Loading Kernel Symbols
........................................................................................................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {faad04bc, 1, 0, 804e70d5}
*** WARNING: Unable to verify timestamp for Ntfs.sys
*** WARNING: Unable to verify timestamp for rdbss.sys
Probably caused by : ntoskrnl.exe ( nt!WmiTraceEvent+2ef )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: faad04bc, memory referenced
Arg2: 00000001, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804e70d5, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: faad04bc
CURRENT_IRQL: 1
FAULTING_IP:
nt!WmiTraceEvent+2ef
804e70d5 8b0490 mov eax,dword ptr [eax+edx*4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: AÀ
LAST_CONTROL_TRANSFER: from 804f37b7 to 804e70d5
STACK_TEXT:
b8040820 804f37b7 c0c0003c 00000000 d9ac0000 nt!WmiTraceEvent+0x2ef
b80408a8 804f347b d9ac0000 0012e9f8 00000000 nt!`string'+0x7
b8040938 804f3307 85c2e298 0012e9f8 b804097c nt!`string'+0xf
b80409c4 f769f721 866e6188 b8040b94 0000001f nt!`string'+0xf
b8040bb8 f769cc24 85c577e8 85bca008 85bca008 Ntfs!InitializeNewTable+0x3a
b8040c1c 804e37f7 867cf020 85bca008 86772910 Ntfs!NtfsLookupAllocation+0x3e6
b8040c3c 804e37f7 867796d8 e21b4440 85bca1d8 nt!ExExtendZone+0x5b
b8040c60 804e37f7 865c6c70 865c6d28 806ee2d0 nt!ExExtendZone+0x5b
b8040c84 80577530 865c6c70 85bca008 866e6188 nt!ExExtendZone+0x5b
b8040d38 804de7ec 000005e4 00000000 00000000 nt!KiTimerTableListHead+0x2b0
b8040d64 7c91eb94 badb0d00 0012e95c baf0054a nt!MiPfPutPagesInTransition+0x494
WARNING: Frame IP not in any known module. Following frames may be wrong.
b8040d70 baf0054a 00000000 00000000 00000000 0x7c91eb94
b8040d74 00000000 00000000 00000000 00000000 rdbss!RxShouldRequestBeThrottled <PERF> (rdbss+0x54a)
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!WmiTraceEvent+2ef
804e70d5 8b0490 mov eax,dword ptr [eax+edx*4]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!WmiTraceEvent+2ef
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 45e54711
FAILURE_BUCKET_ID: 0xA_nt!WmiTraceEvent+2ef
BUCKET_ID: 0xA_nt!WmiTraceEvent+2ef
Followup: MachineOwner
---------