I have received a BSOD on 2 of my servers that someone has loaded Daemon Tools Lite(Do not currently have build info) on.
Below is the !analyze -v from the dump file. I can upload the memory dumps if needed for review.
Can someone review and please let me know if this is an incompatibility issue or what is causing this.
Thanks
Anthony
1: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000001002, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffffa800d34f3ba, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 0000000000001002
CURRENT_IRQL: 2
FAULTING_IP:
+2d6952f00eadfdc
fffffa80`0d34f3ba c60201 mov byte ptr [rdx],1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffffa600191bb70 -- (.trap 0xfffffa600191bb70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800d34f370
rdx=0000000000001002 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa800d34f3ba rsp=fffffa600191bd08 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000d3c950
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
fffffa80`0d34f3ba c60201 mov byte ptr [rdx],1 ds:fa00:1002=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800016b512e to fffff800016b5390
STACK_TEXT:
fffffa60`0191ba28 fffff800`016b512e : 00000000`0000000a 00000000`00001002 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffa60`0191ba30 fffff800`016b400b : 00000000`00000001 00001f80`00380060 00000000`00000000 fffffa80`0d34f370 : nt!KiBugCheckDispatch+0x6e
fffffa60`0191bb70 fffffa80`0d34f3ba : fffff800`016be9d7 00000000`00000000 fffff800`016d07e0 fffffa80`0c777a30 : nt!KiPageFault+0x20b
fffffa60`0191bd08 fffff800`016be9d7 : 00000000`00000000 fffff800`016d07e0 fffffa80`0c777a30 00000000`00000000 : 0xfffffa80`0d34f3ba
fffffa60`0191bd10 fffff800`016bfb72 : fffffa80`0d34f3b3 fffffa60`005ec180 00000000`00000000 fffffa60`005f5d40 : nt!KiRetireDpcList+0x117
fffffa60`0191bd80 fffff800`0188d5c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62
fffffa60`0191bdb0 00000000`fffffa60 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4
fffffa60`005efd00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00680000`00000000 : 0xfffffa60
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+20b
fffff800`016b400b 488d058e320000 lea rax,[nt!RtlpInterlockedPopEntrySList (fffff800`016b72a0)]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+20b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 479192b7
FAILURE_BUCKET_ID: X64_0xD1_nt!KiPageFault+20b
BUCKET_ID: X64_0xD1_nt!KiPageFault+20b
Followup: MachineOwner
Below is the !analyze -v from the dump file. I can upload the memory dumps if needed for review.
Can someone review and please let me know if this is an incompatibility issue or what is causing this.
Thanks
Anthony
1: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000001002, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffffa800d34f3ba, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 0000000000001002
CURRENT_IRQL: 2
FAULTING_IP:
+2d6952f00eadfdc
fffffa80`0d34f3ba c60201 mov byte ptr [rdx],1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffffa600191bb70 -- (.trap 0xfffffa600191bb70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800d34f370
rdx=0000000000001002 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa800d34f3ba rsp=fffffa600191bd08 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000d3c950
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
fffffa80`0d34f3ba c60201 mov byte ptr [rdx],1 ds:fa00:1002=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800016b512e to fffff800016b5390
STACK_TEXT:
fffffa60`0191ba28 fffff800`016b512e : 00000000`0000000a 00000000`00001002 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffa60`0191ba30 fffff800`016b400b : 00000000`00000001 00001f80`00380060 00000000`00000000 fffffa80`0d34f370 : nt!KiBugCheckDispatch+0x6e
fffffa60`0191bb70 fffffa80`0d34f3ba : fffff800`016be9d7 00000000`00000000 fffff800`016d07e0 fffffa80`0c777a30 : nt!KiPageFault+0x20b
fffffa60`0191bd08 fffff800`016be9d7 : 00000000`00000000 fffff800`016d07e0 fffffa80`0c777a30 00000000`00000000 : 0xfffffa80`0d34f3ba
fffffa60`0191bd10 fffff800`016bfb72 : fffffa80`0d34f3b3 fffffa60`005ec180 00000000`00000000 fffffa60`005f5d40 : nt!KiRetireDpcList+0x117
fffffa60`0191bd80 fffff800`0188d5c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62
fffffa60`0191bdb0 00000000`fffffa60 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4
fffffa60`005efd00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00680000`00000000 : 0xfffffa60
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+20b
fffff800`016b400b 488d058e320000 lea rax,[nt!RtlpInterlockedPopEntrySList (fffff800`016b72a0)]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+20b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 479192b7
FAILURE_BUCKET_ID: X64_0xD1_nt!KiPageFault+20b
BUCKET_ID: X64_0xD1_nt!KiPageFault+20b
Followup: MachineOwner
Comment