Loading Dump File [D:\ DOWNLOADS\ DUMPS\Liv Lukas\020311-33165-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\XSymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02062000 PsLoadedModuleList = 0xfffff800`0229fe50
Debug session time: Thu Feb 3 09:50:42.790 2011 (UTC + 0:00)
System Uptime: 0 days 4:39:43.508
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff8a0013d9048, 2, 0, fffff88001125fa9}
Unable to load image \SystemRoot\system32\DRIVERS\stflt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for stflt.sys
*** ERROR: Module load completed but symbols could not be loaded for stflt.sys
Probably caused by : stflt.sys ( stflt+1ed9 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8a0013d9048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001125fa9, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000230a0e0
fffff8a0013d9048
CURRENT_IRQL: 2
FAULTING_IP:
fltmgr!GetContextFromStreamList+99
fffff880`01125fa9 488b4820 mov rcx,qword ptr [rax+20h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff880009fe7c0 -- (.trap 0xfffff880009fe7c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a0013d9028 rbx=0000000000000000 rcx=fffffa8007acbe70
rdx=fffffa8007ad35f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001125fa9 rsp=fffff880009fe950 rbp=fffffa8008858798
r8=fffffa80081f8510 r9=fffff880009fea68 r10=fffffa8007acbe78
r11=0000000000000011 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
fltmgr!GetContextFromStreamList+0x99:
fffff880`01125fa9 488b4820 mov rcx,qword ptr [rax+20h] ds:003c:fffff8a0`013d9048=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800020d1ca9 to fffff800020d2740
STACK_TEXT:
fffff880`009fe678 fffff800`020d1ca9 : 00000000`0000000a fffff8a0`013d9048 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009fe680 fffff800`020d0920 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe468`a021d54e : nt!KiBugCheckDispatch+0x69
fffff880`009fe7c0 fffff880`01125fa9 : 00000000`00000000 00000000`00000000 fffff880`009fea00 fffff880`0112532e : nt!KiPageFault+0x260
fffff880`009fe950 fffff880`01125533 : fffffa80`07acbe70 fffffa80`07acbe70 fffffa80`08858690 fffffa80`081f8510 : fltmgr!GetContextFromStreamList+0x99
fffff880`009fe9d0 fffff880`0457fed9 : fffffa80`07acbe70 00000000`00000000 fffff880`009feaa8 fffff880`009feaa8 : fltmgr!FltGetStreamHandleContext+0x43
fffff880`009fea00 fffffa80`07acbe70 : 00000000`00000000 fffff880`009feaa8 fffff880`009feaa8 00000000`00000000 : stflt+0x1ed9
fffff880`009fea08 00000000`00000000 : fffff880`009feaa8 fffff880`009feaa8 00000000`00000000 fffff880`0112a31a : 0xfffffa80`07acbe70
STACK_COMMAND: kb
FOLLOWUP_IP:
stflt+1ed9
fffff880`0457fed9 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: stflt+1ed9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: stflt
IMAGE_NAME: stflt.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c2b57fc
FAILURE_BUCKET_ID: X64_0xD1_stflt+1ed9
BUCKET_ID: X64_0xD1_stflt+1ed9
Followup: MachineOwner