Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [c:\windows\minidump\Mini061608-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: c:\windows\symbols
Executable search path is: c:\windows\i386
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0
Debug session time: Mon Jun 16 00:01:55.437 2008 (GMT+3)
System Uptime: 0 days 12:23:47.431
Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
.....................................................................................................................................
Loading User Symbols
Loading unloaded module list
....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, cd4, 6e006f, e17c3980}
Unable to load image aswSP.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
GetUlongFromAddress: unable to read from 805637f0
Probably caused by : aswSP.SYS ( aswSP+89c7 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 00000007, Attempt to free pool which was already freed
Arg2: 00000cd4, (reserved)
Arg3: 006e006f, Memory contents of the pool block
Arg4: e17c3980, Address of the block of pool being deallocated
Debugging Details:
------------------
GetUlongFromAddress: unable to read from 805637f0
POOL_ADDRESS: e17c3980
BUGCHECK_STR: 0xc2_7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: msiexec.exe
LAST_CONTROL_TRANSFER: from 80551fc5 to 80537672
STACK_TEXT:
9f949bd8 80551fc5 000000c2 00000007 00000cd4 nt!MiRemoveUnusedSegments+0x3db
9f949c28 80585703 e17c3980 00000000 d56b2f4c nt!KiProfileLock+0x1
9f949c44 805922ff e1055f08 e10470d8 00000000 nt!CcPfBuildDumpFromTrace+0x47
9f949c9c 8059207f e1055f08 009a0098 06395df4 nt!FsRtlAddToTunnelCache+0x1a6
9f949d14 b762d9c7 00000300 00beee68 28f7fab5 nt!RtlUnicodeToOemN+0x197
WARNING: Stack unwind information not available. Following frames may be wrong.
9f949d54 804dd98f 00000300 00beee68 00beee50 aswSP+0x89c7
9f949d58 00000000 00beee68 00beee50 7c90e4f4 nt!ZwSetSystemInformation+0x13
STACK_COMMAND: kb
FOLLOWUP_IP:
aswSP+89c7
b762d9c7 ?? ???
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: aswSP+89c7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: aswSP
IMAGE_NAME: aswSP.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 482cc53e
FAILURE_BUCKET_ID: 0xc2_7_aswSP+89c7
BUCKET_ID: 0xc2_7_aswSP+89c7
Followup: MachineOwner
---------
Friday, June 20, 2008
Probably caused by : aswSP.SYS ( aswSP+89c7 )
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment