*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80000c17aaa, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8027f5bf150
GetUlongFromAddress: unable to read from fffff8027f5bf208
0000000000000050 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+1fa
fffff800`00c17aaa 4183795003 cmp dword ptr [r9+50h],3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre
TRAP_FRAME: ffffd00026378ef0 -- (.trap 0xffffd00026378ef0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffc0000184 rbx=0000000000000000 rcx=fffff80000c67b80
rdx=fffff80000c0d100 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000c17aaa rsp=ffffd00026379080 rbp=ffffffffc0000184
r8=fffff80000c0d100 r9=0000000000000000 r10=0000000000000126
r11=0000000000002006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
NETIO!StreamInvokeCalloutAndNormalizeAction+0x1fa:
fffff800`00c17aaa 4183795003 cmp dword ptr [r9+50h],3 ds:00000000`00000050=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8027f3cb7e9 to fffff8027f3bfca0
STACK_TEXT:
ffffd000`26378da8 fffff802`7f3cb7e9 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`26378db0 fffff802`7f3ca03a : 00000000`00000000 ffffd000`263791e8 ffffd000`26379c00 ffffd000`26378ef0 : nt!KiBugCheckDispatch+0x69
ffffd000`26378ef0 fffff800`00c17aaa : ffffd000`263791e8 00000000`00000000 ffffd000`263791b0 fffff800`00c17d5b : nt!KiPageFault+0x23a
ffffd000`26379080 fffff800`00c177b1 : ffffe000`08a43900 ffffe000`08a43900 ffffd000`26379221 ffffe000`08a439b0 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x1fa
ffffd000`26379130 fffff800`00c0b3e3 : ffffe000`02100014 fffff800`040db790 ffffd000`00000000 ffffd000`26379c28 : NETIO!StreamProcessCallout+0x741
ffffd000`26379270 fffff800`00c03576 : 00000001`02000014 ffffd000`26379c28 ffffe000`046fad80 ffffd000`26379ae0 : NETIO!ProcessCallout+0x963
ffffd000`263793d0 fffff800`00c02005 : ffffd000`26379808 ffffd000`263796c0 ffffe000`00000001 ffffd000`26379c50 : NETIO!ArbitrateAndEnforce+0x2c6
ffffd000`263795c0 fffff800`00c16970 : ffffe000`07738090 ffffd000`26379b58 ffffe000`07738090 00000000`00000000 : NETIO!KfdClassify+0x525
ffffd000`26379a40 fffff800`00c16eab : ffffd000`2637a0f0 ffffd000`26379f30 ffffd000`26379c00 ffffd000`00000000 : NETIO!StreamClassify+0x220
ffffd000`26379bd0 fffff800`00c181b6 : 00000000`00000000 ffffe000`05d3b9c0 ffffe000`024c0000 00000000`00000000 : NETIO!StreamCommonInspect+0x25b
ffffd000`26379f70 fffff800`010ec01f : ffffe000`014a6620 00000000`00000000 ffffd000`2637a061 ffffd000`2637a300 : NETIO!WfpStreamInspectSend+0x27e
ffffd000`2637a000 fffff800`010e64b7 : 00000000`00000020 fffff800`010cd97c ffffe000`077c6100 ffffe000`02488a10 : tcpip!TcpEnqueueTcbSend+0x4ef
ffffd000`2637a100 fffff802`7f32a3f9 : 00000000`00000000 fffff802`7f2f2a3e ffffe000`02488a11 00000000`00000002 : tcpip!TcpTlConnectionSendCalloutRoutine+0x28
ffffd000`2637a180 fffff800`01133462 : fffff800`010e6490 ffffd000`2637a300 ffffd000`2637ab00 fffff800`01f556cb : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`2637a2d0 fffff800`01f70577 : ffffe000`077c6140 ffffd000`2637ab80 00000000`000003c9 00000000`00001c20 : tcpip!TcpTlConnectionSend+0x72
ffffd000`2637a340 fffff800`01f54451 : ffffe000`00db14b0 00000000`00000000 00000000`00000000 ffffd000`2637a650 : afd!AfdFastConnectionSend+0x387
ffffd000`2637a500 fffff802`7f61cf97 : ffffe000`0866a7c0 00000000`00000000 ffffe000`0866a7c0 ffffd000`207dd180 : afd!AfdFastIoDeviceControl+0x441
ffffd000`2637a870 fffff802`7f61dd7a : e000096f`cc40fff1 0000000c`001f0003 00000000`00000001 00000000`08452518 : nt!IopXxxControlFile+0x3f7
ffffd000`2637aa20 fffff802`7f3cb4b3 : 00000000`00000102 ffffd000`2637aad8 00000000`00000001 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffd000`2637aa90 00000000`770b2772 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04a5ecd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770b2772
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+1fa
fffff800`00c17aaa 4183795003 cmp dword ptr [r9+50h],3
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+1fa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5215f7e4
IMAGE_VERSION: 6.3.9600.16384
BUCKET_ID_FUNC_OFFSET: 1fa
FAILURE_BUCKET_ID: AV_NETIO!StreamInvokeCalloutAndNormalizeAction
BUCKET_ID: AV_NETIO!StreamInvokeCalloutAndNormalizeAction
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_netio!streaminvokecalloutandnormalizeaction
FAILURE_ID_HASH: {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04}