Advertisement
Guest User

Untitled

a guest
May 4th, 2018
105
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.47 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.17074.1002 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 10 Kernel Version 16299 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  13. Built by: 16299.15.amd64fre.rs3_release.170928-1534
  14. Machine Name:
  15. Kernel base = 0xfffff800`cc684000 PsLoadedModuleList = 0xfffff800`cc9ea070
  16. Debug session time: Wed May 2 19:32:44.913 2018 (UTC + 1:00)
  17. System Uptime: 1 days 6:08:38.571
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ..............................................................
  22. Loading User Symbols
  23.  
  24. Loading unloaded module list
  25. ..............
  26. *******************************************************************************
  27. * *
  28. * Bugcheck Analysis *
  29. * *
  30. *******************************************************************************
  31.  
  32. Use !analyze -v to get detailed debugging information.
  33.  
  34. BugCheck D1, {0, 2, 0, fffff80f2687660a}
  35.  
  36. Probably caused by : NETIO.SYS ( NETIO!NetioDereferenceNetBufferListChain+107 )
  37.  
  38. Followup: MachineOwner
  39. ---------
  40.  
  41. nt!KeBugCheckEx:
  42. fffff800`cc7f9930 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffcf8a`ce26db80=000000000000000a
  43.  
  44. ************* Path validation summary **************
  45. Response Time (ms) Location
  46. Deferred srv*
  47. 7: kd> !analyze -v
  48. *******************************************************************************
  49. * *
  50. * Bugcheck Analysis *
  51. * *
  52. *******************************************************************************
  53.  
  54. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  55. An attempt was made to access a pageable (or completely invalid) address at an
  56. interrupt request level (IRQL) that is too high. This is usually
  57. caused by drivers using improper addresses.
  58. If kernel debugger is available get stack backtrace.
  59. Arguments:
  60. Arg1: 0000000000000000, memory referenced
  61. Arg2: 0000000000000002, IRQL
  62. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  63. Arg4: fffff80f2687660a, address which referenced memory
  64.  
  65. Debugging Details:
  66. ------------------
  67.  
  68.  
  69. KEY_VALUES_STRING: 1
  70.  
  71.  
  72. TIMELINE_ANALYSIS: 1
  73.  
  74.  
  75. DUMP_CLASS: 1
  76.  
  77. DUMP_QUALIFIER: 401
  78.  
  79. BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534
  80.  
  81. SYSTEM_MANUFACTURER: System manufacturer
  82.  
  83. SYSTEM_PRODUCT_NAME: System Product Name
  84.  
  85. SYSTEM_SKU: SKU
  86.  
  87. SYSTEM_VERSION: System Version
  88.  
  89. BIOS_VENDOR: American Megatrends Inc.
  90.  
  91. BIOS_VERSION: 0801
  92.  
  93. BIOS_DATE: 01/25/2017
  94.  
  95. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  96.  
  97. BASEBOARD_PRODUCT: STRIX Z270E GAMING
  98.  
  99. BASEBOARD_VERSION: Rev 1.xx
  100.  
  101. DUMP_TYPE: 1
  102.  
  103. BUGCHECK_P1: 0
  104.  
  105. BUGCHECK_P2: 2
  106.  
  107. BUGCHECK_P3: 0
  108.  
  109. BUGCHECK_P4: fffff80f2687660a
  110.  
  111. READ_ADDRESS: 0000000000000000
  112.  
  113. CURRENT_IRQL: 2
  114.  
  115. FAULTING_IP:
  116. tcpip!memset+4deca
  117. fffff80f`2687660a 488b01 mov rax,qword ptr [rcx]
  118.  
  119. CPU_COUNT: 8
  120.  
  121. CPU_MHZ: 1068
  122.  
  123. CPU_VENDOR: GenuineIntel
  124.  
  125. CPU_FAMILY: 6
  126.  
  127. CPU_MODEL: 9e
  128.  
  129. CPU_STEPPING: 9
  130.  
  131. CPU_MICROCODE: 6,9e,9,0 (F,M,S,R) SIG: 5E'00000000 (cache) 5E'00000000 (init)
  132.  
  133. BLACKBOXBSD: 1 (!blackboxbsd)
  134.  
  135.  
  136. BLACKBOXPNP: 1 (!blackboxpnp)
  137.  
  138.  
  139. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  140.  
  141. BUGCHECK_STR: AV
  142.  
  143. PROCESS_NAME: System
  144.  
  145. ANALYSIS_SESSION_HOST: JOE-PC
  146.  
  147. ANALYSIS_SESSION_TIME: 05-04-2018 08:02:49.0325
  148.  
  149. ANALYSIS_VERSION: 10.0.17074.1002 amd64fre
  150.  
  151. TRAP_FRAME: ffffcf8ace26dcc0 -- (.trap 0xffffcf8ace26dcc0)
  152. NOTE: The trap frame does not contain all registers.
  153. Some register values may be zeroed or incorrect.
  154. rax=fffff80f267f4c70 rbx=0000000000000000 rcx=0000000000000000
  155. rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
  156. rip=fffff80f2687660a rsp=ffffcf8ace26de50 rbp=0000000000000000
  157. r8=0000000000000001 r9=0000000000000050 r10=ffffaa08c8d2e1a0
  158. r11=ffffcf8ace26dfa8 r12=0000000000000000 r13=0000000000000000
  159. r14=0000000000000000 r15=0000000000000000
  160. iopl=0 nv up ei ng nz na po nc
  161. tcpip!memset+0x4deca:
  162. fffff80f`2687660a 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=????????????????
  163. Resetting default scope
  164.  
  165. LAST_CONTROL_TRANSFER: from fffff800cc80bae9 to fffff800cc7f9930
  166.  
  167. STACK_TEXT:
  168. ffffcf8a`ce26db78 fffff800`cc80bae9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  169. ffffcf8a`ce26db80 fffff800`cc8081fe : 00000000`00000000 ffffaa08`c75fed70 ffffaa08`c861d8f0 ffffaa08`cfb4ba20 : nt!KiBugCheckDispatch+0x69
  170. ffffcf8a`ce26dcc0 fffff80f`2687660a : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x47e
  171. ffffcf8a`ce26de50 fffff80f`25c06137 : 00000000`0002eb7c 00000000`00000000 ffffaa08`c8d60be0 fffff80f`2a8aad83 : tcpip!memset+0x4deca
  172. ffffcf8a`ce26deb0 fffff80f`267df989 : ffffaa08`cc2737c0 00000000`00000001 ffffaa08`cd91de60 00000000`00000001 : NETIO!NetioDereferenceNetBufferListChain+0x107
  173. ffffcf8a`ce26df30 fffff80f`267dc62d : 00000000`0677e07d 00000000`0677e07d 00000000`b2cbb9e4 ffffaa08`c873db38 : tcpip!TcpFlushDelay+0xa9
  174. ffffcf8a`ce26dfb0 fffff80f`26808782 : ffffaa08`c861d8f0 00000000`0000bb01 ffffcf8a`00000007 ffffaa08`c86f83b0 : tcpip!TcpReceive+0x37d
  175. ffffcf8a`ce26e080 fffff80f`267b97fe : 00000000`00000000 ffffaa08`cc2737c0 ffffaa08`ce810a80 00000000`00000001 : tcpip!TcpNlClientReceiveDatagrams+0x22
  176. ffffcf8a`ce26e0c0 fffff80f`267b9453 : 00000000`00000000 00000000`00000000 ffffcf8a`ce26e250 fffff80f`26954000 : tcpip!IppDeliverListToProtocol+0x6a
  177. ffffcf8a`ce26e180 fffff80f`267d9c8f : ffffcf8a`ce26e289 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppProcessDeliverList+0x63
  178. ffffcf8a`ce26e1f0 fffff80f`267d9767 : fffff80f`26954000 ffffaa08`c8769130 00000000`00000000 ffffaa08`cc272b00 : tcpip!IppReceiveHeaderBatch+0x25f
  179. ffffcf8a`ce26e2f0 fffff80f`26796b7c : ffffaa08`cc271810 ffffaa08`cd91de60 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x317
  180. ffffcf8a`ce26e410 fffff80f`267968b6 : ffffaa08`cd91de60 00000000`00000000 ffffcf8a`ce26e528 ffffcf8a`00000001 : tcpip!IpFlcReceivePackets+0xc
  181. ffffcf8a`ce26e440 fffff80f`267da798 : ffffaa08`cc270002 ffffcf8a`00000001 fffff80f`267f4c70 00000000`00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x256
  182. ffffcf8a`ce26e520 fffff800`cc7147fb : ffffaa08`c865e8a0 ffffaa08`cf5ae040 fffff80f`267da640 ffffcf8a`ce26e7f0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x158
  183. ffffcf8a`ce26e650 fffff800`cc71475d : ffffaa08`c8664820 00000000`00000007 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
  184. ffffcf8a`ce26e6a0 fffff80f`267f4907 : ffffaa08`c5cb4820 fffff80f`256da250 fffff80f`2528d750 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
  185. ffffcf8a`ce26e6e0 fffff80f`267f3f83 : 00000000`00000000 ffffcf8a`ce26e840 ffffaa08`cc2737c0 fffff80f`256f663c : tcpip!NetioExpandKernelStackAndCallout+0x87
  186. ffffcf8a`ce26e740 fffff80f`25ad4fae : ffffaa08`c8d2e1a0 ffffaa08`cc20b8c2 00000000`00000001 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x243
  187. ffffcf8a`ce26e970 fffff80f`25ad4c81 : ffffaa08`ce8b7900 00000000`00000000 ffff9380`00000000 fffff80f`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x13e
  188. ffffcf8a`ce26ea40 fffff80f`25b19bb7 : ffffaa08`c8d2e1a0 ffffcf8a`ce26eb01 ffffaa08`cd91de60 ffffaa08`ce8b77b0 : ndis!ndisMTopReceiveNetBufferLists+0x231
  189. ffffcf8a`ce26eb40 fffff80f`25af327c : 00000000`00000000 ffffaa08`cbdd4c60 00000000`00000000 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0x4b
  190. ffffcf8a`ce26ec10 fffff80f`25ad7c1f : ffffaa08`cbdd4c60 00000000`00000001 ffffaa08`00000000 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x1b63c
  191. ffffcf8a`ce26ecb0 fffff80f`274ccba6 : ffffaa08`cbdcf010 00000000`00000000 ffffaa08`cbdcf010 ffffaa08`00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x3f
  192. ffffcf8a`ce26ecf0 fffff80f`25ad5583 : fffff80f`274cc8f0 ffffcf8a`ce26ef01 fffff80f`25ad2d80 00000000`00000000 : nwifi!Pt6Receive+0x2b6
  193. ffffcf8a`ce26ed50 fffff80f`25ad2dbe : ffffaa08`cafbaf50 fffff80f`296969cc 00000001`00000000 fffff80f`296969cc : ndis!ndisCallReceiveHandler+0x43
  194. ffffcf8a`ce26eda0 fffff800`cc7147fb : ffffcf8a`ce26ef01 ffffcf8a`ce26eee8 ffffaa08`cc2242e0 ffffaa08`ce8b77b0 : ndis!ndisDataPathExpandStackCallback+0x3e
  195. ffffcf8a`ce26edf0 fffff800`cc71475d : ffffaa08`ce8b77b0 00000000`00000000 ffffaa08`cbdd4c60 ffffaa08`ce8b77b0 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
  196. ffffcf8a`ce26ee40 fffff80f`25b19e12 : 00000000`00000000 00000010`00000000 00000000`0053ffe8 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
  197. ffffcf8a`ce26ee80 fffff80f`25af327c : 00000000`00000000 ffffaa08`cc225720 00000000`00000000 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0x2a6
  198. ffffcf8a`ce26ef50 fffff80f`25ad7c1f : ffffaa08`cc225720 ffffaa08`cc243028 00000000`00000000 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x1b63c
  199. ffffcf8a`ce26eff0 fffff80f`27265737 : ffffaa08`cc263ca0 00000000`00000000 00000000`00000001 00000000`00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x3f
  200. ffffcf8a`ce26f030 fffff80f`25ad5583 : fffff80f`27265650 ffffaa08`ce8b77b0 ffffcf8a`ce26f241 fffff80f`25ad2d80 : vwififlt!FilterReceiveNetBufferLists+0xe7
  201. ffffcf8a`ce26f090 fffff80f`25ad2dbe : ffffaa08`ceb15900 fffff80f`26a31751 ffffaa08`ceb15930 00000000`00000000 : ndis!ndisCallReceiveHandler+0x43
  202. ffffcf8a`ce26f0e0 fffff800`cc7147fb : ffffcf8a`ce26f241 ffffcf8a`ce26f228 ffffaa08`cc228e60 ffffaa08`ce8b77b0 : ndis!ndisDataPathExpandStackCallback+0x3e
  203. ffffcf8a`ce26f130 fffff800`cc71475d : ffffaa08`ce8b77b0 00000000`00000000 ffffaa08`cc225720 ffffaa08`ce8b77b0 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
  204. ffffcf8a`ce26f180 fffff80f`25b19e12 : ffffaa08`cc6d9cb0 00000000`00000000 fffff80f`27831a90 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
  205. ffffcf8a`ce26f1c0 fffff80f`25af327c : 00000000`00000000 ffffaa08`cc228010 00000000`00000000 ffffcf8a`ce26f309 : ndis!ndisInvokeNextReceiveHandler+0x2a6
  206. ffffcf8a`ce26f290 fffff80f`25ad7c1f : ffffaa08`cc228010 00000000`00000001 ffffaa08`00000000 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x1b63c
  207. ffffcf8a`ce26f330 fffff80f`26ab1177 : 00000000`00000000 fffff80f`29a7dc14 00000000`00000000 00000000`00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x3f
  208. ffffcf8a`ce26f370 fffff80f`25ad5583 : ffffcf8a`ce26f540 ffffcf8a`ce26f548 ffffcf8a`ce26f558 ffffaa08`cafad000 : wfplwfs!LwfLowerRecvNetBufferLists+0x167
  209. ffffcf8a`ce26f4d0 fffff80f`25ad2dbe : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x43
  210. ffffcf8a`ce26f520 fffff800`cc7147fb : ffffcf8a`ce26f700 ffffcf8a`ce26f6c0 fffff80f`26ab1010 00000000`0069f9a4 : ndis!ndisDataPathExpandStackCallback+0x3e
  211. ffffcf8a`ce26f570 fffff800`cc71475d : 00000000`0069f9a4 ffffaa08`c8d2e1a0 ffffaa08`cc228010 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
  212. ffffcf8a`ce26f5c0 fffff80f`25af1867 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffaa08`cf5ae100 : nt!KeExpandKernelStackAndCalloutEx+0x1d
  213. ffffcf8a`ce26f600 fffff80f`2a8e289d : 00000000`00000004 ffffaa08`ca3525c0 ffffcf8a`ce26f7d0 00000000`000016b0 : ndis!NdisMIndicateReceiveNetBufferLists+0x1d487
  214. ffffcf8a`ce26f770 fffff80f`2a89b1f1 : 00000000`00000001 ffffaa08`c96bd0e0 00000000`00000001 fffff800`00000000 : wdiwifi!CPort::IndicateFrames+0x2a1
  215. ffffcf8a`ce26f810 fffff80f`2a89a59b : fffff80f`2a93bf20 ffffaa08`ce6d0000 ffffcf8a`ce26f939 ffffaa08`c96bf970 : wdiwifi!CRxMgr::RxIndicatePortFrames+0x129
  216. ffffcf8a`ce26f880 fffff80f`2a89b9ba : 00000000`00000000 00000000`00000000 ffffaa08`c96bf970 ffffaa08`cf5ae180 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x717
  217. ffffcf8a`ce26f9a0 fffff80f`25b86192 : ffffaa08`cd9c6660 ffffaa08`c5d4f040 fffff80f`25b86180 fffff80f`25b86180 : wdiwifi!RxMgrWorkItemRoutine+0x6a
  218. ffffcf8a`ce26f9e0 fffff800`cc79128b : 00000000`00000000 ffffaa08`cd9c6660 ffffaa08`c8d2e050 ffffaa08`c3c99cb0 : ndis!ndisDispatchIoWorkItem+0x12
  219. ffffcf8a`ce26fa10 fffff800`cc6bf4d5 : ffffaa08`c3c99cb0 ffffaa08`cf5ae040 fffff800`cc791190 00000000`00000012 : nt!IopProcessWorkItem+0xfb
  220. ffffcf8a`ce26fa80 fffff800`cc79ac07 : ffffaa08`cf5ae040 00000000`00000080 ffffaa08`c3ce9440 ffffaa08`cf5ae040 : nt!ExpWorkerThread+0xf5
  221. ffffcf8a`ce26fb10 fffff800`cc801366 : ffff9380`40a00180 ffffaa08`cf5ae040 fffff800`cc79abc0 fffff800`cc80b513 : nt!PspSystemThreadStartup+0x47
  222. ffffcf8a`ce26fb60 00000000`00000000 : ffffcf8a`ce270000 ffffcf8a`ce269000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
  223.  
  224.  
  225. THREAD_SHA1_HASH_MOD_FUNC: 2eda6fbb64887482cfd3484eec423a6fd72eae51
  226.  
  227. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d6bb6b3e68066c3277683857a3bbcd9204f38169
  228.  
  229. THREAD_SHA1_HASH_MOD: 1b253b0ed3a040f3536694b6a338414d52967b06
  230.  
  231. FOLLOWUP_IP:
  232. NETIO!NetioDereferenceNetBufferListChain+107
  233. fffff80f`25c06137 8bc5 mov eax,ebp
  234.  
  235. FAULT_INSTR_CODE: 8348c58b
  236.  
  237. SYMBOL_STACK_INDEX: 4
  238.  
  239. SYMBOL_NAME: NETIO!NetioDereferenceNetBufferListChain+107
  240.  
  241. FOLLOWUP_NAME: MachineOwner
  242.  
  243. MODULE_NAME: NETIO
  244.  
  245. IMAGE_NAME: NETIO.SYS
  246.  
  247. DEBUG_FLR_IMAGE_TIMESTAMP: 5b0597f3
  248.  
  249. STACK_COMMAND: .thread ; .cxr ; kb
  250.  
  251. BUCKET_ID_FUNC_OFFSET: 107
  252.  
  253. FAILURE_BUCKET_ID: AV_NETIO!NetioDereferenceNetBufferListChain
  254.  
  255. BUCKET_ID: AV_NETIO!NetioDereferenceNetBufferListChain
  256.  
  257. PRIMARY_PROBLEM_CLASS: AV_NETIO!NetioDereferenceNetBufferListChain
  258.  
  259. TARGET_TIME: 2018-05-02T18:32:44.000Z
  260.  
  261. OSBUILD: 16299
  262.  
  263. OSSERVICEPACK: 0
  264.  
  265. SERVICEPACK_NUMBER: 0
  266.  
  267. OS_REVISION: 0
  268.  
  269. SUITE_MASK: 784
  270.  
  271. PRODUCT_TYPE: 1
  272.  
  273. OSPLATFORM_TYPE: x64
  274.  
  275. OSNAME: Windows 10
  276.  
  277. OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
  278.  
  279. OS_LOCALE:
  280.  
  281. USER_LCID: 0
  282.  
  283. OSBUILD_TIMESTAMP: 2018-03-30 04:22:49
  284.  
  285. BUILDDATESTAMP_STR: 170928-1534
  286.  
  287. BUILDLAB_STR: rs3_release
  288.  
  289. BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534
  290.  
  291. ANALYSIS_SESSION_ELAPSED_TIME: ae8
  292.  
  293. ANALYSIS_SOURCE: KM
  294.  
  295. FAILURE_ID_HASH_STRING: km:av_netio!netiodereferencenetbufferlistchain
  296.  
  297. FAILURE_ID_HASH: {b14cf127-5933-4e45-71a8-f23e2243d43b}
  298.  
  299. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement