Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051311-13291-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Thu May 12 18:31:37.067 2011 (UTC - 4:00)
System Uptime: 0 days 2:41:39.221
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {cd9, 7, 1, fffff88001098350}
Unable to load image \SystemRoot\system32\DRIVERS\nvstor64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvstor64.sys
*** ERROR: Module load completed but symbols could not be loaded for nvstor64.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000cd9, memory referenced
Arg2: 0000000000000007, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001098350, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc10e0
0000000000000cd9
CURRENT_IRQL: 7
FAULTING_IP:
storport!RaidGetKeyFromUnit+0
fffff880`01098350 0000 add byte ptr [rax],al
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xD1
PROCESS_NAME: dwm.exe
TRAP_FRAME: fffff8800af79700 -- (.trap 0xfffff8800af79700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000cd9 rbx=0000000000000000 rcx=fffffa8004ac91e8
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001098350 rsp=fffff8800af79898 rbp=fffffa8004abb7b0
r8=fffff8800af79910 r9=0000000000010100 r10=fffff88003d340e8
r11=fffff8800af799d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
storport!RaidGetKeyFromUnit:
fffff880`01098350 0000 add byte ptr [rax],al ds:e963:00000000`00000cd9=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a88c69 to fffff80002a89700
STACK_TEXT:
fffff880`0af795b8 fffff800`02a88c69 : 00000000`0000000a 00000000`00000cd9 00000000`00000007 00000000`00000001 : nt!KeBugCheckEx
fffff880`0af795c0 fffff800`02a878e0 : fffffa80`07444000 00000000`c0000225 00000000`0027bcce 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`0af79700 fffff880`01098350 : fffff880`0108fc97 00000000`00000000 fffffa80`08190b30 fffffa80`000a9ea2 : nt!KiPageFault+0x260
fffff880`0af79898 fffff880`0108fc97 : 00000000`00000000 fffffa80`08190b30 fffffa80`000a9ea2 fffffa80`04e3b000 : storport!RaidGetKeyFromUnit
fffff880`0af798a0 fffff880`0109b347 : 00000000`00000002 00000000`00000000 fffffa80`04ae2008 fffffa80`04ad81b0 : storport!StorFindDictionary+0x57
fffff880`0af798e0 fffff880`0109e753 : 00000000`00000000 00000000`00000000 fffffa80`04ae2008 fffffa80`04acd040 : storport!RaidAdapterFindUnitAtDirql+0x37
fffff880`0af79910 fffff880`0109f46f : 00000000`00000000 fffffa80`03000101 fffffa80`04ae2008 fffffa80`04acd2b0 : storport!RaidAdapterFindUnit+0x43
fffff880`0af79940 fffff880`010ec83b : fffff880`03000101 fffffa80`04acd040 fffffa80`08afd0d0 fffff800`02a91de7 : storport!StorPortGetLogicalUnit+0x2f
fffff880`0af79970 fffff880`03000101 : fffffa80`04acd040 fffffa80`08afd0d0 fffff800`02a91de7 fffff880`00000000 : nvstor64+0x183b
fffff880`0af79978 fffffa80`04acd040 : fffffa80`08afd0d0 fffff800`02a91de7 fffff880`00000000 fffff800`02c03e00 : 0xfffff880`03000101
fffff880`0af79980 fffffa80`08afd0d0 : fffff800`02a91de7 fffff880`00000000 fffff800`02c03e00 fffff880`03d340e8 : 0xfffffa80`04acd040
fffff880`0af79988 fffff800`02a91de7 : fffff880`00000000 fffff800`02c03e00 fffff880`03d340e8 00000000`00003000 : 0xfffffa80`08afd0d0
fffff880`0af79990 00000000`00000000 : fffff880`0108ae70 00000000`00003000 00000000`00000002 00000000`00003000 : nt!KeUpdateSystemTime+0x377
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !storport
fffff88001098000-fffff8800109800b 12 bytes - storport!RaInitializeRaidResources+30
[ 94 c0 83 61 38 00 c7 41:00 9c 00 ff 00 9b 00 ff ]
fffff8800109800d-fffff8800109801b 15 bytes - storport!RaInitializeRaidResources+3d (+0x0d)
[ 88 41 28 44 89 69 24 4c:9b 00 ff 00 8e 00 ff 00 ]
fffff8800109801d-fffff8800109801e 2 bytes - storport!RaInitializeRaidResources+4d (+0x10)
[ 00 33:34 00 ]
fffff88001098020-fffff88001098046 39 bytes - storport!RaInitializeRaidResources+50 (+0x03)
[ 80 7b 28 00 75 0f ba 52:00 16 00 ff 02 00 19 ff ]
fffff88001098048-fffff88001098068 33 bytes - storport!RaInitializeRaidResources+78 (+0x28)
[ 48 8b f0 48 85 c0 74 1f:01 00 18 ff 01 00 17 ff ]
fffff8800109806a-fffff8800109806e 5 bytes - storport!RaInitializeRaidResources+9a (+0x22)
[ 00 72 b3 eb 03:17 ff 01 00 1a ]
fffff88001098070-fffff880010980da 107 bytes - storport!RaInitializeRaidResources+a0 (+0x06)
[ 43 38 3b 7b 1c 73 17 44:40 3d 5a ff 80 7c 9b ff ]
fffff880010980dc-fffff880010980df 4 bytes - storport!StorNextIoGatewayItem+1c (+0x6c)
[ ff 15 d6 cf:00 00 01 ff ]
fffff880010980e2-fffff8800109812e 77 bytes - storport!StorNextIoGatewayItem+22 (+0x06)
[ 48 8d 54 24 20 48 8b cb:01 ff 00 00 00 ff 00 00 ]
fffff88001098130-fffff88001098136 7 bytes - storport!StorNextIoGatewayItem+70 (+0x4e)
[ 15 13 cf 00 00 48 85:8d 89 a2 ff a2 9e b8 ]
fffff88001098138-fffff8800109815d 38 bytes - storport!StorNextIoGatewayItem+78 (+0x08)
[ 74 74 48 8d 4b 40 ff 15:6d 69 82 ff 38 34 4e ff ]
fffff8800109815f-fffff88001098167 9 bytes - storport!StorNextIoGatewayItem+9f (+0x27)
[ 00 48 89 46 08 48 83 61:ff 00 00 00 ff 00 00 00 ]
fffff88001098169-fffff8800109816c 4 bytes - storport!StorNextIoGatewayItem+a9 (+0x0a)
[ 48 83 61 18:00 00 ff 00 ]
fffff8800109816e-fffff88001098171 4 bytes - storport!StorNextIoGatewayItem+ae (+0x05)
[ 48 83 61 48:00 ff 00 00 ]
fffff88001098173-fffff8800109817b 9 bytes - storport!StorNextIoGatewayItem+b3 (+0x05)
[ 48 83 61 50 00 48 83 61:ff 00 00 00 ff 00 00 00 ]
fffff8800109817d-fffff88001098180 4 bytes - storport!StorNextIoGatewayItem+bd (+0x0a)
[ 48 83 61 70:00 00 ff 00 ]
fffff88001098182-fffff88001098185 4 bytes - storport!StorNextIoGatewayItem+c2 (+0x05)
[ 48 83 a1 98:00 ff 00 00 ]
fffff88001098187 - storport!StorNextIoGatewayItem+c7 (+0x05)
[ 00:ff ]
fffff8800109818a-fffff8800109818d 4 bytes - storport!StorNextIoGatewayItem+ca (+0x03)
[ 48 83 a1 a0:00 ff 00 00 ]
fffff8800109818f - storport!StorNextIoGatewayItem+cf (+0x05)
[ 00:ff ]
fffff88001098192-fffff88001098199 8 bytes - storport!StorNextIoGatewayItem+d2 (+0x03)
[ 80 61 10 dc 48 83 61 58:00 ff 00 00 00 ff 00 00 ]
fffff8800109819b-fffff88001098200 102 bytes - storport!StorNextIoGatewayItem+db (+0x09)
[ b8 ff ff 00 00 66 89 41:ff 00 00 03 ff 00 00 06 ]
fffff88001098202-fffff88001098206 5 bytes - storport!StorSubmitIoGatewayItem+32 (+0x67)
[ 8b cf e8 67 fc:5d ff 01 00 0c ]
fffff88001098208-fffff88001098235 46 bytes - storport!StorSubmitIoGatewayItem+38 (+0x06)
[ ff 33 db 39 5f 2c 7f 2e:00 00 00 ff 00 00 00 ff ]
fffff88001098237 - storport!StorSubmitIoGatewayItem+67 (+0x2f)
[ 00:ff ]
fffff88001098239-fffff8800109824b 19 bytes - storport!StorSubmitIoGatewayItem+69 (+0x02)
[ 40 b6 01 eb 1d 48 8d 4f:00 00 ff 00 00 00 ff 00 ]
fffff8800109824d-fffff88001098263 23 bytes - storport!StorSubmitIoGatewayItem+7d (+0x14)
[ 48 89 45 08 48 89 28 48:00 00 ff 00 00 02 ff 00 ]
fffff88001098266-fffff8800109826e 9 bytes - storport!StorSubmitIoGatewayItem+96 (+0x19)
[ 40 3a f3 74 70 48 8d 4f:10 ff 00 00 10 ff 00 00 ]
fffff88001098270-fffff88001098273 4 bytes - storport!StorSubmitIoGatewayItem+a0 (+0x0a)
[ 15 4b ce 00:00 00 0f ff ]
fffff88001098275-fffff880010982dc 104 bytes - storport!StorSubmitIoGatewayItem+a5 (+0x05)
[ 4c 8b d8 48 8d 48 10 48:00 0f ff 00 00 0f ff 00 ]
fffff880010982de-fffff88001098318 59 bytes - storport!StorSubmitIoGatewayItem+10e (+0x69)
[ 00 00 48 8b 6c 24 58 48:0e ff 01 00 11 ff 01 00 ]
fffff8800109831a-fffff88001098394 123 bytes - storport!RaidUnitConvertToNormalUnit+a (+0x3c)
[ 00 00 20 48 8b d9 74 18:0e ff 00 00 0e ff 00 00 ]
fffff88001098396-fffff880010983a6 17 bytes - storport!RaidUnitGetCompatibleIds+16 (+0x7c)
[ 00 00 48 8b f1 8d 4a c9:10 ff 00 00 0f ff 00 00 ]
fffff880010983a8-fffff880010983b3 12 bytes - storport!RaidUnitGetCompatibleIds+28 (+0x12)
[ ff 33 ed 48 8b d8 48 3b:00 00 0f ff 00 00 0f ff ]
fffff880010983b6-fffff8800109843f 138 bytes - storport!RaidUnitGetCompatibleIds+36 (+0x0e)
[ 00 48 8b 4e 50 8d 55 1c:0f ff 00 00 0f ff 01 01 ]
fffff88001098500-fffff8800109850a 11 bytes - storport!RaidUnitGetHardwareIds+80 (+0x14a)
[ 78 08 48 8b e8 48 8d 05:22 23 20 ff 22 23 20 ff ]
fffff8800109850c-fffff88001098536 43 bytes - storport!RaidUnitGetHardwareIds+8c (+0x0c)
[ 48 89 7c 24 38 48 89 4c:21 22 20 ff 21 22 20 ff ]
fffff88001098538-fffff8800109855b 36 bytes - storport!RaidUnitGetHardwareIds+b8 (+0x2c)
[ 48 8b 8c 24 80 00 00 00:03 06 03 ff 03 06 03 ff ]
fffff8800109855d-fffff88001098563 7 bytes - storport!RaidUnitGetHardwareIds+dd (+0x25)
[ 48 89 94 24 88 00 00:00 1d ff 00 00 23 ff ]
fffff88001098565-fffff88001098568 4 bytes - storport!RaidUnitGetHardwareIds+e5 (+0x08)
[ 0f 8c d9 01:00 25 ff 00 ]
fffff8800109856a-fffff88001098571 8 bytes - storport!RaidUnitGetHardwareIds+ea (+0x05)
[ 00 48 8b 45 00 4c 89 64:24 ff 00 00 24 ff 00 00 ]
fffff88001098573-fffff88001098582 16 bytes - storport!RaidUnitGetHardwareIds+f3 (+0x09)
[ 40 48 89 7c 24 38 48 89:ff 00 00 24 ff 00 00 24 ]
fffff88001098584-fffff8800109858b 8 bytes - storport!RaidUnitGetHardwareIds+104 (+0x11)
[ ff 4c 8d 8c 24 88 00 00:00 00 23 ff 00 00 23 ff ]
fffff8800109858d-fffff88001098597 11 bytes - storport!RaidUnitGetHardwareIds+10d (+0x09)
[ 48 89 44 24 28 4c 8d 84:00 22 ff 00 00 22 ff 00 ]
fffff8800109859a-fffff880010985a2 9 bytes - storport!RaidUnitGetHardwareIds+11a (+0x0d)
[ 4c 89 74 24 20 e8 9c bf:21 ff 00 00 21 ff 00 00 ]
fffff880010985a4-fffff880010985a8 5 bytes - storport!RaidUnitGetHardwareIds+124 (+0x0a)
[ 48 8b 8c 24 80:00 00 20 ff 00 ]
fffff880010985aa-fffff880010985b0 7 bytes - storport!RaidUnitGetHardwareIds+12a (+0x06)
[ 00 00 48 8b 94 24 88:20 ff 00 00 20 ff 00 ]
fffff880010985b2-fffff880010985c3 18 bytes - storport!RaidUnitGetHardwareIds+132 (+0x08)
[ 00 00 48 83 c1 02 48 ff:20 ff 00 00 21 ff 00 00 ]
fffff880010985c6-fffff880010985cb 6 bytes - storport!RaidUnitGetHardwareIds+146 (+0x14)
[ 48 89 94 24 88 00:21 ff 00 00 21 ff ]
fffff880010985ce-fffff880010985d4 7 bytes - storport!RaidUnitGetHardwareIds+14e (+0x08)
[ 44 8b d8 0f 8c 6d 01:21 ff 00 00 21 ff 00 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
3767 errors : !storport (fffff88001098000-fffff88001098fff)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE_4096
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE_4096
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE_4096
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051311-19671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16792.amd64fre.win7_gdr.110408-1633
Machine Name:
Kernel base = 0xfffff800`02a1b000 PsLoadedModuleList = 0xfffff800`02c58e50
Debug session time: Fri May 13 10:03:57.236 2011 (UTC - 4:00)
System Uptime: 0 days 0:28:06.000
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff88064d30428, 2, 1, fffff880010cfeba}
Unable to load image \SystemRoot\system32\DRIVERS\nvstor64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvstor64.sys
*** ERROR: Module load completed but symbols could not be loaded for nvstor64.sys
Probably caused by : nvstor64.sys ( nvstor64+1ceba )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff88064d30428, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880010cfeba, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc30e0
fffff88064d30428
CURRENT_IRQL: 2
FAULTING_IP:
nvstor64+1ceba
fffff880`010cfeba 5d pop rbp
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800ca70270 -- (.trap 0xfffff8800ca70270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880010d04e8 rbx=0000000000000000 rcx=fffff88003d30380
rdx=00000000c0000010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880010cfeba rsp=fffff8800ca70400 rbp=fffffa8004aeb000
r8=0000000000000000 r9=0000000000000002 r10=fffff88003d300e8
r11=fffff88003d303c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvstor64+0x1ceba:
fffff880`010cfeba 5d pop rbp
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a8ac69 to fffff80002a8b700
STACK_TEXT:
fffff880`0ca70128 fffff800`02a8ac69 : 00000000`0000000a fffff880`64d30428 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0ca70130 fffff800`02a898e0 : 00000008`00000008 fffff880`03d30380 0000000c`00000040 ffffffff`0000000c : nt!KiBugCheckDispatch+0x69
fffff880`0ca70270 fffff880`010cfeba : 00000000`00000002 00000000`00000000 fffffa80`04af6008 fffffa80`04ad61b0 : nt!KiPageFault+0x260
fffff880`0ca70400 00000000`00000002 : 00000000`00000000 fffffa80`04af6008 fffffa80`04ad61b0 fffff880`03d30380 : nvstor64+0x1ceba
fffff880`0ca70408 00000000`00000000 : fffffa80`04af6008 fffffa80`04ad61b0 fffff880`03d30380 fffff880`010b8372 : 0x2
STACK_COMMAND: kb
FOLLOWUP_IP:
nvstor64+1ceba
fffff880`010cfeba 5d pop rbp
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvstor64+1ceba
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvstor64
IMAGE_NAME: nvstor64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bbef1e1
FAILURE_BUCKET_ID: X64_0xD1_nvstor64+1ceba
BUCKET_ID: X64_0xD1_nvstor64+1ceba
Followup: MachineOwner
---------