Yes, it's an OxD1 stop (DRIVER_IRQL_NOT_LESS_OR_EQUAL) and module MSDSM.SYS is identified as the probable cause. This seems to be the exact issue described in MS KB2511962, but application of that hotfix does not resolve. Also here is the full text from the WinDbg results:
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ghamner\Desktop\SANTEST minidumps\011413-17609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`01c54000 PsLoadedModuleList = 0xfffff800`01e98670
Debug session time: Mon Jan 14 11:10:49.023 2013 (UTC - 6:00)
System Uptime: 3 days 22:21:40.296
Loading Kernel Symbols
...............................................................
................................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff880012aad27}
Probably caused by : msdsm.sys ( msdsm!DsmpUpdateTargetPortGroupEntry+2b3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880012aad27, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001f02100
GetUlongFromAddress: unable to read from fffff80001f021c0
0000000000000000 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
msdsm!DsmpUpdateTargetPortGroupEntry+2b3
fffff880`012aad27 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT_SERVER
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800210ee50 -- (.trap 0xfffff8800210ee50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8002441cf8 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800243de91 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012aad27 rsp=fffff8800210efe0 rbp=fffffa8002441cf8
r8=fffffa800243de90 r9=0000000000000050 r10=fffff80001e46880
r11=fffffa80022f80a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
msdsm!DsmpUpdateTargetPortGroupEntry+0x2b3:
fffff880`012aad27 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LOCK_ADDRESS: fffff80001eceb80 -- (!locks fffff80001eceb80)
Resource @ nt!PiEngineLock (0xfffff80001eceb80) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0xfffff80001eceb80
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80001cd2569 to fffff80001cd2fc0
STACK_TEXT:
fffff880`0210ed08 fffff800`01cd2569 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0210ed10 fffff800`01cd11e0 : ffff9660`b352b000 fffff800`01dfefbd 00000000`00000000 fffffa80`02441cd0 : nt!KiBugCheckDispatch+0x69
fffff880`0210ee50 fffff880`012aad27 : fffffa80`02441cd0 fffffa80`01eafcb6 fffffa80`01eafca4 00000000`00000001 : nt!KiPageFault+0x260
fffff880`0210efe0 fffff880`012aa78e : fffffa80`018a2cc0 fffffa80`00000000 fffffa80`02441cd0 fffff880`00000001 : msdsm!DsmpUpdateTargetPortGroupEntry+0x2b3
fffff880`0210f050 fffff880`012a6384 : fffffa80`018a2cc0 fffff880`012c0110 fffffa80`00000014 fffffa80`00000028 : msdsm!DsmpParseTargetPortGroupsInformation+0x19a
fffff880`0210f0e0 fffff880`0101a49d : 00000000`00000000 fffffa80`0288f2c0 fffffa80`4f49504d 00000000`00000000 : msdsm!DsmInquire+0xbfc
fffff880`0210f2c0 fffff880`0100f41a : fffffa80`01aa0050 00000000`00000000 00000000`00000000 fffffa80`00000002 : mpio!MPIOAddSingleDevice+0x191
fffff880`0210f390 fffff880`0100e776 : 00000000`00000000 fffffa80`0287c480 fffff880`0197d500 00000000`00000000 : mpio!MPIODeviceRegistration+0x82
fffff880`0210f400 fffff880`0100e7dd : fffffa80`01aa0050 00000000`00000020 fffffa80`01bc8b70 fffff880`0210f490 : mpio!MPIOFdoDispatch+0xd6
fffff880`0210f430 fffff880`019746be : fffff880`01127d80 0000057f`fe14fa88 fffffa80`02846040 00000000`00000000 : mpio!MPIOGlobalDispatch+0x19
fffff880`0210f460 fffff880`0198fd91 : fffffa80`02b25ea0 fffffa80`02b25ea0 fffffa80`0287c480 00000000`000007ff : CLASSPNP!ClassSendIrpSynchronous+0x4e
fffff880`0210f4c0 fffff880`0198336b : 00000000`00000000 fffffa80`02b25ea0 fffffa80`028e3010 00000000`00000000 : CLASSPNP!ClassSendDeviceIoControlSynchronous+0xe1
fffff880`0210f520 fffff880`01987d17 : fffffa80`028e3010 00000000`00000000 fffffa80`0287c5d0 fffff880`0210f6d2 : CLASSPNP!ClasspMpdevStartDevice+0x14b
fffff880`0210f5c0 fffff800`01ff18e9 : fffffa80`028e31b8 00000000`00000000 fffffa80`0287c480 fffffa80`028e3010 : CLASSPNP!ClassMpdevPnPDispatch+0x217
fffff880`0210f610 fffff880`0103da94 : fffffa80`028e3010 fffffa80`02915ce0 fffffa80`01943040 fffffa80`01ca7378 : nt!IoForwardIrpSynchronously+0x75
fffff880`0210f670 fffff880`0104732a : 00000000`00000000 fffffa80`028e3010 fffffa80`028e3010 fffffa80`02915b90 : partmgr!PmStartDevice+0x74
fffff880`0210f740 fffff800`02088fde : fffffa80`028e3010 fffffa80`0274af90 fffffa80`02915b90 fffff880`009c6180 : partmgr!PmPnp+0x11a
fffff880`0210f790 fffff800`01dc0e7d : fffffa80`0288f2c0 fffffa80`0274af90 fffff800`01dca5a0 00000000`00000000 : nt!PnpAsynchronousCall+0xce
fffff880`0210f7d0 fffff800`02098326 : fffff800`01ece940 fffffa80`02860370 fffffa80`0274af90 fffffa80`02860518 : nt!PnpStartDevice+0x11d
fffff880`0210f890 fffff800`020985c4 : fffffa80`02860370 fffffa80`01920037 fffffa80`01929b60 00000000`00000001 : nt!PnpStartDeviceNode+0x156
fffff880`0210f920 fffff800`020bbcf6 : fffffa80`02860370 fffffa80`01929b60 00000000`00000002 00000000`00000000 : nt!PipProcessStartPhase1+0x74
fffff880`0210f950 fffff800`020bc288 : fffff800`01ecc500 00000000`00000000 00000000`00000001 fffff800`01f385e8 : nt!PipProcessDevNodeTree+0x296
fffff880`0210fbc0 fffff800`01dccee7 : 00000001`00000003 00000000`00000000 00000000`00000001 00000000`00000000 : nt!PiProcessReenumeration+0x98
fffff880`0210fc10 fffff800`01cdc641 : fffff800`01dccbc0 fffff800`01fc5501 fffffa80`018e4b00 fffff800`01e702d8 : nt!PnpDeviceActionWorker+0x327
fffff880`0210fcb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpWorkerThread+0x111
STACK_COMMAND: kb
FOLLOWUP_IP:
msdsm!DsmpUpdateTargetPortGroupEntry+2b3
fffff880`012aad27 488b01 mov rax,qword ptr [rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: msdsm!DsmpUpdateTargetPortGroupEntry+2b3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: msdsm
IMAGE_NAME: msdsm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a476
FAILURE_BUCKET_ID: X64_0xD1_msdsm!DsmpUpdateTargetPortGroupEntry+2b3
BUCKET_ID: X64_0xD1_msdsm!DsmpUpdateTargetPortGroupEntry+2b3
Followup: MachineOwner
---------