Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121610-20482-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02619000 PsLoadedModuleList = 0xfffff800`02856e50
Debug session time: Thu Dec 16 07:19:26.723 2010 (UTC - 5:00)
System Uptime: 0 days 0:03:49.457
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 1, fffff880012a2b7f}
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+2db7f )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880012a2b7f, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800028c10e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
iaStor+2db7f
fffff880`012a2b7f 48894628 mov qword ptr [rsi+28h],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: wermgr.exe
TRAP_FRAME: fffff880009cbaf0 -- (.trap 0xfffff880009cbaf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=7fffffffffffffff rbx=0000000000000000 rcx=fffffa8004b24000
rdx=fffffa800478c1a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012a2b7f rsp=fffff880009cbc80 rbp=fffff880009cbd70
r8=0000000000000002 r9=0000000000000000 r10=fffffa8004b24000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
iaStor+0x2db7f:
fffff880`012a2b7f 48894628 mov qword ptr [rsi+28h],rax ds:7c80:00000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000268a469 to fffff8000268af00
STACK_TEXT:
fffff880`009cb9a8 fffff800`0268a469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009cb9b0 fffff800`026890e0 : 00000000`00000000 fffff880`0974c350 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009cbaf0 fffff880`012a2b7f : 00000000`00000000 fffffa80`04b3a0b8 00000000`00000002 00000000`00140000 : nt!KiPageFault+0x260
fffff880`009cbc80 00000000`00000000 : fffffa80`04b3a0b8 00000000`00000002 00000000`00140000 00000000`00000000 : iaStor+0x2db7f
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStor+2db7f
fffff880`012a2b7f 48894628 mov qword ptr [rsi+28h],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStor+2db7f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b8f2033
FAILURE_BUCKET_ID: X64_0xD1_iaStor+2db7f
BUCKET_ID: X64_0xD1_iaStor+2db7f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121610-21200-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0261f000 PsLoadedModuleList = 0xfffff800`0285ce50
Debug session time: Thu Dec 16 06:58:50.183 2010 (UTC - 5:00)
System Uptime: 0 days 0:04:36.901
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 1, fffff88001070af5}
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+50af5 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001070af5, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800028c70e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
iaStor+50af5
fffff880`01070af5 4c8902 mov qword ptr [rdx],r8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880009c4840 -- (.trap 0xfffff880009c4840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8004b26c38
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001070af5 rsp=fffff880009c49d0 rbp=fffffa800403a3a9
r8=0000000000000000 r9=0000000000000000 r10=fffffa8004b24000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
iaStor+0x50af5:
fffff880`01070af5 4c8902 mov qword ptr [rdx],r8 ds:8b10:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002690469 to fffff80002690f00
STACK_TEXT:
fffff880`009c46f8 fffff800`02690469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009c4700 fffff800`0268f0e0 : 00000000`00000003 fffffa80`04b24000 fffffa80`05e7c2c0 fffffa80`06803950 : nt!KiBugCheckDispatch+0x69
fffff880`009c4840 fffff880`01070af5 : 00000000`00000000 fffff880`09788350 fffff880`09788350 fffffa80`04b24000 : nt!KiPageFault+0x260
fffff880`009c49d0 00000000`00000000 : fffff880`09788350 fffff880`09788350 fffffa80`04b24000 00000000`00000022 : iaStor+0x50af5
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStor+50af5
fffff880`01070af5 4c8902 mov qword ptr [rdx],r8
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStor+50af5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b8f2033
FAILURE_BUCKET_ID: X64_0xD1_iaStor+50af5
BUCKET_ID: X64_0xD1_iaStor+50af5
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121610-24492-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02649000 PsLoadedModuleList = 0xfffff800`02886e50
Debug session time: Thu Dec 16 11:17:39.205 2010 (UTC - 5:00)
System Uptime: 0 days 0:04:33.939
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ffffffffffffff5b, 2, 1, fffff8800171e4d4}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff5b, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800171e4d4, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800028f10e0
ffffffffffffff5b
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!FsbFree+44
fffff880`0171e4d4 00483b add byte ptr [rax+3Bh],cl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b98fd0 -- (.trap 0xfffff80000b98fd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffffff20 rbx=0000000000000000 rcx=fffffa8006ef6b30
rdx=fffffa80046e2700 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800171e4d4 rsp=fffff80000b99160 rbp=fffff80000b99280
r8=fffffa8004177d90 r9=0000000000000002 r10=fffffa8005b574e0
r11=fffffa8004210d90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
NETIO!FsbFree+0x44:
fffff880`0171e4d4 00483b add byte ptr [rax+3Bh],cl ds:0aaf:ffffffff`ffffff5b=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800026ba469 to fffff800026baf00
STACK_TEXT:
fffff800`00b98e88 fffff800`026ba469 : 00000000`0000000a ffffffff`ffffff5b 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b98e90 fffff800`026b90e0 : 00000000`00000000 fffffa80`06ef6b30 00000000`00000d00 00000000`00000008 : nt!KiBugCheckDispatch+0x69
fffff800`00b98fd0 fffff880`0171e4d4 : fffffa80`046edc01 fffffa80`074543d0 00000000`00000d90 fffff800`00b99280 : nt!KiPageFault+0x260
fffff800`00b99160 fffff880`01844247 : fffffa80`06ef6b30 fffffa80`06ef6b30 fffff800`00b99280 00000000`00000000 : NETIO!FsbFree+0x44
fffff800`00b991a0 fffff880`0187a7e6 : fffff800`00b99400 fffffa80`074543d0 fffffa80`074543d0 fffff880`01916155 : tcpip!TcpSatisfyReceiveRequests+0x457
fffff800`00b99480 fffff880`0187b2f9 : 00000000`00000000 00000000`00000000 00000000`00000000 80000804`00000084 : tcpip!TcpDeliverDataToClient+0x106
fffff800`00b99600 fffff880`01874af8 : 00000000`c259f100 fffff880`034576f1 fffffa80`06119030 fffff880`0186d64a : tcpip!TcpDeliverReceive+0xa9
fffff800`00b99700 fffff880`018756f5 : 00000000`00000014 fffffa80`00000000 fffffa80`058f3000 fffffa80`0742ca90 : tcpip!TcpTcbFastDatagram+0x208
fffff800`00b998c0 fffff880`0187a0ca : fffffa80`058f7f00 fffffa80`03d69080 fffffa80`046e61a0 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
fffff800`00b99a70 fffff880`01879c17 : fffff880`02f4803c fffffa80`058f3000 00000000`00000000 fffff880`0185d400 : tcpip!TcpMatchReceive+0x1fa
fffff800`00b99bc0 fffff880`0185c3c7 : fffffa80`058f5000 fffffa80`0471fac0 fffffa80`058f5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff800`00b99c70 fffff880`0185c499 : fffff800`00b99df0 fffff880`0196c9a0 fffff800`00b99e00 fffff880`01867a7e : tcpip!IppDeliverListToProtocol+0x97
fffff800`00b99d30 fffff880`0185c990 : fffffa80`058f3000 fffffa80`06329e00 fffffa80`04184450 fffff800`00b99df0 : tcpip!IppProcessDeliverList+0x59
fffff800`00b99da0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x231
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !NETIO
fffff8800171e4cb-fffff8800171e4cf 5 bytes - NETIO!FsbFree+3b
[ 03 00 00 80 f7:ff ff ff ff ff ]
fffff8800171e4d2 - NETIO!FsbFree+42 (+0x07)
[ 48:7f ]
6 errors : !NETIO (fffff8800171e4cb-fffff8800171e4d2)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121610-23056-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02617000 PsLoadedModuleList = 0xfffff800`02854e50
Debug session time: Thu Dec 16 11:19:01.864 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:43.598
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 1, fffff880010d8b7f}
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+2db7f )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880010d8b7f, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800028bf0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
iaStor+2db7f
fffff880`010d8b7f 48894628 mov qword ptr [rsi+28h],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: taskhost.exe
TRAP_FRAME: fffff880009cbaf0 -- (.trap 0xfffff880009cbaf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=7fffffffffffffff rbx=0000000000000000 rcx=fffffa8004b24000
rdx=fffffa8003d351a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880010d8b7f rsp=fffff880009cbc80 rbp=fffff880009cbd70
r8=0000000000000002 r9=0000000000000000 r10=fffff80002617000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
iaStor+0x2db7f:
fffff880`010d8b7f 48894628 mov qword ptr [rsi+28h],rax ds:7c80:00000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002688469 to fffff80002688f00
STACK_TEXT:
fffff880`009cb9a8 fffff800`02688469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009cb9b0 fffff800`026870e0 : fffffa80`05b3aa70 fffff880`08d41350 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`009cbaf0 fffff880`010d8b7f : 00000000`00000000 fffffa80`04b3a0b8 00000000`00000002 fffff880`021d4070 : nt!KiPageFault+0x260
fffff880`009cbc80 00000000`00000000 : fffffa80`04b3a0b8 00000000`00000002 fffff880`021d4070 00000000`00000000 : iaStor+0x2db7f
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStor+2db7f
fffff880`010d8b7f 48894628 mov qword ptr [rsi+28h],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStor+2db7f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4b8f2033
FAILURE_BUCKET_ID: X64_0xD1_iaStor+2db7f
BUCKET_ID: X64_0xD1_iaStor+2db7f
Followup: MachineOwner
---------