Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\122210-18064-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a3b000 PsLoadedModuleList = 0x82b83810
Debug session time: Wed Dec 22 08:37:28.648 2010 (UTC - 5:00)
System Uptime: 0 days 0:51:39.006
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ffff02, 2, 0, 83ac376e}
Unable to load image \SystemRoot\System32\Drivers\sptd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for sptd.sys
*** ERROR: Module load completed but symbols could not be loaded for sptd.sys
Probably caused by : sptd.sys ( sptd+1176e )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00ffff02, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 83ac376e, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82ba3718
Unable to read MiSystemVaType memory at 82b83160
00ffff02
CURRENT_IRQL: 2
FAULTING_IP:
sptd+1176e
83ac376e 0000 add byte ptr [eax],al
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 807e1bd0 -- (.trap 0xffffffff807e1bd0)
ErrCode = 00000000
eax=00000000 ebx=8558a52c ecx=8558a518 edx=82aa33b5 esi=01000040 edi=8558a008
eip=83ac376e esp=807e1c44 ebp=807e1c68 iopl=0 nv up ei pl nz ac pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010217
sptd+0x1176e:
83ac376e 0000 add byte ptr [eax],al ds:0023:00000000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 83ac376e to 82a8182b
STACK_TEXT:
807e1bd0 83ac376e badb0d00 82aa33b5 83ac3037 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
807e1c68 8558aa0a 8558a008 83bb5363 807e1c7c sptd+0x1176e
807e1cd4 82aa3218 807c5120 807ca800 00000000 0x8558aa0a
807e1d20 82aa3038 00000000 0000000e 7618f67b nt!KiRetireDpcList+0xd5
807e1d24 00000000 0000000e 7618f67b 9939e16e nt!KiIdleLoop+0x38
STACK_COMMAND: kb
FOLLOWUP_IP:
sptd+1176e
83ac376e 0000 add byte ptr [eax],al
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: sptd+1176e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: sptd
IMAGE_NAME: sptd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ad245ea
FAILURE_BUCKET_ID: 0xD1_sptd+1176e
BUCKET_ID: 0xD1_sptd+1176e
Followup: MachineOwner
---------