Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022311-13899-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03018000 PsLoadedModuleList = 0xfffff800`03255e50
Debug session time: Wed Feb 23 23:57:06.627 2011 (UTC - 5:00)
System Uptime: 0 days 0:11:51.564
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1c, 2, 1, fffff88001a7a3ba}
Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+32a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001a7a3ba, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c00e0
000000000000001c
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpBeginTcbSend+32a
fffff880`01a7a3ba f083401c01 lock add dword ptr [rax+1Ch],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff800056742a0 -- (.trap 0xfffff800056742a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800a682440
rdx=fffffa800a682430 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001a7a3ba rsp=fffff80005674430 rbp=fffff80005674538
r8=fffffa800a682240 r9=fffff800056744d0 r10=fffffa800a682370
r11=0000000000000014 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x32a:
fffff880`01a7a3ba f083401c01 lock add dword ptr [rax+1Ch],1 ds:44d0:00000000`0000001c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003087ca9 to fffff80003088740
STACK_TEXT:
fffff800`05674158 fffff800`03087ca9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`05674160 fffff800`03086920 : fffffa80`08c58d90 00000000`00000001 fffffa80`46786d4b fffffa80`08fb24c0 : nt!KiBugCheckDispatch+0x69
fffff800`056742a0 fffff880`01a7a3ba : 00000000`00000001 fffffa80`0cf55cf0 fffffa80`0c3602f0 fffff880`01a6f24f : nt!KiPageFault+0x260
fffff800`05674430 fffff880`01a78bc9 : ffff0080`04d12418 ffff0080`04d12428 fffffa80`08d29d90 00000000`00000001 : tcpip!TcpBeginTcbSend+0x32a
fffff800`056746b0 fffff880`01a74a56 : 00000000`00000000 00000000`00000001 fffff880`01b66128 00000000`00000000 : tcpip!TcpTcbSend+0x1d9
fffff800`05674930 fffff880`01a7c44c : fffffa80`08f26000 00000000`00000000 00000000`00000000 fffff880`01a5f600 : tcpip!TcpFlushDelay+0x316
fffff800`05674a10 fffff880`01a5e6c7 : fffffa80`07f00000 fffffa80`07dc8820 fffffa80`07dcbb01 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x20c
fffff800`05674ac0 fffff880`01a5e799 : fffff800`05674c40 fffff880`01b6c9a0 fffff800`05674c50 fffffa80`08c421a0 : tcpip!IppDeliverListToProtocol+0x97
fffff800`05674b80 fffff880`01a5ec90 : fffffa80`07f00000 fffffa80`08c42102 00000000`00000001 fffff800`05674c40 : tcpip!IppProcessDeliverList+0x59
fffff800`05674bf0 fffff880`01a5db21 : fffffa80`08c42480 fffffa80`07f00000 fffff880`01b6c9a0 00000000`00000001 : tcpip!IppReceiveHeaderBatch+0x231
fffff800`05674cd0 fffff880`01a7e39c : fffffa80`08e55c40 00000000`00000000 00000000`00000001 0000000f`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff800`05674ed0 fffff880`01a75e22 : fffffa80`08e55010 fffffa80`08e55010 00000000`00000002 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x6ac
fffff800`05675030 fffff800`03097e5a : 00000000`00000000 fffff800`05670000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff800`05675080 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpBeginTcbSend+32a
fffff880`01a7a3ba f083401c01 lock add dword ptr [rax+1Ch],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpBeginTcbSend+32a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c15a458
FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+32a
BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+32a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022311-16021-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0304c000 PsLoadedModuleList = 0xfffff800`03289e50
Debug session time: Wed Feb 23 20:10:34.801 2011 (UTC - 5:00)
System Uptime: 0 days 11:52:32.737
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1c, 2, 1, fffff88001a7b3ba}
Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+32a )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001a7b3ba, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f40e0
000000000000001c
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpBeginTcbSend+32a
fffff880`01a7b3ba f083401c01 lock add dword ptr [rax+1Ch],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9b320 -- (.trap 0xfffff80000b9b320)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800e5e4f30
rdx=fffffa800e5e4f20 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001a7b3ba rsp=fffff80000b9b4b0 rbp=fffff80000b9b5b8
r8=fffffa800e5e4d30 r9=fffff80000b9b550 r10=fffffa800e5e4e60
r11=0000000000000014 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x32a:
fffff880`01a7b3ba f083401c01 lock add dword ptr [rax+1Ch],1 ds:b550:00000000`0000001c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030bbca9 to fffff800030bc740
STACK_TEXT:
fffff800`00b9b1d8 fffff800`030bbca9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9b1e0 fffff800`030ba920 : 00000000`00000002 00000000`00000001 fffffa80`0960c8c0 fffffa80`0ccc0b60 : nt!KiBugCheckDispatch+0x69
fffff800`00b9b320 fffff880`01a7b3ba : 00000000`00000001 fffffa80`0e264cf0 fffffa80`0e5377a0 fffff880`01a58be0 : nt!KiPageFault+0x260
fffff800`00b9b4b0 fffff880`01a79bc9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x32a
fffff800`00b9b730 fffff880`01a75a56 : fffffa80`0e3eeee0 fffffa80`0e5377a0 fffff880`01b67128 00000000`00000000 : tcpip!TcpTcbSend+0x1d9
fffff800`00b9b9b0 fffff880`01a7d44c : fffffa80`0a77ee00 fffffa80`0e3eeee0 00000000`00000004 fffff880`01a60600 : tcpip!TcpFlushDelay+0x316
fffff800`00b9ba90 fffff880`01a5f6c7 : fffffa80`09738270 fffffa80`09602820 fffffa80`095dbb01 00000000`00000002 : tcpip!TcpPreValidatedReceive+0x20c
fffff800`00b9bb40 fffff880`01a5f799 : fffff800`00b9bcc0 fffff880`01b6d9a0 fffff800`00b9bcd0 fffff800`00b9bc20 : tcpip!IppDeliverListToProtocol+0x97
fffff800`00b9bc00 fffff880`01a5fc90 : fffffa80`09738000 00000000`00000000 fffffa80`0af3ab10 fffff800`00b9bcc0 : tcpip!IppProcessDeliverList+0x59
fffff800`00b9bc70 fffff880`01a5eb21 : fffffa80`0a4c1050 fffffa80`09738270 fffff880`01b6d9a0 00000000`0a839001 : tcpip!IppReceiveHeaderBatch+0x231
fffff800`00b9bd50 fffff880`01a5d592 : fffffa80`0a85b010 00000000`00000000 fffffa80`0a839001 00000000`00000003 : tcpip!IpFlcReceivePackets+0x651
fffff800`00b9bf50 fffff880`01a76e5a : fffffa80`0a839010 fffff800`00b9c080 fffffa80`0a839010 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff800`00b9c030 fffff800`030cbe5a : fffffa80`0a80dd50 fffff800`00b97000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff800`00b9c080 fffff880`01a76882 : fffff880`01a76d80 fffff800`00b9c190 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff800`00b9c160 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpBeginTcbSend+32a
fffff880`01a7b3ba f083401c01 lock add dword ptr [rax+1Ch],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpBeginTcbSend+32a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c15a458
FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+32a
BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+32a
Followup: MachineOwner
---------