Hi,
I had a blue screen in Windows 8.1 x64 using avast today and I wanted to report it to see if it is a known issue and whether a fix is available. Below is the windbg trace from the dump file.
Thanks
Paul
Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\051014-23781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred http://msdl.microsoft.com/download/symbols
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17041.amd64fre.winblue_gdr.140305-1710
Machine Name:
Kernel base = 0xfffff8039421b000 PsLoadedModuleList = 0xfffff803944e52d0
Debug session time: Sat May 10 08:44:18.095 2014 (UTC + 1:00)
System Uptime: 0 days 14:11:54.849
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
…
…
…
Loading User Symbols
Loading unloaded module list
…
-
* -
Bugcheck Analysis * -
*
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffe101fe1585e0, 2, 0, fffff803942fadc7}
Probably caused by : NETIO.SYS ( NETIO!KfdClassify+6fd )
Followup: MachineOwner
1: kd> !analyze -v
-
* -
Bugcheck Analysis * -
*
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe101fe1585e0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803942fadc7, address which referenced memory
Debugging Details:
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8039456f138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffe101fe1585e0
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlLookupEntryHashTable+77
fffff803`942fadc7 488b4110 mov rax,qword ptr [rcx+10h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: AvastSvc.exe
ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
TRAP_FRAME: ffffd0002868cef0 – (.trap 0xffffd0002868cef0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=5085a946b1e35d98 rbx=0000000000000000 rcx=ffffe101fe1585d0
rdx=ffffe00200037630 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803942fadc7 rsp=ffffd0002868d080 rbp=ffffd0002868d1b0
r8=ffffe00200f701e0 r9=ecc4b5485964d0a6 r10=ffffd0002868d280
r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlLookupEntryHashTable+0x77:
fffff803942fadc7 488b4110 mov rax,qword ptr [rcx+10h] ds:ffffe101fe1585e0=???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8039437aae9 to fffff8039436efa0
STACK_TEXT:
ffffd0002868cda8 fffff8039437aae9 : 000000000000000a ffffe101fe1585e0 0000000000000002 0000000000000000 : nt!KeBugCheckEx
ffffd0002868cdb0 fffff8039437933a : 0000000000000000 ecc4b5485964d0a6 ffffc6a881d38e00 ffffd0002868cef0 : nt!KiBugCheckDispatch+0x69
ffffd0002868cef0 fffff803942fadc7 : 0000000000000000 fffff801a0b481c4 00000000000002fb 0000001600000001 : nt!KiPageFault+0x23a
ffffd0002868d080 fffff801a06021d9 : 0000000000000000 ffffd0002868d1b0 ffffe001fdfd91b0 fffff801a0b11a2d : nt!RtlLookupEntryHashTable+0x77
ffffd0002868d0b0 fffff801a0b9b364 : ffffe001fced2078 fffff801a08c0887 0000000000000001 ffffe001fdfe2300 : NETIO!KfdClassify+0x6fd
ffffd0002868d530 fffff801a0b48b7c : ffffd0002868e090 fffff8010000000e 0000000000000000 0000000000000002 : tcpip!WfpTlShimInspectSendTcpDatagram+0x754
ffffd0002868d830 fffff801a0b455b8 : fffff8010000fab3 ffffe00100000000 ffffe0010000000b ffffe00100007010 : tcpip!IppInspectLocalDatagramsOut+0x82c
ffffd0002868db60 fffff801a0afce62 : ffffd0002868dff0 0000000000000007 fffff801a0cb6180 ffffe001fced2010 : tcpip!IppSendDatagramsCommon+0x3f8
ffffd0002868dd50 fffff801a0b1dbe0 : ffffe001fd0a5240 0000000000000000 0000000000000000 000000000000000b : tcpip!IpNlpFastSendDatagram+0xf2
ffffd0002868de30 fffff801a0b1f6f5 : ffffd0002868e212 0000000000000000 ffffe001ff934310 ffffd0002868e530 : tcpip!TcpTcbSend+0x780
ffffd0002868e180 fffff801a0b1ef8a : 0000000000000000 ffffe001fced2010 ffffd0002868e211 ffffd0002868e500 : tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0xa5
ffffd0002868e1b0 fffff801a0b1f2f8 : 0000000000000000 0000000000000000 ffffe001fce10a00 0000000000000000 : tcpip!TcpEnqueueTcbSend+0x2aa
ffffd0002868e2b0 fffff803942f5256 : ffffd0002868e2d0 0000000000000000 00000000000000f0 0000000008a4da60 : tcpip!TcpTlConnectionSendCalloutRoutine+0x28
ffffd0002868e330 fffff801a0b1f5a2 : fffff801a0b1f2d0 ffffd0002868e450 0000000000000000 fffff801a178b6cb : nt!KeExpandKernelStackAndCalloutInternal+0xe6
ffffd0002868e420 fffff801a17a6577 : ffffe001fce10a20 ffffd0002868ecc0 000000000000000b 0000000000000003 : tcpip!TcpTlConnectionSend+0x72
ffffd0002868e490 fffff801a178a451 : ffffe001ff103e10 ffffe001ffd8eb30 0000000000000005 0000000020206f49 : afd!AfdFastConnectionSend+0x387
ffffd0002868e650 fffff803946173f4 : ffffe00200f073c0 0000000000000000 ffffe001ff103e10 0000000000000001 : afd!AfdFastIoDeviceControl+0x441
ffffd0002868e9c0 fffff803946181c6 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!IopXxxControlFile+0x3d4
ffffd0002868eb60 fffff8039437a7b3 : ffffe001ffafd568 ffffe001fd03b880 fffff6fb7dbed000 fffff6fb7da00000 : nt!NtDeviceIoControlFile+0x56
ffffd0002868ebd0 0000000077742772 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x13
0000000008a4ea58 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x77742772
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!KfdClassify+6fd
fffff801`a06021d9 4c8bc0 mov r8,rax
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!KfdClassify+6fd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5215f7e4
IMAGE_VERSION: 6.3.9600.16384
BUCKET_ID_FUNC_OFFSET: 6fd
FAILURE_BUCKET_ID: AV_NETIO!KfdClassify
BUCKET_ID: AV_NETIO!KfdClassify
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_netio!kfdclassify
FAILURE_ID_HASH: {0e14637a-385d-0a7b-00b2-7ee608277b22}