Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\Downloads\Minidump\071310-24312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x81c0f000 PsLoadedModuleList = 0x81d57810
Debug session time: Mon Jul 12 22:00:30.540 2010 (GMT-4)
System Uptime: 0 days 0:10:05.227
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
......
1: kd> !analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck F4, {3, 85c78530, 85c7869c, 81e37d50}
Probably caused by : csrss.exe
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 00000003, Process
Arg2: 85c78530, Terminating object
Arg3: 85c7869c, Process image file name
Arg4: 81e37d50, Explanatory message (ascii)
Debugging Details:
------------------
PROCESS_OBJECT: 85c78530
IMAGE_NAME: csrss.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: csrss
FAULTING_MODULE: 00000000
PROCESS_NAME: csrss.exe
EXCEPTION_CODE: (NTSTATUS) 0xc0000006 - The instruction at 0x%p referenced memory at 0x%p. The required data was not placed into memory because of an I/O error status of 0x%x.
BUGCHECK_STR: 0xF4_IOERR
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
STACK_TEXT:
aa3ffc9c 81eeb07b 000000f4 00000003 85c78530 nt!KeBugCheckEx+0x1e
aa3ffcc0 81e6ee44 81e37d50 85c7869c 85c787a0 nt!PspCatchCriticalBreak+0x71
aa3ffcf0 81e70cdf 85c78530 86862238 c0000006 nt!PspTerminateAllThreads+0x2d
aa3ffd24 81c5242a ffffffff c0000006 0216f200 nt!NtTerminateProcess+0x1a2
aa3ffd24 778764f4 ffffffff c0000006 0216f200 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0216f200 00000000 00000000 00000000 00000000 0x778764f4
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: 0xF4_IOERR_IMAGE_csrss.exe
BUCKET_ID: 0xF4_IOERR_IMAGE_csrss.exe
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\Downloads\Minidump\071310-26843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x81c07000 PsLoadedModuleList = 0x81d4f810
Debug session time: Mon Jul 12 21:12:29.494 2010 (GMT-4)
System Uptime: 0 days 2:40:53.197
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
......
1: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7A, {c0460668, c0000185, 63fff860, 8c0cd000}
GetPointerFromAddress: unable to read from 81d6f700
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: c0460668, lock type that was held (value 1,2,3, or PTE address)
Arg2: c0000185, error status (normally i/o status code)
Arg3: 63fff860, current process (virtual address for lock type 3, or PTE)
Arg4: 8c0cd000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.
DISK_HARDWARE_ERROR: There was error with disk hardware
BUGCHECK_STR: 0x7a_c0000185
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: bb189b64 -- (.trap 0xffffffffbb189b64)
ErrCode = 00000010
eax=843af878 ebx=842ae178 ecx=842ae178 edx=842ae254 esi=00000000 edi=84f747c8
eip=8c0ccffe esp=bb189bd8 ebp=bb189bec iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
afd!AfdSendMessageDispatch+0x17:
8c0ccffe b8d1000000 mov eax,0D1h
Resetting default scope
LAST_CONTROL_TRANSFER: from 81cbb60a to 81ce3d10
STACK_TEXT:
bb1899bc 81cbb60a 0000007a c0460668 c0000185 nt!KeBugCheckEx+0x1e
bb189a30 81cb30d5 842d239c bb189a88 81d3b540 nt!MiWaitForInPageComplete+0x2fd
bb189ac4 81c8ee3f 81d3b540 8c0cd000 842d2308 nt!MiIssueHardFault+0x3b2
bb189b4c 81c4d5f8 00000008 8c0cd000 00000000 nt!MmAccessFault+0x2656
bb189b4c 8c0ccffe 00000008 8c0cd000 00000000 nt!KiTrap0E+0xdc
bb189bec 8c0d3504 843af878 84dca310 bb189c14 afd!AfdSendMessageDispatch+0x17
bb189bfc 81c434bc 84dca310 842ae178 842ae178 afd!AfdDispatchDeviceControl+0x3b
bb189c14 81e44eee 843af878 842ae178 842ae254 nt!IofCallDriver+0x63
bb189c34 81e61cd1 84dca310 843af878 00000000 nt!IopSynchronousServiceTail+0x1f8
bb189cd0 81e644ac 84dca310 842ae178 00000000 nt!IopXxxControlFile+0x6aa
bb189d04 81c4a42a 000004a8 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
bb189d04 77a364f4 000004a8 00000000 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
02f8f5cc 00000000 00000000 00000000 00000000 0x77a364f4
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !afd
8c0cd000 - afd!AfdSendMessageDispatch+19
[ af:00 ]
8c0cd003-8c0cd021 31 bytes - afd!AfdSendMessageDispatch+1c (+0x03)
[ 89 75 fc 66 39 07 75 70:00 00 00 00 00 00 00 00 ]
8c0cd024-8c0cd02d 10 bytes - afd!AfdSendMessageDispatch+3d (+0x21)
[ c0 50 56 56 56 56 57 68:00 00 00 00 00 00 00 00 ]
8c0cd030-8c0cd050 33 bytes - afd!AfdSendMessageDispatch+49 (+0x0c)
[ eb 5d 8d 45 fc 50 52 53:00 00 00 00 00 00 00 00 ]
8c0cd053-8c0cd061 15 bytes - afd!AfdSendMessageDispatch+6c (+0x23)
[ eb 3d 33 c9 8d 47 20 41:00 00 00 00 00 00 00 00 ]
8c0cd063 - afd!AfdSendMessageDispatch+7c (+0x10)
[ 02:00 ]
8c0cd066-8c0cd080 27 bytes - afd!AfdSendMessageDispatch+7f (+0x03)
[ ff 75 fc 57 53 74 07 e8:00 00 00 00 00 00 00 00 ]
8c0cd083-8c0cd08c 10 bytes - afd!AfdSendMessageDispatch+9c (+0x1d)
[ c0 50 56 56 56 56 57 68:00 00 00 00 00 00 00 00 ]
8c0cd08f-8c0cd0bd 47 bytes - afd!AfdSendMessageDispatch+a8 (+0x0c)
[ 89 45 f8 56 e8 37 79 fe:00 00 00 00 00 00 00 00 ]
8c0cd0bf-8c0cd0cb 13 bytes - afd!AfdTPacketsApcKernelRoutine+b (+0x30)
[ 8b 45 18 ff 30 8b 45 14:00 00 00 00 00 00 00 00 ]
8c0cd0cd-8c0cd0ed 33 bytes - afd!AfdTPacketsApcKernelRoutine+19 (+0x0e)
[ 90 90 90 90 90 8b ff 55:00 00 00 00 00 00 00 df ]
8c0cd0ef-8c0cd0fa 12 bytes - afd!AfdTPacketsApcRundownRoutine+1d (+0x22)
[ 6a 01 50 ff 15 a8 12 0c:00 00 00 00 00 00 00 00 ]
8c0cd0fc-8c0cd11f 36 bytes - afd!AfdTPacketsApcRundownRoutine+2a (+0x0d)
[ 90 90 90 90 90 8b ff 55:00 00 00 00 00 00 00 00 ]
8c0cd121-8c0cd129 9 bytes - afd!AfdComputeTpInfoSize+20 (+0x25)
[ 83 e1 f8 8d 04 41 5d c2:00 00 00 00 00 00 00 00 ]
8c0cd12b-8c0cd14a 32 bytes - afd!AfdComputeTpInfoSize+2a (+0x0a)
[ 90 90 90 90 90 8b ff 55:00 00 00 00 00 00 00 00 ]
8c0cd14e-8c0cd15d 16 bytes - afd!AfdMdlReadComplete+1e (+0x23)
[ 57 53 ff 15 94 12 0c 8c:00 00 00 00 00 00 dd ba ]
8c0cd15f-8c0cd16d 15 bytes - afd!AfdMdlReadComplete+2f (+0x11)
[ 50 ff 15 90 10 0c 8c 8b:00 00 00 00 00 00 00 00 ]
8c0cd170-8c0cd182 19 bytes - afd!AfdMdlReadComplete+40 (+0x11)
[ c0 eb 75 8b 45 0c 56 8b:00 00 00 00 00 00 00 00 ]
8c0cd184-8c0cd19a 23 bytes - afd!AfdMdlReadComplete+54 (+0x14)
[ c6 06 03 c6 46 01 06 85:00 00 00 00 00 00 00 00 ]
8c0cd19c-8c0cd1b0 21 bytes - afd!AfdMdlReadComplete+6c (+0x18)
[ 89 45 0c 85 c0 75 ee 8b:00 00 00 00 00 00 00 00 ]
8c0cd1b2-8c0cd1e4 51 bytes - afd!AfdMdlReadComplete+82 (+0x16)
[ 8b cb 89 46 10 ff 15 b4:00 00 00 00 00 00 00 00 ]
8c0cd1e7-8c0cd1ec 6 bytes - afd!AfdMdlReadComplete+b7 (+0x35)
[ 5e 5f 5b 5d c2 0c:00 00 00 00 00 00 ]
8c0cd1ee-8c0cd238 75 bytes - afd!AfdMdlReadComplete+be (+0x07)
[ 90 90 90 90 90 0f b6 05:00 00 00 00 00 00 00 00 ]
8c0cd23a-8c0cd294 91 bytes - afd!AfdTdiGetTpInfo+47 (+0x4c)
[ 83 48 2c ff 8d 48 0c 89:00 00 00 00 00 00 00 00 ]
8c0cd298-8c0cd29f 8 bytes - afd!AfdLRProcessFileMdlList+34 (+0x5e)
[ 8b 45 f8 8b f0 83 7e 24:00 00 00 00 00 00 00 00 ]
8c0cd2a1 - afd!AfdLRProcessFileMdlList+3d (+0x09)
[ 8b:00 ]
8c0cd2a3-8c0cd2c4 34 bytes - afd!AfdLRProcessFileMdlList+3f (+0x02)
[ 8b 7e 18 89 45 f8 8d 46:00 00 00 00 00 00 00 00 ]
8c0cd2c7-8c0cd2c8 2 bytes - afd!AfdLRProcessFileMdlList+63 (+0x24)
[ 57 e8:00 00 ]
8c0cd2ca-8c0cd2e4 27 bytes - afd!AfdLRProcessFileMdlList+66 (+0x03)
[ 64 fe ff eb 51 8b 46 1c:00 00 00 00 00 00 00 00 ]
8c0cd2e6-8c0cd2f5 16 bytes - afd!AfdLRProcessFileMdlList+82 (+0x1c)
[ 8b 46 1c 8b 4e 24 89 48:00 00 00 00 00 00 00 00 ]
8c0cd2f8-8c0cd307 16 bytes - afd!AfdLRProcessFileMdlList+94 (+0x12)
[ 8d 47 20 83 c9 ff f0 0f:00 00 00 00 00 00 00 00 ]
8c0cd30a-8c0cd322 25 bytes - afd!AfdLRProcessFileMdlList+a6 (+0x12)
[ eb 14 8b d6 b9 60 3d 0c:00 00 00 00 00 00 00 00 ]
8c0cd324-8c0cd336 19 bytes - afd!AfdLRProcessFileMdlList+c0 (+0x1a)
[ 0f 85 6e ff ff ff 8a 45:00 00 00 00 00 00 00 00 ]
8c0cd338-8c0cd352 27 bytes - afd!AfdLRProcessFileMdlList+d4 (+0x14)
[ 90 90 90 90 90 6a 0c 68:00 00 00 00 00 00 00 00 ]
8c0cd355-8c0cd3c4 112 bytes - afd!AfdTliGetTpInfo+18 (+0x1d)
[ 50 e8 ae 62 fe ff 8b f0:00 00 00 00 00 00 00 00 ]
8c0cd3c6-8c0cd400 59 bytes - afd!AfdTliGetTpInfo+89 (+0x71)
[ 33 f6 c7 45 fc fe ff ff:00 00 00 00 00 00 00 00 ]
8c0cd402-8c0cd404 3 bytes - afd!AfdLRMdlReadComplete+26 (+0x3c)
[ 5d c2 04:00 00 00 ]
8c0cd406-8c0cd446 65 bytes - afd!AfdLRMdlReadComplete+2a (+0x04)
[ 90 90 90 90 90 8b ff 53:00 00 00 00 00 00 00 00 ]
8c0cd448-8c0cd44f 8 bytes - afd!AfdDoMdlReadComplete+3d (+0x42)
[ 13 0c 8c 8b 46 1c 83 20:00 00 00 00 00 00 00 00 ]
8c0cd451-8c0cd460 16 bytes - afd!AfdDoMdlReadComplete+46 (+0x09)
[ 8b 46 1c 8b 4e 24 89 48:00 00 00 00 00 00 00 00 ]
8c0cd463-8c0cd472 16 bytes - afd!AfdDoMdlReadComplete+58 (+0x12)
[ 8d 47 20 83 c9 ff f0 0f:00 00 00 00 00 00 00 00 ]
8c0cd475-8c0cd486 18 bytes - afd!AfdDoMdlReadComplete+6a (+0x12)
[ eb 06 56 e8 5f ff ff ff:00 00 00 00 00 00 00 00 ]
8c0cd488-8c0cd4b1 42 bytes - afd!AfdDoMdlReadComplete+7d (+0x13)
[ 90 90 90 90 90 8b ff 53:00 00 00 00 00 00 00 00 ]
8c0cd4b6-8c0cd4ce 25 bytes - afd!AfdBuildPacketChain+29 (+0x2e)
[ 50 51 51 53 83 ec 50 56:00 00 00 00 00 00 00 00 ]
8c0cd4d3-8c0cd4d9 7 bytes - afd!AfdBuildPacketChain+46 (+0x1d)
[ 89 65 e8 c7 45 d8 16:00 00 00 00 00 00 00 ]
8c0cd4dc-8c0cd4df 4 bytes - afd!AfdBuildPacketChain+4f (+0x09)
[ c0 c6 45 df:00 00 00 00 ]
8c0cd4e1-8c0cd4f5 21 bytes - afd!AfdBuildPacketChain+54 (+0x05)
[ 8b 73 08 8b 7e 0c 8b 46:00 00 00 00 00 00 00 00 ]
8c0cd4f7-8c0cd4f9 3 bytes - afd!AfdBuildPacketChain+6a (+0x16)
[ 83 65 c0:00 00 00 ]
8c0cd4fb-8c0cd50f 21 bytes - afd!AfdBuildPacketChain+6e (+0x04)
[ 8b 46 44 a8 40 74 45 84:00 00 00 00 00 00 00 00 ]
8c0cd512-8c0cd51c 11 bytes - afd!AfdBuildPacketChain+85 (+0x17)
[ 85 c0 7d 0a 83 66 44 bf:00 00 00 00 00 00 00 00 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
3815 errors : !afd (8c0cd000-8c0cdfff)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE_4096
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE_4096
BUCKET_ID: MEMORY_CORRUPTION_LARGE_4096
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\Downloads\Minidump\071410-26906-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x81c4e000 PsLoadedModuleList = 0x81d96810
Debug session time: Wed Jul 14 09:47:32.147 2010 (GMT-4)
System Uptime: 0 days 0:19:44.834
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
......
0: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7A, {c0540480, c0000185, 3b52bbe0, a8090000}
Probably caused by : memory_corruption ( nt!MiWaitForInPageComplete+2fd )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: c0540480, lock type that was held (value 1,2,3, or PTE address)
Arg2: c0000185, error status (normally i/o status code)
Arg3: 3b52bbe0, current process (virtual address for lock type 3, or PTE)
Arg4: a8090000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.
DISK_HARDWARE_ERROR: There was error with disk hardware
BUGCHECK_STR: 0x7a_c0000185
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 81d0260a to 81d2ad10
STACK_TEXT:
89270af4 81d0260a 0000007a c0540480 c0000185 nt!KeBugCheckEx+0x1e
89270b68 81cfa0d5 8682e80c 89270bc0 81d82540 nt!MiWaitForInPageComplete+0x2fd
89270bfc 81cd5e3f 81d82540 a8090000 8682e778 nt!MiIssueHardFault+0x3b2
89270c80 81c82259 00000001 a8090000 00000000 nt!MmAccessFault+0x2656
89270d10 81c81f7a 862e6030 89270d30 00000000 nt!MiInPageSingleKernelStack+0x1cf
89270d44 81cda003 861a94bc 89270d90 81e5c66d nt!KiInSwapKernelStacks+0x41
89270d50 81e5c66d 00000000 96e91ef3 00000000 nt!KeSwapProcessOrStack+0x78
89270d90 81d0e0d9 81cd9f8b 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiWaitForInPageComplete+2fd
81d0260a cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiWaitForInPageComplete+2fd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0x7a_c0000185_nt!MiWaitForInPageComplete+2fd
BUCKET_ID: 0x7a_c0000185_nt!MiWaitForInPageComplete+2fd
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\Downloads\Minidump\071410-29828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x81c1d000 PsLoadedModuleList = 0x81d65810
Debug session time: Wed Jul 14 07:41:49.118 2010 (GMT-4)
System Uptime: 0 days 0:21:22.805
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
......
0: kd> !Analyze
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7A, {c0407e08, c0000185, ce288c0, 80fc1034}
Probably caused by : CI.dll ( CI!CiValidateImageData+1d )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: c0407e08, lock type that was held (value 1,2,3, or PTE address)
Arg2: c0000185, error status (normally i/o status code)
Arg3: 0ce288c0, current process (virtual address for lock type 3, or PTE)
Arg4: 80fc1034, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
ERROR_CODE: (NTSTATUS) 0xc0000185 - The I/O device reported an I/O error.
DISK_HARDWARE_ERROR: There was error with disk hardware
BUGCHECK_STR: 0x7a_c0000185
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: af2d0a80 -- (.trap 0xffffffffaf2d0a80)
ErrCode = 00000000
eax=ab4f3000 ebx=c055a798 ecx=00000000 edx=ffffffff esi=80fc1000 edi=83127ea0
eip=822f0943 esp=af2d0af4 ebp=af2d0b50 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
CI!CiValidateImageData+0x1d:
822f0943 8b4634 mov eax,dword ptr [esi+34h] ds:0023:80fc1034=00000000
Resetting default scope
LAST_CONTROL_TRANSFER: from 81cd160a to 81cf9d10
STACK_TEXT:
af2d08dc 81cd160a 0000007a c0407e08 c0000185 nt!KeBugCheckEx+0x1e
af2d0950 81cc90d5 84111fbc af2d09a8 81d51300 nt!MiWaitForInPageComplete+0x2fd
af2d09e4 81ca4e3f 81d51300 80fc1034 84111f28 nt!MiIssueHardFault+0x3b2
af2d0a68 81c635f8 00000000 80fc1034 00000000 nt!MmAccessFault+0x2656
af2d0a68 822f0943 00000000 80fc1034 00000000 nt!KiTrap0E+0xdc
af2d0b50 81dfc16a 80fc1000 ab4f3000 00006400 CI!CiValidateImageData+0x1d
af2d0b68 81dfc114 80fc1000 ab4f3000 00006400 nt!SeValidateImageData+0x30
af2d0b94 81cd142e 00000000 00006400 00000000 nt!MiValidateImagePfn+0xed
af2d0c00 81cc90d5 86786e9c af2d0c58 86067220 nt!MiWaitForInPageComplete+0x121
af2d0c94 81ca5428 86067220 778b7408 86786e09 nt!MiIssueHardFault+0x3b2
af2d0d1c 81c635f8 00000000 778b7408 00000001 nt!MmAccessFault+0x2c3a
af2d0d1c 77aaedd9 00000000 778b7408 00000001 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
00f5ec28 00000000 00000000 00000000 00000000 0x77aaedd9
STACK_COMMAND: kb
FOLLOWUP_IP:
CI!CiValidateImageData+1d
822f0943 8b4634 mov eax,dword ptr [esi+34h]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: CI!CiValidateImageData+1d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: CI
IMAGE_NAME: CI.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bdac8
FAILURE_BUCKET_ID: 0x7a_c0000185_CI!CiValidateImageData+1d
BUCKET_ID: 0x7a_c0000185_CI!CiValidateImageData+1d
Followup: MachineOwner
---------
0: kd> lmtsmn
start end module name
880a2000 880ea000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F)
8c297000 8c2f1000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62)
8d690000 8d6a2000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954)
8800e000 88017000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F)
881c5000 881ce000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
881ce000 881f1000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16)
8e450000 8e49d000 ATMFD ATMFD.DLL unavailable (00000000)
8c86c000 8c89f280 avgldx86 avgldx86.sys Wed Feb 10 22:51:19 2010 (4B737EB7)
8c866000 8c86b940 avgmfx86 avgmfx86.sys Sun Apr 25 17:05:02 2010 (4BD4AE7E)
8c22b000 8c264a80 avgtdix avgtdix.sys Sun Apr 25 17:08:21 2010 (4BD4AF45)
88149000 88154000 BATTC BATTC.SYS Mon Jul 13 19:19:15 2009 (4A5BC0F3)
88426000 8842d000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC)
8c858000 8c866000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8)
822a1000 822a9000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2)
a5e9e000 a5eb7000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD)
8e430000 8e44e000 cdd cdd.dll unavailable (00000000)
822eb000 82396000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8)
8859f000 885c4000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18)
822a9000 822eb000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E)
8d664000 8d667700 CmBatt CmBatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
88384000 883e1000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427)
88141000 88149000 compbatt compbatt.sys Mon Jul 13 19:19:18 2009 (4A5BC0F6)
8d683000 8d690000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716)
8daa5000 8dab2000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8c840000 8c858000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8)
8c834000 8c840000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214)
8858e000 8859f000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20)
8da8c000 8daa5000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5)
8dab2000 8dabd000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
8dac7000 8dad8000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F)
8dabd000 8dac7000 dump_msahci dump_msahci.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
8dad8000 8dae2000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
8d328000 8d3df000 dxgkrnl dxgkrnl.sys Mon Jul 13 19:26:15 2009 (4A5BC297)
8c8c1000 8c8fa000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265)
8c349000 8c373000 fastfat fastfat.SYS Mon Jul 13 19:14:01 2009 (4A5BBFB9)
823ca000 823db000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
82396000 823ca000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11)
883ef000 883f8000 Fs_Rec Fs_Rec.sys unavailable (00000000)
8855c000 8858e000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D)
88788000 887b9000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43)
8855b000 8855b680 giveio giveio.sys Wed Apr 03 22:33:25 1996 (316334F5)
8202d000 82064000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07)
8d3df000 8d3fe000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F)
8da0d000 8da5d000 HdAudio HdAudio.sys Mon Jul 13 19:51:46 2009 (4A5BC892)
a5e19000 a5e9e000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75)
88553000 8855b000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05)
8c800000 8c818000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B)
8ce2b000 8d328000 igdkmd32 igdkmd32.sys Tue Jun 16 14:28:17 2009 (4A37E441)
8d671000 8d683000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07)
8c818000 8c825000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
81b9a000 81ba2000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA)
8d760000 8d794000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709)
88371000 88384000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C)
8852e000 88553000 ksecpkg ksecpkg.sys Mon Jul 13 19:34:00 2009 (4A5BC468)
8db39000 8db49000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE)
8db04000 8db1f000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020)
82218000 82290000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21)
8dae2000 8daed000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286)
8d657000 8d664000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13)
881af000 881c5000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F)
a5eb7000 a5ec9000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4)
a5ec9000 a5eec000 mrxsmb mrxsmb.sys Mon Jul 13 19:14:24 2009 (4A5BBFD0)
a5eec000 a5f27000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:14:34 2009 (4A5BBFDA)
a5f27000 a5f42000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:14:29 2009 (4A5BBFD5)
881f1000 881fb000 msahci msahci.sys Mon Jul 13 19:45:50 2009 (4A5BC72E)
88200000 8820b000 Msfs Msfs.SYS unavailable (00000000)
880f3000 880fb000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D)
88346000 88371000 msrpc msrpc.sys unavailable (00000000)
88017000 88021000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
8862f000 8863f000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6)
88439000 884f0000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58)
8d6ba000 8d6c5000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930)
8db8f000 8db9f000 ndisuio ndisuio.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
8d6c5000 8d6e7000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A)
8d7e6000 8d7f7000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933)
8c328000 8c336000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912)
8c265000 8c297000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52)
884f0000 8852e000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63)
8c8fa000 8c983000 netr28 netr28.sys Wed Feb 25 21:56:57 2009 (49A604F9)
a5f5a000 a5f69000 npf npf.sys Tue Oct 20 13:57:28 2009 (4ADDFA08)
82200000 8220e000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23)
8820b000 88215000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48)
81c1d000 8202d000 nt ntkrpamp.exe Mon Jul 13 19:15:19 2009 (4A5BC007)
88217000 88346000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45)
8841f000 88426000 Null Null.SYS unavailable (00000000)
8db49000 8db8f000 nwifi nwifi.sys Mon Jul 13 19:51:59 2009 (4A5BC89F)
8c2f8000 8c317000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916)
88130000 88141000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27)
880fb000 88125000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14)
88000000 8800e000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13)
883e1000 883ef000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E)
a5f69000 a6000000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0)
8da5d000 8da8c000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864)
82290000 822a1000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0)
a94c9000 a94d5000 pssdk42 pssdk42.sys Tue Jun 23 08:14:40 2009 (4A40C730)
8d6a2000 8d6ba000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939)
8d6e7000 8d6ff000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D)
8d6ff000 8d716000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947)
8d716000 8d72d000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951)
8c3bf000 8c400000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2)
8840d000 88415000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4)
88415000 8841d000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3)
885f7000 885ff000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5)
88602000 8862f000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A)
a5e00000 a5e0f000 RHDISK RHDISK.SYS Fri Jul 24 03:43:27 2009 (4A69661F)
8db9f000 8dbb2000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0)
8ce00000 8ce25000 Rt86win7 Rt86win7.sys Thu Feb 26 04:04:22 2009 (49A65B16)
8c3b1000 8c3be880 SCDEmu SCDEmu.SYS Sun Jul 26 22:43:19 2009 (4A6D1447)
a5e0f000 a5e19000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
88600000 88601480 speedfan speedfan.sys Sun Sep 24 09:28:47 2006 (4516880F)
887f8000 88800000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB)
a9478000 a94c9000 srv srv.sys Mon Jul 13 19:15:10 2009 (4A5BBFFE)
a9429000 a9478000 srv2 srv2.sys Mon Jul 13 19:14:52 2009 (4A5BBFEC)
8dbbb000 8dbdc000 srvnet srvnet.sys Mon Jul 13 19:14:45 2009 (4A5BBFE5)
8d75e000 8d75f380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704)
8d61b000 8d654b00 SynTP SynTP.sys Thu Feb 18 22:35:08 2010 (4B7E06EC)
8863f000 88788000 tcpip tcpip.sys Mon Jul 13 19:13:18 2009 (4A5BBF8E)
a5f42000 a5f4f000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926)
8c220000 8c22b000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C)
8c209000 8c220000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A)
8c3a1000 8c3b1000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF)
8e400000 8e409000 TSDDD TSDDD.dll unavailable (00000000)
8c8a0000 8c8c1000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B)
8d794000 8d7a2000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A)
8d655000 8d656700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869)
8c9e3000 8c9f2000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872)
8d7a2000 8d7e6000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6)
8c998000 8c9e3000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871)
8daed000 8db04000 USBSTOR USBSTOR.SYS Mon Jul 13 19:51:19 2009 (4A5BC877)
8c98d000 8c998000 usbuhci usbuhci.sys Mon Jul 13 19:51:10 2009 (4A5BC86E)
8c37f000 8c3a0480 VBoxDrv VBoxDrv.sys Fri Jun 25 10:01:13 2010 (4C24B6A9)
8d72d000 8d743e80 VBoxNetAdp VBoxNetAdp.sys Fri Jun 25 10:01:13 2010 (4C24B6A9)
8d744000 8d75d8c0 VBoxNetFlt VBoxNetFlt.sys Fri Jun 25 10:01:13 2010 (4C24B6A9)
8c376000 8c37e9c0 VBoxUSBMon VBoxUSBMon.sys Fri Jun 25 10:01:13 2010 (4C24B6A9)
8c373000 8c375180 VCdRom VCdRom.sys Wed Dec 19 14:44:58 2001 (3C20EE3A)
88125000 88130000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B)
8842d000 88439000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E)
823db000 823fc000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D)
88154000 88164000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D)
88164000 881af000 volmgrx volmgrx.sys unavailable (00000000)
887b9000 887f8000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26)
8c983000 8c98d000 vwifibus vwifibus.sys Mon Jul 13 19:52:02 2009 (4A5BC8A2)
8c317000 8c328000 vwififlt vwififlt.sys Mon Jul 13 19:52:03 2009 (4A5BC8A3)
8dbb2000 8dbbb000 vwifimp vwifimp.sys Mon Jul 13 19:52:09 2009 (4A5BC8A9)
8c336000 8c349000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956)
88400000 8840d000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A)
88023000 88094000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28)
88094000 880a2000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D)
8c2f1000 8c2f8000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F)
8e5a0000 8e7ea000 win32k win32k.sys unavailable (00000000)
8d668000 8d671000 wmiacpi wmiacpi.sys Mon Jul 13 19:19:16 2009 (4A5BC0F4)
880ea000 880f3000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A)
8db1f000 8db39000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835)
a94d5000 a94f5480 WUDFRd WUDFRd.sys Mon Jul 13 19:50:44 2009 (4A5BC854)
Unloaded modules:
a5f42000 a5f5a000 parport.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
885c4000 885d1000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
885d1000 885dc000 dump_pciidex
Timestamp: unavailable (00000000)
Checksum: 00000000
885dc000 885e6000 dump_msahci.
Timestamp: unavailable (00000000)
Checksum: 00000000
885e6000 885f7000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
88400000 8841f000 cdrom.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
Let's begin by testing your RAM.