Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121310-14031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c17000 PsLoadedModuleList = 0xfffff800`02e54e50
Debug session time: Mon Dec 13 04:45:58.271 2010 (UTC - 5:00)
System Uptime: 1 days 5:39:04.771
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffffffff49840f, 2, 0, fffff80002c92e67}
Probably caused by : ntkrnlmp.exe ( nt!KiProcessExpiredTimerList+157 )
Followup: MachineOwner
---------
1: kd>
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffff49840f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002c92e67, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ebf0e0
ffffffffff49840f
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiProcessExpiredTimerList+157
fffff800`02c92e67 4885f6 test rsi,rsi
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: FahCore_a3.exe
TRAP_FRAME: fffff88002f22680 -- (.trap 0xfffff88002f22680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=1b067f0492100000
rdx=ffffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c92e67 rsp=fffff88002f22810 rbp=fffffa8004ea3c68
r8=0000000000000008 r9=0000000000000008 r10=fffff80002c17000
r11=fffff88002f227e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiProcessExpiredTimerList+0x157:
fffff800`02c92e67 4885f6 test rsi,rsi
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c86ca9 to fffff80002c87740
STACK_TEXT:
fffff880`02f22538 fffff800`02c86ca9 : 00000000`0000000a ffffffff`ff49840f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f22540 fffff800`02c85920 : 00000000`00000000 fffffa80`04ea3c68 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f22680 fffff800`02c92e67 : fffffa80`04ea3c20 fffffa80`04ea3c68 fffffa80`04ea3c68 00000000`00000000 : nt!KiPageFault+0x260
fffff880`02f22810 fffff800`02c934be : 000000f8`88d7841b fffff880`02f22e88 00000000`00683e31 fffff880`009eaba8 : nt!KiProcessExpiredTimerList+0x157
fffff880`02f22e60 fffff800`02c92cb7 : fffff880`009e81c1 fffff880`00683e31 fffffa80`03c58050 00000000`00000031 : nt!KiTimerExpiration+0x1be
fffff880`02f22f00 fffff800`02c8d865 : 3441582e`3b532b37 fffffa80`056bbb60 00000000`00000000 fffff800`02d40230 : nt!KiRetireDpcList+0x277
fffff880`02f22fb0 fffff800`02c8d67c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`08161ba0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+157
fffff800`02c92e67 4885f6 test rsi,rsi
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiProcessExpiredTimerList+157
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiProcessExpiredTimerList+157
BUCKET_ID: X64_0xA_nt!KiProcessExpiredTimerList+157
Followup: MachineOwner
---------