View Single Post
01 Oct 2012  
koolkat77

Microsoft Community Contributor Award Recipient

Windows 7 Home Premium 64Bit
 
 

Please update the drivers to your manufactures networking card.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {1048, 2, 0, fffff88001a79027}

Probably caused by : tcpip.sys ( tcpip!UdpBeginDelivery+7 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000001048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001a79027, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330c100
 0000000000001048 

CURRENT_IRQL:  2

FAULTING_IP: 
tcpip!UdpBeginDelivery+7
fffff880`01a79027 488b4248        mov     rax,qword ptr [rdx+48h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff88003bbc7c0 -- (.trap 0xfffff88003bbc7c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800b06c080 rbx=0000000000000000 rcx=fffffa8006e03820
rdx=0000000000001000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001a79027 rsp=fffff88003bbc950 rbp=fffffa8006e03820
 r8=0000000000000000  r9=0000000000000000 r10=fffff880009ecb20
r11=fffff88003bbc9c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip!UdpBeginDelivery+0x7:
fffff880`01a79027 488b4248        mov     rax,qword ptr [rdx+48h] ds:0092:00000000`00001048=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030dc769 to fffff800030dd1c0

STACK_TEXT:  
fffff880`03bbc678 fffff800`030dc769 : 00000000`0000000a 00000000`00001048 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03bbc680 fffff800`030db3e0 : fffffa80`0b06c0a8 fffff880`01a44a18 fffffa80`00000000 fffffa80`0b677ec0 : nt!KiBugCheckDispatch+0x69
fffff880`03bbc7c0 fffff880`01a79027 : fffffa80`0acd9a10 00000000`00000040 fffffa80`0acd99e0 00000000`000007ff : nt!KiPageFault+0x260
fffff880`03bbc950 fffff880`01a7f8ce : fffffa80`0b677ec0 fffffa80`0b030280 fffffa80`06e03820 fffffa80`0b677ec0 : tcpip!UdpBeginDelivery+0x7
fffff880`03bbc9d0 fffff880`01a793ed : fffffa80`00000028 fffffa80`0b677ec0 fffffa80`00000000 fffffa80`06a50cc8 : tcpip!UdpDeliverDatagrams+0x20e
fffff880`03bbcb60 fffff880`01a57c37 : fffffa80`06df9ea0 fffffa80`0b030280 00000000`00000017 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x1ed
fffff880`03bbcc70 fffff880`01a5774a : 00000000`00000000 fffff880`01b69800 fffff880`03bbce30 fffffa80`06e03820 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`03bbcd30 fffff880`01a56d49 : 00000000`00000000 fffffa80`0b106100 00000000`00000000 fffff880`03bbce20 : tcpip!IppProcessDeliverList+0x5a
fffff880`03bbcdd0 fffff880`01a3b5df : fffffa80`0b1061c0 fffffa80`00000001 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`03bbceb0 fffff800`030d4cb7 : fffff880`01b69800 00000000`00000011 00000000`00000000 00000000`00000000 : tcpip!IppLoopbackTransmit+0x38f
fffff880`03bbcf60 fffff800`030d4c78 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0c2550a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
tcpip!UdpBeginDelivery+7
fffff880`01a79027 488b4248        mov     rax,qword ptr [rdx+48h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  tcpip!UdpBeginDelivery+7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5034f727

FAILURE_BUCKET_ID:  X64_0xD1_tcpip!UdpBeginDelivery+7

BUCKET_ID:  X64_0xD1_tcpip!UdpBeginDelivery+7

Followup: MachineOwner
---------
My System SpecsSystem Spec