Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000000028, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
- Arg4: fffff8800194e780, address which referenced memory
- Debugging Details:
- ------------------
- TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
- READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f5100
- GetUlongFromAddress: unable to read from fffff800032f51c8
- 0000000000000028 Nonpaged pool
- CURRENT_IRQL: 2
- FAULTING_IP:
- ndis!ndisParseReceivedNBL+40
- fffff880`0194e780 8b7928 mov edi,dword ptr [rcx+28h]
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
- BUGCHECK_STR: 0xD1
- PROCESS_NAME: audiodg.exe
- TRAP_FRAME: fffff80000ba06d0 -- (.trap 0xfffff80000ba06d0)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffffa8010908160 rbx=0000000000000000 rcx=0000000000000000
- rdx=fffffa8010908030 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8800194e780 rsp=fffff80000ba0860 rbp=0000000000000000
- r8=fffff80000ba0938 r9=fffff80000ba0930 r10=0000000000000000
- r11=fffff80000ba0928 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- ndis!ndisParseReceivedNBL+0x40:
- fffff880`0194e780 8b7928 mov edi,dword ptr [rcx+28h] ds:00000000`00000028=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800030b7f29 to fffff800030b8980
- STACK_TEXT:
- fffff800`00ba0588 fffff800`030b7f29 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
- fffff800`00ba0590 fffff800`030b6ba0 : fffffa80`0bfd8c60 00000000`000007ff fffff880`00f3fb50 fffff800`00ba0900 : nt!KiBugCheckDispatch+0x69
- fffff800`00ba06d0 fffff880`0194e780 : 0c380c68`0c680c94 00000000`00000008 fffffa80`0bfbab30 00000000`0000000c : nt!KiPageFault+0x260
- fffff800`00ba0860 fffff880`0194e592 : fffffa80`0bfb0000 fffff800`00ba09b0 00000000`00000000 fffff800`00ba0930 : ndis!ndisParseReceivedNBL+0x40
- fffff800`00ba08b0 fffff880`0194e9c5 : fffffa80`0bfd8c00 fffff880`00000000 00000000`00000000 00000000`00000000 : ndis!ndisSortNetBufferLists+0xc2
- fffff800`00ba0930 fffff880`018d0594 : fffffa80`0b04e1a0 fffff880`04f43f50 00000000`00000001 fffff880`04ee17c0 : ndis!ndisMDispatchReceiveNetBufferLists+0xc5
- fffff800`00ba0db0 fffff880`018d0509 : 00000000`00005601 fffff880`04c33ead fffffa80`0ac75618 fffffa80`0b04e1a0 : ndis!ndisMTopReceiveNetBufferLists+0x24
- fffff800`00ba0df0 fffff880`018d04a0 : fffffa80`0ac75008 00000000`000056c0 00000000`00000000 fffffa80`0ac75618 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
- fffff800`00ba0e30 fffff880`04c2c200 : 00000000`00000001 fffffa80`10908030 00000000`00000004 00000000`00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
- fffff800`00ba0e70 00000000`00000001 : fffffa80`10908030 00000000`00000004 00000000`00000000 00000000`00000000 : bflwfx64+0x1200
- fffff800`00ba0e78 fffffa80`10908030 : 00000000`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1
- fffff800`00ba0e80 00000000`00000004 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`10908030
- fffff800`00ba0e88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`04c306a5 : 0x4
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- bflwfx64+1200
- fffff880`04c2c200 ?? ???
- SYMBOL_STACK_INDEX: 9
- SYMBOL_NAME: bflwfx64+1200
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: bflwfx64
- IMAGE_NAME: bflwfx64.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 4fda0ae6
- FAILURE_BUCKET_ID: X64_0xD1_bflwfx64+1200
- BUCKET_ID: X64_0xD1_bflwfx64+1200
- Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement