Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042811-17394-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03264000 PsLoadedModuleList = 0xfffff800`034a1e50
Debug session time: Thu Apr 28 11:29:42.866 2011 (UTC - 4:00)
System Uptime: 0 days 0:08:39.193
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff880018897a0}
Unable to load image \??\C:\Windows\system32\drivers\PktIcpt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PktIcpt.sys
*** ERROR: Module load completed but symbols could not be loaded for PktIcpt.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880018897a0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350c0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+56f4
fffff880`018897a0 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880031cb520 -- (.trap 0xfffff880031cb520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800a38d3d0 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800a38d3d1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018897a0 rsp=fffff880031cb6b0 rbp=0000000000000000
r8=fffffa800a38d3d0 r9=00000000000000d0 r10=fffff880009f3e80
r11=fffffa80093c2880 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip! ?? ::FNODOBFM::`string'+0x56f4:
fffff880`018897a0 488b01 mov rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032d3ca9 to fffff800032d4740
STACK_TEXT:
fffff880`031cb3d8 fffff800`032d3ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031cb3e0 fffff800`032d2920 : fffffa80`06ed4f48 fffffa80`093c2690 00000000`00000000 fffffa80`07a60670 : nt!KiBugCheckDispatch+0x69
fffff880`031cb520 fffff880`018897a0 : fffffa80`093c2690 fffff880`06f18b37 00000000`206c644d fffffa80`0a0000d0 : nt!KiPageFault+0x260
fffff880`031cb6b0 fffff880`017436a6 : fffffa80`093c2690 00000000`07bcf000 00000000`00000000 fffffa80`07bcf000 : tcpip! ?? ::FNODOBFM::`string'+0x56f4
fffff880`031cb700 fffff880`0174135d : 00000000`00000000 fffffa80`08a98030 00000000`00000000 fffff880`0196b9a0 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`031cb730 fffff880`0185de26 : fffffa80`07bcf000 fffffa80`08a98100 00000000`00000011 fffffa80`093c2690 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`031cb7b0 fffff880`0185cb21 : 00000000`faffffef fffffa80`07bcf000 fffff880`0196b9a0 00000000`0a38d301 : tcpip!IppReceiveHeaderBatch+0x3c7
fffff880`031cb890 fffff880`01934542 : fffffa80`095408f0 00000000`00000000 fffffa80`0a38d301 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`031cba90 fffff880`01609afa : fffffa80`0a343202 fffffa80`0a3432d0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`031cbad0 fffff880`06f1558d : fffffa80`0aa40a50 fffffa80`0a38d3d0 fffffa80`093c2700 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`031cbb80 fffffa80`0aa40a50 : fffffa80`0a38d3d0 fffffa80`093c2700 00000000`00000000 fffffa80`0a380002 : PktIcpt+0x258d
fffff880`031cbb88 fffffa80`0a38d3d0 : fffffa80`093c2700 00000000`00000000 fffffa80`0a380002 00000000`00000001 : 0xfffffa80`0aa40a50
fffff880`031cbb90 fffffa80`093c2700 : 00000000`00000000 fffffa80`0a380002 00000000`00000001 fffff880`0000000b : 0xfffffa80`0a38d3d0
fffff880`031cbb98 00000000`00000000 : fffffa80`0a380002 00000000`00000001 fffff880`0000000b fffff880`00000000 : 0xfffffa80`093c2700
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferList+86
fffff880`017436a6 4885ff test rdi,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042811-27861-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0325d000 PsLoadedModuleList = 0xfffff800`0349ae50
Debug session time: Wed Apr 27 19:17:42.649 2011 (UTC - 4:00)
System Uptime: 1 days 11:26:45.601
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff8800188b7a0}
Unable to load image \??\C:\Windows\system32\drivers\PktIcpt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PktIcpt.sys
*** ERROR: Module load completed but symbols could not be loaded for PktIcpt.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800188b7a0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800035050e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+56f4
fffff880`0188b7a0 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880031af520 -- (.trap 0xfffff880031af520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800d10e0a0 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800d10e0a1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800188b7a0 rsp=fffff880031af6b0 rbp=0000000000000000
r8=fffffa800d10e0a0 r9=00000000000000d0 r10=fffff80003448b80
r11=fffffa80092f9c60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tcpip! ?? ::FNODOBFM::`string'+0x56f4:
fffff880`0188b7a0 488b01 mov rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032ccca9 to fffff800032cd740
STACK_TEXT:
fffff880`031af3d8 fffff800`032ccca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031af3e0 fffff800`032cb920 : fffffa80`0bc2f388 fffffa80`092f9a70 00000000`00000000 fffffa80`07b31f50 : nt!KiBugCheckDispatch+0x69
fffff880`031af520 fffff880`0188b7a0 : fffffa80`092f9a70 fffff880`0a383b37 00000000`206c644d fffffa80`06f33970 : nt!KiPageFault+0x260
fffff880`031af6b0 fffff880`0163e6a6 : fffffa80`092f9a70 00000000`07bcc000 00000000`00000000 fffffa80`07bcc000 : tcpip! ?? ::FNODOBFM::`string'+0x56f4
fffff880`031af700 fffff880`0163c35d : 00000000`00000000 fffffa80`102cc1a0 00000000`00000000 fffff880`0196d9a0 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`031af730 fffff880`0185fe26 : fffffa80`07bcc000 fffffa80`102cc200 00000000`00000011 fffffa80`092f9a70 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`031af7b0 fffff880`0185eb21 : 00000000`faffffef fffffa80`07bcc000 fffff880`0196d9a0 00000000`0d10e001 : tcpip!IppReceiveHeaderBatch+0x3c7
fffff880`031af890 fffff880`01936542 : fffffa80`07100630 00000000`00000000 fffffa80`0d10e001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`031afa90 fffff880`016ceafa : fffffa80`10f2f002 fffffa80`10f2f0b0 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`031afad0 fffff880`0a38058d : fffffa80`0acab490 fffffa80`0d10e0a0 fffffa80`092f9b00 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`031afb80 fffffa80`0acab490 : fffffa80`0d10e0a0 fffffa80`092f9b00 00000000`00000000 fffffa80`0d100002 : PktIcpt+0x258d
fffff880`031afb88 fffffa80`0d10e0a0 : fffffa80`092f9b00 00000000`00000000 fffffa80`0d100002 00000000`00000001 : 0xfffffa80`0acab490
fffff880`031afb90 fffffa80`092f9b00 : 00000000`00000000 fffffa80`0d100002 00000000`00000001 fffff880`0000000b : 0xfffffa80`0d10e0a0
fffff880`031afb98 00000000`00000000 : fffffa80`0d100002 00000000`00000001 fffff880`0000000b fffff880`00000000 : 0xfffffa80`092f9b00
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferList+86
fffff880`0163e6a6 4885ff test rdi,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050811-36176-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03262000 PsLoadedModuleList = 0xfffff800`0349fe50
Debug session time: Sat May 7 18:38:42.242 2011 (UTC - 4:00)
System Uptime: 2 days 21:38:44.553
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff8800188b7a0}
Unable to load image \??\C:\Windows\system32\drivers\PktIcpt.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for PktIcpt.sys
*** ERROR: Module load completed but symbols could not be loaded for PktIcpt.sys
Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferList+86 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800188b7a0, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350a0e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+56f4
fffff880`0188b7a0 488b01 mov rax,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff880031bd520 -- (.trap 0xfffff880031bd520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800f00a200 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800f00a201 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800188b7a0 rsp=fffff880031bd6b0 rbp=0000000000000000
r8=fffffa800f00a200 r9=00000000000000d0 r10=fffff8000344db80
r11=fffffa80085751c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip! ?? ::FNODOBFM::`string'+0x56f4:
fffff880`0188b7a0 488b01 mov rax,qword ptr [rcx] ds:07ff:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032d1ca9 to fffff800032d2740
STACK_TEXT:
fffff880`031bd3d8 fffff800`032d1ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`031bd3e0 fffff800`032d0920 : fffffa80`06a383a8 fffffa80`08574030 00000000`00000000 fffffa80`07b25fd0 : nt!KiBugCheckDispatch+0x69
fffff880`031bd520 fffff880`0188b7a0 : fffffa80`08574030 fffff880`074eeb37 00000000`206c644d fffffa80`0de80b90 : nt!KiPageFault+0x260
fffff880`031bd6b0 fffff880`016046a6 : fffffa80`08574030 00000000`07bac000 00000000`00000000 fffffa80`07bac000 : tcpip! ?? ::FNODOBFM::`string'+0x56f4
fffff880`031bd700 fffff880`0160235d : 00000000`00000000 fffffa80`06d00030 00000000`00000000 fffff880`0196d9a0 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`031bd730 fffff880`0185fe26 : fffffa80`07bac000 fffffa80`06d00100 00000000`00000011 fffffa80`08574030 : NETIO!NetioDereferenceNetBufferListChain+0x2dd
fffff880`031bd7b0 fffff880`0185eb21 : 00000000`faffffef fffffa80`07bac000 fffff880`0196d9a0 00000000`0f00a201 : tcpip!IppReceiveHeaderBatch+0x3c7
fffff880`031bd890 fffff880`01936542 : fffffa80`084c3470 00000000`00000000 fffffa80`0f00a201 00000000`00000001 : tcpip!IpFlcReceivePackets+0x651
fffff880`031bda90 fffff880`01694afa : fffffa80`0c396602 fffffa80`0c396640 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`031bdad0 fffff880`074eb58d : fffffa80`09bf2130 fffffa80`0f00a200 fffffa80`08574100 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`031bdb80 fffffa80`09bf2130 : fffffa80`0f00a200 fffffa80`08574100 00000000`00000000 fffffa80`0f000002 : PktIcpt+0x258d
fffff880`031bdb88 fffffa80`0f00a200 : fffffa80`08574100 00000000`00000000 fffffa80`0f000002 00000000`00000001 : 0xfffffa80`09bf2130
fffff880`031bdb90 fffffa80`08574100 : 00000000`00000000 fffffa80`0f000002 00000000`00000001 fffff880`0000000b : 0xfffffa80`0f00a200
fffff880`031bdb98 00000000`00000000 : fffffa80`0f000002 00000000`00000001 fffff880`0000000b fffff880`00000000 : 0xfffffa80`08574100
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferList+86
fffff880`016046a6 4885ff test rdi,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+86
Followup: MachineOwner
---------