................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {c, 2, 1, 9249f159}
Unable to load image \SystemRoot\system32\DRIVERS\[COLOR=#ff0000][U][B]athr.sys[/B][/U][/COLOR], Win32 error 0n2
*** WARNING: Unable to verify timestamp for [B][U][COLOR=#ff0000]athr.sys[/COLOR][/U][/B]
*** ERROR: Module load completed but symbols could not be loaded for[U][B][COLOR=#ff0000] athr.sys[/COLOR][/B][/U]
[U][B][COLOR=#ff0000]Probably caused by : athr.sys ( athr+13159 )[/COLOR][/B][/U]
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 9249f159, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82f6d718
Unable to read MiSystemVaType memory at 82f4d180
0000000c
CURRENT_IRQL: 2
FAULTING_IP:
athr+13159
9249f159 c7400c00000000 mov dword ptr [eax+0Ch],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 9e02fb5c -- (.trap 0xffffffff9e02fb5c)
ErrCode = 00000002
eax=00000000 ebx=866e2008 ecx=863d6c90 edx=00000000 esi=863380e0 edi=00000002
eip=9249f159 esp=9e02fbd0 ebp=9e02fbdc iopl=0 nv up ei ng nz ac pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010296
athr+0x13159:
9249f159 c7400c00000000 mov dword ptr [eax+0Ch],0 ds:0023:0000000c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 9249f159 to 82e4b7cb
STACK_TEXT:
9e02fb5c 9249f159 badb0d00 00000000 00000020 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
9e02fbdc 924a1349 863d9020 863d6d38 00000001 [U][B][COLOR=#ff0000]athr[/COLOR][/B][/U]+0x13159
9e02fc14 924a06ca 863d9020 00000001 00000002 [U][B][COLOR=#ff0000]athr[/COLOR][/B][/U]+0x15349
9e02fc30 92508164 863d9020 9e02fc58 9250d3ce [U][COLOR=#ff0000]athr[/COLOR][/U]+0x146ca
9e02fc3c 9250d3ce 863df020 866e2d30 00000ec9 [U][B][COLOR=#ff0000]athr[/COLOR][/B][/U]+0x7c164
9e02fc58 924aa4fd 863df020 9e02fc74 9248d791 [B][U][COLOR=#ff0000]athr[/COLOR][/U][/B]+0x813ce
9e02fc64 9248d791 85bb6020 863d9020 9e02fcb0 [U][B][COLOR=#ff0000]athr[/COLOR][/B][/U]+0x1e4fd
9e02fc74 88eec309 863d9020 00000000 9e02fca0 [B][U][COLOR=#ff0000]athr[/COLOR][/U][/B]+0x1791
9e02fcb0 88ecd6b2 866e201c 006e2008 00000000 ndis!ndisMiniportDpc+0xe2
9e02fd10 88eb4976 866e2108 00000000 851782a0 ndis!ndisQueuedMiniportDpcWorkItem+0xd0
9e02fd50 83013a55 00000001 ba597127 00000000 ndis!ndisReceiveWorkerThread+0xeb
9e02fd90 82ec5239 88eb488b 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
[U][B][COLOR=#ff0000]athr[/COLOR][/B][/U]+13159
9249f159 c7400c00000000 mov dword ptr [eax+0Ch],0
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: [B][U][COLOR=#ff0000]athr[/COLOR][/U][/B]+13159
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: [B][U][COLOR=#ff0000]athr[/COLOR][/U][/B]
IMAGE_NAME: [B][U][COLOR=#ff0000]athr.sys[/COLOR][/U][/B]
DEBUG_FLR_IMAGE_TIMESTAMP: 4c9fdc60
FAILURE_BUCKET_ID: 0xD1_[B][U][COLOR=#ff0000]athr[/COLOR][/U][/B]+13159
BUCKET_ID: 0xD1_[B][U][COLOR=#ff0000]athr[/COLOR][/U][/B]+13159
Followup: MachineOwner