Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121210-23712-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02453000 PsLoadedModuleList = 0xfffff800`02690e50
Debug session time: Sun Dec 12 05:37:19.947 2010 (UTC - 5:00)
System Uptime: 0 days 0:02:50.447
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
...................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff880041b5738, 2, 0, fffff88001126ee1}
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+4aee1 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff880041b5738, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001126ee1, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800026fb0e0
fffff880041b5738
CURRENT_IRQL: 2
FAULTING_IP:
iaStor+4aee1
fffff880`01126ee1 4c8b6138 mov r12,qword ptr [rcx+38h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88001dd59f0 -- (.trap 0xfffff88001dd59f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004b15c68 rbx=0000000000000000 rcx=fffff880041b5700
rdx=fffffa8005c12160 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001126ee1 rsp=fffff88001dd5b80 rbp=fffffa8005c12160
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=fffffa80069bedf0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
iaStor+0x4aee1:
fffff880`01126ee1 4c8b6138 mov r12,qword ptr [rcx+38h] ds:002d:fffff880`041b5738=0000000000000000
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800024c2ca9 to fffff800024c3740
STACK_TEXT:
fffff880`01dd58a8 fffff800`024c2ca9 : 00000000`0000000a fffff880`041b5738 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`01dd58b0 fffff800`024c1920 : 00000000`18daf10f fffffa80`05c28700 fffff880`01dd5db0 fffffa80`03d1bb60 : nt!KiBugCheckDispatch+0x69
fffff880`01dd59f0 fffff880`01126ee1 : fffffa80`04b15000 0000057f`fa156fd8 00000000`00000000 fffffa80`05c28700 : nt!KiPageFault+0x260
fffff880`01dd5b80 fffffa80`04b15000 : 0000057f`fa156fd8 00000000`00000000 fffffa80`05c28700 00000000`c0000001 : iaStor+0x4aee1
fffff880`01dd5b88 0000057f`fa156fd8 : 00000000`00000000 fffffa80`05c28700 00000000`c0000001 fffff880`02ee94ba : 0xfffffa80`04b15000
fffff880`01dd5b90 00000000`00000000 : fffffa80`05c28700 00000000`c0000001 fffff880`02ee94ba 00000000`00000000 : 0x57f`fa156fd8
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStor+4aee1
fffff880`01126ee1 4c8b6138 mov r12,qword ptr [rcx+38h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStor+4aee1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a287aa4
FAILURE_BUCKET_ID: X64_0xD1_iaStor+4aee1
BUCKET_ID: X64_0xD1_iaStor+4aee1
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121210-20482-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03057000 PsLoadedModuleList = 0xfffff800`03294e50
Debug session time: Sun Dec 12 05:54:22.878 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:42.798
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 1, fffff880010eb771}
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+4a771 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880010eb771, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ff0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
iaStor+4a771
fffff880`010eb771 488911 mov qword ptr [rcx],rdx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: dwm.exe
TRAP_FRAME: fffff880009b0920 -- (.trap 0xfffff880009b0920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880010eb771 rsp=fffff880009b0ab0 rbp=0000000000000000
r8=fffffa8004745000 r9=0000000000000000 r10=fffff880010a66b8
r11=fffff88006334948 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
iaStor+0x4a771:
fffff880`010eb771 488911 mov qword ptr [rcx],rdx ds:0246:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030c6ca9 to fffff800030c7740
STACK_TEXT:
fffff880`009b07d8 fffff800`030c6ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009b07e0 fffff800`030c5920 : 00000000`00000000 00000000`00000000 fffffa80`03d25c68 fffff800`030a6e05 : nt!KiBugCheckDispatch+0x69
fffff880`009b0920 fffff880`010eb771 : fffffa80`04745ad0 fffffa80`03c9b1a0 fffffa80`0814c6c1 00000000`00000000 : nt!KiPageFault+0x260
fffff880`009b0ab0 fffffa80`04745ad0 : fffffa80`03c9b1a0 fffffa80`0814c6c1 00000000`00000000 00000000`00000001 : iaStor+0x4a771
fffff880`009b0ab8 fffffa80`03c9b1a0 : fffffa80`0814c6c1 00000000`00000000 00000000`00000001 fffffa80`03c9b1a0 : 0xfffffa80`04745ad0
fffff880`009b0ac0 fffffa80`0814c6c1 : 00000000`00000000 00000000`00000001 fffffa80`03c9b1a0 fffff800`03241e80 : 0xfffffa80`03c9b1a0
fffff880`009b0ac8 00000000`00000000 : 00000000`00000001 fffffa80`03c9b1a0 fffff800`03241e80 fffff880`010f3733 : 0xfffffa80`0814c6c1
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStor+4a771
fffff880`010eb771 488911 mov qword ptr [rcx],rdx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStor+4a771
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a287aa4
FAILURE_BUCKET_ID: X64_0xD1_iaStor+4a771
BUCKET_ID: X64_0xD1_iaStor+4a771
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121210-20935-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03019000 PsLoadedModuleList = 0xfffff800`03256e50
Debug session time: Sun Dec 12 05:41:23.952 2010 (UTC - 5:00)
System Uptime: 0 days 0:03:10.871
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {19000002ac, 2, 0, fffff8800104ff2b}
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+4af2b )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000019000002ac, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800104ff2b, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c10e0
00000019000002ac
CURRENT_IRQL: 2
FAULTING_IP:
iaStor+4af2b
fffff880`0104ff2b 498b5520 mov rdx,qword ptr [r13+20h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880087559f0 -- (.trap 0xfffff880087559f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000026161 rbx=0000000000000000 rcx=fffff88008f716b0
rdx=fffffa8003ea2920 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800104ff2b rsp=fffff88008755b80 rbp=fffffa8003ea2920
r8=fffff80003019000 r9=0000000000000000 r10=00000000000094bf
r11=fffffa8008196c00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
iaStor+0x4af2b:
fffff880`0104ff2b 498b5520 mov rdx,qword ptr [r13+20h] ds:0001:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003088ca9 to fffff80003089740
STACK_TEXT:
fffff880`087558a8 fffff800`03088ca9 : 00000000`0000000a 00000019`000002ac 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`087558b0 fffff800`03087920 : fffffa80`065a0650 00000000`00002fcb 00000000`00000002 fffff880`03d7d630 : nt!KiBugCheckDispatch+0x69
fffff880`087559f0 fffff880`0104ff2b : fffffa80`04b62000 00000000`00000002 00000000`00000000 fffffa80`075f4c00 : nt!KiPageFault+0x260
fffff880`08755b80 fffffa80`04b62000 : 00000000`00000002 00000000`00000000 fffffa80`075f4c00 00000000`000007ff : iaStor+0x4af2b
fffff880`08755b88 00000000`00000002 : 00000000`00000000 fffffa80`075f4c00 00000000`000007ff 00000000`00000020 : 0xfffffa80`04b62000
fffff880`08755b90 00000000`00000000 : fffffa80`075f4c00 00000000`000007ff 00000000`00000020 fffff8a0`05e47170 : 0x2
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStor+4af2b
fffff880`0104ff2b 498b5520 mov rdx,qword ptr [r13+20h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStor+4af2b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a287aa4
FAILURE_BUCKET_ID: X64_0xD1_iaStor+4af2b
BUCKET_ID: X64_0xD1_iaStor+4af2b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121210-21356-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03011000 PsLoadedModuleList = 0xfffff800`0324ee50
Debug session time: Sun Dec 12 05:29:32.951 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:25.871
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffffffffffe1, 1, fffff880010d24ff, 0}
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Could not read faulting driver name
Probably caused by : iaStor.sys ( iaStor+524ff )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffe1, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff880010d24ff, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b90e0
ffffffffffffffe1
FAULTING_IP:
iaStor+524ff
fffff880`010d24ff 48894620 mov qword ptr [rsi+20h],rax
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880033176d0 -- (.trap 0xfffff880033176d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=7fffffffffffffff rbx=0000000000000000 rcx=fffffa8004aee000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880010d24ff rsp=fffff88003317860 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=fffff880010856b8
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
iaStor+0x524ff:
fffff880`010d24ff 48894620 mov qword ptr [rsi+20h],rax ds:e36e:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003101f14 to fffff80003081740
STACK_TEXT:
fffff880`03317568 fffff800`03101f14 : 00000000`00000050 ffffffff`ffffffe1 00000000`00000001 fffff880`033176d0 : nt!KeBugCheckEx
fffff880`03317570 fffff800`0307f82e : 00000000`00000001 fffff880`02c146b0 fffffa80`00020000 fffffa80`03c9db00 : nt! ?? ::FNODOBFM::`string'+0x42837
fffff880`033176d0 fffff880`010d24ff : fffffa80`06167db0 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`03317860 fffffa80`06167db0 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : iaStor+0x524ff
fffff880`03317868 00000000`00000001 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`06167db0
fffff880`03317870 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStor+524ff
fffff880`010d24ff 48894620 mov qword ptr [rsi+20h],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStor+524ff
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a287aa4
FAILURE_BUCKET_ID: X64_0x50_iaStor+524ff
BUCKET_ID: X64_0x50_iaStor+524ff
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121210-23306-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0305b000 PsLoadedModuleList = 0xfffff800`03298e50
Debug session time: Sun Dec 12 05:56:36.867 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:49.802
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff8800110a7cb, fffff88002fb67c8, fffff88002fb6030}
Probably caused by : iaStor.sys ( iaStor+527cb )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8800110a7cb, The address that the exception occurred at
Arg3: fffff88002fb67c8, Exception Record Address
Arg4: fffff88002fb6030, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
iaStor+527cb
fffff880`0110a7cb 80380e cmp byte ptr [rax],0Eh
EXCEPTION_RECORD: fffff88002fb67c8 -- (.exr 0xfffff88002fb67c8)
ExceptionAddress: fffff8800110a7cb (iaStor+0x00000000000527cb)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: fffff88002fb6030 -- (.cxr 0xfffff88002fb6030)
rax=0000000000000000 rbx=fffff880066d5700 rcx=fffffa80077ec200
rdx=fffffa800818b4f1 rsi=fffff88002d63140 rdi=fffffa80077ec200
rip=fffff8800110a7cb rsp=fffff88002fb6a08 rbp=fffffa8004b63c68
r8=fffffa800818b4f0 r9=0000000000000000 r10=fffffa8004b63d80
r11=fffff88002d63140 r12=fffffa8004b63000 r13=0000000000000000
r14=0000000000000009 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
iaStor+0x527cb:
fffff880`0110a7cb 80380e cmp byte ptr [rax],0Eh ds:002b:00000000`00000000=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800033030e0
0000000000000000
FOLLOWUP_IP:
iaStor+527cb
fffff880`0110a7cb 80380e cmp byte ptr [rax],0Eh
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff88001102cc2 to fffff8800110a7cb
STACK_TEXT:
fffff880`02fb6a08 fffff880`01102cc2 : fffff880`066d5700 fffff880`02d63140 00000000`00000000 fffffa80`04b63000 : iaStor+0x527cb
fffff880`02fb6a10 fffff880`066d5700 : fffff880`02d63140 00000000`00000000 fffffa80`04b63000 fffffa80`08367410 : iaStor+0x4acc2
fffff880`02fb6a18 fffff880`02d63140 : 00000000`00000000 fffffa80`04b63000 fffffa80`08367410 fffffa80`083f39a0 : 0xfffff880`066d5700
fffff880`02fb6a20 00000000`00000000 : fffffa80`04b63000 fffffa80`08367410 fffffa80`083f39a0 fffffa80`04b68e09 : 0xfffff880`02d63140
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: iaStor+527cb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a287aa4
STACK_COMMAND: .cxr 0xfffff88002fb6030 ; kb
FAILURE_BUCKET_ID: X64_0x7E_iaStor+527cb
BUCKET_ID: X64_0x7E_iaStor+527cb
Followup: MachineOwner
---------