Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\WhoEver\Desktop\New folder\021910-16052-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*
Symbol information Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c59000 PsLoadedModuleList = 0xfffff800`02e96e50
Debug session time: Fri Feb 19 18:12:26.567 2010 (GMT-6)
System Uptime: 0 days 2:10:37.611
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8005d0ea8e, 2, 0, fffff88003a850e1}
Unable to load image \SystemRoot\system32\DRIVERS\athrxusb.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrxusb.sys
*** ERROR: Module load completed but symbols could not be loaded for athrxusb.sys
Probably caused by : athrxusb.sys ( athrxusb+760e1 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000008005d0ea8e, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88003a850e1, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f010e0
0000008005d0ea8e
CURRENT_IRQL: 2
FAULTING_IP:
athrxusb+760e1
fffff880`03a850e1 8b402c mov eax,dword ptr [rax+2Ch]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: DOW2.exe
TRAP_FRAME: fffff880009b06f0 -- (.trap 0xfffff880009b06f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000008005d0ea62 rbx=0000000000000000 rcx=0000000000000001
rdx=fffffa8005cf1030 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003a850e1 rsp=fffff880009b0880 rbp=0000000000000000
r8=fffffa800599c290 r9=0000000000000000 r10=fffff88002fd3e20
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
athrxusb+0x760e1:
fffff880`03a850e1 8b402c mov eax,dword ptr [rax+2Ch] ds:00000080`05d0ea8e=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cca469 to fffff80002ccaf00
STACK_TEXT:
fffff880`009b05a8 fffff800`02cca469 : 00000000`0000000a 00000080`05d0ea8e 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009b05b0 fffff800`02cc90e0 : fffffa80`00000000 fffffa80`04bcbcc0 fffffa80`05b519a0 fffff800`02dfe2dd : nt!KiBugCheckDispatch+0x69
fffff880`009b06f0 fffff880`03a850e1 : fffff880`01559110 fffffa80`03de6050 00000000`00000286 fffff880`03a206b0 : nt!KiPageFault+0x260
fffff880`009b0880 fffff880`01559110 : fffffa80`03de6050 00000000`00000286 fffff880`03a206b0 00000000`00000000 : athrxusb+0x760e1
fffff880`009b0888 fffffa80`03de6050 : 00000000`00000286 fffff880`03a206b0 00000000`00000000 fffffa80`03de6050 : ndis!WPP_GLOBAL_Control
fffff880`009b0890 00000000`00000286 : fffff880`03a206b0 00000000`00000000 fffffa80`03de6050 00000000`00000000 : 0xfffffa80`03de6050
fffff880`009b0898 fffff880`03a206b0 : 00000000`00000000 fffffa80`03de6050 00000000`00000000 fffff880`03a4bca1 : 0x286
fffff880`009b08a0 00000000`00000000 : fffffa80`03de6050 00000000`00000000 fffff880`03a4bca1 00000001`060af810 : athrxusb+0x116b0
STACK_COMMAND: kb
FOLLOWUP_IP:
athrxusb+760e1
fffff880`03a850e1 8b402c mov eax,dword ptr [rax+2Ch]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: athrxusb+760e1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athrxusb
IMAGE_NAME: athrxusb.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 488f1151
FAILURE_BUCKET_ID: X64_0xD1_athrxusb+760e1
BUCKET_ID: X64_0xD1_athrxusb+760e1
Followup: MachineOwner
---------
3: kd> lmvm athrxusb
start end module name
fffff880`03a0f000 fffff880`03b1c000 athrxusb T (no symbols)
Loaded symbol image file: athrxusb.sys
Image path: \SystemRoot\system32\DRIVERS\athrxusb.sys
Image name: athrxusb.sys
Timestamp: Tue Jul 29 07:47:13 2008 (488F1151)
CheckSum: 00107E18
ImageSize: 0010D000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4