Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021611-29468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a0b000 PsLoadedModuleList = 0xfffff800`02c48e50
Debug session time: Wed Feb 16 07:01:04.540 2011 (UTC - 4:00)
System Uptime: 0 days 14:09:59.461
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff8800188b7a0}
Unable to load image \Device\Harddisk1\Partition2\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800188b7a0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb30e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+56f4
fffff880`0188b7a0 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880054bf520 -- (.trap 0xfffff880054bf520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8001d3bc20 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800188b7a0 rsp=fffff880054bf6b0 rbp=0000000000000000
r8=fffffa8001d3bc20 r9=00000000000000d0 r10=fffff80002bf6b80
r11=fffffa8003dded30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip! ?? ::FNODOBFM::`string'+0x56f4:
fffff880`0188b7a0 488b01 mov rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a7aca9 to fffff80002a7b740
STACK_TEXT:
fffff880`054bf3d8 fffff800`02a7aca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`054bf3e0 fffff800`02a79920 : fffffa80`04c2e080 fffffa80`03ddeb40 fffffa80`02725b50 fffffa80`0273d910 : nt!KiBugCheckDispatch+0x69
fffff880`054bf520 fffff880`0188b7a0 : fffffa80`03ddeb40 fffff880`02d08aca fffff880`206c644d fffffa80`03fcaa70 : nt!KiPageFault+0x260
fffff880`054bf6b0 fffff880`017526a6 : fffffa80`03ddeb40 00000000`0274f000 00000000`00000000 fffffa80`0274f000 : tcpip! ?? ::FNODOBFM::`string'+0x56f4
fffff880`054bf700 fffff880`0175035d : 00000000`00000000 fffffa80`03fcaa70 00000000`00000000 fffff880`0196d9a0 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`054bf730 fffff880`0185fe26 : fffffa80`0274f000 fffffa80`03fcab00 00000000`00000011 fffffa80`03ddeb40 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`054bf7b0 fffff880`0185eb21 : 00000000`00000000 fffffa80`0274f000 fffff880`0196d9a0 00000000`05538f01 : tcpip!IppReceiveHeaderBatch+0x3c7
fffff880`054bf890 fffff880`01936542 : fffffa80`0288c180 00000000`00000000 fffffa80`05538f01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`054bfa90 fffff880`01609afa : fffffa80`01947602 fffffa80`019476f0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`054bfad0 fffff880`02d0171d : fffffa80`04a26640 fffffa80`05538f40 00000000`c0000000 fffff880`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`054bfb80 fffffa80`04a26640 : fffffa80`05538f40 00000000`c0000000 fffff880`00000000 fffffa80`040a0002 : PctWfpFilter64+0xd71d
fffff880`054bfb88 fffffa80`05538f40 : 00000000`c0000000 fffff880`00000000 fffffa80`040a0002 fffffa80`00000001 : 0xfffffa80`04a26640
fffff880`054bfb90 00000000`c0000000 : fffff880`00000000 fffffa80`040a0002 fffffa80`00000001 fffffa80`0000000b : 0xfffffa80`05538f40
fffff880`054bfb98 fffff880`00000000 : fffffa80`040a0002 fffffa80`00000001 fffffa80`0000000b fffffa80`00000000 : 0xc0000000
fffff880`054bfba0 fffffa80`040a0002 : fffffa80`00000001 fffffa80`0000000b fffffa80`00000000 fffffa80`00000000 : 0xfffff880`00000000
fffff880`054bfba8 fffffa80`00000001 : fffffa80`0000000b fffffa80`00000000 fffffa80`00000000 fffff880`02d01250 : 0xfffffa80`040a0002
fffff880`054bfbb0 fffffa80`0000000b : fffffa80`00000000 fffffa80`00000000 fffff880`02d01250 fffffa80`05538f40 : 0xfffffa80`00000001
fffff880`054bfbb8 fffffa80`00000000 : fffffa80`00000000 fffff880`02d01250 fffffa80`05538f40 00000000`53636670 : 0xfffffa80`0000000b
fffff880`054bfbc0 fffffa80`00000000 : fffff880`02d01250 fffffa80`05538f40 00000000`53636670 fffffa80`03fcaa70 : 0xfffffa80`00000000
fffff880`054bfbc8 fffff880`02d01250 : fffffa80`05538f40 00000000`53636670 fffffa80`03fcaa70 fffff880`02d10338 : 0xfffffa80`00000000
fffff880`054bfbd0 fffffa80`05538f40 : 00000000`53636670 fffffa80`03fcaa70 fffff880`02d10338 00000000`00000000 : PctWfpFilter64+0xd250
fffff880`054bfbd8 00000000`53636670 : fffffa80`03fcaa70 fffff880`02d10338 00000000`00000000 00000000`00000000 : 0xfffffa80`05538f40
fffff880`054bfbe0 fffffa80`03fcaa70 : fffff880`02d10338 00000000`00000000 00000000`00000000 00000000`53636670 : 0x53636670
fffff880`054bfbe8 fffff880`02d10338 : 00000000`00000000 00000000`00000000 00000000`53636670 fffffa80`05088010 : 0xfffffa80`03fcaa70
fffff880`054bfbf0 00000000`00000000 : 00000000`00000000 00000000`53636670 fffffa80`05088010 fffff880`02d13128 : PctWfpFilter64+0x1c338
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferList+86
fffff880`017526a6 4885ff test rdi,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021911-25468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a62000 PsLoadedModuleList = 0xfffff800`02c9fe50
Debug session time: Sat Feb 19 16:40:47.890 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:47.812
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff880018897a0}
Unable to load image \Device\Harddisk1\Partition2\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880018897a0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0a0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+56f4
fffff880`018897a0 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800591b520 -- (.trap 0xfffff8800591b520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800510de50 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800180d000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018897a0 rsp=fffff8800591b6b0 rbp=0000000000000000
r8=0000000000006888 r9=00000000000000d0 r10=fffff80002a62000
r11=000000000000029d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip! ?? ::FNODOBFM::`string'+0x56f4:
fffff880`018897a0 488b01 mov rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ad1ca9 to fffff80002ad2740
STACK_TEXT:
fffff880`0591b3d8 fffff800`02ad1ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0591b3e0 fffff800`02ad0920 : fffffa80`04cab140 fffffa80`03ec0370 fffffa80`02528c90 fffffa80`0253d8c0 : nt!KiBugCheckDispatch+0x69
fffff880`0591b520 fffff880`018897a0 : fffffa80`03ec0370 fffff880`03d95aca fffff880`206c644d fffffa80`054439a0 : nt!KiPageFault+0x260
fffff880`0591b6b0 fffff880`017406a6 : fffffa80`03ec0370 00000000`02550000 00000000`00000000 fffffa80`02550000 : tcpip! ?? ::FNODOBFM::`string'+0x56f4
fffff880`0591b700 fffff880`0173e35d : 00000000`00000000 fffffa80`054439a0 00000000`00000000 fffff880`0196b9a0 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`0591b730 fffff880`0185de26 : fffffa80`02550000 fffffa80`05443a00 00000000`00000011 fffffa80`03ec0370 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`0591b7b0 fffff880`0185cb21 : 00000000`00000000 fffffa80`02550000 fffff880`0196b9a0 00000000`0511ee01 : tcpip!IppReceiveHeaderBatch+0x3c7
fffff880`0591b890 fffff880`01934542 : fffffa80`0316b180 00000000`00000000 fffffa80`0511ee01 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`0591ba90 fffff880`01609afa : fffffa80`05477002 fffffa80`05477010 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0591bad0 fffff880`03d8e71d : fffffa80`0190ada0 fffffa80`0511eec0 00000000`c0000000 fffff880`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0591bb80 fffffa80`0190ada0 : fffffa80`0511eec0 00000000`c0000000 fffff880`00000000 fffffa80`03170002 : PctWfpFilter64+0xd71d
fffff880`0591bb88 fffffa80`0511eec0 : 00000000`c0000000 fffff880`00000000 fffffa80`03170002 fffffa80`00000001 : 0xfffffa80`0190ada0
fffff880`0591bb90 00000000`c0000000 : fffff880`00000000 fffffa80`03170002 fffffa80`00000001 fffffa80`0000000b : 0xfffffa80`0511eec0
fffff880`0591bb98 fffff880`00000000 : fffffa80`03170002 fffffa80`00000001 fffffa80`0000000b fffffa80`00000000 : 0xc0000000
fffff880`0591bba0 fffffa80`03170002 : fffffa80`00000001 fffffa80`0000000b fffffa80`00000000 fffffa80`00000000 : 0xfffff880`00000000
fffff880`0591bba8 fffffa80`00000001 : fffffa80`0000000b fffffa80`00000000 fffffa80`00000000 fffff880`03d8e250 : 0xfffffa80`03170002
fffff880`0591bbb0 fffffa80`0000000b : fffffa80`00000000 fffffa80`00000000 fffff880`03d8e250 fffffa80`0511eec0 : 0xfffffa80`00000001
fffff880`0591bbb8 fffffa80`00000000 : fffffa80`00000000 fffff880`03d8e250 fffffa80`0511eec0 00000000`00000002 : 0xfffffa80`0000000b
fffff880`0591bbc0 fffffa80`00000000 : fffff880`03d8e250 fffffa80`0511eec0 00000000`00000002 fffffa80`054439a0 : 0xfffffa80`00000000
fffff880`0591bbc8 fffff880`03d8e250 : fffffa80`0511eec0 00000000`00000002 fffffa80`054439a0 fffff880`03d9d338 : 0xfffffa80`00000000
fffff880`0591bbd0 fffffa80`0511eec0 : 00000000`00000002 fffffa80`054439a0 fffff880`03d9d338 00000000`00000000 : PctWfpFilter64+0xd250
fffff880`0591bbd8 00000000`00000002 : fffffa80`054439a0 fffff880`03d9d338 00000000`00000000 00000000`00000000 : 0xfffffa80`0511eec0
fffff880`0591bbe0 fffffa80`054439a0 : fffff880`03d9d338 00000000`00000000 00000000`00000000 00000000`53636670 : 0x2
fffff880`0591bbe8 fffff880`03d9d338 : 00000000`00000000 00000000`00000000 00000000`53636670 fffffa80`04eda570 : 0xfffffa80`054439a0
fffff880`0591bbf0 00000000`00000000 : 00000000`00000000 00000000`53636670 fffffa80`04eda570 fffff880`03da0128 : PctWfpFilter64+0x1c338
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferList+86
fffff880`017406a6 4885ff test rdi,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
Followup: MachineOwner
---------