Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [E:\Temp\Rar$DI02.547\100310-24102-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e0c000 PsLoadedModuleList = 0xfffff800`03049e50
Debug session time: Sun Oct 3 08:35:15.148 2010 (UTC - 4:00)
System Uptime: 0 days 0:00:16.163
Loading Kernel Symbols
...............................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
..
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {b074, 2, 0, fffff88003d2746d}
Probably caused by : pacer.sys ( pacer!PcpLineUpdate+ad )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000b074, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88003d2746d, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b40e0
000000000000b074
CURRENT_IRQL: 2
FAULTING_IP:
pacer!PcpLineUpdate+ad
fffff880`03d2746d 48398c24b0000000 cmp qword ptr [rsp+0B0h],rcx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880065a0650 -- (.trap 0xfffff880065a0650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007b03960 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003d2746d rsp=fffff880065a07e0 rbp=0000000000000050
r8=fffffa8007380ab8 r9=0000000000000003 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
pacer!PcpLineUpdate+0xad:
fffff880`03d2746d 48398c24b0000000 cmp qword ptr [rsp+0B0h],rcx ss:0018:fffff880`065a0890=fffff880065a0920
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e7bca9 to fffff80002e7c740
STACK_TEXT:
fffff880`065a0508 fffff800`02e7bca9 : 00000000`0000000a 00000000`0000b074 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`065a0510 fffff800`02e7a920 : fffffa80`069b2200 fffffa80`07b081b0 fffffa80`00000000 fffff880`70614c00 : nt!KiBugCheckDispatch+0x69
fffff880`065a0650 fffff880`03d2746d : fffffa80`07b081b0 00000000`00000330 00000000`00000018 fffff880`014e763a : nt!KiPageFault+0x260
fffff880`065a07e0 fffff880`03d28fdc : 00000000`00000000 00000000`00000000 fffff880`065a0920 00000000`00000000 : pacer!PcpLineUpdate+0xad
fffff880`065a0880 fffff880`014fc26d : fffffa80`0699e1a0 00000000`00000000 fffffa80`07b08c01 fffffa80`07b08c01 : pacer!PcFilterAttach+0x4dc
fffff880`065a0960 fffff880`014ea8c5 : fffffa80`06d1e1a0 fffffa80`06d1e1a0 fffffa80`06d1c1a0 fffffa80`06d1e1a0 : ndis! ?? ::FNODOBFM::`string'+0xbc55
fffff880`065a0bb0 fffff880`0157dd0d : fffffa80`06d1e101 00000000`00000080 fffffa80`06d1ace0 fffffa80`06cbd020 : ndis!ndisCheckMiniportFilters+0x125
fffff880`065a0bf0 fffff880`014efb5a : 00000000`00000080 fffff880`0153e110 fffffa80`0737fa40 fffff880`014efaa0 : ndis!ndisCheckProtocolBindings+0x12e
fffff880`065a0d10 fffff800`03120c06 : fffffa80`07b03960 fffffa80`054ed040 fffff880`065a0db0 fffffa80`07b03960 : ndis!ndisWorkerThread+0xba
fffff880`065a0d40 fffff800`02e5ac26 : fffff880`02fd5180 fffffa80`07b03960 fffff880`02fe00c0 fffff880`01249a90 : nt!PspSystemThreadStartup+0x5a
fffff880`065a0d80 00000000`00000000 : fffff880`065a1000 fffff880`0659b000 fffff880`065a0d40 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
pacer!PcpLineUpdate+ad
fffff880`03d2746d 48398c24b0000000 cmp qword ptr [rsp+0B0h],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: pacer!PcpLineUpdate+ad
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: pacer
IMAGE_NAME: pacer.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bccc5
FAILURE_BUCKET_ID: X64_0xD1_pacer!PcpLineUpdate+ad
BUCKET_ID: X64_0xD1_pacer!PcpLineUpdate+ad
Followup: MachineOwner
---------