Just want to keep this not back.
It can be the system. The system the give problems is under testing, and get reinstalled anyway without some program that i suspect it gives problems. But opensim is so visible in the debug file that it looks like its doing maby something wrong to.

But i dont think its opensim, maby a bad combination of opensim + that other program. (acronis)

----------------------------------------

Microsoft (R) Windows Debugger Version 6.2.8400.4218 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\072912-15615-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030
Machine Name:
Kernel base = 0xfffff800`02a1a000 PsLoadedModuleList = 0xfffff800`02c5e670
Debug session time: Sun Jul 29 01:12:11.702 2012 (UTC + 2:00)
System Uptime: 4 days 5:08:03.481
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 1, fffff80002a78c7f}

*** WARNING: Unable to verify timestamp for MpFilter.sys
*** ERROR: Module load completed but symbols could not be loaded for MpFilter.sys
Probably caused by : MpFilter.sys ( MpFilter+22e3f )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a78c7f, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc8100
GetUlongFromAddress: unable to read from fffff80002cc81c0
 0000000000000000 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP:
nt!KeSetEventBoostPriority+3f
fffff800`02a78c7f f00fba2907      lock bts dword ptr [rcx],7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  OpenSim.exe

TRAP_FRAME:  fffff88007bebab0 -- (.trap 0xfffff88007bebab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800f9186f8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a78c7f rsp=fffff88007bebc40 rbp=fffffa801275fb50
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff88007bebce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KeSetEventBoostPriority+0x3f:
fffff800`02a78c7f f00fba2907 lock bts dword ptr [rcx],7 ds:00000000`00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a98769 to fffff80002a991c0

STACK_TEXT:
fffff880`07beb968 fffff800`02a98769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`07beb970 fffff800`02a973e0 : 00000000`00000000 000000df`fd4cc640 fffff880`07bec2d0 fffff880`009b2180 : nt!KiBugCheckDispatch+0x69 fffff880`07bebab0 fffff800`02a78c7f : fffffa80`0141c100 fffff880`00000002 fffffa80`00000000 00000000`00000002 : nt!KiPageFault+0x260 fffff880`07bebc40 fffff800`02a8e7ef : 00000000`00000000 fffff880`01242f99 00000000`00000000 fffff8a0`13632470 : nt!KeSetEventBoostPriority+0x3f fffff880`07bebcb0 fffff880`012c279a : fffff8a0`13632470 fffffa80`18ea3630 fffff8a0`13632790 fffff8a0`13632470 : nt!ExpReleaseResourceForThreadLite+0x2bf fffff880`07bebd10 fffff880`012c0346 : fffff880`07bebe90 fffffa80`18ea3630 fffff880`00000000 fffffa80`00000028 : Ntfs!NtfsCommonQueryInformation+0xf12 fffff880`07bebdf0 fffff880`012c0b14 : fffff880`07bebe90 fffffa80`18ea3630 fffffa80`18ea39d0 fffff880`07bec220 : Ntfs!NtfsFsdDispatchSwitch+0x106 fffff880`07bebe70 fffff880`01081bcf : 00000000`00006081 fffffa80`00000030 fffffa80`0d5c0b50 fffffa80`0df49010 : Ntfs!NtfsFsdDispatchWait+0x14 fffff880`07bec060 fffff880`01084aea : 00000000`00000000 00000000`00000000 fffffa80`0df31700 fffffa80`120dc5a0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`07bec0f0 fffff880`010ba4f2 : fffffa80`0dfc7bc0 00000000`0000001b fffffa80`0df49010 fffffa80`120dc650 : fltmgr!FltPerformSynchronousIo+0x2ca fffff880`07bec190 fffff880`01101e3f : fffffa80`1218ee60 00000000`000182c5 fffff880`07bec488 fffffa80`0d5c0f80 : fltmgr!FltQueryInformationFile+0x52 fffff880`07bec1d0 fffffa80`1218ee60 : 00000000`000182c5 fffff880`07bec488 fffffa80`0d5c0f80 fffff880`00000004 : MpFilter+0x22e3f fffff880`07bec1d8 00000000`000182c5 : fffff880`07bec488 fffffa80`0d5c0f80 fffff880`00000004 00000000`00000000 : 0xfffffa80`1218ee60 fffff880`07bec1e0 fffff880`07bec488 : fffffa80`0d5c0f80 fffff880`00000004 00000000`00000000 00000000`00000000 : 0x182c5 fffff880`07bec1e8 fffffa80`0d5c0f80 : fffff880`00000004 00000000`00000000 00000000`00000000 01cd6bb4`00d9b0b4 : 0xfffff880`07bec488 fffff880`07bec1f0 fffff880`00000004 : 00000000`00000000 00000000`00000000 01cd6bb4`00d9b0b4 01cd6bb4`00d9b0b4 : 0xfffffa80`0d5c0f80 fffff880`07bec1f8 00000000`00000000 : 00000000`00000000 01cd6bb4`00d9b0b4 01cd6bb4`00d9b0b4 01cd6bb4`00dc1214 : 0xfffff880`00000004


STACK_COMMAND:  kb

FOLLOWUP_IP:
MpFilter+22e3f
fffff880`01101e3f ??              ???

SYMBOL_STACK_INDEX:  b

SYMBOL_NAME:  MpFilter+22e3f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: MpFilter

IMAGE_NAME:  MpFilter.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4f59e3f6

FAILURE_BUCKET_ID:  X64_0xA_MpFilter+22e3f

BUCKET_ID:  X64_0xA_MpFilter+22e3f

Followup: MachineOwner
---------

4: kd> lmvm MpFilter
start             end                 module name
fffff880`010df000 fffff880`01114000   MpFilter T (no symbols)
    Loaded symbol image file: MpFilter.sys
    Image path: \SystemRoot\system32\DRIVERS\MpFilter.sys
    Image name: MpFilter.sys
    Timestamp:        Fri Mar 09 12:05:26 2012 (4F59E3F6)
    CheckSum:         00037740
    ImageSize:        00035000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4

_______________________________________________
Opensim-dev mailing list
[email protected]
https://lists.berlios.de/mailman/listinfo/opensim-dev

Reply via email to