windows 7 Crash with "DRIVER_IRQL_LESS_OR_EQUAL"


  1. Posts : 1
    7 Home Premium 64bit french
       #1

    windows 7 Crash with "DRIVER_IRQL_LESS_OR_EQUAL"


    64 bits
    windows 7 home prenium edition
    Oem
    1 years
    i have re-installed the système

    after recovering my système after puting my password the systeme crash with the blue screen of death

    so i now use my computer in safe mode but it still crash

    thank for your future help
    Last edited by helixire; 16 Dec 2010 at 12:38.
      My Computer


  2. Posts : 670
    Windows 7 x64
       #2

    Hello and Welcome to sevenforums. : )


    1. Remove Avast completely with this tool:

    avast! Uninstall Utility



    2. Uninstall Avira.



    3. Install MSE as the replacement:

    http://www.microsoft.com/security_essentials/



    4. Update Broadcom NetLink (TM) Gigabit Ethernet NDIS6.x:

    k57nd60a.sys Sat Jun 20 07:34:49 2009





    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121610-20482-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02619000 PsLoadedModuleList = 0xfffff800`02856e50
    Debug session time: Thu Dec 16 07:19:26.723 2010 (UTC - 5:00)
    System Uptime: 0 days 0:03:49.457
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {0, 2, 1, fffff880012a2b7f}
    
    Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for iaStor.sys
    *** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
    Probably caused by : iaStor.sys ( iaStor+2db7f )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffff880012a2b7f, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800028c10e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    iaStor+2db7f
    fffff880`012a2b7f 48894628        mov     qword ptr [rsi+28h],rax
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  wermgr.exe
    
    TRAP_FRAME:  fffff880009cbaf0 -- (.trap 0xfffff880009cbaf0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=7fffffffffffffff rbx=0000000000000000 rcx=fffffa8004b24000
    rdx=fffffa800478c1a0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880012a2b7f rsp=fffff880009cbc80 rbp=fffff880009cbd70
     r8=0000000000000002  r9=0000000000000000 r10=fffffa8004b24000
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    iaStor+0x2db7f:
    fffff880`012a2b7f 48894628        mov     qword ptr [rsi+28h],rax ds:7c80:00000000`00000028=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000268a469 to fffff8000268af00
    
    STACK_TEXT:  
    fffff880`009cb9a8 fffff800`0268a469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`009cb9b0 fffff800`026890e0 : 00000000`00000000 fffff880`0974c350 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`009cbaf0 fffff880`012a2b7f : 00000000`00000000 fffffa80`04b3a0b8 00000000`00000002 00000000`00140000 : nt!KiPageFault+0x260
    fffff880`009cbc80 00000000`00000000 : fffffa80`04b3a0b8 00000000`00000002 00000000`00140000 00000000`00000000 : iaStor+0x2db7f
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    iaStor+2db7f
    fffff880`012a2b7f 48894628        mov     qword ptr [rsi+28h],rax
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  iaStor+2db7f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: iaStor
    
    IMAGE_NAME:  iaStor.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b8f2033
    
    FAILURE_BUCKET_ID:  X64_0xD1_iaStor+2db7f
    
    BUCKET_ID:  X64_0xD1_iaStor+2db7f
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121610-21200-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`0261f000 PsLoadedModuleList = 0xfffff800`0285ce50
    Debug session time: Thu Dec 16 06:58:50.183 2010 (UTC - 5:00)
    System Uptime: 0 days 0:04:36.901
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {0, 2, 1, fffff88001070af5}
    
    Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for iaStor.sys
    *** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
    Probably caused by : iaStor.sys ( iaStor+50af5 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffff88001070af5, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800028c70e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    iaStor+50af5
    fffff880`01070af5 4c8902          mov     qword ptr [rdx],r8
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880009c4840 -- (.trap 0xfffff880009c4840)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8004b26c38
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001070af5 rsp=fffff880009c49d0 rbp=fffffa800403a3a9
     r8=0000000000000000  r9=0000000000000000 r10=fffffa8004b24000
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    iaStor+0x50af5:
    fffff880`01070af5 4c8902          mov     qword ptr [rdx],r8 ds:8b10:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002690469 to fffff80002690f00
    
    STACK_TEXT:  
    fffff880`009c46f8 fffff800`02690469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`009c4700 fffff800`0268f0e0 : 00000000`00000003 fffffa80`04b24000 fffffa80`05e7c2c0 fffffa80`06803950 : nt!KiBugCheckDispatch+0x69
    fffff880`009c4840 fffff880`01070af5 : 00000000`00000000 fffff880`09788350 fffff880`09788350 fffffa80`04b24000 : nt!KiPageFault+0x260
    fffff880`009c49d0 00000000`00000000 : fffff880`09788350 fffff880`09788350 fffffa80`04b24000 00000000`00000022 : iaStor+0x50af5
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    iaStor+50af5
    fffff880`01070af5 4c8902          mov     qword ptr [rdx],r8
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  iaStor+50af5
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: iaStor
    
    IMAGE_NAME:  iaStor.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b8f2033
    
    FAILURE_BUCKET_ID:  X64_0xD1_iaStor+50af5
    
    BUCKET_ID:  X64_0xD1_iaStor+50af5
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121610-24492-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02649000 PsLoadedModuleList = 0xfffff800`02886e50
    Debug session time: Thu Dec 16 11:17:39.205 2010 (UTC - 5:00)
    System Uptime: 0 days 0:04:33.939
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {ffffffffffffff5b, 2, 1, fffff8800171e4d4}
    
    *** WARNING: Unable to verify timestamp for win32k.sys
    *** ERROR: Module load completed but symbols could not be loaded for win32k.sys
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: ffffffffffffff5b, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffff8800171e4d4, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800028f10e0
     ffffffffffffff5b 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!FsbFree+44
    fffff880`0171e4d4 00483b          add     byte ptr [rax+3Bh],cl
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  CODE_CORRUPTION
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff80000b98fd0 -- (.trap 0xfffff80000b98fd0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffffffffffff20 rbx=0000000000000000 rcx=fffffa8006ef6b30
    rdx=fffffa80046e2700 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8800171e4d4 rsp=fffff80000b99160 rbp=fffff80000b99280
     r8=fffffa8004177d90  r9=0000000000000002 r10=fffffa8005b574e0
    r11=fffffa8004210d90 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    NETIO!FsbFree+0x44:
    fffff880`0171e4d4 00483b          add     byte ptr [rax+3Bh],cl ds:0aaf:ffffffff`ffffff5b=??
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800026ba469 to fffff800026baf00
    
    STACK_TEXT:  
    fffff800`00b98e88 fffff800`026ba469 : 00000000`0000000a ffffffff`ffffff5b 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff800`00b98e90 fffff800`026b90e0 : 00000000`00000000 fffffa80`06ef6b30 00000000`00000d00 00000000`00000008 : nt!KiBugCheckDispatch+0x69
    fffff800`00b98fd0 fffff880`0171e4d4 : fffffa80`046edc01 fffffa80`074543d0 00000000`00000d90 fffff800`00b99280 : nt!KiPageFault+0x260
    fffff800`00b99160 fffff880`01844247 : fffffa80`06ef6b30 fffffa80`06ef6b30 fffff800`00b99280 00000000`00000000 : NETIO!FsbFree+0x44
    fffff800`00b991a0 fffff880`0187a7e6 : fffff800`00b99400 fffffa80`074543d0 fffffa80`074543d0 fffff880`01916155 : tcpip!TcpSatisfyReceiveRequests+0x457
    fffff800`00b99480 fffff880`0187b2f9 : 00000000`00000000 00000000`00000000 00000000`00000000 80000804`00000084 : tcpip!TcpDeliverDataToClient+0x106
    fffff800`00b99600 fffff880`01874af8 : 00000000`c259f100 fffff880`034576f1 fffffa80`06119030 fffff880`0186d64a : tcpip!TcpDeliverReceive+0xa9
    fffff800`00b99700 fffff880`018756f5 : 00000000`00000014 fffffa80`00000000 fffffa80`058f3000 fffffa80`0742ca90 : tcpip!TcpTcbFastDatagram+0x208
    fffff800`00b998c0 fffff880`0187a0ca : fffffa80`058f7f00 fffffa80`03d69080 fffffa80`046e61a0 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
    fffff800`00b99a70 fffff880`01879c17 : fffff880`02f4803c fffffa80`058f3000 00000000`00000000 fffff880`0185d400 : tcpip!TcpMatchReceive+0x1fa
    fffff800`00b99bc0 fffff880`0185c3c7 : fffffa80`058f5000 fffffa80`0471fac0 fffffa80`058f5000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
    fffff800`00b99c70 fffff880`0185c499 : fffff800`00b99df0 fffff880`0196c9a0 fffff800`00b99e00 fffff880`01867a7e : tcpip!IppDeliverListToProtocol+0x97
    fffff800`00b99d30 fffff880`0185c990 : fffffa80`058f3000 fffffa80`06329e00 fffffa80`04184450 fffff800`00b99df0 : tcpip!IppProcessDeliverList+0x59
    fffff800`00b99da0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x231
    
    
    STACK_COMMAND:  kb
    
    CHKIMG_EXTENSION: !chkimg -lo 50 -d !NETIO
        fffff8800171e4cb-fffff8800171e4cf  5 bytes - NETIO!FsbFree+3b
    	[ 03 00 00 80 f7:ff ff ff ff ff ]
        fffff8800171e4d2 - NETIO!FsbFree+42 (+0x07)
    	[ 48:7f ]
    6 errors : !NETIO (fffff8800171e4cb-fffff8800171e4d2)
    
    MODULE_NAME: memory_corruption
    
    IMAGE_NAME:  memory_corruption
    
    FOLLOWUP_NAME:  memory_corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MEMORY_CORRUPTOR:  LARGE
    
    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_LARGE
    
    BUCKET_ID:  X64_MEMORY_CORRUPTION_LARGE
    
    Followup: memory_corruption
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\121610-23056-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0xfffff800`02617000 PsLoadedModuleList = 0xfffff800`02854e50
    Debug session time: Thu Dec 16 11:19:01.864 2010 (UTC - 5:00)
    System Uptime: 0 days 0:00:43.598
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {0, 2, 1, fffff880010d8b7f}
    
    Unable to load image \SystemRoot\system32\DRIVERS\iaStor.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for iaStor.sys
    *** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
    Probably caused by : iaStor.sys ( iaStor+2db7f )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffff880010d8b7f, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800028bf0e0
     0000000000000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    iaStor+2db7f
    fffff880`010d8b7f 48894628        mov     qword ptr [rsi+28h],rax
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  taskhost.exe
    
    TRAP_FRAME:  fffff880009cbaf0 -- (.trap 0xfffff880009cbaf0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=7fffffffffffffff rbx=0000000000000000 rcx=fffffa8004b24000
    rdx=fffffa8003d351a0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880010d8b7f rsp=fffff880009cbc80 rbp=fffff880009cbd70
     r8=0000000000000002  r9=0000000000000000 r10=fffff80002617000
    r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    iaStor+0x2db7f:
    fffff880`010d8b7f 48894628        mov     qword ptr [rsi+28h],rax ds:7c80:00000000`00000028=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002688469 to fffff80002688f00
    
    STACK_TEXT:  
    fffff880`009cb9a8 fffff800`02688469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`009cb9b0 fffff800`026870e0 : fffffa80`05b3aa70 fffff880`08d41350 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`009cbaf0 fffff880`010d8b7f : 00000000`00000000 fffffa80`04b3a0b8 00000000`00000002 fffff880`021d4070 : nt!KiPageFault+0x260
    fffff880`009cbc80 00000000`00000000 : fffffa80`04b3a0b8 00000000`00000002 fffff880`021d4070 00000000`00000000 : iaStor+0x2db7f
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    iaStor+2db7f
    fffff880`010d8b7f 48894628        mov     qword ptr [rsi+28h],rax
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  iaStor+2db7f
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: iaStor
    
    IMAGE_NAME:  iaStor.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b8f2033
    
    FAILURE_BUCKET_ID:  X64_0xD1_iaStor+2db7f
    
    BUCKET_ID:  X64_0xD1_iaStor+2db7f
    
    Followup: MachineOwner
    ---------


    Drivers:

    Code:
    start             end                 module name
    fffff880`00f47000 fffff880`00f9e000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`02f3d000 fffff880`02fc7000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`037e8000 fffff880`037fe000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`012e8000 fffff880`012f3000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`07a87000 fffff880`07ac1000   aswMonFlt aswMonFlt.sys Tue Sep 07 10:47:32 2010 (4C865084)
    fffff880`02fc7000 fffff880`02fd1000   aswRdr   aswRdr.SYS   Tue Sep 07 10:47:47 2010 (4C865093)
    fffff880`01bdb000 fffff880`01bfe000   aswSP    aswSP.SYS    Tue Sep 07 10:52:07 2010 (4C865197)
    fffff880`012b5000 fffff880`012be000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`012be000 fffff880`012e8000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`03603000 fffff880`0375b000   athrx    athrx.sys    Tue Jun 09 14:06:49 2009 (4A2EA4B9)
    fffff880`07ac1000 fffff880`07ade000   avgntflt avgntflt.sys Fri May 07 12:05:34 2010 (4BE43A4E)
    fffff880`01bb9000 fffff880`01bdb000   avipbb   avipbb.sys   Mon Feb 22 05:08:50 2010 (4B8257B2)
    fffff880`00e1e000 fffff880`00e2a000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`02e81000 fffff880`02e88000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`01ba8000 fffff880`01bb9000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`08395000 fffff880`083b3000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`006d0000 fffff960`006f7000   cdd      cdd.dll      unavailable (00000000)
    fffff880`02e4e000 fffff880`02e78000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01a78000 fffff880`01aa8000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d37000 fffff880`00d95000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`03768000 fffff880`0376c500   CmBatt   CmBatt.sys   Mon Jul 13 19:31:03 2009 (4A5BC3B7)
    fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00e15000 fffff880`00e1e000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`037d8000 fffff880`037e8000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`02654000 fffff880`02662000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`01b8a000 fffff880`01ba8000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`01b7b000 fffff880`01b8a000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`01a62000 fffff880`01a78000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`026b8000 fffff880`026da000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`02662000 fffff880`02675000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`02c31000 fffff880`02e3b000   dump_iaStor dump_iaStor.sys Wed Mar 03 21:51:31 2010 (4B8F2033)
    fffff880`0274f000 fffff880`0275b000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`028d8000 fffff880`029cc000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
    fffff880`02800000 fffff880`02846000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`0133f000 fffff880`01353000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`012f3000 fffff880`0133f000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01411000 fffff880`0141b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01a28000 fffff880`01a62000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
    fffff880`01600000 fffff880`0164a000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02bf4000 fffff800`02c3d000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`02846000 fffff880`0286a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`03400000 fffff880`0345c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
    fffff880`082cd000 fffff880`08395000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`017e5000 fffff880`017ee000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`0376d000 fffff880`0378b000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`010ab000 fffff880`012b5000   iaStor   iaStor.sys   Wed Mar 03 21:51:31 2010 (4B8F2033)
    fffff880`037c2000 fffff880`037d8000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`03481000 fffff880`034d2000   k57nd60a k57nd60a.sys Sat Jun 20 07:34:49 2009 (4A3CC959)
    fffff880`0378b000 fffff880`0379a000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff800`00bb1000 fffff800`00bb4000   kdcom    kdcom.dll    Tue Nov 30 09:40:39 2010 (4CF50CE7)
    fffff880`03587000 fffff880`035ca000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
    fffff880`015de000 fffff880`015f8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`017ba000 fffff880`017e5000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
    fffff880`026da000 fffff880`026df200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`027b6000 fffff880`027d9000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00cdf000 fffff880`00d23000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`027a8000 fffff880`027b6000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`0379a000 fffff880`037a9000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`00e3f000 fffff880`00e59000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`083b3000 fffff880`083cb000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`083cb000 fffff880`083f7000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
    fffff880`08200000 fffff880`0824d000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
    fffff880`0824d000 fffff880`08270000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
    fffff880`02ee6000 fffff880`02ef1000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00fa7000 fffff880`00fb1000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01353000 fffff880`013b1000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02f2d000 fffff880`02f38000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`01652000 fffff880`01664000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01668000 fffff880`0175a000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`034f6000 fffff880`03502000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`07b67000 fffff880`07b7a000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
    fffff880`03502000 fffff880`03531000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`0273a000 fffff880`0274f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02c16000 fffff880`02c25000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`01ab6000 fffff880`01afb000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`0175a000 fffff880`017ba000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`02ef1000 fffff880`02f02000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02c25000 fffff880`02c31000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02617000 fffff800`02bf4000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
    fffff880`0143b000 fffff880`015de000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`037b1000 fffff880`037b9000   NTIDrvr  NTIDrvr.sys  Tue Mar 24 23:09:39 2009 (49C9A073)
    fffff880`02e78000 fffff880`02e81000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`047ec000 fffff880`047ed180   nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
    fffff880`03c12000 fffff880`047eba80   nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
    fffff880`07b14000 fffff880`07b67000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
    fffff880`02fda000 fffff880`03000000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00e00000 fffff880`00e15000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00fb1000 fffff880`00fe4000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`01400000 fffff880`01411000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`0860d000 fffff880`086b3000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`0267b000 fffff880`026b8000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d23000 fffff880`00d37000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`034d2000 fffff880`034f6000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03531000 fffff880`0354c000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`0354c000 fffff880`0356d000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`0356d000 fffff880`03587000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`01b2a000 fffff880`01b7b000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`02ecb000 fffff880`02ed4000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02ed4000 fffff880`02edd000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`02edd000 fffff880`02ee6000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`00e59000 fffff880`00e93000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`086b3000 fffff880`086be000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`08766000 fffff880`087fe000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
    fffff880`086fd000 fffff880`08766000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
    fffff880`086be000 fffff880`086eb000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
    fffff880`037fe000 fffff880`037ff480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01802000 fffff880`019ff000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`086eb000 fffff880`086fd000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`02f20000 fffff880`02f2d000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`02f02000 fffff880`02f20000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`01b16000 fffff880`01b2a000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01a00000 fffff880`01a26000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`037a9000 fffff880`037b1000   UBHelper UBHelper.sys Mon Apr 27 04:48:19 2009 (49F57153)
    fffff880`02600000 fffff880`02654000   udfs     udfs.sys     Mon Jul 13 19:23:37 2009 (4A5BC1F9)
    fffff880`035ca000 fffff880`035dc000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`0275b000 fffff880`02778000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`02778000 fffff880`02779f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`029cc000 fffff880`029dd000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`026e0000 fffff880`0273a000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`02877000 fffff880`028cd000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`0286a000 fffff880`02877000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`0277a000 fffff880`027a7100   usbvideo usbvideo.sys Mon Jul 13 20:07:00 2009 (4A5BCC24)
    fffff880`00fe4000 fffff880`00ff1000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`02e88000 fffff880`02e96000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`02e96000 fffff880`02ebb000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`00e2a000 fffff880`00e3f000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00d95000 fffff880`00df1000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`013b1000 fffff880`013fd000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`0375b000 fffff880`03768000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
    fffff880`02c00000 fffff880`02c16000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`01afb000 fffff880`01b16000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`02ebb000 fffff880`02ecb000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e94000 fffff880`00f38000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f38000 fffff880`00f47000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02fd1000 fffff880`02fda000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`00080000 fffff960`0038f000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
    fffff880`037b9000 fffff880`037c2000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f9e000 fffff880`00fa7000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`07ade000 fffff880`07aff000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
    
    Unloaded modules:
    fffff880`07b7a000 fffff880`07b92000   rspndr.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00018000
    fffff880`07aff000 fffff880`07b14000   lltdio.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00015000
    fffff880`01aa8000 fffff880`01ab6000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`02c31000 fffff880`02e3b000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0020A000
    fffff880`02e3b000 fffff880`02e4e000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    fffff880`02f2d000 fffff880`02f3d000   aswTdi.SYS
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00010000
    fffff880`0164a000 fffff880`01652000   spldr.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00008000
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 21:10.
Find Us