*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 94e75000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8b7d9108, address which referenced memory
Debugging Details:
------------------
Unable to load image \SystemRoot\system32\DRIVERS\e100b325.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for e100b325.sys
*** ERROR: Module load completed but symbols could not be loaded for e100b325.sys
Unable to load image \SystemRoot\system32\DRIVERS\bdfndisf.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for bdfndisf.sys
*** ERROR: Module load completed but symbols could not be loaded for bdfndisf.sys
READ_ADDRESS: GetPointerFromAddress: unable to read from 82747868
Unable to read MiSystemVaType memory at 82727420
94e75000
CURRENT_IRQL: 2
FAULTING_IP:
e100b325+c108
8b7d9108 ?? ???
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 877639fc -- (.trap 0xffffffff877639fc)
.trap 0xffffffff877639fc
ErrCode = 00000000
eax=94e75000 ebx=00000001 ecx=ffffbea0 edx=94e7553e esi=8940bafc edi=000094e7
eip=8b7d9108 esp=87763a70 ebp=87763a80 iopl=0 nv up ei ng nz ac po cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010293
e100b325+0xc108:
8b7d9108 ?? ???
.trap
Resetting default scope
LAST_CONTROL_TRANSFER: from 8b7d9108 to 8265dfb9
STACK_TEXT:
877639fc 8b7d9108 badb0d00 94e7553e 84163580 nt!KiTrap0E+0x2e1
WARNING: Stack unwind information not available. Following frames may be wrong.
87763a6c 87b26f8a 94e7143a 94e713e6 00000001 e100b325+0xc108
87763a80 8b7d9525 00d6693a 87b26f6e 89424f60 0x87b26f8a
87763ac4 8b7e52d5 87b26f00 8940b008 0000004e e100b325+0xc525
87763af4 8b7e7319 c0010017 8940b048 8940b008 e100b325+0x182d5
87763b50 8b7e73c5 00000000 8942ce28 00000000 e100b325+0x1a319
87763b74 8b7e768d 8940b008 8940b048 8940b04c e100b325+0x1a3c5
87763bc4 8b7e771f 00000000 8942ce28 00002082 e100b325+0x1a68d
87763be4 832cd56e 8940b598 87763c10 00000001 e100b325+0x1a71f
87763bfc 829ce1f4 86821030 00000000 8fea1e08 ndis!ndisMProcessSGList+0x7a
87763c28 832cd6c7 8fea1e08 86821030 84881008 hal!HalBuildScatterGatherList+0x1ba
87763c78 832d4860 868210e8 00000003 868210e8 ndis!ndisMAllocSGList+0x128
87763ca0 832d2cb3 87763cf8 87763cf8 00000000 ndis!ndisMSendPacketsXToMiniport+0xc0
87763cd8 832d4792 8942e008 87763cf8 00000001 ndis!ndisMSendPackets+0x1b4
87763cec 8b909ef9 8942e008 8942ce28 8271213c ndis!ndisMSend+0x13
87763d30 8281d865 8698ca50 8690e3a0 84163580 bdfndisf+0x8ef9
87763d44 826b5e22 8ff554f0 00000000 84163580 nt!IopProcessWorkItem+0x23
87763d7c 827e5c42 8ff554f0 500b66bb 00000000 nt!ExpWorkerThread+0xfd
87763dc0 8264eefe 826b5d25 00000001 00000000 nt!PspSystemThreadStartup+0x9d
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
e100b325+c108
8b7d9108 ?? ???
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: e100b325+c108
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e100b325
IMAGE_NAME: e100b325.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 45ddde2f
FAILURE_BUCKET_ID: 0xD1_e100b325+c108
BUCKET_ID: 0xD1_e100b325+c108
Followup: MachineOwner
---------