Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\091011-23415-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at start of path element
WARNING: Whitespace at start of path element
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: c:\windows\System32; c:\windows\system\System32; http://www.alexander.com/SymServe
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03e0f000 PsLoadedModuleList = 0xfffff800`04054670
Debug session time: Sat Sep 10 15:25:31.351 2011 (UTC + 2:00)
System Uptime: 0 days 0:05:50.005
Loading Kernel Symbols
...............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {60001, 2, 1, fffff80003e9372c}
Probably caused by : ntkrnlmp.exe ( nt!KeWaitForSingleObject+17c )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000060001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003e9372c, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800040be100
0000000000060001
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeWaitForSingleObject+17c
fffff800`03e9372c 4c8938 mov qword ptr [rax],r15
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: wmplayer.exe
TRAP_FRAME: fffff8800d79d870 -- (.trap 0xfffff8800d79d870)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060001 rbx=0000000000000000 rcx=fffffa80076b7bc8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003e9372c rsp=fffff8800d79da00 rbp=0000000000000000
r8=fffff78000000008 r9=0000000000000000 r10=0000000000000000
r11=fffff880009e9180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x17c:
fffff800`03e9372c 4c8938 mov qword ptr [rax],r15 ds:7b20:00000000`00060001=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003e8b1e9 to fffff80003e8bc40
STACK_TEXT:
fffff880`0d79d728 fffff800`03e8b1e9 : 00000000`0000000a 00000000`00060001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0d79d730 fffff800`03e89e60 : 00000000`00000000 fffff880`0d79d940 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0d79d870 fffff800`03e9372c : fffffa80`08eca770 fffff800`04194950 fffff8a0`0017e010 fffffa80`0712ace0 : nt!KiPageFault+0x260
fffff880`0d79da00 fffff800`03e5e61e : 00000000`00100000 fffff800`00000022 fffff880`0d79db00 fffff800`04180300 : nt!KeWaitForSingleObject+0x17c
fffff880`0d79daa0 fffff800`03e9e1c5 : fffffa80`08eca770 fffff880`0100176f 00000001`00000001 00000000`00000001 : nt!KiAcquireFastMutex+0x4e
fffff880`0d79dae0 fffff880`012aabbf : 00000000`00000000 fffff880`00100000 fffffa80`0780f500 fffff880`00de3110 : nt!ExAcquireFastMutex+0x45
fffff880`0d79db10 fffff880`012b00ec : fffffa80`0712ace0 fffff8a0`0017e010 00000000`00000000 fffffa80`0b302368 : Ntfs!NtfsCreateScb+0x4f
fffff880`0d79dbd0 fffff880`0129efe5 : fffffa80`0712ace0 fffffa80`0b302368 fffffa80`07859180 fffff8a0`0017e450 : Ntfs!NtfsOpenAttribute+0xac
fffff880`0d79dce0 fffff880`0129ad9f : fffff880`0d79e4a0 00000000`c0000022 fffff880`0d79e4a0 00000000`00000000 : Ntfs!NtfsOpenExistingAttr+0x145
fffff880`0d79dda0 fffff880`0129e09f : fffffa80`0712ace0 fffffa80`0b302010 fffff8a0`0017e450 fffff880`00000000 : Ntfs!NtfsOpenAttributeInExistingFile+0x50f
fffff880`0d79df30 fffff880`012ae166 : fffffa80`0712ace0 fffffa80`0b302010 fffff8a0`0017e450 00000000`00000001 : Ntfs!NtfsOpenExistingPrefixFcb+0x1ef
fffff880`0d79e020 fffff880`012ab911 : fffffa80`0712ace0 fffffa80`0b302010 fffff880`0d79e1f0 fffff880`0d79e240 : Ntfs!NtfsFindStartingNode+0x5e6
fffff880`0d79e0f0 fffff880`01214a3d : fffffa80`0712ace0 fffffa80`0b302010 fffff880`0d79e4a0 fffffa80`07e80e00 : Ntfs!NtfsCommonCreate+0x3e1
fffff880`0d79e2d0 fffff800`03e98618 : fffff880`0d79e410 00000000`00000000 fffff880`00000000 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`0d79e300 fffff880`012151bf : fffff880`01214a20 fffff880`01214020 fffff880`0d79e400 fffff880`012b5f00 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0d79e3e0 fffff880`012ae99c : 00000000`00000000 00000000`00000000 fffff880`0d79e640 fffffa80`0b302010 : Ntfs!NtfsCommonCreateOnNewStack+0x4f
fffff880`0d79e440 fffff880`01002bcf : fffffa80`07859030 fffffa80`0b302010 00000000`00000000 fffffa80`076b5de0 : Ntfs!NtfsFsdCreate+0x1ac
fffff880`0d79e5f0 fffff880`010222b9 : fffffa80`0b302010 fffffa80`0780d800 fffffa80`0b302000 fffffa80`076b5de0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0d79e680 fffff800`04189f95 : 00000000`00000005 fffffa80`08eca928 fffffa80`0749fb10 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`0d79e730 fffff800`04186838 : fffffa80`0768ba50 fffff800`00000000 fffffa80`08eca770 00000000`00000001 : nt!IopParseDevice+0x5a5
fffff880`0d79e8c0 fffff800`04187a56 : 00000000`00000000 fffffa80`08eca770 fffff8a0`03010380 fffffa80`06726080 : nt!ObpLookupObjectName+0x588
fffff880`0d79e9b0 fffff800`0418935c : fffff8a0`0469c8e0 00000000`00000000 fffff880`0d79ea01 00000000`00000000 : nt!ObOpenObjectByName+0x306
fffff880`0d79ea80 fffff800`04174be4 : 00000000`026ae368 00000000`00100000 00000000`026aebc0 00000000`026ae308 : nt!IopCreateFile+0x2bc
fffff880`0d79eb20 fffff800`03e8aed3 : fffffa80`0a71f580 00000000`026ae2f8 00000000`00000002 00000000`004033a0 : nt!NtOpenFile+0x58
fffff880`0d79ebb0 00000000`77bc164a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`026ae2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bc164a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeWaitForSingleObject+17c
fffff800`03e9372c 4c8938 mov qword ptr [rax],r15
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KeWaitForSingleObject+17c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0xA_nt!KeWaitForSingleObject+17c
BUCKET_ID: X64_0xA_nt!KeWaitForSingleObject+17c
Followup: MachineOwner