Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122910-23743-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c1a000 PsLoadedModuleList = 0xfffff800`02e57e50
Debug session time: Thu Dec 30 00:23:22.110 2010 (UTC - 5:00)
System Uptime: 0 days 0:05:02.453
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff880018897a0}
Unable to load image \Device\Harddisk0\Partition2\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880018897a0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec20e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+56f4
fffff880`018897a0 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880035e85d0 -- (.trap 0xfffff880035e85d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800419b750 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800419b751 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018897a0 rsp=fffff880035e8760 rbp=0000000000000000
r8=fffffa800419b750 r9=00000000000000d0 r10=fffff88003163e80
r11=fffffa800779cb50 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip! ?? ::FNODOBFM::`string'+0x56f4:
fffff880`018897a0 488b01 mov rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c89ca9 to fffff80002c8a740
STACK_TEXT:
fffff880`035e8488 fffff800`02c89ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`035e8490 fffff800`02c88920 : 00000000`00000011 fffffa80`07d94030 fffffa80`00000014 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`035e85d0 fffff880`018897a0 : fffffa80`07d94030 fffff880`042f4aca fffff880`206c644d fffffa80`05dbb2b0 : nt!KiPageFault+0x260
fffff880`035e8760 fffff880`017326a6 : fffffa80`07d94030 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x56f4
fffff880`035e87b0 fffff880`0173035d : 00000000`00000000 fffffa80`05dbb2b0 00000000`00000000 00000000`00000001 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`035e87e0 fffff880`0183bae6 : 00000000`00000000 fffffa80`04bbac01 00000000`00000020 fffffa80`07d94030 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`035e8860 fffff880`018bef7c : fffffa80`05dbb2b0 fffff880`0196b9a0 fffff880`0196b9a0 00000000`00000000 : tcpip!IppCompleteAndFreePacketList+0xc6
fffff880`035e8890 fffff880`01934542 : fffffa80`07f7de00 00000000`00000000 fffffa80`03ff0501 00000000`00000528 : tcpip! ?? ::FNODOBFM::`string'+0x42f8d
fffff880`035e8a90 fffff880`01519afa : fffffa80`040f4902 fffffa80`040f4920 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`035e8ad0 fffff880`042ed71d : fffffa80`0702a140 fffffa80`03ff05f0 00000000`c0000000 fffff880`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`035e8b80 fffffa80`0702a140 : fffffa80`03ff05f0 00000000`c0000000 fffff880`00000000 fffffa80`06cf0002 : PctWfpFilter64+0xd71d
fffff880`035e8b88 fffffa80`03ff05f0 : 00000000`c0000000 fffff880`00000000 fffffa80`06cf0002 fffffa80`00000001 : 0xfffffa80`0702a140
fffff880`035e8b90 00000000`c0000000 : fffff880`00000000 fffffa80`06cf0002 fffffa80`00000001 fffffa80`00000013 : 0xfffffa80`03ff05f0
fffff880`035e8b98 fffff880`00000000 : fffffa80`06cf0002 fffffa80`00000001 fffffa80`00000013 fffffa80`00000000 : 0xc0000000
fffff880`035e8ba0 fffffa80`06cf0002 : fffffa80`00000001 fffffa80`00000013 fffffa80`00000000 fffffa80`00000000 : 0xfffff880`00000000
fffff880`035e8ba8 fffffa80`00000001 : fffffa80`00000013 fffffa80`00000000 fffffa80`00000000 fffff880`042ed250 : 0xfffffa80`06cf0002
fffff880`035e8bb0 fffffa80`00000013 : fffffa80`00000000 fffffa80`00000000 fffff880`042ed250 fffffa80`03ff05f0 : 0xfffffa80`00000001
fffff880`035e8bb8 fffffa80`00000000 : fffffa80`00000000 fffff880`042ed250 fffffa80`03ff05f0 00000000`53636670 : 0xfffffa80`00000013
fffff880`035e8bc0 fffffa80`00000000 : fffff880`042ed250 fffffa80`03ff05f0 00000000`53636670 fffffa80`05dbb2b0 : 0xfffffa80`00000000
fffff880`035e8bc8 fffff880`042ed250 : fffffa80`03ff05f0 00000000`53636670 fffffa80`05dbb2b0 fffff880`042fc338 : 0xfffffa80`00000000
fffff880`035e8bd0 fffffa80`03ff05f0 : 00000000`53636670 fffffa80`05dbb2b0 fffff880`042fc338 00000000`00000000 : PctWfpFilter64+0xd250
fffff880`035e8bd8 00000000`53636670 : fffffa80`05dbb2b0 fffff880`042fc338 00000000`00000000 00000000`00000000 : 0xfffffa80`03ff05f0
fffff880`035e8be0 fffffa80`05dbb2b0 : fffff880`042fc338 00000000`00000000 00000000`00000000 00000000`53636670 : 0x53636670
fffff880`035e8be8 fffff880`042fc338 : 00000000`00000000 00000000`00000000 00000000`53636670 fffffa80`06c97db0 : 0xfffffa80`05dbb2b0
fffff880`035e8bf0 00000000`00000000 : 00000000`00000000 00000000`53636670 fffffa80`06c97db0 fffff880`042ff128 : PctWfpFilter64+0x1c338
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferList+86
fffff880`017326a6 4885ff test rdi,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
Followup: MachineOwner
---------