Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021811-15678-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a65000 PsLoadedModuleList = 0xfffff800`02ca2e50
Debug session time: Thu Feb 17 16:11:06.385 2011 (UTC - 5:00)
System Uptime: 0 days 0:01:20.086
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {1236, fffffa8006be7ed0, fffffa8006be7f50, a9a0b}
Probably caused by : rdyboost.sys ( rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000001236, The subtype of the bugcheck.
Arg2: fffffa8006be7ed0
Arg3: fffffa8006be7f50
Arg4: 00000000000a9a0b
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_1236
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002bcf823 to fffff80002ad5740
STACK_TEXT:
fffff880`068f77b8 fffff800`02bcf823 : 00000000`0000001a 00000000`00001236 fffffa80`06be7ed0 fffffa80`06be7f50 : nt!KeBugCheckEx
fffff880`068f77c0 fffff880`018fdf42 : fffffa80`06be7ed0 fffffa80`04cb8118 00000000`0000046e fffff880`018fe99a : nt!MmFreePagesFromMdl+0x293
fffff880`068f7820 fffff880`018fd86f : fffffa80`04cb8118 00000000`00000000 fffffa80`04d08ff2 fffffa80`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+0x4e
fffff880`068f7880 fffff880`018fc55e : fffffa80`04cb80b0 00000000`00000001 fffffa80`04cb80b0 00000000`00000001 : rdyboost!ST_STORE<SMD_TRAITS>::StDmCleanup+0x183
fffff880`068f78c0 fffff880`018fba23 : fffffa80`04cb80b0 00000000`00000001 fffffa80`04cb80b0 fffff880`068f7ca0 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStCleanup+0x7a
fffff880`068f7900 fffff880`018fb986 : fffff880`0191e8f0 00000000`00000008 fffffa80`04cb80b0 fffff880`0191e870 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmStoreMgrCallback+0x4b
fffff880`068f7940 fffff880`019224b8 : fffff880`0191e870 fffff880`068f7ca0 00000000`00000000 fffffa80`04bb0b68 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmCleanup+0x9a
fffff880`068f7970 fffff880`01903b9e : fffffa80`0777f760 fffffa80`0777f760 fffffa80`072d9010 00000000`00000000 : rdyboost!SmdRBContextShutdown+0x94
fffff880`068f79b0 fffff800`02dee547 : 00000000`00000000 fffffa80`069d07b0 fffffa80`069d08c8 fffffa80`0777f760 : rdyboost!SmdDispatchDeviceControl+0x3ce
fffff880`068f7a10 fffff800`02deeda6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`068f7b40 fffff800`02ad4993 : 00000000`00000000 00000000`000003e8 00000000`00000000 000007fe`f9a9bda0 : nt!NtDeviceIoControlFile+0x56
fffff880`068f7bb0 00000000`775bf72a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00dbee68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775bf72a
STACK_COMMAND: kb
FOLLOWUP_IP:
rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e
fffff880`018fdf42 33d2 xor edx,edx
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: rdyboost!ST_STORE<SMD_TRAITS>::StReleaseRegion+4e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc48a
FAILURE_BUCKET_ID: X64_0x1a_1236_rdyboost!ST_STORE_SMD_TRAITS_::StReleaseRegion+4e
BUCKET_ID: X64_0x1a_1236_rdyboost!ST_STORE_SMD_TRAITS_::StReleaseRegion+4e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021811-20997-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a0a000 PsLoadedModuleList = 0xfffff800`02c47e50
Debug session time: Thu Feb 17 16:08:16.644 2011 (UTC - 5:00)
System Uptime: 0 days 0:09:48.345
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {49000002, 2, 1, fffff8800157e3d3}
Unable to load image \SystemRoot\system32\DRIVERS\netr6164.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for netr6164.sys
*** ERROR: Module load completed but symbols could not be loaded for netr6164.sys
Probably caused by : hardware ( nwifi!EtwEx_tidActivityInfoTransfer+1ac )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000049000002, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800157e3d3, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb20e0
0000000049000002
CURRENT_IRQL: 2
FAULTING_IP:
ndis!ndisMSendCompleteNetBufferListsInternal+73
fffff880`0157e3d3 308002000049 xor byte ptr [rax+49000002h],al
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f8b810 -- (.trap 0xfffff88002f8b810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88001526d00
rdx=0000000000004600 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800157e3d3 rsp=fffff88002f8b9a0 rbp=0000000000000000
r8=0000000000000000 r9=fffff88001523110 r10=0000000000000000
r11=fffffa800436eeb0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ndis!ndisMSendCompleteNetBufferListsInternal+0x73:
fffff880`0157e3d3 308002000049 xor byte ptr [rax+49000002h],al ds:00000000`49000002=??
Resetting default scope
MISALIGNED_IP:
ndis!ndisMSendCompleteNetBufferListsInternal+73
fffff880`0157e3d3 308002000049 xor byte ptr [rax+49000002h],al
LAST_CONTROL_TRANSFER: from fffff80002a79ca9 to fffff80002a7a740
STACK_TEXT:
fffff880`02f8b6c8 fffff800`02a79ca9 : 00000000`0000000a 00000000`49000002 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02f8b6d0 fffff800`02a78920 : 00000000`00000000 fffffa80`06b5a010 00000000`000007ff 00000000`00000300 : nt!KiBugCheckDispatch+0x69
fffff880`02f8b810 fffff880`0157e3d3 : fffffa80`057f4900 00000000`00000000 00000000`00000000 fffff800`02fea6e5 : nt!KiPageFault+0x260
fffff880`02f8b9a0 fffff880`05928eb0 : fffffa80`00000000 fffffa80`0438a030 fffffa80`00000000 fffff880`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x73
fffff880`02f8ba40 fffff880`05924f58 : 00000000`00000000 fffffa80`0436eac0 00000000`00000000 fffffa80`0438a2bc : nwifi!EtwEx_tidActivityInfoTransfer+0x1ac
fffff880`02f8ba90 fffff880`05928860 : 00000000`00000000 00000000`00000000 fffffa80`0436eeb0 fffff800`02feb825 : nwifi!Dot11SendCompletion+0x44
fffff880`02f8bac0 fffff880`03f381bb : fffffa80`0584da78 fffffa80`043b9f40 00000000`00000028 fffffa80`04243501 : nwifi!Pt6SendComplete+0x28
fffff880`02f8baf0 fffff880`0157e5ad : fffffa80`057261a0 00000000`00000000 00000000`00000001 00000000`0001a1f4 : vwififlt!FilterSendNetBufferListsComplete+0x10b
fffff880`02f8bb40 fffff880`0410d5d2 : fffffa80`0596a0c0 fffffa80`0596e9a8 fffffa80`0596a000 fffffa80`0596a000 : ndis!NdisMSendNetBufferListsComplete+0x6d
fffff880`02f8bb80 fffffa80`0596a0c0 : fffffa80`0596e9a8 fffffa80`0596a000 fffffa80`0596a000 00000000`00000000 : netr6164+0xd5d2
fffff880`02f8bb88 fffffa80`0596e9a8 : fffffa80`0596a000 fffffa80`0596a000 00000000`00000000 fffffa80`04389690 : 0xfffffa80`0596a0c0
fffff880`02f8bb90 fffffa80`0596a000 : fffffa80`0596a000 00000000`00000000 fffffa80`04389690 00000000`00000000 : 0xfffffa80`0596e9a8
fffff880`02f8bb98 fffffa80`0596a000 : 00000000`00000000 fffffa80`04389690 00000000`00000000 fffff880`0410d754 : 0xfffffa80`0596a000
fffff880`02f8bba0 00000000`00000000 : fffffa80`04389690 00000000`00000000 fffff880`0410d754 fffffa80`0596a0c0 : 0xfffffa80`0596a000
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!EtwEx_tidActivityInfoTransfer+1ac
fffff880`05928eb0 f0838348130000ff lock add dword ptr [rbx+1348h],0FFFFFFFFh
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nwifi!EtwEx_tidActivityInfoTransfer+1ac
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------