New
#1
Driver_irql_not_less_or_equal?
I randomly BSOD'd, not doing anything particularly strenuous. I ran a sfc which reported corrupt files which were fixed, but I'm not sure if something else is wrong as well
Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff88002966b5c, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff802d3bd8168 unable to get nt!MmPoolCodeStart unable to get nt!MmPoolCodeEnd 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: tcpip!FlpReturnNetBufferListChain+e147c fffff880`02966b5c 488b01 mov rax,qword ptr [rcx] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff880044617a0 -- (.trap 0xfffff880044617a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa80068683b0 rbx=0000000000000000 rcx=0000000000000000 rdx=fffffa800d9e27b0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88002966b5c rsp=fffff88004461930 rbp=0000000000000000 r8=0000000000006888 r9=0000000000000000 r10=fffff88000a90000 r11=000000000000029d r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc tcpip!FlpReturnNetBufferListChain+0xe147c: fffff880`02966b5c 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff802d38d9769 to fffff802d38da440 STACK_TEXT: fffff880`04461658 fffff802`d38d9769 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`04461660 fffff802`d38d7fe0 : 00000000`00000000 fffffa80`068874c0 fffffa80`0c4f6c00 fffff880`044617a0 : nt!KiBugCheckDispatch+0x69 fffff880`044617a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260 STACK_COMMAND: .bugcheck ; kb FOLLOWUP_IP: tcpip!FlpReturnNetBufferListChain+e147c fffff880`02966b5c 488b01 mov rax,qword ptr [rcx] SYMBOL_NAME: tcpip!FlpReturnNetBufferListChain+e147c FOLLOWUP_NAME: MachineOwner MODULE_NAME: tcpip IMAGE_NAME: tcpip.sys DEBUG_FLR_IMAGE_TIMESTAMP: 51db3c2e FAILURE_BUCKET_ID: X64_0xD1_tcpip!FlpReturnNetBufferListChain+e147c BUCKET_ID: X64_0xD1_tcpip!FlpReturnNetBufferListChain+e147c Followup: MachineOwner --------- 3: kd> .trap 0xfffff880044617a0 NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa80068683b0 rbx=0000000000000000 rcx=0000000000000000 rdx=fffffa800d9e27b0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88002966b5c rsp=fffff88004461930 rbp=0000000000000000 r8=0000000000006888 r9=0000000000000000 r10=fffff88000a90000 r11=000000000000029d r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc tcpip!FlpReturnNetBufferListChain+0xe147c: fffff880`02966b5c 488b01 mov rax,qword ptr [rcx] ds:00000000`00000000=????????????????