Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020911-40061-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a47000 PsLoadedModuleList = 0x82b8f810
Debug session time: Wed Feb 9 16:58:53.541 2011 (UTC - 5:00)
System Uptime: 0 days 10:17:24.351
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {64, 2, 0, 820a5d54}
Unable to load image \SystemRoot\system32\DRIVERS\netw5v32.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for netw5v32.sys
*** ERROR: Module load completed but symbols could not be loaded for netw5v32.sys
Probably caused by : netw5v32.sys ( netw5v32+6bd54 )
Followup: MachineOwner
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020911-17238-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a02000 PsLoadedModuleList = 0x82b4a810
Debug session time: Wed Feb 9 18:12:26.404 2011 (UTC - 5:00)
System Uptime: 0 days 1:04:11.215
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {64, 2, 0, 94c9ed54}
Unable to load image \SystemRoot\system32\DRIVERS\netw5v32.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for netw5v32.sys
*** ERROR: Module load completed but symbols could not be loaded for netw5v32.sys
Probably caused by : netw5v32.sys ( netw5v32+6bd54 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000064, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 94c9ed54, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82b6a718
Unable to read MiSystemVaType memory at 82b4a160
00000064
CURRENT_IRQL: 2
FAULTING_IP:
netw5v32+6bd54
94c9ed54 80786400 cmp byte ptr [eax+64h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: chrome.exe
TRAP_FRAME: 807e28b4 -- (.trap 0xffffffff807e28b4)
ErrCode = 00000000
eax=00000000 ebx=8790b000 ecx=00000001 edx=807e2934 esi=807e29f0 edi=00000000
eip=94c9ed54 esp=807e2928 ebp=807e297c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210246
netw5v32+0x6bd54:
94c9ed54 80786400 cmp byte ptr [eax+64h],0 ds:0023:00000064=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 94c9ed54 to 82a4882b
STACK_TEXT:
807e28b4 94c9ed54 badb0d00 807e2934 8670be02 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
807e297c 94ca27c3 8790b000 00000000 807e29ac netw5v32+0x6bd54
807e29c8 94ca386a 8790b000 807e29e8 807e29ec netw5v32+0x6f7c3
807e29f4 94ca3f13 8790b000 00000003 807e2a64 netw5v32+0x7086a
807e2a6c 94ca4290 8790b001 850e56d0 85315fb8 netw5v32+0x70f13
807e2a88 94c3f38e 8790b000 850e56d0 85315fb8 netw5v32+0x71290
807e2ab4 94c3f6d3 85315fb8 85315fd8 850e56d0 netw5v32+0xc38e
807e2acc 94c3eb35 850e56d0 85315fb8 00000000 netw5v32+0xc6d3
807e2ae8 94c55e96 867010f0 00000157 00000001 netw5v32+0xbb35
807e2b34 94d5119f 867010b0 ff000808 807e2bb0 netw5v32+0x22e96
807e2b54 94d7ac57 86b11988 ff000808 807e2bb0 netw5v32+0x11e19f
807e2bb4 94d7b6b6 86b76000 00000001 00000007 netw5v32+0x147c57
807e2c1c 94d7a55f 86b76000 0000012d 8959c6f4 netw5v32+0x1486b6
807e2c84 94d6ec4e 00000001 0000000e 89e66c80 netw5v32+0x14755f
807e2ce0 94c3f38e 86b76000 89e66c80 00000000 netw5v32+0x13bc4e
807e2d0c 94c3f6d3 8530cfa8 8530cff0 89e66c80 netw5v32+0xc38e
807e2d24 94c3eb35 89e66c80 8530cfd0 00000008 netw5v32+0xc6d3
807e2d40 94d51007 86b119c8 000000ba 00000000 netw5v32+0xbb35
807e2d84 94c55d57 86b11988 20030011 807e2db8 netw5v32+0x11e007
807e2d9c 94c60298 867010b0 20030011 807e2db8 netw5v32+0x22d57
807e2dc0 94c4ecb8 875b1b58 872ba004 87545c70 netw5v32+0x2d298
807e2de8 94c4fbd4 872ba004 00000000 872ba004 netw5v32+0x1bcb8
807e2dfc 94c530c9 87545e18 872ba004 00000000 netw5v32+0x1cbd4
807e2e38 94c532a7 867032b0 86b82bd8 872ba040 netw5v32+0x200c9
807e2e88 94c4aa27 00000001 86b82bd8 000000ff netw5v32+0x202a7
807e2ec4 94c4731c 00703e58 80000000 807e2ee0 netw5v32+0x17a27
807e2ed4 94c347a5 86b82bd8 807e2f20 8b07c301 netw5v32+0x1431c
807e2ee0 8b07c301 866d5ec0 00000000 00000000 netw5v32+0x17a5
807e2f20 8b0279f4 8670517c 00705068 00000000 ndis!ndisMiniportDpc+0xda
807e2f48 82a6a3b5 8670517c 86705068 00000000 ndis!ndisInterruptDpc+0xaf
807e2fa4 82a6a218 807c2120 851a38b0 00000000 nt!KiExecuteAllDpcs+0xf9
807e2ff4 82a699dc a2305ce4 00000000 00000000 nt!KiRetireDpcList+0xd5
807e2ff8 a2305ce4 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2c
82a699dc 00000000 0000001a 00d6850f bb830000 0xa2305ce4
STACK_COMMAND: kb
FOLLOWUP_IP:
netw5v32+6bd54
94c9ed54 80786400 cmp byte ptr [eax+64h],0
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: netw5v32+6bd54
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netw5v32
IMAGE_NAME: netw5v32.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49cba8fd
FAILURE_BUCKET_ID: 0xD1_netw5v32+6bd54
BUCKET_ID: 0xD1_netw5v32+6bd54
Followup: MachineOwner
---------