Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020411-259492-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a3d000 PsLoadedModuleList = 0x82b85810
Debug session time: Fri Feb 4 07:32:35.723 2011 (UTC - 5:00)
System Uptime: 0 days 6:01:25.783
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.........
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: c0415e78, lock type that was held (value 1,2,3, or PTE address)
Arg2: c0000185, error status (normally i/o status code)
Arg3: 40ad7860, current process (virtual address for lock type 3, or PTE)
Arg4: 82bcf7db, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
GetPointerFromAddress: unable to read from 82ba5700
ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.
DISK_HARDWARE_ERROR: There was error with disk hardware
BUGCHECK_STR: 0x7a_c0000185
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: 8a91fc90 -- (.trap 0xffffffff8a91fc90)
ErrCode = 00000010
eax=82bcf7db ebx=82b775bc ecx=00000000 edx=00000000 esi=84881a70 edi=82ba31b0
eip=82bcf7db esp=8a91fd04 ebp=8a91fd50 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!IopErrorLogThread:
82bcf7db 00fc add ah,bh
Resetting default scope
LAST_CONTROL_TRANSFER: from 82af160a to 82b19d10
STACK_TEXT:
8a91faec 82af160a 0000007a c0415e78 c0000185 nt!KeBugCheckEx+0x1e
8a91fb60 82ae90d5 850484cc 8a91fbb8 82b71540 nt!MiWaitForInPageComplete+0x2fd
8a91fbf4 82ac4e3f 82b71540 82bcf7db 85048438 nt!MiIssueHardFault+0x3b2
8a91fc78 82a835f8 00000008 82bcf7db 00000000 nt!MmAccessFault+0x2656
8a91fc78 82bcf7db 00000008 82bcf7db 00000000 nt!KiTrap0E+0xdc
8a91fd50 82c4b66d 00000001 93de2e64 00000000 nt!IopErrorLogThread
8a91fd90 82afd0d9 82aaae1e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
82bcf000-82bcf016 23 bytes - nt!LdrResGetRCConfig+298
[ d2 e9 60 fe ff ff 8b 55:5c 6d 70 ff 5f 6f 72 ff ]
82bcf018-82bcf042 43 bytes - nt!LdrResGetRCConfig+2b0 (+0x18)
[ 7d 02 33 d2 80 7d 18 00:89 89 89 ff 89 89 89 ff ]
82bcf044-82bcf04b 8 bytes - nt!LdrResGetRCConfig+2dc (+0x2c)
[ c2 14 00 90 90 90 90 90:8e 8c 8c ff 8d 8b 8b ff ]
82bcf04d-82bcf12a 222 bytes - nt!LdrpSectionTableFromVirtualAddress+1 (+0x09)
[ ff 55 8b ec 85 c9 75 04:89 89 ff 88 86 86 ff 96 ]
82bcf12c-82bcf140 21 bytes - nt!MiSessionWideReserveImageAddress+e (+0xdf)
[ 0f 31 53 c1 e8 04 56 89:fc fc fc 00 fc fc fc 00 ]
82bcf142-82bcf159 24 bytes - nt!MiSessionWideReserveImageAddress+24 (+0x16)
[ 59 ff 35 f8 0e b8 82 a8:00 00 00 00 00 00 00 00 ]
82bcf15d-82bcf1ba 94 bytes - nt!MiSessionWideReserveImageAddress+3f (+0x1b)
[ 03 c8 8b f9 57 56 89 7d:00 00 00 00 00 00 00 00 ]
82bcf1bc-82bcf1da 31 bytes - nt!MiSessionWideReserveImageAddress+9e (+0x5f)
[ 2b 7d f4 47 83 ff 40 73:58 6b 6e ff 5b 6b 6e ff ]
82bcf1dc-82bcf212 55 bytes - nt!MiSessionWideReserveImageAddress+be (+0x20)
[ 8b fb c1 e7 10 03 3d 18:89 89 89 ff 8b 8b 8b ff ]
82bcf214-82bcf216 3 bytes - nt!MiSessionWideReserveImageAddress+f6 (+0x38)
[ 75 10 57:91 94 92 ]
82bcf218-82bcf22a 19 bytes - nt!MiSessionWideReserveImageAddress+fa (+0x04)
[ 75 08 e8 d6 f6 ff ff 89:90 94 92 ff 93 95 93 ff ]
82bcf22c-82bcf27d 82 bytes - nt!MiSessionWideReserveImageAddress+10e (+0x14)
[ ff 75 f4 53 56 e8 28 7f:9f 9a 99 ff 9e 99 98 ff ]
82bcf27f-82bcf296 24 bytes - nt!IoOpenDeviceInterfaceRegistryKey+f (+0x53)
[ ec 0c 66 ff 88 84 00 00:ff 82 81 81 ff 7c 7a 7a ]
82bcf298-82bcf2f7 96 bytes - nt!IoOpenDeviceInterfaceRegistryKey+28 (+0x19)
[ 8d 44 24 0c 50 33 ff 57:4b 57 59 ff 4a 5a 5d ff ]
82bcf2fa-82bcf2fc 3 bytes - nt!IoOpenDeviceInterfaceRegistryKey+8a (+0x62)
[ 8d 81 84:00 00 00 ]
82bcf300-82bcf301 2 bytes - nt!IoOpenDeviceInterfaceRegistryKey+90 (+0x06)
[ 66 ff:00 00 ]
82bcf303-82bcf304 2 bytes - nt!IoOpenDeviceInterfaceRegistryKey+93 (+0x03)
[ 0f b7:00 00 ]
82bcf306-82bcf30e 9 bytes - nt!IoOpenDeviceInterfaceRegistryKey+96 (+0x03)
[ 66 3b c7 75 15 8d 41 40:00 00 00 00 00 00 00 00 ]
82bcf310-82bcf315 6 bytes - nt!IoOpenDeviceInterfaceRegistryKey+a0 (+0x0a)
[ 74 0e 66 39 b9 86:00 00 00 00 00 00 ]
82bcf319-82bcf329 17 bytes - nt!IoOpenDeviceInterfaceRegistryKey+a9 (+0x09)
[ 75 05 e8 ca 75 e9 ff 5f:00 00 00 00 00 00 00 00 ]
82bcf32b-82bcf342 24 bytes - nt!IoOpenDeviceInterfaceRegistryKey+bb (+0x12)
[ 90 90 90 90 90 8b ff 55:00 fc fc fc 00 fc fc fc ]
82bcf344-82bcf367 36 bytes - nt!LdrResFindResource+14 (+0x19)
[ 00 c0 eb 2f ff 75 24 8b:fc fc fc 00 fc fc fc 00 ]
82bcf369-82bcf390 40 bytes - nt!LdrResFindResource+39 (+0x25)
[ 6a 03 8d 45 f4 50 ff 75:fc fc 00 fc fc fc 00 fc ]
82bcf392-82bcf45a 201 bytes - nt!ExCovReadjustUnloadedModuleEntry+12 (+0x29)
[ f4 66 89 45 f6 8b 45 08:4c ff 35 48 50 ff 38 4b ]
82bcf45c-82bcf49e 67 bytes - nt!ExCovReadjustUnloadedModuleEntry+da (+0xca)
[ 8b 47 1c 3b 46 1c 75 7b:fc fc fc 00 fc fc fc 00 ]
82bcf4a0-82bcf4b4 21 bytes - nt!ExCovReadjustUnloadedModuleEntry+11e (+0x44)
[ 74 16 ff 77 1c 50 51 e8:fc fc fc 00 fc fc fc 00 ]
82bcf4b6-82bcf4f9 68 bytes - nt!ExCovReadjustUnloadedModuleEntry+134 (+0x16)
[ eb 4d 33 d2 f7 46 1c fc:00 00 00 00 00 00 00 00 ]
82bcf4fb-82bcf4fd 3 bytes - nt!ExCovReadjustUnloadedModuleEntry+177 (+0x45)
[ 80 7d 0c:00 00 00 ]
82bcf4ff-82bcf513 21 bytes - nt!ExCovReadjustUnloadedModuleEntry+17b (+0x04)
[ 75 04 c6 45 ff 01 b9 c0:00 00 00 00 00 00 00 00 ]
82bcf516-82bcf518 3 bytes - nt!ExCovReadjustUnloadedModuleEntry+192 (+0x17)
[ 8d 81 84:00 00 00 ]
82bcf51c-82bcf51d 2 bytes - nt!ExCovReadjustUnloadedModuleEntry+198 (+0x06)
[ 66 ff:00 00 ]
82bcf51f-82bcf520 2 bytes - nt!ExCovReadjustUnloadedModuleEntry+19b (+0x03)
[ 0f b7:00 00 ]
82bcf522-82bcf52a 9 bytes - nt!ExCovReadjustUnloadedModuleEntry+19e (+0x03)
[ 66 85 c0 75 16 8d 41 40:00 00 00 00 00 00 00 00 ]
82bcf52c-82bcf531 6 bytes - nt!ExCovReadjustUnloadedModuleEntry+1a8 (+0x0a)
[ 74 0f 66 83 b9 86:00 00 00 00 00 00 ]
82bcf536-82bcf53f 10 bytes - nt!ExCovReadjustUnloadedModuleEntry+1b2 (+0x0a)
[ 75 05 e8 ad 73 e9 ff 80:00 00 00 00 00 00 00 00 ]
82bcf541-82bcf549 9 bytes - nt!ExCovReadjustUnloadedModuleEntry+1bd (+0x0b)
[ 74 08 ff 75 08 e8 1c 5c:00 00 00 00 00 00 00 00 ]
82bcf54b-82bcf550 6 bytes - nt!ExCovReadjustUnloadedModuleEntry+1c7 (+0x0a)
[ 5f 5e 5b c9 c2 08:00 00 00 00 00 00 ]
82bcf552-82bcf566 21 bytes - nt!ExCovReadjustUnloadedModuleEntry+1ce (+0x07)
[ 90 90 90 90 90 8b ff 55:00 00 00 00 00 00 00 00 ]
82bcf569-82bcf56c 4 bytes - nt!MmUnloadSystemImage+12 (+0x17)
[ 66 ff 8e 84:00 00 00 00 ]
82bcf570-82bcf59e 47 bytes - nt!MmUnloadSystemImage+19 (+0x07)
[ 57 33 db 53 53 53 6a 12:00 00 00 00 00 00 00 00 ]
82bcf5a2-82bcf5a5 4 bytes - nt!MmUnloadSystemImage+4b (+0x32)
[ 0f b7 86 84:00 00 00 00 ]
82bcf5a9-82bcf5b1 9 bytes - nt!MmUnloadSystemImage+52 (+0x07)
[ 66 3b c3 75 15 8d 46 40:00 00 00 00 00 00 00 00 ]
82bcf5b3-82bcf5b8 6 bytes - nt!MmUnloadSystemImage+5c (+0x0a)
[ 74 0e 66 39 9e 86:00 00 00 00 00 00 ]
82bcf5bc-82bcf5ce 19 bytes - nt!MmUnloadSystemImage+65 (+0x09)
[ 75 05 e8 27 73 e9 ff 8b:00 00 00 00 00 00 00 00 ]
82bcf5d0-82bcf5e4 21 bytes - nt!MmUnloadSystemImage+79 (+0x14)
[ 90 90 90 90 90 8b ff 55:00 00 00 00 00 00 00 00 ]
82bcf5e8-82bcf5ed 6 bytes - nt!MiDereferenceImports+13 (+0x18)
[ 83 f8 fe 0f 84 ab:00 00 00 00 00 00 ]
82bcf5f1-82bcf601 17 bytes - nt!MiDereferenceImports+1c (+0x09)
[ a8 01 74 13 83 e0 fe 89:00 00 00 00 00 00 00 00 ]
82bcf605-82bcf60a 6 bytes - nt!MiDereferenceImports+30 (+0x14)
[ 89 45 08 83 65 fc:00 00 00 00 00 00 ]
82bcf60c-82bcf611 6 bytes - nt!MiDereferenceImports+37 (+0x07)
[ 57 8b 7d 08 83 3f:00 00 00 00 00 00 ]
82bcf613-82bcf615 3 bytes - nt!MiDereferenceImports+3e (+0x07)
[ 0f 86 82:00 00 00 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
3949 errors : !nt (82bcf000-82bcffff)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE_4096
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_4096
BUCKET_ID: MEMORY_CORRUPTION_LARGE_4096
Followup: memory_corruption
---------