Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp1_Windows_NT6_BSOD_jcgriff2[1].zip\Windows_NT6_BSOD_jcgriff2\Mini072610-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18209.amd64fre.vistasp2_gdr.100218-0019
Machine Name:
Kernel base = 0xfffff800`02651000 PsLoadedModuleList = 0xfffff800`02815dd0
Debug session time: Mon Jul 26 20:17:06.107 2010 (GMT-4)
System Uptime: 0 days 0:53:02.008
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 1, fffffa6000c05318}
Unable to load image \SystemRoot\system32\DRIVERS\Rtlh64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rtlh64.sys
*** ERROR: Module load completed but symbols could not be loaded for Rtlh64.sys
Probably caused by : pacer.sys ( pacer!PcFilterSendNetBufferListsComplete+f4 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffffa6000c05318, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002878080
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
ndis!NdisFSendNetBufferListsComplete+148
fffffa60`00c05318 498917 mov qword ptr [r15],rdx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8000369cb40 -- (.trap 0xfffff8000369cb40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa6000d640e0
rdx=fffffa8004711d60 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa6000c05318 rsp=fffff8000369ccd0 rbp=0000000000000000
r8=0000000000000001 r9=fffffa8006a76780 r10=000000000000030f
r11=fffff8000369cd38 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
ndis!NdisFSendNetBufferListsComplete+0x148:
fffffa60`00c05318 498917 mov qword ptr [r15],rdx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800026ab26e to fffff800026ab4d0
STACK_TEXT:
fffff800`0369c9f8 fffff800`026ab26e : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`0369ca00 fffff800`026aa14b : 00000000`00000001 fffffa80`048c4030 00000000`00000f43 fffffa80`06d04320 : nt!KiBugCheckDispatch+0x6e
fffff800`0369cb40 fffffa60`00c05318 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x20b
fffff800`0369ccd0 fffffa60`03d6f8f0 : 00000000`00000000 fffffa80`04eed1a0 fffffa80`06ce9010 fffffa80`048c4240 : ndis!NdisFSendNetBufferListsComplete+0x148
fffff800`0369cd40 fffffa60`00da724c : fffffa80`04eed1a0 fffffa60`00c5b110 00000000`00000001 fffffa80`041017e0 : pacer!PcFilterSendNetBufferListsComplete+0xf4
fffff800`0369cdb0 fffffa60`032f99d7 : 00000000`00000000 fffffa80`06a76780 00000000`00000000 fffffa80`06a76780 : ndis!NdisMSendNetBufferListsComplete+0x7c
fffff800`0369cdf0 00000000`00000000 : fffffa80`06a76780 00000000`00000000 fffffa80`06a76780 fffffa80`06a5f4c0 : Rtlh64+0x69d7
STACK_COMMAND: kb
FOLLOWUP_IP:
pacer!PcFilterSendNetBufferListsComplete+f4
fffffa60`03d6f8f0 4c8d5c2450 lea r11,[rsp+50h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: pacer!PcFilterSendNetBufferListsComplete+f4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: pacer
IMAGE_NAME: pacer.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49e02de0
FAILURE_BUCKET_ID: X64_0xD1_pacer!PcFilterSendNetBufferListsComplete+f4
BUCKET_ID: X64_0xD1_pacer!PcFilterSendNetBufferListsComplete+f4
Followup: MachineOwner
---------