Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp1_Mini082510-01[1].zip\Mini082510-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18267.x86fre.vistasp2_gdr.100608-0458
Machine Name:
Kernel base = 0x8243d000 PsLoadedModuleList = 0x82554c70
Debug session time: Wed Aug 25 00:32:19.535 2010 (GMT-4)
System Uptime: 0 days 8:37:31.236
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {8, 2, 1, 8a432796}
Unable to load image \SystemRoot\system32\DRIVERS\Rtlh86.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rtlh86.sys
*** ERROR: Module load completed but symbols could not be loaded for Rtlh86.sys
Unable to load image \SystemRoot\System32\Drivers\aswNdis2.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswNdis2.sys
*** ERROR: Module load completed but symbols could not be loaded for aswNdis2.sys
*** WARNING: Unable to verify timestamp for aswFW.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswFW.SYS
*** WARNING: Unable to verify timestamp for aswTdi.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
Probably caused by : Rtlh86.sys ( Rtlh86+6175 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000008, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 8a432796, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82574868
Unable to read MiSystemVaType memory at 82554420
00000008
CURRENT_IRQL: 2
FAULTING_IP:
ndis!ndisXlateSendCompleteNetBufferListToPacket+36
8a432796 c7400836434f4d mov dword ptr [eax+8],4D4F4336h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: svchost.exe
TRAP_FRAME: a9283df0 -- (.trap 0xffffffffa9283df0)
ErrCode = 00000002
eax=00000000 ebx=00000000 ecx=a9283e8c edx=875d61e8 esi=8538b580 edi=00000002
eip=8a432796 esp=a9283e64 ebp=a9283e6c iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
ndis!ndisXlateSendCompleteNetBufferListToPacket+0x36:
8a432796 c7400836434f4d mov dword ptr [eax+8],4D4F4336h ds:0023:00000008=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8a432796 to 8248afd9
STACK_TEXT:
a9283df0 8a432796 badb0d00 875d61e8 00000008 nt!KiTrap0E+0x2e1
a9283e6c 8a4da5fe 8538b580 a9283e8c a9283e9c ndis!ndisXlateSendCompleteNetBufferListToPacket+0x36
a9283e90 8a4d958d 877b0390 00000000 00000001 ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x56
a9283ec4 8a4d964c 8728a0e8 8538b580 00000001 ndis!ndisMSendCompleteNetBufferListsInternal+0xb8
a9283ee4 8eb3d175 8728a0e8 8538b580 00000001 ndis!NdisMSendNetBufferListsComplete+0x70
WARNING: Stack unwind information not available. Following frames may be wrong.
a9283f18 8eb38bf5 00000000 00000000 00000000 Rtlh86+0x6175
a9283f40 8eb396e4 004883f0 00000000 00000000 Rtlh86+0x1bf5
a9283f5c 8a4d949e 874883f0 8538b580 00000000 Rtlh86+0x26e4
a9283f84 8a436ce0 8728a0e8 8538b580 00000000 ndis!ndisMSendNBLToMiniport+0xb4
a9283fc4 8a436c0c 8728a0e8 00284028 00000001 ndis!ndisMSendPacketsToNetBufferLists+0x92
a9284000 8a4da6db 877b0390 a9284028 00000001 ndis!ndisSendPacketsWithPause+0x236
a928401c 8a581108 877b0390 875d61e8 861f4438 ndis!ndisSendWithPause+0x48
a9284048 8a4dc8e1 007b0b58 a9284090 00000001 aswNdis2+0x5108
a9284070 8a4dc707 a9284094 a9284090 00000001 ndis!ndisMSendPacketsXToMiniport+0x141
a92840d8 8a40e7d7 861f4438 868f4880 00000000 ndis!ndisMSendNetBufferListsToPackets+0x84
a92840f8 8a40e720 868f4880 868f4880 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
a9284110 8fe904a3 87a17c10 868f4880 00000000 ndis!NdisFSendNetBufferLists+0x18
a928418c 8a40e869 87a17968 868f4880 00000000 pacer!PcFilterSendNetBufferLists+0x233
a92841a8 8a4d93b5 868f4880 868f4880 00000000 ndis!ndisSendNBLToFilter+0x87
a92841cc 8a671095 87b50508 868f4880 00000000 ndis!NdisSendNetBufferLists+0x4f
a9284214 8a66ff4a 87b508c0 00000000 00000000 tcpip!FlSendPackets+0x399
a9284254 8a66f992 8a6d7cd0 00000000 00000000 tcpip!IppFragmentPackets+0x201
a928428c 8a66f734 8a6d7cd0 a92843a8 616c7049 tcpip!IppDispatchSendPacketHelper+0x252
a928432c 8a67084c 002843a8 00000000 855f8178 tcpip!IppPacketizeDatagrams+0x8fe
a928448c 8a671e49 00000000 00000004 8a6d7cd0 tcpip!IppSendDatagramsCommon+0x604
a92844ac 8a664942 85906208 a92845a8 a928476c tcpip!IpNlpSendDatagrams+0x4b
a92846f4 8a664a69 881990b8 86190578 00000000 tcpip!UdpSendMessages+0xc07
a9284708 824efeb4 a928476c 829a3dd7 a9284794 tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x13
a9284748 8a664a3b 8a664a56 a928476c 00000000 nt!KeExpandKernelStackAndCalloutEx+0xbd
a9284778 8fbc0d86 869ebcc8 a9284794 85424960 tcpip!UdpTlProviderSendMessages+0x5e
a92847c0 8fbc8a52 8686f758 85424900 868e8af0 tdx!TdxSendDatagramTransportAddress+0x206
a92847dc 824819c6 87a6f3b0 85424960 85424a10 tdx!TdxTdiDispatchInternalDeviceControl+0x5c
a92847f4 8fbd3d49 85152450 a92848fc 00000000 nt!IofCallDriver+0x63
a928480c 8fbd9308 00000001 85424960 00000000 aswFW+0xd49
a928485c 8fbd8321 00000000 a92848fc a9284894 aswFW+0x6308
a928486c 8fbd8854 a92848fc a92848a4 871d2008 aswFW+0x5321
a9284894 8fbd8e49 86202008 a92848a4 00000000 aswFW+0x5854
a92848a8 8fbd6228 a92848fc 85424960 87aaeae0 aswFW+0x5e49
a9284994 8fbd3def 87aaeae0 85424960 a92849bc aswFW+0x3228
a92849a4 824819c6 87aaeae0 85424960 87a99e28 aswFW+0xdef
a92849bc 8fbea679 26976d1d 00000000 85424a18 nt!IofCallDriver+0x63
a9284a10 8fbea9ef 87a99df8 85424960 85424a18 aswTdi+0x679
a9284a58 824819c6 87aaeae0 85424960 85424928 aswTdi+0x9ef
a9284a70 8fe2b914 26c9a9b1 00000001 0288ebe8 nt!IofCallDriver+0x63
a9284ad8 8fe203d0 0288ec3e 00000003 8fe203d0 afd!AfdFastDatagramSend+0x5ba
a9284c58 82683b4c 8682d901 00000001 0288ebb0 afd!AfdFastIoDeviceControl+0x3c1
a9284d00 82685012 87b58f08 00000238 00000000 nt!IopXxxControlFile+0x2cf
a9284d34 82487c7a 00000870 00000238 00000000 nt!NtDeviceIoControlFile+0x2a
a9284d34 00000000 00000870 00000238 00000000 nt!KiFastCallEntry+0x12a