Code:
-
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G:\Kingston\BSODDmpFiles\darren13\Windows_NT6_BSOD_jcgriff2\020112-18486-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03e57000 PsLoadedModuleList = 0xfffff800`0409c670
Debug session time: Wed Feb 1 04:29:30.072 2012 (GMT-7)
System Uptime: 0 days 21:51:16.913
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........................................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1000028, 2, 0, fffff88001700cb9}
Unable to load image pctgntdi64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for pctgntdi64.sys
*** ERROR: Module load completed but symbols could not be loaded for pctgntdi64.sys
Probably caused by : NETIO.SYS ( NETIO!RtlCopyMdlToMdlIndirect+2a9 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000001000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001700cb9, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80004106100
0000000001000028
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyMdlToMdlIndirect+2a9
fffff880`01700cb9 448b6928 mov r13d,dword ptr [rcx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: SoftwareUpdate
TRAP_FRAME: fffff8801194c9f0 -- (.trap 0xfffff8801194c9f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa803806bf98 rbx=0000000000000000 rcx=0000000001000000
rdx=fffff8801194cd68 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001700cb9 rsp=fffff8801194cb80 rbp=0000000000000d90
r8=0000000000000000 r9=0000000000000000 r10=06a081490157aabe
r11=fffffa803806b000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
NETIO!RtlCopyMdlToMdlIndirect+0x2a9:
fffff880`01700cb9 448b6928 mov r13d,dword ptr [rcx+28h] ds:1160:00000000`01000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003ed31e9 to fffff80003ed3c40
STACK_TEXT:
fffff880`1194c8a8 fffff800`03ed31e9 : 00000000`0000000a 00000000`01000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`1194c8b0 fffff800`03ed1e60 : 00000000`00000000 00000000`00000000 fffffa80`0744dbc0 00000000`00000d90 : nt!KiBugCheckDispatch+0x69
fffff880`1194c9f0 fffff880`01700cb9 : fffffa80`00000aaf fffff880`0319baba 00000000`00000000 00000000`000010f8 : nt!KiPageFault+0x260
fffff880`1194cb80 fffff880`018d13d4 : fffff880`1194cd78 fffff880`1194cd48 fffff880`1194cd68 fffff880`1194cd30 : NETIO!RtlCopyMdlToMdlIndirect+0x2a9
fffff880`1194cc20 fffff880`018e8a45 : 00000000`000010f8 00000000`00780cdd fffffa80`169fecf0 00001f80`00000002 : tcpip!TcpSatisfyReceiveRequests+0x1f4
fffff880`1194cf00 fffff880`018d1b75 : 00000000`00000001 fffff800`040021de fffff800`03ede845 fffff880`1194cfe8 : tcpip!TcpDeliverDataToClient+0x105
fffff880`1194d080 fffff880`018d191c : fffff880`1194d280 fffffa80`169fecf0 fffffa80`090d6230 fffffa80`322dc5d0 : tcpip!TcpDeliverInput+0x1e5
fffff880`1194d180 fffff880`01215d15 : fffffa80`322dc5d0 00000000`00000000 fffffa80`322dc5d0 fffffa80`103e18d0 : tcpip!TcpRequestReceive+0x18c
fffff880`1194d240 fffff880`0120cb8a : fffffa80`103e18d0 fffff880`03364100 fffffa80`322dc5d0 fffffa80`0791c700 : tdx!TdxReceiveConnection+0x1f5
fffff880`1194d2e0 fffff880`010935d3 : fffffa80`37c15ec0 fffffa80`0791c700 00000000`00000000 fffffa80`37c15ec0 : tdx! ?? ::FNODOBFM::`string'+0x47cf
fffff880`1194d360 fffffa80`37c15ec0 : fffffa80`0791c700 00000000`00000000 fffffa80`37c15ec0 fffffa80`3806bec0 : pctgntdi64+0x85d3
fffff880`1194d368 fffffa80`0791c700 : 00000000`00000000 fffffa80`37c15ec0 fffffa80`3806bec0 fffff880`011eb69c : 0xfffffa80`37c15ec0
fffff880`1194d370 00000000`00000000 : fffffa80`37c15ec0 fffffa80`3806bec0 fffff880`011eb69c fffffa80`0791c700 : 0xfffffa80`0791c700
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyMdlToMdlIndirect+2a9
fffff880`01700cb9 448b6928 mov r13d,dword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!RtlCopyMdlToMdlIndirect+2a9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyMdlToMdlIndirect+2a9
BUCKET_ID: X64_0xD1_NETIO!RtlCopyMdlToMdlIndirect+2a9
Followup: MachineOwner
---------
-
Loading Dump File [G:\Kingston\BSODDmpFiles\darren13\Windows_NT6_BSOD_jcgriff2\013112-24960-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03e65000 PsLoadedModuleList = 0xfffff800`040aa670
Debug session time: Tue Jan 31 06:34:09.114 2012 (GMT-7)
System Uptime: 0 days 7:03:45.331
Loading Kernel Symbols
...............................................................
................................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1000028, 2, 0, fffff88001409cb9}
Unable to load image pctgntdi64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for pctgntdi64.sys
*** ERROR: Module load completed but symbols could not be loaded for pctgntdi64.sys
Unable to load image aswTdi.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswTdi.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswTdi.SYS
Probably caused by : NETIO.SYS ( NETIO!RtlCopyMdlToMdlIndirect+2a9 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000001000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001409cb9, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80004114100
0000000001000028
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyMdlToMdlIndirect+2a9
fffff880`01409cb9 448b6928 mov r13d,dword ptr [rcx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: AvastSvc.exe
TRAP_FRAME: fffff88006524b90 -- (.trap 0xfffff88006524b90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8013662f98 rbx=0000000000000000 rcx=0000000001000000
rdx=fffff88006524ee8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001409cb9 rsp=fffff88006524d20 rbp=0000000000000228
r8=0000000000000000 r9=0000000000000000 r10=9e5fdcc1fe7ae9d4
r11=fffffa8013662b68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
NETIO!RtlCopyMdlToMdlIndirect+0x2a9:
fffff880`01409cb9 448b6928 mov r13d,dword ptr [rcx+28h] ds:d110:00000000`01000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003ee11e9 to fffff80003ee1c40
STACK_TEXT:
fffff880`06524a48 fffff800`03ee11e9 : 00000000`0000000a 00000000`01000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06524a50 fffff800`03edfe60 : fffff880`00000001 00000000`00000000 fffffa80`0bbeb160 00000000`00000228 : nt!KiBugCheckDispatch+0x69
fffff880`06524b90 fffff880`01409cb9 : fffffa80`13662d90 fffff880`044e9aba 00000000`000005b4 00000000`00000010 : nt!KiPageFault+0x260
fffff880`06524d20 fffff880`016b43d4 : fffff880`06524ef8 fffff880`06524ec8 fffff880`06524ee8 fffff880`06524eb0 : NETIO!RtlCopyMdlToMdlIndirect+0x2a9
fffff880`06524dc0 fffff880`016cba45 : 00000000`00000000 fffffa80`08e6d1d0 00000000`00000000 00000000`00000000 : tcpip!TcpSatisfyReceiveRequests+0x1f4
fffff880`065250a0 fffff880`016ca839 : fffffa80`07420240 fffff880`0142cf6b 00000000`0000022f 00000000`00000000 : tcpip!TcpDeliverDataToClient+0x105
fffff880`06525220 fffff880`017a4eef : fffffa80`08e6d1d0 fffff880`06525610 00000000`0000022f fffff880`06525610 : tcpip!TcpDeliverReceive+0xa9
fffff880`06525320 fffff880`0172b82e : 00000000`998e7c9f fffffa80`08e6d1d0 fffffa80`11790e20 fffffa80`11790e20 : tcpip!TcpInspectReceive+0xaf
fffff880`06525370 fffff880`016c88b5 : 00000000`00000d97 fffff880`00010000 fffff880`065269e0 fffff800`03ee0ed3 : tcpip! ?? ::FNODOBFM::`string'+0x442c1
fffff880`06525530 fffff880`016c767a : fffffa80`0745c870 fffffa80`111548d0 fffffa80`0742bd30 00000000`00000000 : tcpip!TcpTcbReceive+0x1f5
fffff880`065256e0 fffff880`016c92ab : fffffa80`0d0ae5b0 fffffa80`0965d1c0 00000000`00000000 fffff880`01508500 : tcpip!TcpMatchReceive+0x1fa
fffff880`06525830 fffff880`016a3ffa : fffffa80`0745c870 00000000`0000302f fffff880`000051e0 fffff880`065251e0 : tcpip!TcpPreValidatedReceive+0x36b
fffff880`06525900 fffff800`03eee618 : fffff880`017df9a0 00000000`00000006 fffff880`06525c00 00000000`000007ff : tcpip!IppLoopbackTransmit+0x11a
fffff880`065259b0 fffff880`016a490f : fffff880`016f0c70 fffffa80`074dec90 fffff880`06525b02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`06525a90 fffff880`016c174a : fffffa80`1154abe0 00000000`00000000 00000000`00000010 fffffa80`0d0ae460 : tcpip!IppLoopbackEnqueue+0x22f
fffff880`06525b40 fffff880`016c3895 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppDispatchSendPacketHelper+0x38a
fffff880`06525c00 fffff880`016c1fd3 : 00000000`00000006 fffff880`01508e00 00000000`00000014 fffff880`00000000 : tcpip!IppPacketizeDatagrams+0x2d5
fffff880`06525d20 fffff880`016c543e : 00000000`00000014 00000000`00004007 fffff880`017df9a0 fffffa80`12dba5a0 : tcpip!IppSendDatagramsCommon+0x753
fffff880`06525ff0 fffff880`016cdffd : 00000001`00000042 00000000`00000000 00000000`00000000 00000000`00000d97 : tcpip!IpNlpSendDatagrams+0x3e
fffff880`06526030 fffff880`016ce9a0 : fffffa80`12dba5a0 fffffa80`0dfce690 00000000`00000000 00000000`00000014 : tcpip!TcpTcbSend+0x6ad
fffff880`065262b0 fffff880`016cd6f8 : 00000000`00000000 0000003b`32adc59c fffff880`065264d0 fffff880`06526590 : tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0xa0
fffff880`065262e0 fffff880`016cd8bb : fffffa80`00000000 00000000`00000000 00000000`00004800 fffff8a0`076ed030 : tcpip!TcpEnqueueTcbSend+0x258
fffff880`06526390 fffff800`03eee618 : fffff6fc`c0308820 fffff880`009ec8e4 fffff880`03e49160 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
fffff880`065263c0 fffff880`016ce77a : fffff880`016cd8a0 fffffa80`133beed8 fffffa80`14723300 fffff880`03e16c01 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`065264a0 fffff880`03fb6e72 : fffffa80`1139f010 00000000`00000000 fffff880`03fb4020 00000000`00000040 : tcpip!TcpTlConnectionSend+0x7a
fffff880`06526510 fffff880`03fb5bf9 : 00000000`00000020 fffffa80`1139f010 fffffa80`0790d4d0 00000000`00000001 : tdx!TdxSendConnection+0x252
fffff880`06526600 fffff880`03e085d3 : fffffa80`10ccfad0 fffffa80`133bee00 fffffa80`00000000 fffffa80`10ccfad0 : tdx!TdxTdiDispatchInternalDeviceControl+0x389
fffff880`06526680 fffffa80`10ccfad0 : fffffa80`133bee00 fffffa80`00000000 fffffa80`10ccfad0 fffffa80`133beed0 : pctgntdi64+0x85d3
fffff880`06526688 fffffa80`133bee00 : fffffa80`00000000 fffffa80`10ccfad0 fffffa80`133beed0 fffff880`03e81ff0 : 0xfffffa80`10ccfad0
fffff880`06526690 fffffa80`00000000 : fffffa80`10ccfad0 fffffa80`133beed0 fffff880`03e81ff0 fffffa80`133bee00 : 0xfffffa80`133bee00
fffff880`06526698 fffffa80`10ccfad0 : fffffa80`133beed0 fffff880`03e81ff0 fffffa80`133bee00 fffffa80`10ccfad0 : 0xfffffa80`00000000
fffff880`065266a0 fffffa80`133beed0 : fffff880`03e81ff0 fffffa80`133bee00 fffffa80`10ccfad0 fffffa80`0790d950 : 0xfffffa80`10ccfad0
fffff880`065266a8 fffff880`03e81ff0 : fffffa80`133bee00 fffffa80`10ccfad0 fffffa80`0790d950 fffffa80`133beed0 : 0xfffffa80`133beed0
fffff880`065266b0 fffffa80`133bee00 : fffffa80`10ccfad0 fffffa80`0790d950 fffffa80`133beed0 fffffa80`0bad6db0 : aswTdi+0x4ff0
fffff880`065266b8 fffffa80`10ccfad0 : fffffa80`0790d950 fffffa80`133beed0 fffffa80`0bad6db0 fffffa80`0790d950 : 0xfffffa80`133bee00
fffff880`065266c0 fffffa80`0790d950 : fffffa80`133beed0 fffffa80`0bad6db0 fffffa80`0790d950 fffffa80`133bee00 : 0xfffffa80`10ccfad0
fffff880`065266c8 fffffa80`133beed0 : fffffa80`0bad6db0 fffffa80`0790d950 fffffa80`133bee00 fffff880`03e7e57c : 0xfffffa80`0790d950
fffff880`065266d0 fffffa80`0bad6db0 : fffffa80`0790d950 fffffa80`133bee00 fffff880`03e7e57c fffffa80`133bee00 : 0xfffffa80`133beed0
fffff880`065266d8 fffffa80`0790d950 : fffffa80`133bee00 fffff880`03e7e57c fffffa80`133bee00 fffffa80`0790d4d0 : 0xfffffa80`0bad6db0
fffff880`065266e0 fffffa80`133bee00 : fffff880`03e7e57c fffffa80`133bee00 fffffa80`0790d4d0 00000000`c2646641 : 0xfffffa80`0790d950
fffff880`065266e8 fffff880`03e7e57c : fffffa80`133bee00 fffffa80`0790d4d0 00000000`c2646641 fffff800`00000000 : 0xfffffa80`133bee00
fffff880`065266f0 fffffa80`133bee00 : fffffa80`0790d4d0 00000000`c2646641 fffff800`00000000 fffffa80`12c4ba28 : aswTdi+0x157c
fffff880`065266f8 fffffa80`0790d4d0 : 00000000`c2646641 fffff800`00000000 fffffa80`12c4ba28 00000000`00000d30 : 0xfffffa80`133bee00
fffff880`06526700 00000000`c2646641 : fffff800`00000000 fffffa80`12c4ba28 00000000`00000d30 00000000`00000000 : 0xfffffa80`0790d4d0
fffff880`06526708 fffff800`00000000 : fffffa80`12c4ba28 00000000`00000d30 00000000`00000000 fffff880`0450b0ee : 0xc2646641
fffff880`06526710 fffffa80`12c4ba28 : 00000000`00000d30 00000000`00000000 fffff880`0450b0ee fffffa80`133bee00 : 0xfffff800`00000000
fffff880`06526718 00000000`00000d30 : 00000000`00000000 fffff880`0450b0ee fffffa80`133bee00 fffffa80`0aa08680 : 0xfffffa80`12c4ba28
fffff880`06526720 00000000`00000000 : fffff880`0450b0ee fffffa80`133bee00 fffffa80`0aa08680 fffffa80`078a0930 : 0xd30
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyMdlToMdlIndirect+2a9
fffff880`01409cb9 448b6928 mov r13d,dword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!RtlCopyMdlToMdlIndirect+2a9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyMdlToMdlIndirect+2a9
BUCKET_ID: X64_0xD1_NETIO!RtlCopyMdlToMdlIndirect+2a9
Followup: MachineOwner
---------
- Caused by PC Tools Internet Security. Use the uninstall procedure in Smart Update and IntelliGuard Issue and install Microsoft Security Essentials - Free Antivirus for Windows in its place to run with Windows firewall.
- Are you using two internet security systems? Avast and PC Tools Internet Security show up in this crash.