Microsoft (R) Windows Debugger Version 6.4.0007.2
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini041108-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp_sp2_rtm.040803-2158
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055ab20
Debug session time: Fri Apr 11 15:57:23.078 2008 (GMT+2)
System Uptime: 0 days 0:03:32.640
Loading Kernel Symbols
.......................................................................................................................................
Loading unloaded module list
..........
Loading User Symbols
Unable to load image dump_wmimmc.sys, Win32 error 2
*** WARNING: Unable to verify timestamp for dump_wmimmc.sys
*** ERROR: Module load completed but symbols could not be loaded for dump_wmimmc.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 100000D1, {bf849b03, 2, 0, ed7e897f}
Probably caused by : dump_wmimmc.sys ( dump_wmimmc+797f )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: bf849b03, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: ed7e897f, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: bf849b03
CURRENT_IRQL: 2
FAULTING_IP:
dump_wmimmc+797f
ed7e897f 8a02 mov al,[edx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xD1
LAST_CONTROL_TRANSFER: from ed7e48c7 to ed7e897f
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
f6c41ad8 ed7e48c7 bf849b03 836bb138 00000000 dump_wmimmc+0x797f
f6c41af8 ed7fb988 bf849b03 ed7ea1c0 ed7e9b60 dump_wmimmc+0x38c7
f6c41b34 ed80f6d7 838a1fb8 821b1a30 836bb138 dump_wmimmc+0x1a988
f6c41bec ed7e8051 83b43148 00000001 83986760 dump_wmimmc+0x2e6d7
f6c41c34 804e3d77 fe935858 836bb138 806ef2d0 dump_wmimmc+0x7051
f6c41c44 8056a9ab 836bb1a8 83b43148 836bb138 nt!IopfCallDriver+0x31
f6c41c58 8057d9f7 fe935858 836bb138 83b43148 nt!IopSynchronousServiceTail+0x60
f6c41d00 8057fbfa 000001f0 00000000 00000000 nt!IopXxxControlFile+0x611
f6c41d34 804df06b 000001f0 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
f6c41d34 00413b1b 000001f0 00000000 00000000 nt!KiFastCallEntry+0xf8
0012f050 00000000 00000000 00000000 00000000 0x413b1b
FOLLOWUP_IP:
dump_wmimmc+797f
ed7e897f 8a02 mov al,[edx]
SYMBOL_STACK_INDEX: 0
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: dump_wmimmc+797f
MODULE_NAME: dump_wmimmc
IMAGE_NAME: dump_wmimmc.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 47eb5e04
STACK_COMMAND: kb
FAILURE_BUCKET_ID: 0xD1_dump_wmimmc+797f
BUCKET_ID: 0xD1_dump_wmimmc+797f
Followup: MachineOwner
---------