Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021411-24086-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x83037000 PsLoadedModuleList = 0x8317f810
Debug session time: Mon Feb 14 08:42:11.897 2011 (UTC - 5:00)
System Uptime: 0 days 1:20:27.723
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {30, 2, 0, 91a568a5}
Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athr.sys
*** ERROR: Module load completed but symbols could not be loaded for athr.sys
Probably caused by : athr.sys ( athr+428a5 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000030, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 91a568a5, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 8319f718
Unable to read MiSystemVaType memory at 8317f160
00000030
CURRENT_IRQL: 2
FAULTING_IP:
athr+428a5
91a568a5 8b5130 mov edx,dword ptr [ecx+30h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: SYSTEM
TRAP_FRAME: 807e1894 -- (.trap 0xffffffff807e1894)
ErrCode = 00000000
eax=0000001a ebx=87946290 ecx=00000000 edx=00000088 esi=00000000 edi=00000001
eip=91a568a5 esp=807e1908 ebp=807e190c iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
athr+0x428a5:
91a568a5 8b5130 mov edx,dword ptr [ecx+30h] ds:0023:00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 91a568a5 to 8307d81b
STACK_TEXT:
807e1894 91a568a5 badb0d00 00000088 8793f6c0 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
807e190c 91a56647 00000000 897c5f34 8a0ada00 athr+0x428a5
807e1944 91a55c52 860cf108 876d9528 00000000 athr+0x42647
807e196c 91a7cfc0 860cf028 876d9528 00000018 athr+0x41c52
807e19c0 91a7d8c7 87185020 876d9528 00000000 athr+0x68fc0
807e1b14 91a2ecfe 876d9528 807e1b30 91a2bd2f athr+0x698c7
807e1b20 91a2bd2f 876d9528 87444668 807e1b40 athr+0x1acfe
807e1b30 91a739c7 87444668 876d9528 807e1b68 athr+0x17d2f
807e1b40 91a736b7 87676420 876d9528 00000000 athr+0x5f9c7
807e1b68 91a2762a 87676420 876d9528 00000000 athr+0x5f6b7
807e1b94 91a27414 8767ca50 876d94a0 87946290 athr+0x1362a
807e1bac 91a28499 8767ca50 8a485248 8a5c9788 athr+0x13414
807e1bc4 91a28525 8767ca50 807e1bdc 91a85554 athr+0x14499
807e1bd0 91a85554 8767ca50 807e1bf8 91a8a1ff athr+0x14525
807e1bdc 91a8a1ff 87441020 87940022 807c6a54 athr+0x71554
807e1bf8 91a2eabd 87441020 807e1c14 91a15761 athr+0x761ff
807e1c04 91a15761 87185020 8767ca50 807e1c50 athr+0x1aabd
807e1c14 8b19d309 8767ca50 00000000 807e1c40 athr+0x1761
807e1c50 8b1489f4 879462a4 00946290 00000000 ndis!ndisMiniportDpc+0xe2
807e1c78 8309f4f5 879462a4 87946290 00000000 ndis!ndisInterruptDpc+0xaf
807e1cd4 8309f358 807c5120 807ca800 00000000 nt!KiExecuteAllDpcs+0xf9
807e1d20 8309f178 00000000 0000000e ffffffff nt!KiRetireDpcList+0xd5
807e1d24 00000000 0000000e ffffffff b7ffdffd nt!KiIdleLoop+0x38
STACK_COMMAND: kb
FOLLOWUP_IP:
athr+428a5
91a568a5 8b5130 mov edx,dword ptr [ecx+30h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: athr+428a5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athr
IMAGE_NAME: athr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a2ea444
FAILURE_BUCKET_ID: 0xD1_athr+428a5
BUCKET_ID: 0xD1_athr+428a5
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021411-21403-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x83016000 PsLoadedModuleList = 0x8315e810
Debug session time: Mon Feb 14 15:53:31.552 2011 (UTC - 5:00)
System Uptime: 0 days 2:04:43.690
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {30, 2, 0, 933298a5}
Unable to load image \SystemRoot\system32\DRIVERS\athr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athr.sys
*** ERROR: Module load completed but symbols could not be loaded for athr.sys
Probably caused by : athr.sys ( athr+428a5 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000030, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 933298a5, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 8317e718
Unable to read MiSystemVaType memory at 8315e160
00000030
CURRENT_IRQL: 2
FAULTING_IP:
athr+428a5
933298a5 8b5130 mov edx,dword ptr [ecx+30h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: SYSTEM
TRAP_FRAME: 807e1894 -- (.trap 0xffffffff807e1894)
ErrCode = 00000000
eax=0000001a ebx=87969e08 ecx=00000000 edx=00000088 esi=00000000 edi=00000001
eip=933298a5 esp=807e1908 ebp=807e190c iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
athr+0x428a5:
933298a5 8b5130 mov edx,dword ptr [ecx+30h] ds:0023:00000030=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 933298a5 to 8305c81b
STACK_TEXT:
807e1894 933298a5 badb0d00 00000088 8770c070 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
807e190c 93329647 00000000 883c295c c422f230 athr+0x428a5
807e1944 93328c52 cf083108 876e6528 00000000 athr+0x42647
807e196c 9334ffc0 cf083028 876e6528 00000018 athr+0x41c52
807e19c0 933508c7 856c8020 876e6528 00000000 athr+0x68fc0
807e1b14 93301cfe 876e6528 807e1b30 932fed2f athr+0x698c7
807e1b20 932fed2f 876e6528 8769ed60 807e1b40 athr+0x1acfe
807e1b30 933469c7 8769ed60 876e6528 807e1b68 athr+0x17d2f
807e1b40 933466b7 876a7628 876e6528 00000000 athr+0x5f9c7
807e1b68 932fa62a 876a7628 876e6528 00000000 athr+0x5f6b7
807e1b94 932fa414 8768ca50 876e64a0 00000000 athr+0x1362a
807e1bac 932fb499 8768ca50 85de7f60 885e9708 athr+0x13414
807e1bc4 932fb525 8768ca50 807e1bdc 93358554 athr+0x14499
807e1bd0 93358554 8768ca50 807e1bf8 9335d1ff athr+0x14525
807e1bdc 9335d1ff 8754a020 87960022 807c6a54 athr+0x71554
807e1bf8 93301abd 8754a020 807e1c14 932e8761 athr+0x761ff
807e1c04 932e8761 856c8020 8768ca50 807e1c50 athr+0x1aabd
807e1c14 8b194309 8768ca50 00000000 807e1c40 athr+0x1761
807e1c50 8b13f9f4 87969e1c 00969e08 00000000 ndis!ndisMiniportDpc+0xe2
807e1c78 8307e4f5 87969e1c 87969e08 00000000 ndis!ndisInterruptDpc+0xaf
807e1cd4 8307e358 807c5120 807ca800 00000000 nt!KiExecuteAllDpcs+0xf9
807e1d20 8307e178 00000000 0000000e ffdfffff nt!KiRetireDpcList+0xd5
807e1d24 00000000 0000000e ffdfffff fdf6ffff nt!KiIdleLoop+0x38
STACK_COMMAND: kb
FOLLOWUP_IP:
athr+428a5
933298a5 8b5130 mov edx,dword ptr [ecx+30h]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: athr+428a5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athr
IMAGE_NAME: athr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a2ea444
FAILURE_BUCKET_ID: 0xD1_athr+428a5
BUCKET_ID: 0xD1_athr+428a5
Followup: MachineOwner
---------