Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\XPMUser\My Documents\122710-21075-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Documents and Settings\XPMUser\My Documents\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03009000 PsLoadedModuleList = 0xfffff800`03246e50
Debug session time: Mon Dec 27 05:32:54.740 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:36.675
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {f00019398, 2, 1, fffff80003099448}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000f00019398, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003099448, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b10e0
0000000f00019398
CURRENT_IRQL: 2
FAULTING_IP:
nt!IopCompleteRequest+c85
fffff800`03099448 488908 mov qword ptr [rax],rcx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: MsMpEng.exe
IRP_ADDRESS: 000000000003ff88
TRAP_FRAME: fffff8800693f630 -- (.trap 0xfffff8800693f630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000f00019398 rbx=0000000000000000 rcx=0000000000040000
rdx=fffffa8003b71000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003099448 rsp=fffff8800693f7c0 rbp=0000000000000000
r8=fffffa80053fb5f0 r9=fffff8800693f8c0 r10=0000000000000002
r11=fffffa8005b84f40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!IopCompleteRequest+0xc85:
fffff800`03099448 488908 mov qword ptr [rax],rcx ds:0000000f`00019398=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003078ca9 to fffff80003079740
STACK_TEXT:
fffff880`0693f4e8 fffff800`03078ca9 : 00000000`0000000a 0000000f`00019398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0693f4f0 fffff800`03077920 : 00000000`00000000 fffffa80`05cca500 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0693f630 fffff800`03099448 : fffffa80`05cb7060 fffff800`0307f5da 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0693f7c0 fffff800`030560c7 : 00000000`00040000 00000000`00000000 00000000`00000000 ffffe3a3`00000000 : nt!IopCompleteRequest+0xc85
fffff880`0693f890 fffff800`03080b9d : fffff880`02f67400 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`0693f910 fffff800`030842a1 : fffffa80`0594e3f8 fffffa80`05cb7060 fffffa80`000000f4 fffff8a0`01166370 : nt!KiCommitThreadWait+0x3dd
fffff880`0693f9a0 fffff800`03374df7 : fffffa80`00010000 fffff880`0693fb88 00000000`00000001 fffff880`0693fb00 : nt!KeRemoveQueueEx+0x301
fffff880`0693fa50 fffff800`03089aa6 : 00000000`00000000 fffff880`0693fb68 fffff880`0693fb88 00000000`00000001 : nt!IoRemoveIoCompletion+0x47
fffff880`0693fae0 fffff800`03078993 : fffffa80`05cb7060 00000000`77854270 fffff880`0693fc60 00000000`00000000 : nt!NtWaitForWorkViaWorkerFactory+0x285
fffff880`0693fbe0 00000000`777a165a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04b2f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x777a165a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`03077920 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xA_nt!KiPageFault+260
BUCKET_ID: X64_0xA_nt!KiPageFault+260
Followup: MachineOwner
---------