[FONT=Arial]Use !analyze -v to get detailed debugging information.[/FONT]
[FONT=Arial]BugCheck D1, {0, 2, 0, fffff88001dd8c20}[/FONT]
[FONT=Arial]Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+121 )[/FONT]
[FONT=Arial]Followup: MachineOwner
---------[/FONT]
[FONT=Arial]1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************[/FONT]
[FONT=Arial]DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001dd8c20, address which referenced memory[/FONT]
[FONT=Arial]Debugging Details:
------------------[/FONT]
[FONT=Arial]
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800c7972168
GetUlongFromAddress: unable to read from fffff800c79721f8
0000000000000000 Nonpaged pool[/FONT]
[FONT=Arial]CURRENT_IRQL: 2[/FONT]
[FONT=Arial]FAULTING_IP:
tcpip!FlpReturnNetBufferListChain+e1a50
fffff880`01dd8c20 488b01 mov rax,qword ptr [rcx][/FONT]
[FONT=Arial]CUSTOMER_CRASH_COUNT: 1[/FONT]
[FONT=Arial]DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT[/FONT]
[FONT=Arial]BUGCHECK_STR: AV[/FONT]
[FONT=Arial]PROCESS_NAME: System[/FONT]
[FONT=Arial]ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre[/FONT]
[FONT=Arial]TRAP_FRAME: fffff880034454b0 -- (.trap 0xfffff880034454b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80098ef2c0 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa80098ef2c1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001dd8c20 rsp=fffff88003445640 rbp=0000000000000000
r8=fffffa80098ef2c0 r9=0000000000000000 r10=fffff8800098fe80
r11=fffffa8006fa46e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!FlpReturnNetBufferListChain+0xe1a50:
fffff880`01dd8c20 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope[/FONT]
[FONT=Arial]LAST_CONTROL_TRANSFER: from fffff800c7673769 to fffff800c7674440[/FONT]
[FONT=Arial]STACK_TEXT:
fffff880`03445368 fffff800`c7673769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03445370 fffff800`c7671fe0 : 00000000`00000000 fffffa80`06fa4620 fffffa80`03fdca00 fffff880`034454b0 : nt!KiBugCheckDispatch+0x69
fffff880`034454b0 fffff880`01dd8c20 : fffffa80`09b12d02 fffffa80`42526354 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`03445640 fffff880`01801291 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000001 : tcpip!FlpReturnNetBufferListChain+0xe1a50
fffff880`03445690 fffff880`01cf0ece : fffffa80`03d29d38 00000000`bbce1501 00000000`00002cd3 0624dd2f`1a9fbe77 : NETIO!NetioDereferenceNetBufferListChain+0x121
fffff880`03445760 fffff880`01ce3cf3 : fffff880`07657048 00000000`00008e50 00000000`00000000 fffffa80`04582000 : tcpip!TcpFlushDelay+0x8e
fffff880`03445810 fffff880`01cf5b13 : fffffa80`036694c0 00000000`000013d3 fffffa80`04585000 fffffa80`036694c0 : tcpip!TcpPreValidatedReceive+0x403
fffff880`034458f0 fffff880`01cf5e28 : fffff880`03445b19 00000000`00164d16 00000000`00000000 00000000`0007df5c : tcpip!IppDeliverListToProtocol+0x93
fffff880`034459a0 fffff880`01cf9eab : fffff880`01e08b90 00000000`00000000 00000000`00000000 fffff880`03445ab8 : tcpip!IppProcessDeliverList+0x68
fffff880`03445a50 fffff880`01cf7901 : 00000000`00000000 fffffa80`04577b30 00000000`00000000 fffff880`01e08b90 : tcpip!IppReceiveHeaderBatch+0x21b
fffff880`03445b80 fffff880`01cf8d43 : fffffa80`08f19ef0 00000000`00000000 00000000`00000001 fffffa80`06c4da02 : tcpip!IpFlcReceivePackets+0x641
fffff880`03445db0 fffff880`01d03df9 : fffffa80`08f1bb00 00000000`00000000 fffff880`01cf71d0 000bc4be`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2ce
fffff880`03445e80 fffff800`c766eb67 : 00000000`00000000 00000000`00000000 fffff880`18fa2780 00000020`00030300 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x119
fffff880`03445f80 fffff800`c766eb2d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`18fa2780 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue[/FONT]
[FONT=Arial]
STACK_COMMAND: kb[/FONT]
[FONT=Arial]FOLLOWUP_IP:
NETIO!NetioDereferenceNetBufferListChain+121
fffff880`01801291 418bc7 mov eax,r15d[/FONT]
[FONT=Arial]SYMBOL_STACK_INDEX: 4[/FONT]
[FONT=Arial]SYMBOL_NAME: NETIO!NetioDereferenceNetBufferListChain+121[/FONT]
[FONT=Arial]FOLLOWUP_NAME: MachineOwner[/FONT]
[FONT=Arial]MODULE_NAME: NETIO[/FONT]
[FONT=Arial]IMAGE_NAME: NETIO.SYS[/FONT]
[FONT=Arial]DEBUG_FLR_IMAGE_TIMESTAMP: 50765624[/FONT]
[FONT=Arial]IMAGE_VERSION: 6.2.9200.16433[/FONT]
[FONT=Arial]BUCKET_ID_FUNC_OFFSET: 121[/FONT]
[FONT=Arial]FAILURE_BUCKET_ID: AV_NETIO!NetioDereferenceNetBufferListChain[/FONT]
[FONT=Arial]BUCKET_ID: AV_NETIO!NetioDereferenceNetBufferListChain[/FONT]
[FONT=Arial]ANALYSIS_SOURCE: KM[/FONT]
[FONT=Arial]FAILURE_ID_HASH_STRING: km:av_netio!netiodereferencenetbufferlistchain[/FONT]
[FONT=Arial]FAILURE_ID_HASH: {b14cf127-5933-4e45-71a8-f23e2243d43b}[/FONT]
[FONT=Arial]Followup: MachineOwner
Use !analyze -v to get detailed debugging information.[/FONT]
[SIZE=3][COLOR=black][FONT=Arial]BugCheck C9, {23e, fffff88003d94360, fffff98009dccea0, 0}[/FONT][/COLOR][/SIZE]
[SIZE=3][COLOR=black][FONT=Arial]Unable to load image \SystemRoot\System32\drivers\dtsoftbus01.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dtsoftbus01.sys
*** ERROR: Module load completed but symbols could not be loaded for dtsoftbus01.sys
Probably caused by : dtsoftbus01.sys ( dtsoftbus01+1360 )[/FONT][/COLOR][/SIZE]
[SIZE=3][COLOR=black][FONT=Arial]Followup: MachineOwner[/FONT][/COLOR][/SIZE]