Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-15537-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03005000 PsLoadedModuleList = 0xfffff800`03242e50
Debug session time: Tue Feb 1 02:17:05.071 2011 (UTC - 5:00)
System Uptime: 0 days 15:32:22.819
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 5, 8, 0}
Unable to load image \SystemRoot\system32\DRIVERS\ahcix64s.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ahcix64s.sys
*** ERROR: Module load completed but symbols could not be loaded for ahcix64s.sys
Probably caused by : ahcix64s.sys ( ahcix64s+4895 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000005, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032ad0e0
0000000000000000
CURRENT_IRQL: 5
FAULTING_IP:
+3039333339383461
00000000`00000000 ?? ???
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: fffff80000b9c320 -- (.trap 0xfffff80000b9c320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8007a29730 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff80000b9c4b8 rbp=0000000000040bf1
r8=0000000000000000 r9=fffffa8007a293c8 r10=0000000000000028
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
00000000`00000000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003074ca9 to fffff80003075740
FAILED_INSTRUCTION_ADDRESS:
+3039333339383461
00000000`00000000 ?? ???
STACK_TEXT:
fffff800`00b9c4b8 fffff880`01996895 : fffff800`031f2080 fffff800`031fdc40 fffffa80`0760f600 fffff880`01a2a934 : 0x0
fffff800`00b9c4c0 fffff800`031f2080 : fffff800`031fdc40 fffffa80`0760f600 fffff880`01a2a934 fffffa80`07a29730 : ahcix64s+0x4895
fffff800`00b9c4c8 fffff800`031fdc40 : fffffa80`0760f600 fffff880`01a2a934 fffffa80`07a29730 00000028`00000000 : nt!KiInitialPCR+0x2380
fffff800`00b9c4d0 fffffa80`0760f600 : fffff880`01a2a934 fffffa80`07a29730 00000028`00000000 fffff800`031f2080 : nt!KiInitialThread
fffff800`00b9c4d8 fffff880`01a2a934 : fffffa80`07a29730 00000028`00000000 fffff800`031f2080 fffff800`031fdc40 : 0xfffffa80`0760f600
fffff800`00b9c4e0 fffff880`01a22228 : fffffa80`0760f600 00000000`00000002 00000000`00000000 fffff800`035e8b7f : storport!RaidAdapterAcquireInterruptLock+0x74
fffff800`00b9c510 fffff800`0308129e : fffff800`00b9c600 fffffa80`0c0b53d0 00000000`40070000 00000000`0000000f : storport!RaidpAdapterTimerDpcRoutine+0x68
fffff800`00b9c570 fffff800`03080dd6 : fffffa80`08ec84f0 00000000`0036b807 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`00b9c5e0 fffff800`030814be : 00000082`4084c7e3 fffff800`00b9cc58 00000000`0036b807 fffff800`031f2368 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9cc30 fffff800`03080cb7 : 00000026`28fc58c2 00000026`0036b807 00000026`28fc5813 00000000`00000007 : nt!KiTimerExpiration+0x1be
fffff800`00b9ccd0 fffff800`0307deea : fffff800`031efe80 fffff800`031fdc40 00000000`00000000 fffff880`01a324d0 : nt!KiRetireDpcList+0x277
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: .trap 0xfffff80000b9c320 ; kb
FOLLOWUP_IP:
ahcix64s+4895
fffff880`01996895 488d4c2420 lea rcx,[rsp+20h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: ahcix64s+4895
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ahcix64s
IMAGE_NAME: ahcix64s.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4aba1a1f
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_ahcix64s+4895
BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_ahcix64s+4895
Followup: MachineOwner
---------