Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032311-18673-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02c64000 PsLoadedModuleList = 0xfffff800`02ea1e50
Debug session time: Wed Mar 23 10:17:01.996 2011 (UTC - 4:00)
System Uptime: 0 days 1:48:35.495
Loading Kernel Symbols
...............................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 8, 0}
Unable to load image NEOFLTR_650_16339.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for NEOFLTR_650_16339.SYS
*** ERROR: Module load completed but symbols could not be loaded for NEOFLTR_650_16339.SYS
Probably caused by : NEOFLTR_650_16339.SYS ( NEOFLTR_650_16339+d0c7 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0c0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
+3534346334343833
00000000`00000000 ?? ???
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
TRAP_FRAME: fffff88009290660 -- (.trap 0xfffff88009290660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800c338b80 rbx=0000000000000000 rcx=fffffa800a360700
rdx=0000000000000016 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff880092907f8 rbp=0000000000000032
r8=fffff880092909e0 r9=0000000000000018 r10=0000000000000002
r11=fffff880092909e8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
00000000`00000000 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cd3ca9 to fffff80002cd4740
FAILED_INSTRUCTION_ADDRESS:
+3534346334343833
00000000`00000000 ?? ???
STACK_TEXT:
fffff880`092907f8 fffff880`0431d0c7 : 00000000`00000002 ffffffff`ffffffff 00000000`000004ed ffffffff`ffffffff : 0x0
fffff880`09290800 00000000`00000002 : ffffffff`ffffffff 00000000`000004ed ffffffff`ffffffff fffffa80`0c748110 : NEOFLTR_650_16339+0xd0c7
fffff880`09290808 ffffffff`ffffffff : 00000000`000004ed ffffffff`ffffffff fffffa80`0c748110 00000080`00001000 : 0x2
fffff880`09290810 00000000`000004ed : ffffffff`ffffffff fffffa80`0c748110 00000080`00001000 00000000`00000032 : 0xffffffff`ffffffff
fffff880`09290818 ffffffff`ffffffff : fffffa80`0c748110 00000080`00001000 00000000`00000032 00000000`00000032 : 0x4ed
fffff880`09290820 fffffa80`0c748110 : 00000080`00001000 00000000`00000032 00000000`00000032 fffff880`09290968 : 0xffffffff`ffffffff
fffff880`09290828 00000080`00001000 : 00000000`00000032 00000000`00000032 fffff880`09290968 fffff880`06247caa : 0xfffffa80`0c748110
fffff880`09290830 00000000`00000032 : 00000000`00000032 fffff880`09290968 fffff880`06247caa fffff880`09290938 : 0x80`00001000
fffff880`09290838 00000000`00000032 : fffff880`09290968 fffff880`06247caa fffff880`09290938 00000000`00000000 : 0x32
fffff880`09290840 fffff880`09290968 : fffff880`06247caa fffff880`09290938 00000000`00000000 fffffa80`0a275460 : 0x32
fffff880`09290848 fffff880`06247caa : fffff880`09290938 00000000`00000000 fffffa80`0a275460 00000000`00000000 : 0xfffff880`09290968
fffff880`09290850 fffff880`09290938 : 00000000`00000000 fffffa80`0a275460 00000000`00000000 00000000`00000000 : 0xfffff880`06247caa
fffff880`09290858 00000000`00000000 : fffffa80`0a275460 00000000`00000000 00000000`00000000 fffffa80`0c338b80 : 0xfffff880`09290938
STACK_COMMAND: .trap 0xfffff88009290660 ; kb
FOLLOWUP_IP:
NEOFLTR_650_16339+d0c7
fffff880`0431d0c7 ?? ???
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: NEOFLTR_650_16339+d0c7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NEOFLTR_650_16339
IMAGE_NAME: NEOFLTR_650_16339.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4c57c2ae
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_NEOFLTR_650_16339+d0c7
BUCKET_ID: X64_0xD1_CODE_AV_NULL_IP_NEOFLTR_650_16339+d0c7
Followup: MachineOwner
---------