Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123010-26707-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a4b000 PsLoadedModuleList = 0xfffff800`02c88e50
Debug session time: Thu Dec 30 09:33:11.929 2010 (UTC - 5:00)
System Uptime: 0 days 10:24:53.171
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.......................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff80068c431c9, 2, 8, fffff80068c431c9}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80068c431c9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff80068c431c9, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf30e0
fffff80068c431c9
CURRENT_IRQL: 2
FAULTING_IP:
+3361373062303637
fffff800`68c431c9 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: iPodService.ex
TRAP_FRAME: fffff8800247c040 -- (.trap 0xfffff8800247c040)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000005e15420 rbx=0000000000000000 rcx=fffffa8006a33180
rdx=fffff8800247c520 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80068c431c9 rsp=fffff8800247c1d8 rbp=0000000000000003
r8=0000000000000003 r9=0000000000000000 r10=0000000000000003
r11=fffffa8006a33168 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
fffff800`68c431c9 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002abaca9 to fffff80002abb740
FAILED_INSTRUCTION_ADDRESS:
+3361373062303637
fffff800`68c431c9 ?? ???
STACK_TEXT:
fffff880`0247bef8 fffff800`02abaca9 : 00000000`0000000a fffff800`68c431c9 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff880`0247bf00 fffff800`02ab9920 : fffff880`0247c070 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`0247c040 fffff800`68c431c9 : fffff800`02abf03c fffff8a0`0b680060 fffff800`02dd0cd0 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0247c1d8 fffff800`02abf03c : fffff8a0`0b680060 fffff800`02dd0cd0 00000000`00000000 fffffa80`04274700 : 0xfffff800`68c431c9
fffff880`0247c1e0 fffff800`02db72ef : 00000000`00000003 fffff880`0247c520 fffff880`00000000 fffff880`00000006 : nt!KeWaitForMultipleObjects+0x563
fffff880`0247c490 fffff800`02db7bf2 : 00000000`04b73e01 00000001`00000000 001f0003`00000000 00000000`001f0001 : nt!ObpWaitForMultipleObjects+0x294
fffff880`0247c960 fffff800`02aba993 : fffffa80`06a33060 00000000`02abf298 fffff880`0247cbc8 00000000`00000000 : nt!NtWaitForMultipleObjects+0xe5
fffff880`0247cbb0 00000000`76e9030a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02abf278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e9030a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`02ab9920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_nt!KiPageFault+260
BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_nt!KiPageFault+260
Followup: MachineOwner
---------