNameString+4ed
Followup: MachineOwner
---------