[FONT=Arial][SIZE=4]Copyright (c) Microsoft Corporation. All rights reserved.[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp1_BSOD[1].zip\Mini080310-01.dmp][/SIZE][/FONT]
[FONT=Arial][SIZE=4]Mini Kernel Dump File: Only registers and stack trace are available[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Executable search path is: [/SIZE][/FONT]
[FONT=Arial][SIZE=4]Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Product: WinNt, suite: TerminalServer SingleUserTS Personal[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Built by: 6002.18209.x86fre.vistasp2_gdr.100218-0019[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Machine Name:[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Kernel base = 0x81c42000 PsLoadedModuleList = 0x81d59c70[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Debug session time: Mon Aug 2 16:04:43.066 2010 (GMT-4)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]System Uptime: 0 days 5:09:13.949[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Loading Kernel Symbols[/SIZE][/FONT]
[FONT=Arial][SIZE=4]...............................................................[/SIZE][/FONT]
[FONT=Arial][SIZE=4]................................................................[/SIZE][/FONT]
[FONT=Arial][SIZE=4].......................................[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Loading User Symbols[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Loading unloaded module list[/SIZE][/FONT]
[FONT=Arial][SIZE=4].........[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Unable to load image \SystemRoot\system32\DRIVERS\Rtlh86.sys, Win32 error 0n2[/SIZE][/FONT]
[FONT=Arial][SIZE=4]*** WARNING: Unable to verify timestamp for Rtlh86.sys[/SIZE][/FONT]
[FONT=Arial][SIZE=4]*** ERROR: Module load completed but symbols could not be loaded for Rtlh86.sys[/SIZE][/FONT]
[FONT=Arial][SIZE=4]*******************************************************************************[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* Bugcheck Analysis *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]*******************************************************************************[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Use !analyze -v to get detailed debugging information.[/SIZE][/FONT]
[FONT=Arial][SIZE=4]BugCheck 1000007F, {8, 805d3130, 0, 0}[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Probably caused by : Rtlh86.sys ( Rtlh86+8d35 )[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Followup: MachineOwner[/SIZE][/FONT]
[FONT=Arial][SIZE=4]---------[/SIZE][/FONT]
[FONT=Arial][SIZE=4]1: kd> !analyze -v[/SIZE][/FONT]
[FONT=Arial][SIZE=4]*******************************************************************************[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* Bugcheck Analysis *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]* *[/SIZE][/FONT]
[FONT=Arial][SIZE=4]*******************************************************************************[/SIZE][/FONT]
[FONT=Arial][SIZE=4]UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]This means a trap occurred in kernel mode, and it's a trap of a kind[/SIZE][/FONT]
[FONT=Arial][SIZE=4]that the kernel isn't allowed to have/catch (bound trap) or that[/SIZE][/FONT]
[FONT=Arial][SIZE=4]is always instant death (double fault). The first number in the[/SIZE][/FONT]
[FONT=Arial][SIZE=4]bugcheck params is the number of the trap (8 = double fault, etc)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Consult an Intel x86 family manual to learn more about what these[/SIZE][/FONT]
[FONT=Arial][SIZE=4]traps are. Here is a *portion* of those codes:[/SIZE][/FONT]
[FONT=Arial][SIZE=4]If kv shows a taskGate[/SIZE][/FONT]
[FONT=Arial][SIZE=4] use .tss on the part before the colon, then kv.[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Else if kv shows a trapframe[/SIZE][/FONT]
[FONT=Arial][SIZE=4] use .trap on that value[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Else[/SIZE][/FONT]
[FONT=Arial][SIZE=4] .trap on the appropriate frame will show where the trap was taken[/SIZE][/FONT]
[FONT=Arial][SIZE=4] (on x86, this will be the ebp that goes with the procedure KiTrap)[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Endif[/SIZE][/FONT]
[FONT=Arial][SIZE=4]kb will then show the corrected stack.[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Arguments:[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Arg1: 00000008, EXCEPTION_DOUBLE_FAULT[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Arg2: 805d3130[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Arg3: 00000000[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Arg4: 00000000[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Debugging Details:[/SIZE][/FONT]
[FONT=Arial][SIZE=4]------------------[/SIZE][/FONT]
[FONT=Arial][SIZE=4]BUGCHECK_STR: 0x7f_8[/SIZE][/FONT]
[FONT=Arial][SIZE=4]CUSTOMER_CRASH_COUNT: 1[/SIZE][/FONT]
[FONT=Arial][SIZE=4]DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT[/SIZE][/FONT]
[FONT=Arial][SIZE=4]PROCESS_NAME: System[/SIZE][/FONT]
[FONT=Arial][SIZE=4]CURRENT_IRQL: 2[/SIZE][/FONT]
[FONT=Arial][SIZE=4]LAST_CONTROL_TRANSFER: from 8c4403c2 to 8c43ed35[/SIZE][/FONT]
[FONT=Arial][SIZE=4]STACK_TEXT: [/SIZE][/FONT]
[FONT=Arial][SIZE=4]WARNING: Stack unwind information not available. Following frames may be wrong.[/SIZE][/FONT]
[FONT=Arial][SIZE=4]805ea024 8c4403c2 00000000 87235ef8 87235ee8 Rtlh86+0x8d35[/SIZE][/FONT]
[FONT=Arial][SIZE=4]805ea858 81c141f4 85cfb380 00000000 87235ee8 Rtlh86+0xa3c2[/SIZE][/FONT]
[FONT=Arial][SIZE=4]805ea884 87c09554 87235ee8 85cfb380 8438ddd0 hal!HalBuildScatterGatherList+0x1ba[/SIZE][/FONT]
[FONT=Arial][SIZE=4]805ea8c8 8c4405a9 00000077 844e80a4 871fe310 ndis!NdisMAllocateNetBufferSGList+0x94[/SIZE][/FONT]
[FONT=Arial][SIZE=4]805ea8e4 85f5b048 00000001 00000000 00000000 Rtlh86+0xa5a9[/SIZE][/FONT]
[FONT=Arial][SIZE=4]805ea8e8 00000000 00000000 00000000 871fdfa0 0x85f5b048[/SIZE][/FONT]
[FONT=Arial][SIZE=4]STACK_COMMAND: kb[/SIZE][/FONT]
[FONT=Arial][SIZE=4]FOLLOWUP_IP: [/SIZE][/FONT]
[FONT=Arial][SIZE=4]Rtlh86+8d35[/SIZE][/FONT]
[FONT=Arial][SIZE=4]8c43ed35 56 push esi[/SIZE][/FONT]
[FONT=Arial][SIZE=4]SYMBOL_STACK_INDEX: 0[/SIZE][/FONT]
[FONT=Arial][SIZE=4]SYMBOL_NAME: Rtlh86+8d35[/SIZE][/FONT]
[FONT=Arial][SIZE=4]FOLLOWUP_NAME: MachineOwner[/SIZE][/FONT]
[FONT=Arial][SIZE=4]MODULE_NAME: Rtlh86[/SIZE][/FONT]
[FONT=Arial][SIZE=4]IMAGE_NAME: Rtlh86.sys[/SIZE][/FONT]
[FONT=Arial][SIZE=4]DEBUG_FLR_IMAGE_TIMESTAMP: 45ab8f82[/SIZE][/FONT]
[FONT=Arial][SIZE=4]FAILURE_BUCKET_ID: 0x7f_8_Rtlh86+8d35[/SIZE][/FONT]
[FONT=Arial][SIZE=4]BUCKET_ID: 0x7f_8_Rtlh86+8d35[/SIZE][/FONT]
[FONT=Arial][SIZE=4]Followup: MachineOwner[/SIZE][/FONT]
[FONT=Arial][SIZE=4]---------[/SIZE][/FONT]