Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021211-31231-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a49000 PsLoadedModuleList = 0xfffff800`02c86e50
Debug session time: Sat Feb 12 23:00:01.198 2011 (UTC - 5:00)
System Uptime: 0 days 9:31:32.180
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff8800188b7a0}
Unable to load image \Device\Harddisk0\Partition3\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021211-34819-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a59000 PsLoadedModuleList = 0xfffff800`02c96e50
Debug session time: Sat Feb 12 23:09:23.565 2011 (UTC - 5:00)
System Uptime: 0 days 0:08:49.563
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff880018897a0}
Unable to load image \Device\Harddisk0\Partition3\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021311-31090-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a1b000 PsLoadedModuleList = 0xfffff800`02c58e50
Debug session time: Sun Feb 13 00:17:12.024 2011 (UTC - 5:00)
System Uptime: 0 days 0:14:02.006
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff8800189246c}
Unable to load image \Device\Harddisk0\Partition3\Windows\system32\drivers\PctWfpFilter64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PctWfpFilter64.sys
*** ERROR: Module load completed but symbols could not be loaded for PctWfpFilter64.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800189246c, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc30e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+5354
fffff880`0189246c 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800717e5d0 -- (.trap 0xfffff8800717e5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8003e1c4d0 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8003e1c4d1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800189246c rsp=fffff8800717e760 rbp=0000000000000000
r8=fffffa8003e1c4d0 r9=00000000000000d0 r10=fffff880009e7e80
r11=fffffa8006322380 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip! ?? ::FNODOBFM::`string'+0x5354:
fffff880`0189246c 488b01 mov rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a8aca9 to fffff80002a8b740
STACK_TEXT:
fffff880`0717e488 fffff800`02a8aca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0717e490 fffff800`02a89920 : 00000000`00000011 fffffa80`0628a650 fffffa80`00000014 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0717e5d0 fffff880`0189246c : fffffa80`0628a650 fffff880`02c14aca fffff880`206c644d fffffa80`04355d30 : nt!KiPageFault+0x260
fffff880`0717e760 fffff880`016b86a6 : fffffa80`0628a650 00000000`00000000 00000000`00000001 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x5354
fffff880`0717e7b0 fffff880`016b635d : 00000000`00000000 fffffa80`04355d30 00000000`00000000 00000000`00000001 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`0717e7e0 fffff880`01841556 : 00000000`00000000 fffffa80`04568d01 00000000`00000020 fffffa80`0628a650 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`0717e860 fffff880`018bb79f : fffffa80`04355d30 fffff880`0196e9a0 fffff880`0196e9a0 00000000`00000000 : tcpip!IppCompleteAndFreePacketList+0xc6
fffff880`0717e890 fffff880`01930712 : fffffa80`08ae07e0 00000000`00000000 fffffa80`03ca0e01 00000000`000000fc : tcpip! ?? ::FNODOBFM::`string'+0x32b03
fffff880`0717ea90 fffff880`01748afa : fffffa80`03fbf602 fffffa80`03fbf660 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0717ead0 fffff880`02c0d71d : fffffa80`08a1b170 fffffa80`03ca0e80 00000000`c0000000 fffff880`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0717eb80 fffffa80`08a1b170 : fffffa80`03ca0e80 00000000`c0000000 fffff880`00000000 fffffa80`038d0002 : PctWfpFilter64+0xd71d
fffff880`0717eb88 fffffa80`03ca0e80 : 00000000`c0000000 fffff880`00000000 fffffa80`038d0002 fffffa80`00000001 : 0xfffffa80`08a1b170
fffff880`0717eb90 00000000`c0000000 : fffff880`00000000 fffffa80`038d0002 fffffa80`00000001 fffffa80`00000017 : 0xfffffa80`03ca0e80
fffff880`0717eb98 fffff880`00000000 : fffffa80`038d0002 fffffa80`00000001 fffffa80`00000017 fffffa80`00000000 : 0xc0000000
fffff880`0717eba0 fffffa80`038d0002 : fffffa80`00000001 fffffa80`00000017 fffffa80`00000000 fffffa80`00000000 : 0xfffff880`00000000
fffff880`0717eba8 fffffa80`00000001 : fffffa80`00000017 fffffa80`00000000 fffffa80`00000000 fffff880`02c0d250 : 0xfffffa80`038d0002
fffff880`0717ebb0 fffffa80`00000017 : fffffa80`00000000 fffffa80`00000000 fffff880`02c0d250 fffffa80`03ca0e80 : 0xfffffa80`00000001
fffff880`0717ebb8 fffffa80`00000000 : fffffa80`00000000 fffff880`02c0d250 fffffa80`03ca0e80 00000000`53636670 : 0xfffffa80`00000017
fffff880`0717ebc0 fffffa80`00000000 : fffff880`02c0d250 fffffa80`03ca0e80 00000000`53636670 fffffa80`04355d30 : 0xfffffa80`00000000
fffff880`0717ebc8 fffff880`02c0d250 : fffffa80`03ca0e80 00000000`53636670 fffffa80`04355d30 fffff880`02c1c338 : 0xfffffa80`00000000
fffff880`0717ebd0 fffffa80`03ca0e80 : 00000000`53636670 fffffa80`04355d30 fffff880`02c1c338 00000000`00000000 : PctWfpFilter64+0xd250
fffff880`0717ebd8 00000000`53636670 : fffffa80`04355d30 fffff880`02c1c338 00000000`00000000 00000000`00000000 : 0xfffffa80`03ca0e80
fffff880`0717ebe0 fffffa80`04355d30 : fffff880`02c1c338 00000000`00000000 00000000`00000000 00000000`53636670 : 0x53636670
fffff880`0717ebe8 fffff880`02c1c338 : 00000000`00000000 00000000`00000000 00000000`53636670 fffffa80`03b86270 : 0xfffffa80`04355d30
fffff880`0717ebf0 00000000`00000000 : 00000000`00000000 00000000`53636670 fffffa80`03b86270 fffff880`02c1f128 : PctWfpFilter64+0x1c338
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferList+86
fffff880`016b86a6 4885ff test rdi,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
Followup: MachineOwner
---------