icrosoft (R) Windows Debugger Version 6.11.0001.404 AMD64[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Copyright (c) Microsoft Corporation. All rights reserved.[/SIZE][/FONT]
[FONT=Arial][SIZE=4] [/SIZE][/FONT]
[FONT=Arial][SIZE=4]Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp2_Windows_NT6_BSOD_jcgriff2[1].zip\Windows_NT6_BSOD_jcgriff2\Mini082310-01.dmp][/SIZE][/FONT]
[FONT=Arial][SIZE=4]Mini Kernel Dump File: Only registers and stack trace are available[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Executable search path is: [/SIZE][/FONT]
[FONT=Arial][SIZE=4]Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Product: WinNt, suite: TerminalServer SingleUserTS Personal[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Built by: 6002.18267.x86fre.vistasp2_gdr.100608-0458[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Machine Name:[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Kernel base = 0x8284c000 PsLoadedModuleList = 0x82963c70[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Debug session time: Mon Aug 23 03:51:26.555 2010 (GMT-4)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]System Uptime: 3 days 3:52:00.770[/SIZE][/FONT]
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {96feb848, 2, 1, 913414d1}
Unable to load image \SystemRoot\System32\Drivers\aswSP.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
[COLOR=yellowgreen]Probably caused by : aswSP.SYS ( aswSP+164d1[/COLOR] )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 96feb848, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 913414d1, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82983868
Unable to read MiSystemVaType memory at 82963420
96feb848
CURRENT_IRQL: 2
FAULTING_IP:
aswSP+164d1
913414d1 ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 8dc27c84 -- (.trap 0xffffffff8dc27c84)
ErrCode = 00000002
eax=96feb840 ebx=00000000 ecx=96feb848 edx=00000001 esi=96feb840 edi=86d69268
eip=913414d1 esp=8dc27cf8 ebp=8dc27cf8 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
aswSP+0x164d1:
913414d1 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from 913414d1 to 82899fd9
STACK_TEXT:
8dc27c84 913414d1 badb0d00 00000001 00000000 nt!KiTrap0E+0x2e1
WARNING: Stack unwind information not available. Following frames may be wrong.
8dc27cf4 8dc27d10 91341605 96feb840 00000001 aswSP+0x164d1
8dc27cf8 91341605 96feb840 00000001 0000003b 0x8dc27d10
8dc27d10 91341cf7 86d69268 9134dd70 00000000 aswSP+0x16605
8dc27d2c 9134285d 9134dd70 88ae21c8 00000000 aswSP+0x16cf7
8dc27d60 913429de 00000001 913412ce 00000000 aswSP+0x1785d
8dc27d7c 82a21c42 00000000 e7120bc7 00000000 aswSP+0x179de
8dc27dc0 8288af4e 91341296 00000000 00000000 nt!PspSystemThreadStartup+0x9d
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
aswSP+164d1
913414d1 ?? ???
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: aswSP+164d1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswSP
IMAGE_NAME: aswSP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4c290808
FAILURE_BUCKET_ID: 0xD1_aswSP+164d1
BUCKET_ID: 0xD1_aswSP+164d1
Followup: MachineOwner
---------