Friday, June 20, 2008

Probably caused by : aswMon2.SYS ( aswMon2+65a9 )

Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [c:\windows\minidump\Mini060908-03.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: c:\windows\symbols
Executable search path is: c:\windows\i386
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0
Debug session time: Mon Jun 9 21:02:12.625 2008 (GMT+3)
System Uptime: 0 days 0:10:53.611
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
.....................................................................................................................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C2, {7, cd4, 660072, e35c2738}

Unable to load image aswMon2.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswMon2.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswMon2.SYS
GetUlongFromAddress: unable to read from 805637f0
Probably caused by : aswMon2.SYS ( aswMon2+65a9 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 00000007, Attempt to free pool which was already freed
Arg2: 00000cd4, (reserved)
Arg3: 00660072, Memory contents of the pool block
Arg4: e35c2738, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from 805637f0

POOL_ADDRESS: e35c2738

BUGCHECK_STR: 0xc2_7

CUSTOMER_CRASH_COUNT: 3

DEFAULT_BUCKET_ID: DRIVER_FAULT

PROCESS_NAME: firefox.exe

LAST_CONTROL_TRANSFER: from 80551fc5 to 80537672

STACK_TEXT:
b766d69c 80551fc5 000000c2 00000007 00000cd4 nt!MiRemoveUnusedSegments+0x3db
b766d6ec 8056ec09 e35c2738 00000000 e1557138 nt!KiProfileLock+0x1
b766d748 8056d03b e1557150 00000000 899fc288 nt!NtQueryInformationToken+0x89b
b766d7c0 80570402 00000000 b766d800 00000040 nt!NtQueryVolumeInformationFile+0x30
b766d814 8057c24e 00000000 00000000 b94bf000 nt!CmpConstructName+0xb3
b766d890 80584cc6 b766d9f4 00120089 b766d950 nt!NtQuerySystemInformation+0xd88
b766d8d8 b68415a9 b766d9f4 00120089 b766d950 nt!MiCreateImageFileMap+0xa24
WARNING: Stack unwind information not available. Following frames may be wrong.
b766da18 b68419a4 898e0a60 898e0888 b766da4f aswMon2+0x65a9
b766da50 b683b83c 89ab0020 008e0888 804e13c9 aswMon2+0x69a4
b766db4c 8056d03b 8a14cc78 00000000 880bdd08 aswMon2+0x83c
b766dbc4 80570402 00000000 b766dc04 00000040 nt!NtQueryVolumeInformationFile+0x30
b766dc18 8057c24e 00000000 00000000 00000001 nt!CmpConstructName+0xb3
b766dc94 8057c31d 0012e898 00100001 0012e858 nt!NtQuerySystemInformation+0xd88
b766dcf0 8057c360 0012e898 00100001 0012e858 nt!NtQuerySystemInformation+0xe59
b766dd30 804dd98f 0012e898 00100001 0012e858 nt!NtQuerySystemInformation+0xe9c
b766dd44 00000000 00000080 00000003 00000002 nt!ZwSetSystemInformation+0x13


STACK_COMMAND: kb

FOLLOWUP_IP:
aswMon2+65a9
b68415a9 ?? ???

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: aswMon2+65a9

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: aswMon2

IMAGE_NAME: aswMon2.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 482c3a50

FAILURE_BUCKET_ID: 0xc2_7_aswMon2+65a9

BUCKET_ID: 0xc2_7_aswMon2+65a9

Followup: MachineOwner
---------


No comments: