Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\ DOWNLOADS\ DUMPS\shadowrunner\033111-16364-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\WinSym*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c50000 PsLoadedModuleList = 0xfffff800`02e95e90
Debug session time: Fri Apr 1 02:42:25.075 2011 (UTC + 1:00)
System Uptime: 0 days 0:05:18.027
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1c, 2, 1, fffff880018e787e}
Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880018e787e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f010e8
000000000000001c
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpBeginTcbSend+33e
fffff880`018e787e f083401c01 lock add dword ptr [rax+1Ch],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800311a4c0 -- (.trap 0xfffff8800311a4c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800653aaa0
rdx=fffffa800653ab58 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018e787e rsp=fffff8800311a650 rbp=fffff8800311a760
r8=fffffa800653aa90 r9=fffffa800653aaa0 r10=fffffa800653a9d0
r11=fffff8800311a820 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x33e:
fffff880`018e787e f083401c01 lock add dword ptr [rax+1Ch],1 ds:0002:00000000`0000001c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ccfbe9 to fffff80002cd0640
STACK_TEXT:
fffff880`0311a378 fffff800`02ccfbe9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0311a380 fffff800`02cce860 : 00000000`00000006 00000000`00000000 00000002`8b003ccd 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`0311a4c0 fffff880`018e787e : 00000000`00000001 fffffa80`03aa1cf0 00000014`00000000 fffff880`01902dbf : nt!KiPageFault+0x260
fffff880`0311a650 fffff880`018ebb29 : 00000000`00000000 fffff880`0311ac38 fffffa80`046d6000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e
fffff880`0311a8d0 fffff880`0190c7e6 : 00000000`00000000 fffffa80`03aa1c01 fffff880`019ec128 00000000`00000000 : tcpip!TcpTcbSend+0x1d9
fffff880`0311ab50 fffff880`018e7325 : fffffa80`06734c00 00000000`00000000 00000000`00000000 fffff880`0311ae00 : tcpip!TcpFlushDelay+0x316
fffff880`0311ac30 fffff880`018de137 : fffffa80`045aa820 fffffa80`045a3ccd fffffa80`00008b00 00000000`00008b00 : tcpip!TcpPreValidatedReceive+0x3e5
fffff880`0311ad00 fffff880`018ddcaa : 00000000`00000000 fffff880`019f29a0 fffff880`0311aec0 fffff880`00c8712c : tcpip!IppDeliverListToProtocol+0x97
fffff880`0311adc0 fffff880`018dd2a9 : fffffa80`044ce500 fffffa80`053b4850 fffffa80`044ce500 fffff880`0311aeb0 : tcpip!IppProcessDeliverList+0x5a
fffff880`0311ae60 fffff880`018dafff : 00000000`00000000 fffffa80`046d6000 fffff880`019f29a0 00000000`063fab01 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0311af40 fffff880`018da5f2 : fffffa80`064c59d0 00000000`00000000 fffffa80`063fab01 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`0311b140 fffff880`018d9a8a : fffffa80`063faba0 fffff880`0311b270 fffffa80`063faba0 fffffa80`04760000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0311b220 fffff800`02cdd078 : fffffa80`051af3d0 00000000`00004800 fffff880`009f2fc0 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0311b270 fffff880`018da152 : fffff880`018d99b0 fffff880`01b8953c fffffa80`0460eb02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0311b350 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpBeginTcbSend+33e
fffff880`018e787e f083401c01 lock add dword ptr [rax+1Ch],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpBeginTcbSend+33e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79420
FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+33e
BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+33e
Followup: MachineOwner