*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa7f98253570, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880014d51b6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ef8100
fffffa7f98253570
CURRENT_IRQL: 2
FAULTING_IP:
ndis!ndisReferenceTopMiniportByNameForNsi+f6
fffff880`014d51b6 488b93d0130000 mov rdx,qword ptr [rbx+13D0h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff88006c432d0 -- (.trap 0xfffff88006c432d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa8007b00808
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880014d51b6 rsp=fffff88006c43460 rbp=0000000000000002
r8=0000000000000000 r9=0000000000000000 r10=0074006c00610065
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ndis!ndisReferenceTopMiniportByNameForNsi+0xf6:
fffff880`014d51b6 488b93d0130000 mov rdx,qword ptr [rbx+13D0h] ds:01a0:00000000`000013d0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cc82a9 to fffff80002cc8d00
STACK_TEXT:
fffff880`06c43188 fffff800`02cc82a9 : 00000000`0000000a fffffa7f`98253570 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06c43190 fffff800`02cc6f20 : 006c0075`00640065 0030002d`00720065 00000030`00300030 fffffa80`082521a0 : nt!KiBugCheckDispatch+0x69
fffff880`06c432d0 fffff880`014d51b6 : fffffa80`07b00808 fffff880`014d006c 00000000`80200020 fffffa80`08b7a301 : nt!KiPageFault+0x260
fffff880`06c43460 fffff880`014d6c77 : fffffa80`08b7a338 fffffa80`079cc100 fffffa80`079cc202 fffffa80`08b7de00 : ndis!ndisReferenceTopMiniportByNameForNsi+0xf6
fffff880`06c434e0 fffff880`01403aab : 00000000`00000000 fffffa80`00000008 00000000`00000290 fffffa80`00000238 : ndis!ndisNsiEnumerateAllInterfaceInformation+0x248
fffff880`06c435d0 fffff880`03edde29 : fffffa80`08b79000 fffff8a0`00000070 fffffa80`06b7c230 00000000`0599ef10 : NETIO!NsiEnumerateObjectsAllParametersEx+0x24f
fffff880`06c437b0 fffff880`03edf8e8 : fffffa80`06b7c230 fffffa80`06b7c160 00000000`00000003 fffffa80`06b7c198 : nsiproxy!NsippEnumerateObjectsAllParameters+0x305
fffff880`06c439a0 fffff880`03edf9db : fffffa80`07850920 00000000`00000000 00000000`00000001 00000000`00000003 : nsiproxy!NsippDispatchDeviceControl+0x70
fffff880`06c439e0 fffff800`02fe3127 : fffffa80`098dc550 fffffa80`098dc550 fffffa80`06b7c278 fffffa80`06b7c160 : nsiproxy!NsippDispatch+0x4b
fffff880`06c43a10 fffff800`02fe3986 : 00000000`0599ed90 00000000`000002c0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`06c43b40 fffff800`02cc7f93 : fffffa80`08131b60 00000000`0599ed78 fffff880`06c43bc8 00000000`00000001 : nt!NtDeviceIoControlFile+0x56
fffff880`06c43bb0 00000000`7774138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0599ee08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7774138a
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NsiEnumerateObjectsAllParametersEx+24f
fffff880`01403aab 8bd8 mov ebx,eax
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: NETIO!NsiEnumerateObjectsAllParametersEx+24f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NsiEnumerateObjectsAllParametersEx+24f
BUCKET_ID: X64_0xD1_NETIO!NsiEnumerateObjectsAllParametersEx+24f
Followup: MachineOwner
---------
0: kd> lmvm NETIO
start end module name
fffff880`01400000 fffff880`01460000 NETIO (pdb symbols) c:\windows\symbols\netio.pdb\DD06DDC1DE2F426D85400E127C2DF49A2\netio.pdb
Loaded symbol image file: NETIO.SYS
Mapped memory image file: c:\Windows\Symbols\NETIO.SYS\4CE7938160000\NETIO.SYS
Image path: \SystemRoot\system32\drivers\NETIO.SYS
Image name: NETIO.SYS
Timestamp: Sat Nov 20 04:23:13 2010 (4CE79381)
CheckSum: 00066D17
ImageSize: 00060000
File version: 6.1.7601.17514
Product version: 6.1.7601.17514
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: netio.sys
OriginalFilename: netio.sys
ProductVersion: 6.1.7601.17514
FileVersion: 6.1.7601.17514 (win7sp1_rtm.101119-1850)
FileDescription: Network I/O Subsystem
LegalCopyright: © Microsoft Corporation. All rights reserved.