Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032511-17550-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x83012000 PsLoadedModuleList = 0x8315a810
Debug session time: Fri Mar 25 14:53:21.191 2011 (UTC - 4:00)
System Uptime: 0 days 5:41:19.784
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {48, 2, 1, 91afd1b8}
Unable to load image \SystemRoot\system32\DRIVERS\e1k6232.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for e1k6232.sys
*** ERROR: Module load completed but symbols could not be loaded for e1k6232.sys
Probably caused by : e1k6232.sys ( e1k6232+161b8 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000048, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 91afd1b8, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 8317a718
Unable to read MiSystemVaType memory at 8315a160
00000048
CURRENT_IRQL: 2
FAULTING_IP:
e1k6232+161b8
91afd1b8 c7414800000000 mov dword ptr [ecx+48h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 9565fb28 -- (.trap 0xffffffff9565fb28)
ErrCode = 00000002
eax=0000fffb ebx=87c22280 ecx=00000000 edx=87c19000 esi=87c47d20 edi=00000000
eip=91afd1b8 esp=9565fb9c ebp=9565fbe8 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
e1k6232+0x161b8:
91afd1b8 c7414800000000 mov dword ptr [ecx+48h],0 ds:0023:00000048=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 91afd1b8 to 8305881b
STACK_TEXT:
9565fb28 91afd1b8 badb0d00 87c19000 00000000 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
9565fbe8 91af9a0e 87c19000 87c22280 0000000a e1k6232+0x161b8
9565fc58 91af8093 87c19000 00000000 9565fca0 e1k6232+0x12a0e
9565fc74 8c79b309 87c19000 00000000 9565fca0 e1k6232+0x11093
9565fcb0 8c77c6b2 87924acc 00924ab8 00000000 ndis!ndisMiniportDpc+0xe2
9565fd10 8c763976 87924bcc 00000000 864035f0 ndis!ndisQueuedMiniportDpcWorkItem+0xd0
9565fd50 832209df 00000000 b013fd9a 00000000 ndis!ndisReceiveWorkerThread+0xeb
9565fd90 830d21d9 8c76388b 00000000 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
e1k6232+161b8
91afd1b8 c7414800000000 mov dword ptr [ecx+48h],0
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: e1k6232+161b8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1k6232
IMAGE_NAME: e1k6232.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bbae470
FAILURE_BUCKET_ID: 0xD1_e1k6232+161b8
BUCKET_ID: 0xD1_e1k6232+161b8
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032811-16738-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x83040000 PsLoadedModuleList = 0x83188810
Debug session time: Mon Mar 28 10:16:22.537 2011 (UTC - 4:00)
System Uptime: 0 days 1:10:59.846
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {34, 2, 1, 90d38171}
Unable to load image \SystemRoot\system32\DRIVERS\e1k6232.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for e1k6232.sys
*** ERROR: Module load completed but symbols could not be loaded for e1k6232.sys
Probably caused by : e1k6232.sys ( e1k6232+16171 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000034, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 90d38171, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 831a8718
Unable to read MiSystemVaType memory at 83188160
00000034
CURRENT_IRQL: 2
FAULTING_IP:
e1k6232+16171
90d38171 f00fc111 lock xadd dword ptr [ecx],edx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: c7b64b28 -- (.trap 0xffffffffc7b64b28)
ErrCode = 00000002
eax=0000fffb ebx=87c55280 ecx=00000034 edx=ffffffff esi=87c37f90 edi=00000000
eip=90d38171 esp=c7b64b9c ebp=c7b64be8 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
e1k6232+0x16171:
90d38171 f00fc111 lock xadd dword ptr [ecx],edx ds:0023:00000034=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 90d38171 to 8308681b
STACK_TEXT:
c7b64b28 90d38171 badb0d00 ffffffff 00000000 nt!KiTrap0E+0x2cf
WARNING: Stack unwind information not available. Following frames may be wrong.
c7b64be8 90d34a0e 87c4c000 87c55280 00000001 e1k6232+0x16171
c7b64c58 90d33093 87c4c000 00000000 c7b64ca0 e1k6232+0x12a0e
c7b64c74 8ca84309 87c4c000 00000000 c7b64ca0 e1k6232+0x11093
c7b64cb0 8ca656b2 8796ac54 0096ac40 00000000 ndis!ndisMiniportDpc+0xe2
c7b64d10 8ca4c976 8796adac 00000000 85ed25e8 ndis!ndisQueuedMiniportDpcWorkItem+0xd0
c7b64d50 8324e9df 00000002 e2c37e71 00000000 ndis!ndisReceiveWorkerThread+0xeb
c7b64d90 831001d9 8ca4c88b 00000002 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
e1k6232+16171
90d38171 f00fc111 lock xadd dword ptr [ecx],edx
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: e1k6232+16171
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1k6232
IMAGE_NAME: e1k6232.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bbae470
FAILURE_BUCKET_ID: 0xD1_e1k6232+16171
BUCKET_ID: 0xD1_e1k6232+16171
Followup: MachineOwner
---------