Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [c:\windows\minidump\Mini060908-03.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\windows\symbols
Executable search path is: c:\windows\i386
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0
Debug session time: Mon Jun 9 21:02:12.625 2008 (GMT+3)
System Uptime: 0 days 0:10:53.611
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
.....................................................................................................................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, cd4, 660072, e35c2738}
Unable to load image aswMon2.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswMon2.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswMon2.SYS
GetUlongFromAddress: unable to read from 805637f0
Probably caused by : aswMon2.SYS ( aswMon2+65a9 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 00000007, Attempt to free pool which was already freed
Arg2: 00000cd4, (reserved)
Arg3: 00660072, Memory contents of the pool block
Arg4: e35c2738, Address of the block of pool being deallocated
Debugging Details:
------------------
GetUlongFromAddress: unable to read from 805637f0
POOL_ADDRESS: e35c2738
BUGCHECK_STR: 0xc2_7
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: firefox.exe
LAST_CONTROL_TRANSFER: from 80551fc5 to 80537672
STACK_TEXT:
b766d69c 80551fc5 000000c2 00000007 00000cd4 nt!MiRemoveUnusedSegments+0x3db
b766d6ec 8056ec09 e35c2738 00000000 e1557138 nt!KiProfileLock+0x1
b766d748 8056d03b e1557150 00000000 899fc288 nt!NtQueryInformationToken+0x89b
b766d7c0 80570402 00000000 b766d800 00000040 nt!NtQueryVolumeInformationFile+0x30
b766d814 8057c24e 00000000 00000000 b94bf000 nt!CmpConstructName+0xb3
b766d890 80584cc6 b766d9f4 00120089 b766d950 nt!NtQuerySystemInformation+0xd88
b766d8d8 b68415a9 b766d9f4 00120089 b766d950 nt!MiCreateImageFileMap+0xa24
WARNING: Stack unwind information not available. Following frames may be wrong.
b766da18 b68419a4 898e0a60 898e0888 b766da4f aswMon2+0x65a9
b766da50 b683b83c 89ab0020 008e0888 804e13c9 aswMon2+0x69a4
b766db4c 8056d03b 8a14cc78 00000000 880bdd08 aswMon2+0x83c
b766dbc4 80570402 00000000 b766dc04 00000040 nt!NtQueryVolumeInformationFile+0x30
b766dc18 8057c24e 00000000 00000000 00000001 nt!CmpConstructName+0xb3
b766dc94 8057c31d 0012e898 00100001 0012e858 nt!NtQuerySystemInformation+0xd88
b766dcf0 8057c360 0012e898 00100001 0012e858 nt!NtQuerySystemInformation+0xe59
b766dd30 804dd98f 0012e898 00100001 0012e858 nt!NtQuerySystemInformation+0xe9c
b766dd44 00000000 00000080 00000003 00000002 nt!ZwSetSystemInformation+0x13
STACK_COMMAND: kb
FOLLOWUP_IP:
aswMon2+65a9
b68415a9 ?? ???
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: aswMon2+65a9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswMon2
IMAGE_NAME: aswMon2.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 482c3a50
FAILURE_BUCKET_ID: 0xc2_7_aswMon2+65a9
BUCKET_ID: 0xc2_7_aswMon2+65a9
Followup: MachineOwner
---------
Friday, June 20, 2008
Probably caused by : aswMon2.SYS ( aswMon2+65a9 )
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment