*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {bdbc83f0, 2, 1, fffff8015b94f2d7}
*** [COLOR=#ff0000]WARNING: Unable to verify timestamp for Rt630x64.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt630x64.sys
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys[/COLOR]
Probably caused by : memory_corruption
Followup: memory_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000bdbc83f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8015b94f2d7, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80277170138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
00000000bdbc83f0
CURRENT_IRQL: 2
FAULTING_IP:
wfplwfs!memset+d7
fffff801`5b94f2d7 48895130 mov qword ptr [rcx+30h],rdx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
TRAP_FRAME: ffffd000bdbc81d0 -- (.trap 0xffffd000bdbc81d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000bdbc83f0 rbx=0000000000000000 rcx=00000000bdbc83c0
rdx=0000000000000101 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015b94f2d7 rsp=ffffd000bdbc8360 rbp=ffffd000bdbc8460
r8=0000000000000050 r9=0000000000000006 r10=0000000000000002
r11=fffff8015b94f2d7 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
wfplwfs!memset+0xd7:
fffff801`5b94f2d7 48895130 mov qword ptr [rcx+30h],rdx ds:00000000`bdbc83f0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80276f7b7e9 to fffff80276f6fca0
STACK_TEXT:
ffffd000`bdbc8088 fffff802`76f7b7e9 : 00000000`0000000a 00000000`bdbc83f0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`bdbc8090 fffff802`76f7a03a : 00000000`00000001 00000000`00000000 ffffd000`bdbc8200 ffffd000`bdbc81d0 : nt!KiBugCheckDispatch+0x69
ffffd000`bdbc81d0 fffff801`5b94f2d7 : ffffe000`29652c10 fffff801`5b4dc903 00000000`00000000 ffffd000`bdbc83d1 : nt!KiPageFault+0x23a
ffffd000`bdbc8360 ffffe000`29652c10 : fffff801`5b4dc903 00000000`00000000 ffffd000`bdbc83d1 00000000`00000001 : wfplwfs!memset+0xd7
ffffd000`bdbc8368 fffff801`5b4dc903 : 00000000`00000000 ffffd000`bdbc83d1 00000000`00000001 fffff801`5d7cac27 : 0xffffe000`29652c10
ffffd000`bdbc8370 fffff801`5b4ec1fd : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x123
ffffd000`bdbc8430 fffff801`5b4dd8d4 : ffffe000`289321a0 ffffe000`00000001 ffffd000`00000000 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x23d
ffffd000`bdbc84c0 fffff801`5da9f35b : ffffe000`f0e08fd5 ffffe000`28ee6000 ffffd000`bdbc8800 ffffe000`00000001 : ndis!NdisMIndicateReceiveNetBufferLists+0xb74
ffffd000`bdbc86a0 ffffe000`f0e08fd5 : ffffe000`28ee6000 ffffd000`bdbc8800 ffffe000`00000001 ffffd000`00000001 : Rt630x64+0x1835b
ffffd000`bdbc86a8 ffffe000`28ee6000 : ffffd000`bdbc8800 ffffe000`00000001 ffffd000`00000001 ffffd000`00000001 : 0xffffe000`f0e08fd5
ffffd000`bdbc86b0 ffffd000`bdbc8800 : ffffe000`00000001 ffffd000`00000001 ffffd000`00000001 00000001`28fe0001 : 0xffffe000`28ee6000
ffffd000`bdbc86b8 ffffe000`00000001 : ffffd000`00000001 ffffd000`00000001 00000001`28fe0001 ff000001`00000001 : 0xffffd000`bdbc8800
ffffd000`bdbc86c0 ffffd000`00000001 : ffffd000`00000001 00000001`28fe0001 ff000001`00000001 00008000`00000020 : 0xffffe000`00000001
ffffd000`bdbc86c8 ffffd000`00000001 : 00000001`28fe0001 ff000001`00000001 00008000`00000020 00000000`00000000 : 0xffffd000`00000001
ffffd000`bdbc86d0 00000001`28fe0001 : ff000001`00000001 00008000`00000020 00000000`00000000 00000000`00000000 : 0xffffd000`00000001
ffffd000`bdbc86d8 ff000001`00000001 : 00008000`00000020 00000000`00000000 00000000`00000000 00000010`00000001 : 0x00000001`28fe0001
ffffd000`bdbc86e0 00008000`00000020 : 00000000`00000000 00000000`00000000 00000010`00000001 0000000a`00000020 : 0xff000001`00000001
ffffd000`bdbc86e8 00000000`00000000 : 00000000`00000000 00000010`00000001 0000000a`00000020 ffffe000`00000020 : 0x00008000`00000020
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !wfplwfs
6 errors : !wfplwfs (fffff8015b94f200-fffff8015b94f238)
fffff8015b94f200 *58 8b c1 49 83 f8 08 72 *3c 0f b6 d2 49 b9 01 01 X..I...r<...I...
fffff8015b94f210 01 01 01 01 01 01 49 0f *bf d1 49 83 f8 47 73 60 ......I...I..Gs`
fffff8015b94f220 *45 8b c8 49 83 e1 f8 49 *0b c9 49 89 54 01 f8 49 E..I...I..I.T..I
fffff8015b94f230 83 e9 08 75 f5 49 83 e0 *0f 74 0f 0f 1f 44 00 00 ...u.I...t...D..
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
BUCKET_ID: MEMORY_CORRUPTION_STRIDE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_stride
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------