Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\011511-24258-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0281a000 PsLoadedModuleList = 0xfffff800`02a57e50
Debug session time: Sat Jan 15 12:38:09.111 2011 (UTC - 5:00)
System Uptime: 0 days 0:02:55.611
Loading Kernel Symbols
...............................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 1, fffff88001054771}
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+4a771 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001054771, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac20e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
iaStor+4a771
fffff880`01054771 488911 mov qword ptr [rcx],rdx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880009fb6f0 -- (.trap 0xfffff880009fb6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001054771 rsp=fffff880009fb880 rbp=0000000000000000
r8=fffffa8007987000 r9=0000000000000000 r10=fffff8800100f6b8
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
iaStor+0x4a771:
fffff880`01054771 488911 mov qword ptr [rcx],rdx ds:3e20:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002889ca9 to fffff8000288a740
STACK_TEXT:
fffff880`009fb5a8 fffff800`02889ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009fb5b0 fffff800`02888920 : 00000000`00000000 00000000`00000000 fffffa80`098394a8 fffff800`02869e05 : nt!KiBugCheckDispatch+0x69
fffff880`009fb6f0 fffff880`01054771 : fffffa80`07987ad0 fffffa80`06b4c1a0 fffffa80`098392c0 00000000`00000000 : nt!KiPageFault+0x260
fffff880`009fb880 fffffa80`07987ad0 : fffffa80`06b4c1a0 fffffa80`098392c0 00000000`00000000 00000000`00000001 : iaStor+0x4a771
fffff880`009fb888 fffffa80`06b4c1a0 : fffffa80`098392c0 00000000`00000000 00000000`00000001 fffffa80`06b4c1a0 : 0xfffffa80`07987ad0
fffff880`009fb890 fffffa80`098392c0 : 00000000`00000000 00000000`00000001 fffffa80`06b4c1a0 fffffa80`08d4d7e0 : 0xfffffa80`06b4c1a0
fffff880`009fb898 00000000`00000000 : 00000000`00000001 fffffa80`06b4c1a0 fffffa80`08d4d7e0 fffff880`0105c733 : 0xfffffa80`098392c0
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStor+4a771
fffff880`01054771 488911 mov qword ptr [rcx],rdx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStor+4a771
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a287aa4
FAILURE_BUCKET_ID: X64_0xD1_iaStor+4a771
BUCKET_ID: X64_0xD1_iaStor+4a771
Followup: MachineOwner
---------