Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Summary Dump File: Only kernel address space is available Symbol search path is: srv*c:\cache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02e4c000 PsLoadedModuleList = 0xfffff800`03089e50 Debug session time: Tue Sep 7 13:48:31.514 2010 (UTC - 6:00) System Uptime: 0 days 5:06:46.044 Loading Kernel Symbols ............................................................... ................................................................ ............................................ Loading User Symbols Loading unloaded module list ......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {90, 2, 1, fffff8800441b353} *** ERROR: Module load completed but symbols could not be loaded for e1k62x64.sys Probably caused by : e1k62x64.sys ( e1k62x64+1b353 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000090, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff8800441b353, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: 0000000000000090 CURRENT_IRQL: 2 FAULTING_IP: e1k62x64+1b353 fffff880`0441b353 48899090000000 mov qword ptr [rax+90h],rdx DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff88002b21850 -- (.trap 0xfffff88002b21850) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800d19ce20 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8800441b353 rsp=fffff88002b219e0 rbp=000000000000009e r8=fffffa800ca158e0 r9=0000000000000000 r10=fffffa8009138140 r11=000000000000fffb r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc e1k62x64+0x1b353: fffff880`0441b353 48899090000000 mov qword ptr [rax+90h],rdx ds:00000000`00000090=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ebbca9 to fffff80002ebc740 STACK_TEXT: fffff880`02b21708 fffff800`02ebbca9 : 00000000`0000000a 00000000`00000090 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`02b21710 fffff800`02eba920 : 00000000`00000000 00000000`00000000 fffffa80`0cb57100 fffffa80`09177230 : nt!KiBugCheckDispatch+0x69 fffff880`02b21850 fffff880`0441b353 : fffffa80`09181850 fffffa80`091b6998 00000000`00000000 00000000`00000001 : nt!KiPageFault+0x260 fffff880`02b219e0 fffff880`04415c98 : fffffa80`089e1f30 00000000`00000000 00000000`00000000 00000000`00000000 : e1k62x64+0x1b353 fffff880`02b21a80 fffff880`04416092 : 00000000`00000000 00000000`00000000 fffffa80`08df31a0 fffff800`02ec3992 : e1k62x64+0x15c98 fffff880`02b21b60 fffff880`016c8e4b : fffff880`0169f110 00000000`00000000 fffffa80`08df31a0 fffffa80`08df3f68 : e1k62x64+0x16092 fffff880`02b21ba0 fffff880`0164ebfd : fffffa80`09159f08 00000000`0000000a 00000000`00000001 00000000`00000001 : ndis! ?? ::DKGKHJNI::`string'+0x1597 fffff880`02b21c10 fffff880`01675b0c : 00000000`00000000 fffffa80`09159f08 00000000`00000080 fffffa80`08415f40 : ndis!ndisQueuedMiniportDpcWorkItem+0xcd fffff880`02b21cb0 fffff800`03160c06 : 00ffffff`00ffffff fffffa80`0d461b60 00000000`00000080 00ffffff`00ffffff : ndis!ndisReceiveWorkerThread+0x12c fffff880`02b21d40 fffff800`02e9ac26 : fffff880`03178180 fffffa80`0d461b60 fffff880`03182fc0 00ffffff`00ffffff : nt!PspSystemThreadStartup+0x5a fffff880`02b21d80 00000000`00000000 : fffff880`02b22000 fffff880`02b1c000 fffff880`02b21a00 00000000`00000000 : nt!KxStartSystemThread+0x16 STACK_COMMAND: kb FOLLOWUP_IP: e1k62x64+1b353 fffff880`0441b353 48899090000000 mov qword ptr [rax+90h],rdx SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: e1k62x64+1b353 FOLLOWUP_NAME: MachineOwner MODULE_NAME: e1k62x64 IMAGE_NAME: e1k62x64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4bbae4c3 FAILURE_BUCKET_ID: X64_0xD1_e1k62x64+1b353 BUCKET_ID: X64_0xD1_e1k62x64+1b353 Followup: MachineOwner ---------