none
求助:VISTA Ultimate SP1 出现蓝屏(内附Windbg 分析Dump文件描述) RRS feed

  • 问题

  • 蓝屏,用Windbg 分析Dump如下:

     

    Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Users\DD\Desktop\Mini090308-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: srv*c:\\sys*http://msdl.microsoft.com/download/symbols;C:\Windows\System32\drivers\pacer.sys
    Executable search path is: C:\Windows\System32\drivers\pacer.sys
    Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 6001.18063.x86fre.vistasp1_gdr.080425-1930
    Kernel base = 0x81c52000 PsLoadedModuleList = 0x81d69c70
    Debug session time: Wed Sep  3 00:00:44.923 2008 (GMT+8)
    System Uptime: 0 days 0:07:19.678
    Loading Kernel Symbols
    ........................................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {8, 2, 1, 878a785f}

    Unable to load image \SystemRoot\system32\DRIVERS\Rtlh86.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rtlh86.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rtlh86.sys
    Probably caused by : pacer.sys ( pacer!PcFilterSendNetBufferListsComplete+ba )

    Followup: MachineOwner

     

     

    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000008, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, value 0 = read operation, 1 = write operation
    Arg4: 8789a85f, address which referenced memory

    Debugging Details:
    ------------------


    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 81d53868
    Unable to read MiSystemVaType memory at 81d33420
     00000008

    CURRENT_IRQL:  2

    FAULTING_IP:
    ndis!ndisXlateSendCompleteNetBufferListToPacket+36
    8789a85f c7400836434f4d  mov     dword ptr [eax+8],4D4F4336h

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    BUGCHECK_STR:  0xD1

    PROCESS_NAME:  QQ.exe

    TRAP_FRAME:  ac182e68 -- (.trap 0xffffffffac182e68)
    ErrCode = 00000002
    eax=00000000 ebx=00000000 ecx=ac182f04 edx=84758ef8 esi=83fbc898 edi=00000002
    eip=8789a85f esp=ac182edc ebp=ac182ee4 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    ndis!ndisXlateSendCompleteNetBufferListToPacket+0x36:
    8789a85f c7400836434f4d  mov     dword ptr [eax+8],4D4F4336h ds:0023:00000008=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from 8789a85f to 81c76d84

    STACK_TEXT: 
    ac182e68 8789a85f badb0d00 84758ef8 ac182eb8 nt!KiTrap0E+0x2ac
    ac182ee4 879425fe 83fbc898 ac182f04 ac182f14 ndis!ndisXlateSendCompleteNetBufferListToPacket+0x36
    ac182f08 8794141e 84395c50 00000000 00000001 ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x56
    ac182f3c 878764f1 8565d0e8 83fbc898 00000001 ndis!ndisMSendCompleteNetBufferListsInternal+0xb8
    ac182f50 8c8900ee 85a10c10 83fbc898 00000001 ndis!NdisFSendNetBufferListsComplete+0x1a
    ac182f74 879414dd 85a10220 83fbc898 00000001 pacer!PcFilterSendNetBufferListsComplete+0xba
    ac182f94 8c106175 8565d0e8 83fbc898 00000001 ndis!NdisMSendNetBufferListsComplete+0x70
    WARNING: Stack unwind information not available. Following frames may be wrong.
    ac182fc8 8c101bf5 00000000 00000000 00000000 Rtlh86+0x6175
    ac182ff0 8c1026e4 02681508 00000000 00000000 Rtlh86+0x1bf5
    ac18300c 879415c4 85681508 83fbc898 00000000 Rtlh86+0x26e4
    ac183034 87876585 8565d0e8 83fbc898 00000000 ndis!ndisMSendNBLToMiniport+0xb4
    ac183054 878765a8 83fbc898 83fbc898 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    ac18306c 8c8904ab 85a10c10 83fbc898 00000000 ndis!NdisFSendNetBufferLists+0x18
    ac1830e8 87876638 85a10220 83fbc898 00000000 pacer!PcFilterSendNetBufferLists+0x233
    ac183104 8789ed9b 83fbc898 83fbc898 00000000 ndis!ndisSendNBLToFilter+0x87
    ac183144 8789ecc7 8565d0e8 001831a8 00000001 ndis!ndisMSendPacketsToNetBufferLists+0x92
    ac183180 879426db 84395c50 ac1831a8 00000001 ndis!ndisSendPacketsWithPause+0x236
    ac18319c 87be8fad 84395c50 84758ef8 85866708 ndis!ndisSendWithPause+0x48
    ac1831b8 87be4654 86acac48 843878c8 8567c0e8 raspppoe!PrSend+0x49
    ac1831dc 87942299 841f2540 00000001 86b1e900 raspppoe!MpWanSend+0x112
    ac183200 87bd5746 859a9958 00000001 86b1e900 ndis!ndisMWanSend+0x110
    ac18322c 87bd5f91 00000000 8439a008 00000001 ndiswan!SendOnLegacyLink+0x102
    ac183298 87bd6247 0000000e 8422c008 86b1e8a0 ndiswan!FramePacket+0x35a
    ac1832d0 87bd647b 8439a008 00000000 ac183304 ndiswan!SendFromProtocol+0xbb
    ac183310 87bd6c61 0139a008 87bdb000 00000000 ndiswan!SendPacketOnBundle+0x17c
    ac183338 87bcff29 85869380 00000000 847f4ef8 ndiswan!NdisWanQueueSend+0x4fa
    ac183354 879448e1 85869380 ac18339c 00000001 ndiswan!MPSendPackets+0x54
    ac18337c 87944707 ac1833a0 ac18339c 00000001 ndis!ndisMSendPacketsXToMiniport+0x141
    ac1833e4 87876585 856860e8 84778680 00000000 ndis!ndisMSendNetBufferListsToPackets+0x84
    ac183404 878765a8 84778680 84778680 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    ac18341c 8c8904ab 859e6c10 84778680 00000000 ndis!NdisFSendNetBufferLists+0x18
    ac183498 87876638 8417a560 01778680 00000000 pacer!PcFilterSendNetBufferLists+0x233
    ac1834b4 8794164a 84778680 84778680 00000000 ndis!ndisSendNBLToFilter+0x87
    ac1834d8 8c8b7969 85a85008 84778680 00000000 ndis!NdisSendNetBufferLists+0x4f
    ac183520 87a65d8c 840e0520 00000000 ac1836b4 wanarp!WanIpSendPackets+0x193
    ac183560 87a6599b 87acac68 00000000 00000000 tcpip!IppFragmentPackets+0x201
    ac183598 87a6778b 87acac68 ac1836b4 616c7049 tcpip!IppDispatchSendPacketHelper+0x252
    ac183638 87a66bff 001836b4 00000000 83fbc988 tcpip!IppPacketizeDatagrams+0x8fd
    ac183798 87a5fcab 00000000 00000004 87acac68 tcpip!IppSendDatagramsCommon+0x5f9
    ac1837b8 87a60b19 848dd8a8 ac1838b4 843a32d0 tcpip!IpNlpSendDatagrams+0x4b
    ac183a00 8c80982f 842131e8 848dd920 86ceb5c0 tcpip!UdpSendMessages+0xc07
    ac183a18 8c826f80 843a32d0 ac183a30 843a32d0 afd!AfdTLSendMessages+0x27
    ac183a68 8c826d87 843a32d0 86ceb5c0 20999c6e afd!AfdTLFastDgramSend+0x7d
    ac183ae4 8c81c3d0 843a32d0 ac183b7c 00000024 afd!AfdFastDatagramSend+0x5ac
    ac183c58 81e6898e 841b3b01 00000001 090de168 afd!AfdFastIoDeviceControl+0x3c1
    ac183d00 81e52a61 8598e448 000016b0 00000000 nt!IopXxxControlFile+0x2cf
    ac183d34 81c73a7a 00001420 000016b0 00000000 nt!NtDeviceIoControlFile+0x2a
    ac183d34 77f29a94 00001420 000016b0 00000000 nt!KiFastCallEntry+0x12a
    090de220 00000000 00000000 00000000 00000000 0x77f29a94


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    pacer!PcFilterSendNetBufferListsComplete+ba
    8c8900ee 5b              pop     ebx

    SYMBOL_STACK_INDEX:  5

    SYMBOL_NAME:  pacer!PcFilterSendNetBufferListsComplete+ba

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: pacer

    IMAGE_NAME:  pacer.sys

    DEBUG_FLR_IMAGE_TIMESTAMP:  47f6d426

    FAILURE_BUCKET_ID:  0xD1_W_pacer!PcFilterSendNetBufferListsComplete+ba

    BUCKET_ID:  0xD1_W_pacer!PcFilterSendNetBufferListsComplete+ba

    Followup: MachineOwner

       请各位大侠们看看有什么方法可以解决此蓝屏现象?谢谢~!若可以的话,能简略的说下分析方法么?谢谢~!

    2008年11月17日 6:56

答案

  • 应该是网卡驱动问题。

    你去网卡官方网站下载最新的网卡驱动就可以了。

    2008年11月17日 7:21
    版主
  • 应该是驱动问题, 建议你到驱动官方网站安装最新的支持Vista的驱动, 不过蓝屏很难彻底根治, 我的机器也有时蓝屏.

     

    2008年11月17日 7:45
    版主
  • 因为没有你网卡Rtlh86.sys的PDB文件,所以会出现以下的内容:

    805f0f28 8bb01573 00000001 00000001 85749008 Rtlh86+0x6abf
    805f0f40 8793811c 855598a8 00000000 00000000 Rtlh86+0x1573

    可以更新网卡的驱动,但不是代表100%就是网卡的问题,因为我们没有网卡驱动的symbol文件。

     

    2008年11月17日 9:04

全部回复

  • 应该是网卡驱动问题。

    你去网卡官方网站下载最新的网卡驱动就可以了。

    2008年11月17日 7:21
    版主
  • 应该是驱动问题, 建议你到驱动官方网站安装最新的支持Vista的驱动, 不过蓝屏很难彻底根治, 我的机器也有时蓝屏.

     

    2008年11月17日 7:45
    版主
  • 哦,谢谢~!我去下个最新的尝试下把

    其实现在用的这个驱动,是LOGO‘D的主板自带的驱动光盘,按道理应该不会那么容易出现蓝屏的问题吧

    2008年11月17日 7:49
  • 咋看出来的网卡驱动有问题??

    你的这次蓝色是因为QQ引起的,你的QQ是什么版本的?

    2008年11月17日 8:21
  • 应该不是QQ的问题,我用的QQ版本腾讯下的兼容VISTA版本,在其他机器上用,没出现过蓝屏现象,而且这个DUMP只是几次蓝屏中的其中一个DUMP文件,另外有个DUMP文件是显示在Explorer上的,所以我想那个应该只是说明DUMP的时候当前执行的程序把,我还不怎么会看WINDBG的信息,刚开始学着用,还得多向你们请教~谢谢!

    2008年11月17日 8:33
  • 你把那些其他的Dump文件的分析结果也贴上来,现在很难说到底是什么因素导致了蓝屏,有可能是网卡驱动,但也有可能是安装的防火墙导致,以及其他的原因,所以看堆栈调用信息的时候,不能看一个就说是什么问题。

    2008年11月17日 8:41
  • 还有3个:

    Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Users\DD\Desktop\Mini083108-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: srv*c:\\sys*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 6001.18000.x86fre.longhorn_rtm.080118-1840
    Kernel base = 0x81a1e000 PsLoadedModuleList = 0x81b35c70
    Debug session time: Sun Aug 31 23:38:37.310 2008 (GMT+8)
    System Uptime: 0 days 0:17:44.092
    Loading Kernel Symbols
    .........................................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {8, 2, 1, 8769c85f}

    Unable to load image \SystemRoot\system32\DRIVERS\Rtlh86.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rtlh86.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rtlh86.sys
    Probably caused by : pacer.sys ( pacer!PcFilterSendNetBufferListsComplete+ba )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000008, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, value 0 = read operation, 1 = write operation
    Arg4: 8769c85f, address which referenced memory

    Debugging Details:
    ------------------


    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 81b55868
    Unable to read MiSystemVaType memory at 81b35420
     00000008

    CURRENT_IRQL:  2

    FAULTING_IP:
    ndis!ndisXlateSendCompleteNetBufferListToPacket+36
    8769c85f c7400836434f4d  mov     dword ptr [eax+8],4D4F4336h

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    BUGCHECK_STR:  0xD1

    PROCESS_NAME:  System

    TRAP_FRAME:  81b12a38 -- (.trap 0xffffffff81b12a38)
    ErrCode = 00000002
    eax=00000000 ebx=00000000 ecx=81b12ad4 edx=843746d8 esi=8470a608 edi=00000002
    eip=8769c85f esp=81b12aac ebp=81b12ab4 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    ndis!ndisXlateSendCompleteNetBufferListToPacket+0x36:
    8769c85f c7400836434f4d  mov     dword ptr [eax+8],4D4F4336h ds:0023:00000008=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from 8769c85f to 81a78d84

    STACK_TEXT: 
    81b12a38 8769c85f badb0d00 843746d8 81ad7b17 nt!KiTrap0E+0x2ac
    81b12ab4 877445fe 8470a608 81b12ad4 81b12ae4 ndis!ndisXlateSendCompleteNetBufferListToPacket+0x36
    81b12ad8 8774341e 84571008 00000000 00000001 ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x56
    81b12b0c 876784f1 850aa0e8 8470a608 00000001 ndis!ndisMSendCompleteNetBufferListsInternal+0xb8
    81b12b20 8bc900a2 854e8c10 8470a608 00000001 ndis!NdisFSendNetBufferListsComplete+0x1a
    81b12b44 877434dd 854e8410 8470a608 00000001 pacer!PcFilterSendNetBufferListsComplete+0xba
    81b12b64 8b706175 850aa0e8 8470a608 00000001 ndis!NdisMSendNetBufferListsComplete+0x70
    WARNING: Stack unwind information not available. Following frames may be wrong.
    81b12b98 8b701bf5 00000000 00000000 00000000 Rtlh86+0x6175
    81b12bc0 8b7026e4 0211c4e8 00000000 00000000 Rtlh86+0x1bf5
    81b12bdc 877435c4 8511c4e8 8470a608 00000000 Rtlh86+0x26e4
    81b12c04 87678585 850aa0e8 8470a608 00000000 ndis!ndisMSendNBLToMiniport+0xb4
    81b12c24 876785a8 8470a608 8470a608 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    81b12c3c 8bc9045f 854e8c10 8470a608 00000000 ndis!NdisFSendNetBufferLists+0x18
    81b12cb8 87678638 854e8410 8470a608 00000000 pacer!PcFilterSendNetBufferLists+0x233
    81b12cd4 876a0d9b 8470a608 8470a608 00000000 ndis!ndisSendNBLToFilter+0x87
    81b12d14 876a0cc7 850aa0e8 00b12d78 00000001 ndis!ndisMSendPacketsToNetBufferLists+0x92
    81b12d50 877446db 84571008 81b12d78 00000001 ndis!ndisSendPacketsWithPause+0x236
    81b12d6c 879f0fad 84571008 843746d8 854a57d0 ndis!ndisSendWithPause+0x48
    81b12d88 879ec654 83eb82e8 8455e720 85104438 raspppoe!PrSend+0x49
    81b12dac 87744299 83fff950 00000001 84568900 raspppoe!MpWanSend+0x112
    81b12dd0 879dd746 854dc958 00000001 84568900 ndis!ndisMWanSend+0x110
    81b12dfc 879ddf91 00000000 845624b0 00000001 ndiswan!SendOnLegacyLink+0x102
    81b12e68 879de247 0000000e 8455e470 845688a0 ndiswan!FramePacket+0x35a
    81b12ea0 879de47b 845624b0 00000000 81b12ed4 ndiswan!SendFromProtocol+0xbb
    81b12ee0 879dec61 015624b0 879e3000 00000000 ndiswan!SendPacketOnBundle+0x17c
    81b12f08 879d7f29 8538c4d8 00000000 843f0e28 ndiswan!NdisWanQueueSend+0x4fa
    81b12f24 877468e1 8538c4d8 81b12f6c 00000001 ndiswan!MPSendPackets+0x54
    81b12f4c 87746707 81b12f70 81b12f6c 00000001 ndis!ndisMSendPacketsXToMiniport+0x141
    81b12fb4 87678585 851000e8 842e0b78 00000000 ndis!ndisMSendNetBufferListsToPackets+0x84
    81b12fd4 876785a8 842e0b78 842e0b78 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    81b12fec 8bc9045f 854ce980 842e0b78 00000000 ndis!NdisFSendNetBufferLists+0x18
    81b13068 87678638 84559008 012e0b78 00000000 pacer!PcFilterSendNetBufferLists+0x233
    81b13084 8774364a 842e0b78 842e0b78 00000000 ndis!ndisSendNBLToFilter+0x87
    81b130a8 8bcb7969 854e0c08 842e0b78 00000000 ndis!NdisSendNetBufferLists+0x4f
    81b130f0 8786ddcc 84019a18 00000000 81b13284 wanarp!WanIpSendPackets+0x193
    81b13130 8786d9db 878d2c68 00000000 00000000 tcpip!IppFragmentPackets+0x201
    81b13168 8786f7cb 878d2c68 81b13284 616c7049 tcpip!IppDispatchSendPacketHelper+0x252
    81b13208 8786ec3f 00b13284 81b133c8 846e6468 tcpip!IppPacketizeDatagrams+0x8fd
    81b13368 87867cdb 00000000 00000007 878d2c68 tcpip!IppSendDatagramsCommon+0x5f9
    81b13388 8785cc31 844d0870 81b133a0 844d0870 tcpip!IpNlpSendDatagrams+0x4b
    81b13410 8784e349 844d0870 81b134fc 00000000 tcpip!IppSlowSendDatagram+0x31
    81b1346c 87851ff4 844d0870 81b13401 81b134fc tcpip!IpNlpFastSendDatagram+0x47f
    81b1353c 878780fe 00000000 8473e5c0 00000002 tcpip!TcpTcbHeaderSend+0x45d
    81b1357c 87850d4f 00000001 00000000 81b13658 tcpip!TcpFlushDelay+0x185
    81b135ac 8785133c 844d0bf8 844c5000 844c5010 tcpip!TcpPreValidatedReceive+0x2bf
    81b135c8 8785193f 844d0bf8 844c5000 81b13604 tcpip!TcpReceive+0x32
    81b135d8 8787c013 81b135ec c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
    81b13604 8787bdd6 878d2e50 81b13658 c000023e tcpip!IppDeliverListToProtocol+0x49
    81b13624 8787bcfd 878d2c68 00000006 81b13658 tcpip!IppProcessDeliverList+0x2a
    81b1367c 8787b4ec 878d2c68 00000006 84019a18 tcpip!IppReceiveHeaderBatch+0x1eb
    81b1370c 8bcb8404 83f70120 00000000 00000001 tcpip!IpFlcReceivePackets+0xbe1
    81b13798 877430b0 02abb1e4 00000000 00000000 wanarp!WanNdisReceivePackets+0x4e2
    81b137cc 877357e3 004e0c08 86546018 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0xab
    81b13958 8767657f 851000e8 854e0c08 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x7c
    81b13974 876a1d88 851000e8 86546018 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2c
    81b13990 876a1d5f 854ce980 86546018 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x20
    81b139ac 8bc9055c 854ce980 86546018 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x1b
    81b139e8 877482ba 854d0d60 86546018 00000000 pacer!PcFilterReceiveNetBufferLists+0xd2
    81b139e8 00000000 854d0d60 86546018 00000000 ndis!ndisMIndicatePacketsToNetBufferLists+0xe9


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    pacer!PcFilterSendNetBufferListsComplete+ba
    8bc900a2 5b              pop     ebx

    SYMBOL_STACK_INDEX:  5

    SYMBOL_NAME:  pacer!PcFilterSendNetBufferListsComplete+ba

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: pacer

    IMAGE_NAME:  pacer.sys

    DEBUG_FLR_IMAGE_TIMESTAMP:  479190e9

    FAILURE_BUCKET_ID:  0xD1_W_pacer!PcFilterSendNetBufferListsComplete+ba

    BUCKET_ID:  0xD1_W_pacer!PcFilterSendNetBufferListsComplete+ba

    Followup: MachineOwner

    2008年11月17日 8:46
  • Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Users\DD\Desktop\Mini083108-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: srv*c:\\sys*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 6001.18000.x86fre.longhorn_rtm.080118-1840
    Kernel base = 0x81c01000 PsLoadedModuleList = 0x81d18c70
    Debug session time: Sun Aug 31 23:50:58.737 2008 (GMT+8)
    System Uptime: 0 days 0:11:42.503
    Loading Kernel Symbols
    ..........................................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {c, 2, 1, 8794777c}

    Unable to load image \SystemRoot\system32\DRIVERS\Rtlh86.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rtlh86.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rtlh86.sys
    Probably caused by : pacer.sys ( pacer!PcFilterSendNetBufferListsComplete+ba )

    Followup: MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000c, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, value 0 = read operation, 1 = write operation
    Arg4: 8794777c, address which referenced memory

    Debugging Details:
    ------------------


    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 81d38868
    Unable to read MiSystemVaType memory at 81d18420
     0000000c

    CURRENT_IRQL:  2

    FAULTING_IP:
    ndis!ndisSendCompleteWithPause+68
    8794777c 83600c00        and     dword ptr [eax+0Ch],0

    CUSTOMER_CRASH_COUNT:  2

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    BUGCHECK_STR:  0xD1

    PROCESS_NAME:  explorer.exe

    TRAP_FRAME:  805f0dcc -- (.trap 0xffffffff805f0dcc)
    ErrCode = 00000002
    eax=00000000 ebx=8544e0e8 ecx=fffffffe edx=07220003 esi=840f6c50 edi=8445def8
    eip=8794777c esp=805f0e40 ebp=805f0e4c iopl=0         nv up ei ng nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010282
    ndis!ndisSendCompleteWithPause+0x68:
    8794777c 83600c00        and     dword ptr [eax+0Ch],0 ds:0023:0000000c=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from 8794777c to 81c5bd84

    STACK_TEXT: 
    805f0dcc 8794777c badb0d00 07220003 805f0dfc nt!KiTrap0E+0x2ac
    805f0e4c 87947624 000f6c50 8445def8 00000000 ndis!ndisSendCompleteWithPause+0x68
    805f0e70 8794641e 840f6c50 00000000 00000001 ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x7c
    805f0ea4 8787b4f1 8544e0e8 8477de90 00000001 ndis!ndisMSendCompleteNetBufferListsInternal+0xb8
    805f0eb8 8c0890a2 8594cc10 8477de90 00000001 ndis!NdisFSendNetBufferListsComplete+0x1a
    805f0edc 879464dd 8593b178 8477de90 00000001 pacer!PcFilterSendNetBufferListsComplete+0xba
    805f0efc 8bb06abf 8544e0e8 8477de90 00000001 ndis!NdisMSendNetBufferListsComplete+0x70
    WARNING: Stack unwind information not available. Following frames may be wrong.
    805f0f28 8bb01573 00000001 00000001 85749008 Rtlh86+0x6abf
    805f0f40 8793811c 855598a8 00000000 00000000 Rtlh86+0x1573
    805f0f64 87879468 8574901c 00000000 00000000 ndis!ndisMiniportDpc+0x81
    805f0f88 81cb7510 8574901c 8544e0e8 00000000 ndis!ndisInterruptDpc+0xc4
    805f0ff4 81cb59f5 91011d10 00000000 00000000 nt!KiRetireDpcList+0x147
    805f0ff8 91011d10 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x45
    81cb59f5 00000000 0000001b 00c7850f bb830000 0x91011d10


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    pacer!PcFilterSendNetBufferListsComplete+ba
    8c0890a2 5b              pop     ebx

    SYMBOL_STACK_INDEX:  5

    SYMBOL_NAME:  pacer!PcFilterSendNetBufferListsComplete+ba

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: pacer

    IMAGE_NAME:  pacer.sys

    DEBUG_FLR_IMAGE_TIMESTAMP:  479190e9

    FAILURE_BUCKET_ID:  0xD1_W_pacer!PcFilterSendNetBufferListsComplete+ba

    BUCKET_ID:  0xD1_W_pacer!PcFilterSendNetBufferListsComplete+ba

    Followup: MachineOwner

     

    2008年11月17日 8:48
  • Microsoft (R) Windows Debugger Version 6.9.0003.113 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Users\DD\Desktop\Mini090208-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: srv*c:\\sys*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows Server 2008 Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 6001.18063.x86fre.vistasp1_gdr.080425-1930
    Kernel base = 0x81c1c000 PsLoadedModuleList = 0x81d33c70
    Debug session time: Tue Sep  2 01:21:33.743 2008 (GMT+8)
    System Uptime: 0 days 0:29:51.583
    Loading Kernel Symbols
    ..........................................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {8, 2, 1, 8789a85f}

    Unable to load image \SystemRoot\system32\DRIVERS\Rtlh86.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for Rtlh86.sys
    *** ERROR: Module load completed but symbols could not be loaded for Rtlh86.sys
    Probably caused by : pacer.sys ( pacer!PcFilterSendNetBufferListsComplete+ba )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000008, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, value 0 = read operation, 1 = write operation
    Arg4: 8789a85f, address which referenced memory

    Debugging Details:
    ------------------


    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 81d53868
    Unable to read MiSystemVaType memory at 81d33420
     00000008

    CURRENT_IRQL:  2

    FAULTING_IP:
    ndis!ndisXlateSendCompleteNetBufferListToPacket+36
    8789a85f c7400836434f4d  mov     dword ptr [eax+8],4D4F4336h

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    BUGCHECK_STR:  0xD1

    PROCESS_NAME:  QQ.exe

    TRAP_FRAME:  ac182e68 -- (.trap 0xffffffffac182e68)
    ErrCode = 00000002
    eax=00000000 ebx=00000000 ecx=ac182f04 edx=84758ef8 esi=83fbc898 edi=00000002
    eip=8789a85f esp=ac182edc ebp=ac182ee4 iopl=0         nv up ei pl zr na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
    ndis!ndisXlateSendCompleteNetBufferListToPacket+0x36:
    8789a85f c7400836434f4d  mov     dword ptr [eax+8],4D4F4336h ds:0023:00000008=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from 8789a85f to 81c76d84

    STACK_TEXT: 
    ac182e68 8789a85f badb0d00 84758ef8 ac182eb8 nt!KiTrap0E+0x2ac
    ac182ee4 879425fe 83fbc898 ac182f04 ac182f14 ndis!ndisXlateSendCompleteNetBufferListToPacket+0x36
    ac182f08 8794141e 84395c50 00000000 00000001 ndis!ndisMSendNetBufferListsCompleteToNdisPackets+0x56
    ac182f3c 878764f1 8565d0e8 83fbc898 00000001 ndis!ndisMSendCompleteNetBufferListsInternal+0xb8
    ac182f50 8c8900ee 85a10c10 83fbc898 00000001 ndis!NdisFSendNetBufferListsComplete+0x1a
    ac182f74 879414dd 85a10220 83fbc898 00000001 pacer!PcFilterSendNetBufferListsComplete+0xba
    ac182f94 8c106175 8565d0e8 83fbc898 00000001 ndis!NdisMSendNetBufferListsComplete+0x70
    WARNING: Stack unwind information not available. Following frames may be wrong.
    ac182fc8 8c101bf5 00000000 00000000 00000000 Rtlh86+0x6175
    ac182ff0 8c1026e4 02681508 00000000 00000000 Rtlh86+0x1bf5
    ac18300c 879415c4 85681508 83fbc898 00000000 Rtlh86+0x26e4
    ac183034 87876585 8565d0e8 83fbc898 00000000 ndis!ndisMSendNBLToMiniport+0xb4
    ac183054 878765a8 83fbc898 83fbc898 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    ac18306c 8c8904ab 85a10c10 83fbc898 00000000 ndis!NdisFSendNetBufferLists+0x18
    ac1830e8 87876638 85a10220 83fbc898 00000000 pacer!PcFilterSendNetBufferLists+0x233
    ac183104 8789ed9b 83fbc898 83fbc898 00000000 ndis!ndisSendNBLToFilter+0x87
    ac183144 8789ecc7 8565d0e8 001831a8 00000001 ndis!ndisMSendPacketsToNetBufferLists+0x92
    ac183180 879426db 84395c50 ac1831a8 00000001 ndis!ndisSendPacketsWithPause+0x236
    ac18319c 87be8fad 84395c50 84758ef8 85866708 ndis!ndisSendWithPause+0x48
    ac1831b8 87be4654 86acac48 843878c8 8567c0e8 raspppoe!PrSend+0x49
    ac1831dc 87942299 841f2540 00000001 86b1e900 raspppoe!MpWanSend+0x112
    ac183200 87bd5746 859a9958 00000001 86b1e900 ndis!ndisMWanSend+0x110
    ac18322c 87bd5f91 00000000 8439a008 00000001 ndiswan!SendOnLegacyLink+0x102
    ac183298 87bd6247 0000000e 8422c008 86b1e8a0 ndiswan!FramePacket+0x35a
    ac1832d0 87bd647b 8439a008 00000000 ac183304 ndiswan!SendFromProtocol+0xbb
    ac183310 87bd6c61 0139a008 87bdb000 00000000 ndiswan!SendPacketOnBundle+0x17c
    ac183338 87bcff29 85869380 00000000 847f4ef8 ndiswan!NdisWanQueueSend+0x4fa
    ac183354 879448e1 85869380 ac18339c 00000001 ndiswan!MPSendPackets+0x54
    ac18337c 87944707 ac1833a0 ac18339c 00000001 ndis!ndisMSendPacketsXToMiniport+0x141
    ac1833e4 87876585 856860e8 84778680 00000000 ndis!ndisMSendNetBufferListsToPackets+0x84
    ac183404 878765a8 84778680 84778680 00000000 ndis!ndisFilterSendNetBufferLists+0x8b
    ac18341c 8c8904ab 859e6c10 84778680 00000000 ndis!NdisFSendNetBufferLists+0x18
    ac183498 87876638 8417a560 01778680 00000000 pacer!PcFilterSendNetBufferLists+0x233
    ac1834b4 8794164a 84778680 84778680 00000000 ndis!ndisSendNBLToFilter+0x87
    ac1834d8 8c8b7969 85a85008 84778680 00000000 ndis!NdisSendNetBufferLists+0x4f
    ac183520 87a65d8c 840e0520 00000000 ac1836b4 wanarp!WanIpSendPackets+0x193
    ac183560 87a6599b 87acac68 00000000 00000000 tcpip!IppFragmentPackets+0x201
    ac183598 87a6778b 87acac68 ac1836b4 616c7049 tcpip!IppDispatchSendPacketHelper+0x252
    ac183638 87a66bff 001836b4 00000000 83fbc988 tcpip!IppPacketizeDatagrams+0x8fd
    ac183798 87a5fcab 00000000 00000004 87acac68 tcpip!IppSendDatagramsCommon+0x5f9
    ac1837b8 87a60b19 848dd8a8 ac1838b4 843a32d0 tcpip!IpNlpSendDatagrams+0x4b
    ac183a00 8c80982f 842131e8 848dd920 86ceb5c0 tcpip!UdpSendMessages+0xc07
    ac183a18 8c826f80 843a32d0 ac183a30 843a32d0 afd!AfdTLSendMessages+0x27
    ac183a68 8c826d87 843a32d0 86ceb5c0 20999c6e afd!AfdTLFastDgramSend+0x7d
    ac183ae4 8c81c3d0 843a32d0 ac183b7c 00000024 afd!AfdFastDatagramSend+0x5ac
    ac183c58 81e6898e 841b3b01 00000001 090de168 afd!AfdFastIoDeviceControl+0x3c1
    ac183d00 81e52a61 8598e448 000016b0 00000000 nt!IopXxxControlFile+0x2cf
    ac183d34 81c73a7a 00001420 000016b0 00000000 nt!NtDeviceIoControlFile+0x2a
    ac183d34 77f29a94 00001420 000016b0 00000000 nt!KiFastCallEntry+0x12a
    090de220 00000000 00000000 00000000 00000000 0x77f29a94


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    pacer!PcFilterSendNetBufferListsComplete+ba
    8c8900ee 5b              pop     ebx

    SYMBOL_STACK_INDEX:  5

    SYMBOL_NAME:  pacer!PcFilterSendNetBufferListsComplete+ba

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: pacer

    IMAGE_NAME:  pacer.sys

    DEBUG_FLR_IMAGE_TIMESTAMP:  47f6d426

    FAILURE_BUCKET_ID:  0xD1_W_pacer!PcFilterSendNetBufferListsComplete+ba

    BUCKET_ID:  0xD1_W_pacer!PcFilterSendNetBufferListsComplete+ba

    Followup: MachineOwner
     

    帮忙再看看,谢谢~!

     

    2008年11月17日 8:49
  • 因为没有你网卡Rtlh86.sys的PDB文件,所以会出现以下的内容:

    805f0f28 8bb01573 00000001 00000001 85749008 Rtlh86+0x6abf
    805f0f40 8793811c 855598a8 00000000 00000000 Rtlh86+0x1573

    可以更新网卡的驱动,但不是代表100%就是网卡的问题,因为我们没有网卡驱动的symbol文件。

     

    2008年11月17日 9:04
  • 哦,谢谢哈,我先去下个最新的网卡驱动尝试下问题还出现不。

     

    2008年11月17日 9:12