Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\ DOWNLOADS\ DUMPS\JonasQ\040511-22495-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\WinSym*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03055000 PsLoadedModuleList = 0xfffff800`03292e50
Debug session time: Tue Apr 5 20:38:48.471 2011 (UTC + 1:00)
System Uptime: 0 days 8:11:53.954
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {800388f20e, 2, 0, fffff88005ace116}
Unable to load image \SystemRoot\system32\DRIVERS\athrxu6.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrxu6.sys
*** ERROR: Module load completed but symbols could not be loaded for athrxu6.sys
Probably caused by : athrxu6.sys ( athrxu6+8b116 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000800388f20e, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88005ace116, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032fd0e0
000000800388f20e
CURRENT_IRQL: 2
FAULTING_IP:
athrxu6+8b116
fffff880`05ace116 8b402c mov eax,dword ptr [rax+2Ch]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002ffb720 -- (.trap 0xfffff88002ffb720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000800388f1e2 rbx=0000000000000000 rcx=fffffa800384c030
rdx=fffffa80056b5000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88005ace116 rsp=fffff88002ffb8b0 rbp=0000000000000000
r8=fffffa80058f41c0 r9=0000000000000000 r10=fffffa800414a020
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
athrxu6+0x8b116:
fffff880`05ace116 8b402c mov eax,dword ptr [rax+2Ch] ds:9310:00000080`0388f20e=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030c4ca9 to fffff800030c5740
STACK_TEXT:
fffff880`02ffb5d8 fffff800`030c4ca9 : 00000000`0000000a 00000080`0388f20e 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02ffb5e0 fffff800`030c3920 : 00000000`00000000 fffffa80`04eb066b fffffa80`0370b100 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02ffb720 fffff880`05ace116 : 00000000`00000000 fffffa80`04eb04c0 00000000`00000000 fffffa80`07199310 : nt!KiPageFault+0x260
fffff880`02ffb8b0 00000000`00000000 : fffffa80`04eb04c0 00000000`00000000 fffffa80`07199310 00000000`00000000 : athrxu6+0x8b116
STACK_COMMAND: kb
FOLLOWUP_IP:
athrxu6+8b116
fffff880`05ace116 8b402c mov eax,dword ptr [rax+2Ch]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: athrxu6+8b116
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athrxu6
IMAGE_NAME: athrxu6.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 468c5e5a
FAILURE_BUCKET_ID: X64_0xD1_athrxu6+8b116
BUCKET_ID: X64_0xD1_athrxu6+8b116
Followup: MachineOwner