Trying to root out BSoD cause.
MiniDump Debug report below.
Any help appreciated.
Seems to reference a driver...but....what driver....beats me.
Rev
_________________
Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini030708-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805533a0
Debug session time: Fri Mar 7 08:04:01.658 2008 (GMT-6)
System Uptime: 16 days 12:51:56.157
Unable to load image ntoskrnl.exe, Win32 error 2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
.................................................................................................................................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {c0f366d0, 1, 0, 80502b5a}
Probably caused by : memory_corruption ( nt!MiSwapWslEntries+ad )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: c0f366d0, memory referenced
Arg2: 00000001, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 80502b5a, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: c0f366d0
CURRENT_IRQL: 1
FAULTING_IP:
nt!MiSwapWslEntries+ad
80502b5a 8b0490 mov eax,dword ptr [eax+edx*4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from 80517037 to 80502b5a
STACK_TEXT:
bacd3c30 80517037 c0e0003c 00004000 876e4008 nt!MiSwapWslEntries+0xad
bacd3c80 804e0fb7 d5585000 00000006 8054f518 nt!CcZeroEndOfLastPage+0x106
bacd3d2c 804e61cb 89e82040 8055a3c0 89e41d20 nt!Dr_kit9_a+0x8
bacd3d74 80533fe6 89e82040 00000000 89e41d20 nt!KiRestoreProcessorControlState+0x71
bacd3dac 805c4cce 89e82040 00000000 00000000 nt!KeRemoveByKeyDeviceQueueIfBusy+0x7
bacd3ddc 805411c2 80533ee6 00000000 00000000 nt!IopRegisterDeviceInterface+0x16e
bacd3e00 00000000 00001f80 0000ffff 00000000 nt!RtlpTraceDatabaseInternalFind+0x29
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiSwapWslEntries+ad
80502b5a 8b0490 mov eax,dword ptr [eax+edx*4]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiSwapWslEntries+ad
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9c
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiSwapWslEntries+ad
BUCKET_ID: 0xA_nt!MiSwapWslEntries+ad
Followup: MachineOwner
---------
MiniDump Debug report below.
Any help appreciated.
Seems to reference a driver...but....what driver....beats me.
Rev
_________________
Microsoft (R) Windows Debugger Version 6.6.0007.5
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini030708-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: C:\WINDOWS\Symbols
Executable search path is:
Unable to load image ntoskrnl.exe, Win32 error 2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0x804d7000 PsLoadedModuleList = 0x805533a0
Debug session time: Fri Mar 7 08:04:01.658 2008 (GMT-6)
System Uptime: 16 days 12:51:56.157
Unable to load image ntoskrnl.exe, Win32 error 2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
Loading Kernel Symbols
.................................................................................................................................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {c0f366d0, 1, 0, 80502b5a}
Probably caused by : memory_corruption ( nt!MiSwapWslEntries+ad )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: c0f366d0, memory referenced
Arg2: 00000001, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 80502b5a, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: c0f366d0
CURRENT_IRQL: 1
FAULTING_IP:
nt!MiSwapWslEntries+ad
80502b5a 8b0490 mov eax,dword ptr [eax+edx*4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
LAST_CONTROL_TRANSFER: from 80517037 to 80502b5a
STACK_TEXT:
bacd3c30 80517037 c0e0003c 00004000 876e4008 nt!MiSwapWslEntries+0xad
bacd3c80 804e0fb7 d5585000 00000006 8054f518 nt!CcZeroEndOfLastPage+0x106
bacd3d2c 804e61cb 89e82040 8055a3c0 89e41d20 nt!Dr_kit9_a+0x8
bacd3d74 80533fe6 89e82040 00000000 89e41d20 nt!KiRestoreProcessorControlState+0x71
bacd3dac 805c4cce 89e82040 00000000 00000000 nt!KeRemoveByKeyDeviceQueueIfBusy+0x7
bacd3ddc 805411c2 80533ee6 00000000 00000000 nt!IopRegisterDeviceInterface+0x16e
bacd3e00 00000000 00001f80 0000ffff 00000000 nt!RtlpTraceDatabaseInternalFind+0x29
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiSwapWslEntries+ad
80502b5a 8b0490 mov eax,dword ptr [eax+edx*4]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiSwapWslEntries+ad
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9c
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiSwapWslEntries+ad
BUCKET_ID: 0xA_nt!MiSwapWslEntries+ad
Followup: MachineOwner
---------
