New
#11
BW
more of the same
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\092509-42828-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*d:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a46000 PsLoadedModuleList = 0x82b8e810
Debug session time: Sat Sep 26 01:20:26.978 2009 (GMT-4)
System Uptime: 0 days 0:02:55.025
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007F, {8, 801dc000, 0, 0}
Unable to load image igxpmp32.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for igxpmp32.sys
*** ERROR: Module load completed but symbols could not be loaded for igxpmp32.sys
Probably caused by : ataport.SYS ( ataport!ProxyRequestDpc+22 )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 801dc000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: wmplayer.exe
CURRENT_IRQL: 1f
LAST_CONTROL_TRANSFER: from 82a14ba0 to 82a14967
STACK_TEXT:
ac174000 82a14ba0 82b6fd20 00000009 ac174044 hal!HalpLowerIrqlHardwareInterrupts+0xf
ac174010 82ab3ddf 848a43f4 848a30e0 00000000 hal!KfLowerIrql+0x58
ac174044 887e486a 848a309c 00000000 00000000 nt!KeInsertQueueDpc+0x235
ac174058 887e4e6b 848a30e0 84a02290 ac174098 ataport!ProxyRequestDpc+0x22
ac174068 887dd1dc 848a43f0 ac174078 00000000 ataport!IdeProcessPortNotification+0x99
ac174098 887d1fc2 848a43f4 84a02290 848a43f4 ataport!AtaPortCompleteRequest+0x22
ac1740b4 887d21e0 848a43f4 84a02290 01174150 atapi!AtapiCompleteRequest+0x122
ac1740dc 887d22df 848a4300 84a02290 ac174150 atapi!AtapiProcessInterrupt+0x1d0
ac174104 887e1f04 848a4350 ac17411c 887e248e atapi!AtapiHwInterrupt+0xf3
ac174110 887e248e 848a30e0 ac174148 82a857ad ataport!CallMiniPortHwInterrupt+0x14
ac17411c 82a857ad 8513ea00 848a3028 ac174148 ataport!IdePortInterrupt+0x10
ac17411c 8e2835c0 8513ea00 848a3028 ac174148 nt!KiInterruptDispatch+0x6d
WARNING: Stack unwind information not available. Following frames may be wrong.
ac1741b8 e386e77d 00000263 0000001e 6386e77d igxpmp32+0x4b5c0
ac174418 00000000 00000000 00000000 00000000 0xe386e77d
STACK_COMMAND: kb
FOLLOWUP_IP:
ataport!ProxyRequestDpc+22
887e486a 5d pop ebp
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: ataport!ProxyRequestDpc+22
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ataport
IMAGE_NAME: ataport.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf16
FAILURE_BUCKET_ID: 0x7f_8_ataport!ProxyRequestDpc+22
BUCKET_ID: 0x7f_8_ataport!ProxyRequestDpc+22
Followup: MachineOwner
---------
pretty much the same WMP causes ataport and igxpmp32.sys to fault. Is there any way you can NOT run WMP?