NTH
still looks like the L1E60x86.sys file is still causing the crash. Its over a year old so that may be an issue. I dont know if there is a newer one. You can check the version and compare it to the one here to see which is newer.
DriverAgent.com DriverAgent.com | Driver Update | Atheros PCI-E Ethernet LAN v1.0.0.27/1.0.0.34 for Windows Vista, Windows Vista x64, Windows 2003, Windows XP, Windows XP-x64, Windows 2000 | Download
ken
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Mini100609-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*d:\symbols*
Symbol information
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18005.x86fre.lh_sp2rtm.090410-1830
Machine Name:
Kernel base = 0x81e48000 PsLoadedModuleList = 0x81f5fc70
Debug session time: Tue Oct 6 15:09:31.980 2009 (GMT-4)
System Uptime: 0 days 9:59:17.664
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1c, 2, 0, 8eba179f}
Unable to load image \SystemRoot\system32\DRIVERS\L1E60x86.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for L1E60x86.sys
*** ERROR: Module load completed but symbols could not be loaded for L1E60x86.sys
Probably caused by : L1E60x86.sys ( L1E60x86+579f )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000001c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 8eba179f, address which referenced memory
Debugging Details:
------------------
OVERLAPPED_MODULE:
Address regions for 'athr' and 'athr.sys' overlap
READ_ADDRESS: GetPointerFromAddress: unable to read from 81f7f868
Unable to read MiSystemVaType memory at 81f5f420
0000001c
CURRENT_IRQL: 2
FAULTING_IP:
L1E60x86+579f
8eba179f ?? ???
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: WmiPrvSE.exe
TRAP_FRAME: 803f0e78 -- (.trap 0xffffffff803f0e78)
ErrCode = 00000000
eax=00000000 ebx=870f240c ecx=870f0a02 edx=00000000 esi=00000000 edi=870f2008
eip=8eba179f esp=803f0eec ebp=803f0f20 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
L1E60x86+0x579f:
8eba179f ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from 8eba179f to 81e95fb9
STACK_TEXT:
803f0e78 8eba179f badb0d00 00000000 803f0ed4 nt!KiTrap0E+0x2e1
WARNING: Stack unwind information not available. Following frames may be wrong.
803f0ee8 870f2008 00000001 00010210 87528260 L1E60x86+0x579f
803f0f20 8eba4fc3 000f2008 8eb9d4d4 870f1008 0x870f2008
803f0f34 8eb9d4e1 870f2008 803f0f64 8a335204 L1E60x86+0x8fc3
803f0f40 8a335204 870f2008 00000000 00000000 L1E60x86+0x14e1
803f0f64 8a276468 870f101c 8eb9d63c 00000000 ndis!ndisMiniportDpc+0x81
803f0f88 81ef26a2 870f101c 86ef30e8 00000000 ndis!ndisInterruptDpc+0xc4
803f0ff4 81ef02d5 b4427924 00000000 00000000 nt!KiRetireDpcList+0x147
803f0ff8 b4427924 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x45
81ef02d5 00000000 0000001b 00c7850f bb830000 0xb4427924
STACK_COMMAND: kb
FOLLOWUP_IP:
L1E60x86+579f
8eba179f ?? ???
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: L1E60x86+579f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: L1E60x86
IMAGE_NAME:
L1E60x86.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49474532
FAILURE_BUCKET_ID: 0xD1_L1E60x86+579f
BUCKET_ID: 0xD1_L1E60x86+579f
Followup: MachineOwner
---------