Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021711-15834-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0305c000 PsLoadedModuleList = 0xfffff800`03299e50
Debug session time: Thu Feb 17 02:22:28.457 2011 (UTC - 5:00)
System Uptime: 0 days 0:10:06.485
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8, 2, 0, fffff8800167c7c0}
Unable to load image \SystemRoot\system32\DRIVERS\e1q62x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for e1q62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
Probably caused by : e1q62x64.sys ( e1q62x64+21219 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800167c7c0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800033040e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!IpFlcReceivePreValidatedPackets+270
fffff880`0167c7c0 440fb63401 movzx r14d,byte ptr [rcx+rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88006b53f90 -- (.trap 0xfffff88006b53f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800167c7c0 rsp=fffff88006b54120 rbp=fffffa800b5c9540
r8=0000000000000006 r9=0000000000000001 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip!IpFlcReceivePreValidatedPackets+0x270:
fffff880`0167c7c0 440fb63401 movzx r14d,byte ptr [rcx+rax] ds:7fe8:00000000`00000008=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030cd469 to fffff800030cdf00
STACK_TEXT:
fffff880`06b53e48 fffff800`030cd469 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06b53e50 fffff800`030cc0e0 : fffffa80`0b5e0350 00000000`00000000 fffff880`01767128 00001f80`00910270 : nt!KiBugCheckDispatch+0x69
fffff880`06b53f90 fffff880`0167c7c0 : 00000000`00005000 fffff800`030d62c2 00000000`00005000 fffffa80`0b8d6b60 : nt!KiPageFault+0x260
fffff880`06b54120 fffff880`01674682 : fffffa80`0b605800 fffffa80`0b604010 fffffa80`0b600006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x270
fffff880`06b54280 fffff800`030dd64a : 00000000`00000000 fffff880`06b4f000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`06b542d0 fffff880`016740e2 : fffff880`016745e0 fffff880`06b543e0 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`06b543b0 fffff880`015240eb : fffffa80`0b6068d0 00000000`00000000 fffffa80`0b28b1a0 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`06b54420 fffff880`014edfc6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`06b54490 fffff880`01467ef1 : fffffa80`0b28b1a0 00000000`00000002 00000000`00000002 fffff880`015245ad : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`06b54910 fffff880`044c7219 : fffffa80`0b522000 fffffa80`0b5dc3c0 fffffa80`0b5dc330 00000000`00000002 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`06b54960 fffffa80`0b522000 : fffffa80`0b5dc3c0 fffffa80`0b5dc330 00000000`00000002 00000000`00000801 : e1q62x64+0x21219
fffff880`06b54968 fffffa80`0b5dc3c0 : fffffa80`0b5dc330 00000000`00000002 00000000`00000801 00000000`00000002 : 0xfffffa80`0b522000
fffff880`06b54970 fffffa80`0b5dc330 : 00000000`00000002 00000000`00000801 00000000`00000002 fffffa80`0b526500 : 0xfffffa80`0b5dc3c0
fffff880`06b54978 00000000`00000002 : 00000000`00000801 00000000`00000002 fffffa80`0b526500 fffff880`044c73b4 : 0xfffffa80`0b5dc330
fffff880`06b54980 00000000`00000801 : 00000000`00000002 fffffa80`0b526500 fffff880`044c73b4 00000000`00000001 : 0x2
fffff880`06b54988 00000000`00000002 : fffffa80`0b526500 fffff880`044c73b4 00000000`00000001 fffffa80`0b5dc3c0 : 0x801
fffff880`06b54990 fffffa80`0b526500 : fffff880`044c73b4 00000000`00000001 fffffa80`0b5dc3c0 fffffa80`0b5c9540 : 0x2
fffff880`06b54998 fffff880`044c73b4 : 00000000`00000001 fffffa80`0b5dc3c0 fffffa80`0b5c9540 00000000`00000002 : 0xfffffa80`0b526500
fffff880`06b549a0 00000000`00000001 : fffffa80`0b5dc3c0 fffffa80`0b5c9540 00000000`00000002 0000000a`00000201 : e1q62x64+0x213b4
fffff880`06b549a8 fffffa80`0b5dc3c0 : fffffa80`0b5c9540 00000000`00000002 0000000a`00000201 00000000`00000000 : 0x1
fffff880`06b549b0 fffffa80`0b5c9540 : 00000000`00000002 0000000a`00000201 00000000`00000000 00000000`00000000 : 0xfffffa80`0b5dc3c0
fffff880`06b549b8 00000000`00000002 : 0000000a`00000201 00000000`00000000 00000000`00000000 fffff880`06b54c18 : 0xfffffa80`0b5c9540
fffff880`06b549c0 0000000a`00000201 : 00000000`00000000 00000000`00000000 fffff880`06b54c18 00000000`00000000 : 0x2
fffff880`06b549c8 00000000`00000000 : 00000000`00000000 fffff880`06b54c18 00000000`00000000 fffffa80`0aeb4240 : 0xa`00000201
STACK_COMMAND: kb
FOLLOWUP_IP:
e1q62x64+21219
fffff880`044c7219 ?? ???
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: e1q62x64+21219
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1q62x64
IMAGE_NAME: e1q62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4af31807
FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+21219
BUCKET_ID: X64_0xD1_e1q62x64+21219
Followup: MachineOwner
---------