Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012811-13338-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c15000 PsLoadedModuleList = 0xfffff800`02e52e50
Debug session time: Fri Jan 28 11:20:28.645 2011 (UTC - 5:00)
System Uptime: 0 days 10:16:42.644
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 0, fffff8800167a99a}
Probably caused by : tcpip.sys ( tcpip!TcpDequeueTcbSend+3da )
Followup: MachineOwner
---------
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800167a99a, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ebd0e0
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpDequeueTcbSend+3da
fffff880`0167a99a 4c3b6828 cmp r13,qword ptr [rax+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800bcba760 -- (.trap 0xfffff8800bcba760)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800167a99a rsp=fffff8800bcba8f0 rbp=0000000000000000
r8=0000000000387619 r9=8000000100000000 r10=000000000000002d
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
tcpip!TcpDequeueTcbSend+0x3da:
fffff880`0167a99a 4c3b6828 cmp r13,qword ptr [rax+28h] ds:00000000`00000028=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c84ca9 to fffff80002c85740
STACK_TEXT:
fffff880`0bcba618 fffff800`02c84ca9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0bcba620 fffff800`02c83920 : 00000000`00000002 00000000`00000001 fffff880`041b1000 00000000`0000000b : nt!KiBugCheckDispatch+0x69
fffff880`0bcba760 fffff880`0167a99a : fffffa80`0a8a95a0 fffffa80`000005c8 fffff880`0bcba968 fffffa80`09cc2080 : nt!KiPageFault+0x260
fffff880`0bcba8f0 fffff880`0166c469 : 00000000`00000010 fffffa80`06732500 00000000`de2b47fe fffffa80`0000000b : tcpip!TcpDequeueTcbSend+0x3da
fffff880`0bcbab40 fffff880`01679334 : 00000000`00000020 00000000`00000000 fffffa80`05c0c000 fffffa80`0a8a95a0 : tcpip!TcpTcbCarefulDatagram+0x6f9
fffff880`0bcbacf0 fffff880`0167d86a : fffffa80`05c18400 fffff800`02c91de0 fffffa80`05a71cb8 00000000`00000000 : tcpip!TcpTcbReceive+0x694
fffff880`0bcbaea0 fffff880`0167d3b7 : fffffa80`073a7076 fffffa80`05c0c000 00000000`00000000 fffff880`01660700 : tcpip!TcpMatchReceive+0x1fa
fffff880`0bcbaff0 fffff880`0165f6c7 : fffffa80`05c05000 fffffa80`05a723f1 fffffa80`05c15000 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x177
fffff880`0bcbb0a0 fffff880`0165f799 : fffff880`0bcbb220 fffff880`0176d9a0 fffff880`0bcbb230 fffff880`0176d9a0 : tcpip!IppDeliverListToProtocol+0x97
fffff880`0bcbb160 fffff880`0165fc90 : fffffa80`05c0c000 00000000`00000000 00000000`00000011 fffff880`0bcbb220 : tcpip!IppProcessDeliverList+0x59
fffff880`0bcbb1d0 fffff880`0165eb21 : 00000000`ff02a8c0 fffffa80`05c0c000 fffff880`0176d9a0 00000000`09ac0b01 : tcpip!IppReceiveHeaderBatch+0x231
fffff880`0bcbb2b0 fffff880`0165d592 : fffffa80`06f0cca0 00000000`00000000 fffffa80`09ac0b01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0bcbb4b0 fffff880`01676e5a : fffffa80`09ac0bb0 fffff880`0bcbb5e0 fffffa80`09ac0bb0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0bcbb590 fffff800`02c94e5a : fffffa80`0a7fe330 fffff880`0bcb6000 00000000`00004800 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0bcbb5e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpDequeueTcbSend+3da
fffff880`0167a99a 4c3b6828 cmp r13,qword ptr [rax+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpDequeueTcbSend+3da
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c15a458
FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpDequeueTcbSend+3da
BUCKET_ID: X64_0xD1_tcpip!TcpDequeueTcbSend+3da
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012811-13930-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c09000 PsLoadedModuleList = 0xfffff800`02e46e50
Debug session time: Fri Jan 28 11:48:18.614 2011 (UTC - 5:00)
System Uptime: 0 days 0:27:14.002
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002f41227, fffff88007f20ee0, 0}
Probably caused by : ntkrnlmp.exe ( nt!PspDereferenceQuotaBlock+17 )
Followup: MachineOwner
---------
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002f41227, Address of the instruction which caused the bugcheck
Arg3: fffff88007f20ee0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!PspDereferenceQuotaBlock+17
fffff800`02f41227 f0838108020000ff lock add dword ptr [rcx+208h],0FFFFFFFFh
CONTEXT: fffff88007f20ee0 -- (.cxr 0xfffff88007f20ee0)
rax=1000000000000000 rbx=1000000000000000 rcx=1000000000000000
rdx=fffff80002c09000 rsi=0000000000000000 rdi=fffffa8004f4fe70
rip=fffff80002f41227 rsp=fffff88007f218b0 rbp=fffffa8006732680
r8=fffff8a00e947ce0 r9=0000000000000000 r10=fffff80002e059c0
r11=fffffa8006788750 r12=0000000000000000 r13=fffffa80067326a0
r14=fffffa8006732680 r15=0000000000000228
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!PspDereferenceQuotaBlock+0x17:
fffff800`02f41227 f0838108020000ff lock add dword ptr [rcx+208h],0FFFFFFFFh ds:002b:10000000`00000208=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: SearchProtocol
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002f41227
STACK_TEXT:
fffff880`07f218b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspDereferenceQuotaBlock+0x17
FOLLOWUP_IP:
nt!PspDereferenceQuotaBlock+17
fffff800`02f41227 f0838108020000ff lock add dword ptr [rcx+208h],0FFFFFFFFh
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!PspDereferenceQuotaBlock+17
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff88007f20ee0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!PspDereferenceQuotaBlock+17
BUCKET_ID: X64_0x3B_nt!PspDereferenceQuotaBlock+17
Followup: MachineOwner
---------