Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041211-65442-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`01e4b000 PsLoadedModuleList = 0xfffff800`02090e90
Debug session time: Tue Apr 12 04:07:15.659 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:06.284
Loading Kernel Symbols
...............................................................
....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff89fffffffe1, 2, 1, fffff880013324ff}
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+524ff )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff89fffffffe1, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880013324ff, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800020fc0e8
fffff89fffffffe1
CURRENT_IRQL: 2
FAULTING_IP:
iaStor+524ff
fffff880`013324ff 48894620 mov qword ptr [rsi+20h],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880009fa6f0 -- (.trap 0xfffff880009fa6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=7fffffffffffffff rbx=0000000000000000 rcx=fffffa80044aa000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880013324ff rsp=fffff880009fa880 rbp=0000000000000000
r8=fffffa80044aa000 r9=0000000000000000 r10=fffff880012e56b8
r11=fffffa80036e43b6 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
iaStor+0x524ff:
fffff880`013324ff 48894620 mov qword ptr [rsi+20h],rax ds:ad80:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001ecabe9 to fffff80001ecb640
STACK_TEXT:
fffff880`009fa5a8 fffff800`01ecabe9 : 00000000`0000000a fffff89f`ffffffe1 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009fa5b0 fffff800`01ec9860 : fffffa80`0458e060 00000000`00000000 00000000`00000000 fffff880`03c7c660 : nt!KiBugCheckDispatch+0x69
fffff880`009fa6f0 fffff880`013324ff : fffff880`03c7c6b0 fffffa80`05a4d600 fffffa80`05783ab0 00000000`00000000 : nt!KiPageFault+0x260
fffff880`009fa880 fffff880`03c7c6b0 : fffffa80`05a4d600 fffffa80`05783ab0 00000000`00000000 00000000`00000202 : iaStor+0x524ff
fffff880`009fa888 fffffa80`05a4d600 : fffffa80`05783ab0 00000000`00000000 00000000`00000202 fffff800`01ed1a3a : 0xfffff880`03c7c6b0
fffff880`009fa890 fffffa80`05783ab0 : 00000000`00000000 00000000`00000202 fffff800`01ed1a3a fffff800`0203de80 : 0xfffffa80`05a4d600
fffff880`009fa898 00000000`00000000 : 00000000`00000202 fffff800`01ed1a3a fffff800`0203de80 fffffa80`04a13750 : 0xfffffa80`05783ab0
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStor+524ff
fffff880`013324ff 48894620 mov qword ptr [rsi+20h],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStor+524ff
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a287aa4
FAILURE_BUCKET_ID: X64_0xD1_iaStor+524ff
BUCKET_ID: X64_0xD1_iaStor+524ff
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041211-65442-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`01e4b000 PsLoadedModuleList = 0xfffff800`02090e90
Debug session time: Tue Apr 12 04:07:15.659 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:06.284
Loading Kernel Symbols
...............................................................
....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff89fffffffe1, 2, 1, fffff880013324ff}
Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
Probably caused by : iaStor.sys ( iaStor+524ff )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff89fffffffe1, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880013324ff, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800020fc0e8
fffff89fffffffe1
CURRENT_IRQL: 2
FAULTING_IP:
iaStor+524ff
fffff880`013324ff 48894620 mov qword ptr [rsi+20h],rax
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880009fa6f0 -- (.trap 0xfffff880009fa6f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=7fffffffffffffff rbx=0000000000000000 rcx=fffffa80044aa000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880013324ff rsp=fffff880009fa880 rbp=0000000000000000
r8=fffffa80044aa000 r9=0000000000000000 r10=fffff880012e56b8
r11=fffffa80036e43b6 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
iaStor+0x524ff:
fffff880`013324ff 48894620 mov qword ptr [rsi+20h],rax ds:ad80:00000000`00000020=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001ecabe9 to fffff80001ecb640
STACK_TEXT:
fffff880`009fa5a8 fffff800`01ecabe9 : 00000000`0000000a fffff89f`ffffffe1 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009fa5b0 fffff800`01ec9860 : fffffa80`0458e060 00000000`00000000 00000000`00000000 fffff880`03c7c660 : nt!KiBugCheckDispatch+0x69
fffff880`009fa6f0 fffff880`013324ff : fffff880`03c7c6b0 fffffa80`05a4d600 fffffa80`05783ab0 00000000`00000000 : nt!KiPageFault+0x260
fffff880`009fa880 fffff880`03c7c6b0 : fffffa80`05a4d600 fffffa80`05783ab0 00000000`00000000 00000000`00000202 : iaStor+0x524ff
fffff880`009fa888 fffffa80`05a4d600 : fffffa80`05783ab0 00000000`00000000 00000000`00000202 fffff800`01ed1a3a : 0xfffff880`03c7c6b0
fffff880`009fa890 fffffa80`05783ab0 : 00000000`00000000 00000000`00000202 fffff800`01ed1a3a fffff800`0203de80 : 0xfffffa80`05a4d600
fffff880`009fa898 00000000`00000000 : 00000000`00000202 fffff800`01ed1a3a fffff800`0203de80 fffffa80`04a13750 : 0xfffffa80`05783ab0
STACK_COMMAND: kb
FOLLOWUP_IP:
iaStor+524ff
fffff880`013324ff 48894620 mov qword ptr [rsi+20h],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: iaStor+524ff
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: iaStor
IMAGE_NAME: iaStor.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a287aa4
FAILURE_BUCKET_ID: X64_0xD1_iaStor+524ff
BUCKET_ID: X64_0xD1_iaStor+524ff
Followup: MachineOwner
---------