Advertisement
Guest User

Untitled

a guest
Aug 17th, 2017
77
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.38 KB | None | 0 0
  1. *******************************************************************************
  2. * *
  3. * Bugcheck Analysis *
  4. * *
  5. *******************************************************************************
  6.  
  7. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  8. An attempt was made to access a pageable (or completely invalid) address at an
  9. interrupt request level (IRQL) that is too high. This is usually
  10. caused by drivers using improper addresses.
  11. If kernel debugger is available get stack backtrace.
  12. Arguments:
  13. Arg1: 0000000000000028, memory referenced
  14. Arg2: 0000000000000002, IRQL
  15. Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
  16. Arg4: fffff8800194e780, address which referenced memory
  17.  
  18. Debugging Details:
  19. ------------------
  20.  
  21. TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
  22.  
  23. READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f5100
  24. GetUlongFromAddress: unable to read from fffff800032f51c8
  25. 0000000000000028 Nonpaged pool
  26.  
  27. CURRENT_IRQL: 2
  28.  
  29. FAULTING_IP:
  30. ndis!ndisParseReceivedNBL+40
  31. fffff880`0194e780 8b7928 mov edi,dword ptr [rcx+28h]
  32.  
  33. CUSTOMER_CRASH_COUNT: 1
  34.  
  35. DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
  36.  
  37. BUGCHECK_STR: 0xD1
  38.  
  39. PROCESS_NAME: audiodg.exe
  40.  
  41. TRAP_FRAME: fffff80000ba06d0 -- (.trap 0xfffff80000ba06d0)
  42. NOTE: The trap frame does not contain all registers.
  43. Some register values may be zeroed or incorrect.
  44. rax=fffffa8010908160 rbx=0000000000000000 rcx=0000000000000000
  45. rdx=fffffa8010908030 rsi=0000000000000000 rdi=0000000000000000
  46. rip=fffff8800194e780 rsp=fffff80000ba0860 rbp=0000000000000000
  47. r8=fffff80000ba0938 r9=fffff80000ba0930 r10=0000000000000000
  48. r11=fffff80000ba0928 r12=0000000000000000 r13=0000000000000000
  49. r14=0000000000000000 r15=0000000000000000
  50. iopl=0 nv up ei pl zr na po nc
  51. ndis!ndisParseReceivedNBL+0x40:
  52. fffff880`0194e780 8b7928 mov edi,dword ptr [rcx+28h] ds:00000000`00000028=????????
  53. Resetting default scope
  54.  
  55. LAST_CONTROL_TRANSFER: from fffff800030b7f29 to fffff800030b8980
  56.  
  57. STACK_TEXT:
  58. fffff800`00ba0588 fffff800`030b7f29 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  59. fffff800`00ba0590 fffff800`030b6ba0 : fffffa80`0bfd8c60 00000000`000007ff fffff880`00f3fb50 fffff800`00ba0900 : nt!KiBugCheckDispatch+0x69
  60. fffff800`00ba06d0 fffff880`0194e780 : 0c380c68`0c680c94 00000000`00000008 fffffa80`0bfbab30 00000000`0000000c : nt!KiPageFault+0x260
  61. fffff800`00ba0860 fffff880`0194e592 : fffffa80`0bfb0000 fffff800`00ba09b0 00000000`00000000 fffff800`00ba0930 : ndis!ndisParseReceivedNBL+0x40
  62. fffff800`00ba08b0 fffff880`0194e9c5 : fffffa80`0bfd8c00 fffff880`00000000 00000000`00000000 00000000`00000000 : ndis!ndisSortNetBufferLists+0xc2
  63. fffff800`00ba0930 fffff880`018d0594 : fffffa80`0b04e1a0 fffff880`04f43f50 00000000`00000001 fffff880`04ee17c0 : ndis!ndisMDispatchReceiveNetBufferLists+0xc5
  64. fffff800`00ba0db0 fffff880`018d0509 : 00000000`00005601 fffff880`04c33ead fffffa80`0ac75618 fffffa80`0b04e1a0 : ndis!ndisMTopReceiveNetBufferLists+0x24
  65. fffff800`00ba0df0 fffff880`018d04a0 : fffffa80`0ac75008 00000000`000056c0 00000000`00000000 fffffa80`0ac75618 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
  66. fffff800`00ba0e30 fffff880`04c2c200 : 00000000`00000001 fffffa80`10908030 00000000`00000004 00000000`00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
  67. fffff800`00ba0e70 00000000`00000001 : fffffa80`10908030 00000000`00000004 00000000`00000000 00000000`00000000 : bflwfx64+0x1200
  68. fffff800`00ba0e78 fffffa80`10908030 : 00000000`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1
  69. fffff800`00ba0e80 00000000`00000004 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`10908030
  70. fffff800`00ba0e88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`04c306a5 : 0x4
  71.  
  72.  
  73. STACK_COMMAND: kb
  74.  
  75. FOLLOWUP_IP:
  76. bflwfx64+1200
  77. fffff880`04c2c200 ?? ???
  78.  
  79. SYMBOL_STACK_INDEX: 9
  80.  
  81. SYMBOL_NAME: bflwfx64+1200
  82.  
  83. FOLLOWUP_NAME: MachineOwner
  84.  
  85. MODULE_NAME: bflwfx64
  86.  
  87. IMAGE_NAME: bflwfx64.sys
  88.  
  89. DEBUG_FLR_IMAGE_TIMESTAMP: 4fda0ae6
  90.  
  91. FAILURE_BUCKET_ID: X64_0xD1_bflwfx64+1200
  92.  
  93. BUCKET_ID: X64_0xD1_bflwfx64+1200
  94.  
  95. Followup: MachineOwner
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement