Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\020612-9204-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e5b000 PsLoadedModuleList = 0xfffff800`030a0670
Debug session time: Mon Feb 6 17:26:38.661 2012 (UTC + 1:00)
System Uptime: 1 days 5:02:57.191
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1f80327, 2, 0, fffff8800f46b8dc}
Unable to load image \SystemRoot\system32\DRIVERS\L1E62x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for L1E62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for L1E62x64.sys
Probably caused by : L1E62x64.sys ( L1E62x64+78dc )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000001f80327, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800f46b8dc, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310a100
0000000001f80327
CURRENT_IRQL: 2
FAULTING_IP:
L1E62x64+78dc
fffff880`0f46b8dc 45395028 cmp dword ptr [r8+28h],r10d
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880033ae5a0 -- (.trap 0xfffff880033ae5a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800f46b8dc rsp=fffff880033ae730 rbp=fffffa8007d49580
r8=0000000001f802ff r9=0000000000000002 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
L1E62x64+0x78dc:
fffff880`0f46b8dc 45395028 cmp dword ptr [r8+28h],r10d ds:9008:00000000`01f80327=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ed71e9 to fffff80002ed7c40
STACK_TEXT:
fffff880`033ae458 fffff800`02ed71e9 : 00000000`0000000a 00000000`01f80327 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`033ae460 fffff800`02ed5e60 : 00000000`00000001 fffff800`02e16a56 fffffa80`06a83540 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`033ae5a0 fffff880`0f46b8dc : 00000000`00000000 fffff880`033ae818 fffffa80`06a85000 fffffa80`07d49580 : nt!KiPageFault+0x260
fffff880`033ae730 00000000`00000000 : fffff880`033ae818 fffffa80`06a85000 fffffa80`07d49580 fffffa80`07099008 : L1E62x64+0x78dc
STACK_COMMAND: kb
FOLLOWUP_IP:
L1E62x64+78dc
fffff880`0f46b8dc 45395028 cmp dword ptr [r8+28h],r10d
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: L1E62x64+78dc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L1E62x64
IMAGE_NAME: L1E62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bb00bac
FAILURE_BUCKET_ID: X64_0xD1_L1E62x64+78dc
BUCKET_ID: X64_0xD1_L1E62x64+78dc
Followup: MachineOwner
---------