Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123010-24492-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c04000 PsLoadedModuleList = 0xfffff800`02e41e50
Debug session time: Thu Dec 30 18:25:38.202 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:59.090
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002c547e7, 0, 7efa0000}
Probably caused by : ntkrnlmp.exe ( nt!RtlImageNtHeaderEx+3f )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002c547e7, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000000007efa0000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!RtlImageNtHeaderEx+3f
fffff800`02c547e7 66390a cmp word ptr [rdx],cx
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000007efa0000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eac0e0
000000007efa0000
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: hpqWmiEx.exe
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff880088e0768 -- (.exr 0xfffff880088e0768)
ExceptionAddress: fffff80002c547e7 (nt!RtlImageNtHeaderEx+0x000000000000003f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000007efa0000
Attempt to read from address 000000007efa0000
TRAP_FRAME: fffff880088e0810 -- (.trap 0xfffff880088e0810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000005a4d
rdx=000000007efa0000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c547e7 rsp=fffff880088e09a8 rbp=fffff880088e0ae0
r8=0000000000000000 r9=fffff880088e09e8 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlImageNtHeaderEx+0x3f:
fffff800`02c547e7 66390a cmp word ptr [rdx],cx ds:00000000`7efa0000=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002caea39 to fffff80002c74740
STACK_TEXT:
fffff880`088dff98 fffff800`02caea39 : 00000000`0000001e ffffffff`c0000005 fffff800`02c547e7 00000000`00000000 : nt!KeBugCheckEx
fffff880`088dffa0 fffff800`02c73d82 : fffff880`088e0768 fffffa80`051ecc90 fffff880`088e0810 fffffa80`051a2040 : nt!KiDispatchException+0x1b9
fffff880`088e0630 fffff800`02c728fa : 00000000`00000000 fffffa80`051ecc90 fffffa80`051a2000 fffff880`088e0970 : nt!KiExceptionDispatch+0xc2
fffff880`088e0810 fffff800`02c547e7 : fffff800`02c54872 00000000`00000010 00000000`00000082 fffff880`088e09d8 : nt!KiPageFault+0x23a
fffff880`088e09a8 fffff800`02c54872 : 00000000`00000010 00000000`00000082 fffff880`088e09d8 fffffa80`051a2040 : nt!RtlImageNtHeaderEx+0x3f
fffff880`088e09b0 fffffa80`046e5d7c : fffff880`088e0ae0 00000000`00000000 fffffa80`046ea260 fffffa80`046ee5a0 : nt!RtlImageNtHeader+0x1e
fffff880`088e09e0 fffff880`088e0ae0 : 00000000`00000000 fffffa80`046ea260 fffffa80`046ee5a0 00000000`00000000 : 0xfffffa80`046e5d7c
fffff880`088e09e8 00000000`00000000 : fffffa80`046ea260 fffffa80`046ee5a0 00000000`00000000 00000000`00000000 : 0xfffff880`088e0ae0
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlImageNtHeaderEx+3f
fffff800`02c547e7 66390a cmp word ptr [rdx],cx
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!RtlImageNtHeaderEx+3f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f
BUCKET_ID: X64_0x1E_c0000005_nt!RtlImageNtHeaderEx+3f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123010-27284-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c1d000 PsLoadedModuleList = 0xfffff800`02e5ae50
Debug session time: Thu Dec 30 21:56:37.464 2010 (UTC - 5:00)
System Uptime: 0 days 0:02:09.353
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {dc, 2, 1, fffff80002c69055}
Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000000dc, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002c69055, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec50e0
00000000000000dc
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeStackAttachProcess+115
fffff800`02c69055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88007cc37d0 -- (.trap 0xfffff88007cc37d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=fffffa8006bd20a0
rdx=fffff88007cc3ab8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c69055 rsp=fffff88007cc3960 rbp=fffff88007cc3ab8
r8=fffffa8006bd2090 r9=0000000000000130 r10=fffff880009e90c0
r11=fffffa8006bd2040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeStackAttachProcess+0x115:
fffff800`02c69055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax ds:00000000`000000dc=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c8cca9 to fffff80002c8d740
STACK_TEXT:
fffff880`07cc3688 fffff800`02c8cca9 : 00000000`0000000a 00000000`000000dc 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`07cc3690 fffff800`02c8b920 : 00000000`00000000 fffffa80`06bd2040 00000000`00440042 fffffa80`046ed390 : nt!KiBugCheckDispatch+0x69
fffff880`07cc37d0 fffff800`02c69055 : fffffa80`06bd2040 00000000`00000002 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`07cc3960 fffffa80`046e4c40 : fffff880`07cc3ae0 fffff800`02c93ae2 00000000`0b540f1a fffff800`02e07e80 : nt!KeStackAttachProcess+0x115
fffff880`07cc39e0 fffff880`07cc3ae0 : fffff800`02c93ae2 00000000`0b540f1a fffff800`02e07e80 5d746365`6a6e695b : 0xfffffa80`046e4c40
fffff880`07cc39e8 fffff800`02c93ae2 : 00000000`0b540f1a fffff800`02e07e80 5d746365`6a6e695b fffffa80`06000a0d : 0xfffff880`07cc3ae0
fffff880`07cc39f0 fffff800`02c935da : fffff880`07cc3c80 00000000`00000000 00000000`00000000 fffff800`02dd0ae0 : nt!SwapContext_PatchXRstor+0xfc
fffff880`07cc3a30 00000000`00000000 : 00000000`00000000 fffffa80`00000200 00000000`00000000 00000000`00000000 : nt!KiSwapContext+0x7a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeStackAttachProcess+115
fffff800`02c69055 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KeStackAttachProcess+115
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KeStackAttachProcess+115
BUCKET_ID: X64_0xA_nt!KeStackAttachProcess+115
Followup: MachineOwner
---------