Forum Discussion
The computer has rebooted from a bugcheck. The bugcheck was
I wish to know the cause and solve it.
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff803814cc6c1, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 31
Key : Analysis.Elapsed.mSec
Value: 1510
Key : Analysis.IO.Other.Mb
Value: 10
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 54
Key : Analysis.Init.CPU.mSec
Value: 1124
Key : Analysis.Init.Elapsed.mSec
Value: 63604
Key : Analysis.Memory.CommitPeak.Mb
Value: 131
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Bugcheck.Code.TargetModel
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_NETIO!StreamInvokeCalloutAndNormalizeAction
Key : Failure.Hash
Value: {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04}
BUGCHECK_CODE: d1
BUGCHECK_P1: 50
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803814cc6c1
FILE_IN_CAB: 081124-4375-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffda0495665040
READ_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000050
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff9006b8b5fd70 -- (.trap 0xffff9006b8b5fd70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda04a1006001 rbx=0000000000000000 rcx=00000000ffffff00
rdx=0000000000001001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803814cc6c1 rsp=ffff9006b8b5ff00 rbp=ffff9006b8b5ff79
r8=0000000000001001 r9=0000000000000000 r10=000000000001189e
r11=0000000000000109 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x239:
fffff803`814cc6c1 4183795003 cmp dword ptr [r9+50h],3 ds:00000000`00000050=????????
Resetting default scope
STACK_TEXT:
ffff9006`b8b5fc28 fffff803`7bc2bd29 : 00000000`0000000a 00000000`00000050 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9006`b8b5fc30 fffff803`7bc27189 : ffffda04`ac62db02 00000000`00000109 ffff9006`b8b5ff60 fffff803`950ae189 : nt!KiBugCheckDispatch+0x69
ffff9006`b8b5fd70 fffff803`814cc6c1 : 00000000`00000002 00000000`00000000 ffff9006`b8b60080 fffff803`814e91b4 : nt!KiPageFault+0x489
ffff9006`b8b5ff00 fffff803`814cbd8b : ffffda04`a1006010 ffffda04`a1006010 ffffda04`a1006001 00000000`00000000 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x239
ffff9006`b8b5ffd0 fffff803`814c992b : ffffda04`8cfa0014 fffff803`950a12a4 ffffda04`00000001 ffff9006`b8b60a88 : NETIO!StreamProcessCallout+0x2c7
ffff9006`b8b60100 fffff803`814c89dd : 00000000`00000014 ffff9006`b8b60a88 ffff9006`b8b60ab0 ffff9006`b8b607b0 : NETIO!ProcessCallout+0xa4b
ffff9006`b8b60280 fffff803`814c76ee : 00000000`00000005 ffff9006`b8b60ab0 ffffda04`8cee0aa0 ffffda04`9c00ff02 : NETIO!ArbitrateAndEnforce+0x59d
ffff9006`b8b603b0 fffff803`8151cd9e : 00000000`00000000 ffffda04`91ea7440 00000000`00000000 ffff9006`b8b60d40 : NETIO!KfdClassify+0x33e
ffff9006`b8b60760 fffff803`814f1651 : 00000000`00000000 ffff9006`b8b60980 ffff9006`b8b60980 00000000`00000000 : NETIO!StreamInternalClassify+0x106
ffff9006`b8b60880 fffff803`814c4dd8 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9006`b8b60cc0 : NETIO!StreamClassify+0x2c6f5
ffff9006`b8b60a20 fffff803`814c4a47 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000005b4 : NETIO!StreamCommonInspect+0x2ac
ffff9006`b8b60e10 fffff803`8160c3cc : ffff9006`b8b60f00 ffffda04`9e0c9200 00000000`00000000 ffffda04`aa292bf0 : NETIO!WfpStreamInspectReceive+0x157
ffff9006`b8b60e90 fffff803`8160c243 : ffffda04`9e0c9050 00000000`00000000 ffff9006`b8b60fd8 ffffda04`9e0c9280 : tcpip!InetInspectReceive+0x80
ffff9006`b8b60f40 fffff803`816827cb : ffff9006`b8b610a0 00000000`00000000 ffffda04`a8c2ad40 ffffda04`9e7a2580 : tcpip!TcpInspectReceive+0xcb
ffff9006`b8b60fc0 fffff803`815fb5ae : ffff9006`b8b61240 ffffda04`9e0c9050 ffffda04`9571db70 ffffda04`9361c030 : tcpip!TcpProcessFastDatagramBatch+0x87
ffff9006`b8b61010 fffff803`815f7d09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTcbReceive+0x30e
ffff9006`b8b611d0 fffff803`815f6cff : ffff8ffa`d60aa022 00000000`00000010 ffff8ffa`d61d1022 ffffda04`920257b0 : tcpip!TcpMatchReceive+0x519
ffff9006`b8b613a0 fffff803`81621d36 : ffffda04`8cffd7b0 ffff8ffa`d60bbb01 00000000`00000001 ffffda04`9da42115 : tcpip!TcpReceive+0x35f
ffff9006`b8b614b0 fffff803`815d57e6 : 00000000`00000000 00000000`00000000 ffff9006`00000014 ffffda04`920257b0 : tcpip!TcpNlClientReceiveDatagrams+0x16
ffff9006`b8b614e0 fffff803`815d55d9 : 00000000`00000000 ffffda04`00000006 ffffda04`92025000 ffff9006`b8b61630 : tcpip!IppProcessDeliverList+0xb6
ffff9006`b8b615d0 fffff803`815d42a2 : fffff803`817c39d0 ffffda04`91e9a8a0 ffffda04`92025000 ffff9006`b8b61710 : tcpip!IppReceiveHeaderBatch+0x3a9
ffff9006`b8b616c0 fffff803`8165e43a : ffffda04`8cf3ba80 ffffda04`95628510 00000000`5f636300 00000038`00000000 : tcpip!IppReceivePackets+0x502
ffff9006`b8b617f0 fffff803`8160502b : ffffda04`8cf3ba80 ffffda04`95628510 00000000`00000000 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0x11ca
ffff9006`b8b61980 fffff803`7bac4aba : 00000000`00000008 fffff803`81604ee0 ffffda04`956650b4 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x14b
ffff9006`b8b61ad0 fffff803`7bac4a2d : fffff803`81604ee0 ffff9006`b8b61c18 ffffda04`91bffa50 ffff9006`b8b61b50 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
ffff9006`b8b61b40 fffff803`81606340 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff9006`b8b61b80 fffff803`813326e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`2020444e : tcpip!FlReceiveNetBufferListChain+0x530
ffff9006`b8b61e60 fffff803`813320fa : ffffda04`95739b60 00000000`00000800 ffff9006`00000000 ffff9006`00000007 : ndis!ndisMIndicateNetBufferListsToOpen+0x141
ffff9006`b8b61f40 fffff803`8135708c : ffffda04`9361c030 ffffda04`00000000 ffff9006`00000000 ffffda04`9361c030 : ndis!ndisMTopReceiveNetBufferLists+0x24a
ffff9006`b8b62020 fffff803`8135977b : 00000000`00000000 00000000`00000100 ffffda04`95628510 00000000`00000012 : ndis!ndisInvokeNextReceiveHandler+0x54
ffff9006`b8b62080 fffff803`8197382d : 00000000`00000000 ffffda04`95628510 00000000`00000000 ffffda04`00000007 : ndis!NdisFIndicateReceiveNetBufferLists+0x350fb
ffff9006`b8b62130 fffff803`81973c11 : 00000000`00000100 ffffda04`952636a0 ffff9006`b8b621f0 ffffda04`9573eb60 : wfplwfs!L2NdisFIndicateReceiveNetBufferLists+0xa3
ffff9006`b8b62190 fffff803`81357019 : 00000008`00000007 ffffda04`95628510 ffffda04`952636a0 ffff9006`00000000 : wfplwfs!LwfUpperRecvNetBufferLists+0x101
ffff9006`b8b62220 fffff803`81356a87 : 00000000`00006358 ffff9006`b8b62340 00000000`00000100 fffff803`7bac1df5 : ndis!ndisCallReceiveHandler+0xb9
ffff9006`b8b62270 fffff803`8135d74a : ffff9006`b8b62358 00000000`00000000 ffff9006`b8b623b0 ffff9006`b8b62400 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
ffff9006`b8b622c0 fffff803`81357113 : ffffda04`95628510 00000000`00000000 00000000`00000007 00000000`00000100 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
ffff9006`b8b62360 fffff803`8135977b : 00000000`00000000 00000000`00000100 ffffda04`95628510 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb
ffff9006`b8b623c0 fffff803`819712dc : ffffda04`938e4800 ffff9006`b8b624d1 00000000`00000000 00000000`00000007 : ndis!NdisFIndicateReceiveNetBufferLists+0x350fb
ffff9006`b8b62470 fffff803`81357019 : ffffda04`00000007 ffffda04`95628510 ffffda04`95628510 fffff803`7bc1ea01 : wfplwfs!LwfLowerRecvNetBufferLists+0x14c
ffff9006`b8b62530 fffff803`81356a87 : 00000000`00006668 ffff9006`b8b62650 00000000`00000100 fffff803`7bac1df5 : ndis!ndisCallReceiveHandler+0xb9
ffff9006`b8b62580 fffff803`8135d74a : ffff9006`b8b62668 ffff8000`5648f180 aa5dae3a`58f6f83d ffff9006`b8b62798 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
ffff9006`b8b625d0 fffff803`81357113 : ffffda04`95628510 00000000`00000000 ffffda04`00000007 fffff803`00000100 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
ffff9006`b8b62670 fffff803`81333856 : 00000000`002909c3 00000000`00000100 00000000`00000000 ffffda04`9565a1b0 : ndis!ndisInvokeNextReceiveHandler+0xdb
ffff9006`b8b626d0 fffff803`a83942a7 : ffffda04`95727002 ffffda04`936165f8 00000000`00000000 ffff9006`b8b62820 : ndis!NdisMIndicateReceiveNetBufferLists+0x116
ffff9006`b8b62760 fffff803`a839bd3f : ffffda04`952839a0 ffff9006`b8b62859 ffffda04`95283dd0 ffffda04`95283b88 : NetAdapterCx!NxNblDatapath::IndicateReceiveNetBufferLists+0xe7 [minio\netcx\translator\nxnbldatapath.cpp @ 188]
ffff9006`b8b627a0 fffff803`a839bde7 : ffffda04`952839a0 ffffda04`952839a0 ffffda04`953f0528 ffff9006`b8b629d0 : NetAdapterCx!NxRxXlat::EcIndicateNblsToNdis+0x377 [minio\netcx\translator\nxrxxlat.cpp @ 787]
ffff9006`b8b628c0 fffff803`a83a7bfa : ffffda04`952839e8 ffffda04`953f0060 ffffda04`953f0060 ffffda04`888e6040 : NetAdapterCx!EvtRxPollQueueStarted+0x37 [minio\netcx\translator\nxrxxlat.cpp @ 828]
ffff9006`b8b628f0 fffff803`a83a8151 : fffff780`00000014 00000000`00000080 00000000`00000000 fffff803`a83a8001 : NetAdapterCx!ExecutionContext::Poll+0x19e [minio\netcx\ec\lib\executioncontext.cpp @ 890]
ffff9006`b8b62a40 fffff803`a83a7fe7 : 00000000`00000003 00000000`00000080 ffffda04`8cfdf080 fffff780`00000014 : NetAdapterCx!ExecutionContext::RunLockHeld+0x13d [minio\netcx\ec\lib\executioncontext.cpp @ 1093]
ffff9006`b8b62a80 fffff803`a83a7901 : ffffda04`953f0060 ffffda04`953f0060 ffffda04`95665040 ffffda04`8f0351c0 : NetAdapterCx!ExecutionContext::RunLockNotHeld+0x3b [minio\netcx\ec\lib\executioncontext.cpp @ 1010]
ffff9006`b8b62ac0 fffff803`a83c7669 : ffffda04`95665040 fffff803`a83c7660 ffffda04`888c8040 ffffda04`00000002 : NetAdapterCx!ExecutionContext::WorkerThreadRoutine+0x65 [minio\netcx\ec\lib\executioncontext.cpp @ 762]
ffff9006`b8b62b00 fffff803`7ba79ca7 : ffffda04`95665040 fffff803`a83c7660 ffffda04`953f0060 006fe47f`bd9bbfff : NetAdapterCx!ExecutionContext::Thread+0x9 [minio\netcx\ec\lib\executioncontext.cpp @ 737]
ffff9006`b8b62b30 fffff803`7bc1af64 : ffff8000`55c00180 ffffda04`95665040 fffff803`7ba79c50 7e7e7e7e`7e7e7e7e : nt!PspSystemThreadStartup+0x57
ffff9006`b8b62b80 00000000`00000000 : ffff9006`b8b63000 ffff9006`b8b5c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+239
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.22621.3958
STACK_COMMAND: .process /r /p 0xffffda04888e6040; .thread 0xffffda0495665040 ; kb
BUCKET_ID_FUNC_OFFSET: 239
FAILURE_BUCKET_ID: AV_NETIO!StreamInvokeCalloutAndNormalizeAction
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04}
Followup: MachineOwner
---------
- EliseowCopper ContributorDid you contact the computer service clerk?