Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

bsod DRIVER_IRQL_NOT_LESS_OR_EQUAL (NETIO.SYS) on Win 8.1


  • Please log in to reply
8 replies to this topic

#1 L_Alive

L_Alive

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:10:00 AM

Posted 02 July 2014 - 02:40 PM

Ive been getting this ever on my new laptop for a while now whenever I on utorrent. I uninstalled mcafe with the uninstaller from their website still reoccurring. any help? dump file in the description

Dumpfile : 

http://speedy.sh/bbtwE/070214-28828-01.dmp


BC AdBot (Login to Remove)

 


#2 wpgwpg

wpgwpg

  • Members
  • 1,149 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US of A
  • Local time:12:30 AM

Posted 02 July 2014 - 03:01 PM

 I can't access your link, but I can tell you that this error is almost always associated with a driver problem.  If you didn't get all your drivers from your computer's manufacturer, that could be the cause.


Everyone with a computer should back his system up to an external hard drive regularly.  :thumbsup:

#3 alonadel

alonadel

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Clearfield Utah
  • Local time:10:30 PM

Posted 02 July 2014 - 03:16 PM

What wpgwpg says is correct, its a good bet that you have a driver issue that is intering. 

 

It could be a USB add on device your using for example.

 

Try updating to the latest version of your drivers from the manufacturers web site for that device and the os your using. 

 

This can also happen if your systems ram is damaged and your torrent app is using enough ram to push usage up into the damaged range. This is most often not the case as the above mentioned driver issue is more common. 

 

If you want to test your ram I use testmem86 as a good app for that , its free from http://www.memtest.org/. 

 

Anyway, go with checking drivers and disconnecting extra hardware to test first. 



#4 L_Alive

L_Alive
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:10:00 AM

Posted 02 July 2014 - 03:57 PM

Im pretty sure it has someting to do with the drivers but i cant figure out which one.
Ill reupload the dump file so u can tell me the exact one. Thanks again

http://www.fast-files.com/getfile.aspx?file=75912



#5 jinxiang

jinxiang

  • Members
  • 97 posts
  • OFFLINE
  •  
  • Local time:12:30 PM

Posted 03 July 2014 - 06:05 PM

Im pretty sure it has someting to do with the drivers but i cant figure out which one.
Ill reupload the dump file so u can tell me the exact one. Thanks again

http://www.fast-files.com/getfile.aspx?file=75912

Had did the debug for u.... Here's his PC info...

 

 

 
Microsoft ® Windows Debugger Version 6.2.9200.20512 AMD64
Copyright © Microsoft Corporation. All rights reserved.
 
 
Loading Dump File [C:\Users\JinXiang\Downloads\0702142882801.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
 
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.16422.amd64fre.winblue_gdr.131006-1505
Machine Name:
Kernel base = 0xfffff803`9c67e000 PsLoadedModuleList = 0xfffff803`9c942990
Debug session time: Wed Jul  2 05:48:13.825 2014 (UTC + 8:00)
System Uptime: 0 days 0:20:05.542
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
Use !analyze -v to get detailed debugging information.
 
BugCheck D1, {28, 2, 0, fffff80000e1a43f}
 
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1f )
 
Followup: MachineOwner
---------
 
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80000e1a43f, address which referenced memory
 
Debugging Details:
------------------
 
 
READ_ADDRESS: fffff8039c930340: Unable to get special pool info
fffff8039c930340: Unable to get special pool info
GetUlongFromAddress: unable to read from fffff8039c9cb208
 0000000000000028 
 
CURRENT_IRQL:  2
 
FAULTING_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
 
BUGCHECK_STR:  AV
 
PROCESS_NAME:  System
 
TRAP_FRAME:  ffffd000209533d0 -- (.trap 0xffffd000209533d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd00020953600 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000e1a43f rsp=ffffd00020953560 rbp=ffffe0000867c7c0
 r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000001000
r11=ffffd00020953590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1f:
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h] ds:00000000`00000028=????????
Resetting default scope
 
LAST_CONTROL_TRANSFER:  from fffff8039c7d77e9 to fffff8039c7cbca0
 
STACK_TEXT:  
ffffd000`20953288 fffff803`9c7d77e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`20953290 fffff803`9c7d603a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd000`209533d0 : nt!KiBugCheckDispatch+0x69
ffffd000`209533d0 fffff800`00e1a43f : ffffd000`20953990 00000000`00000004 00000000`0000004e ffffe000`090a7650 : nt!KiPageFault+0x23a
ffffd000`20953560 fffff800`0123a9db : 00000000`00000000 00000000`00000001 ffffe000`01c0dd10 00000000`00000011 : NETIO!RtlCopyBufferToMdl+0x1f
ffffd000`209535c0 fffff800`0128b3c9 : 00000000`00000000 00000000`00000001 ffffd000`20953710 fffff800`037613b1 : tcpip!TcpTcbReassemblyRetrieveSegments+0x3bb
ffffd000`20953650 fffff800`01239644 : 00000000`00000000 fffff800`03732e5f ffffe000`05b73c40 ffffe000`06043f20 : tcpip!TcpTcbCarefulDatagram+0xa39
ffffd000`20953a00 fffff800`01288007 : 00000000`00000000 00000000`00000000 ffffe000`05cee300 ffffe000`02179da8 : tcpip!TcpTcbReceive+0x314
ffffd000`20953b50 fffff800`01238625 : ffffe000`0911b114 ffffe000`025f6000 00000000`00000000 ffffe000`001cefa0 : tcpip!TcpMatchReceive+0x1e7
ffffd000`20953ce0 fffff800`0123c9bf : ffffe000`036b25b0 ffffd000`209520cf ffffd000`20959992 ffffe000`07629992 : tcpip!TcpPreValidatedReceive+0x385
ffffd000`20953de0 fffff800`0123ccc3 : ffffe000`01b56030 00000000`00000000 ffffd000`20953ea8 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`20953ea0 fffff800`0124d13c : fffff800`013da180 ffffe000`001b5700 ffffe000`001b56c8 ffffd000`20953fa8 : tcpip!IppProcessDeliverList+0x63
ffffd000`20953f40 fffff800`0124a3da : ffffe000`04bb0880 00000000`20954400 ffffe000`025f6000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x1fc
ffffd000`20954070 fffff800`01249b3c : ffffe000`0879c320 00000000`00000000 ffffd000`20954400 ffffe000`01cfec00 : tcpip!IppFlcReceivePacketsCore+0x68a
ffffd000`209543f0 fffff800`012497ff : 00000000`00000017 00000000`00000000 fffff800`01248fa0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x31c
ffffd000`209544d0 fffff803`9c7363f9 : ffffe000`086c09f0 fffff803`00000001 ffffe000`036cb800 ffffd000`2094f000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17e
ffffd000`20954600 fffff800`01248f56 : fffff800`01249680 ffffd000`20954780 00000000`00000000 ffffd000`20954a50 : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`20954750 fffff800`010aecde : 00000000`00000000 ffffd000`20954831 ffffc000`00000002 00001f80`00260040 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`209547d0 fffff800`010af45d : ffffe000`00000702 fffff800`010b0000 00000000`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x11e
ffffd000`20954890 fffff800`04016046 : fffff800`04027330 fffff800`04011dc2 00000000`00000002 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x32d
ffffd000`20954a80 fffff800`04011f8a : fffff800`04027330 00000000`00000000 fffff803`9c96c180 ffffe000`00266140 : tunnel!TeredoWfpIndicationWorker+0x67
ffffd000`20954ac0 fffff803`9c71ea0e : ffffe000`0805ab00 ffffe000`088bbcc0 00000000`00000000 fffff803`9c91d100 : tunnel!LwWorker+0x1e
ffffd000`20954af0 fffff803`9c71f1b9 : ffffe000`01da5a40 fffff803`9c71e998 ffffd000`20954bd0 ffffe000`0805ab00 : nt!IopProcessWorkItem+0x76
ffffd000`20954b50 fffff803`9c70b2e4 : 00000000`00000000 ffffe000`00266040 ffffe000`00266040 ffffe000`00173480 : nt!ExpWorkerThread+0x2b5
ffffd000`20954c00 fffff803`9c7d22c6 : ffffd000`201e7180 ffffe000`00266040 ffffd000`201f3340 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd000`20954c60 00000000`00000000 : ffffd000`20955000 ffffd000`2094f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
 
 
STACK_COMMAND:  kb
 
FOLLOWUP_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
SYMBOL_STACK_INDEX:  3
 
SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1f
 
FOLLOWUP_NAME:  MachineOwner
 
MODULE_NAME: NETIO
 
IMAGE_NAME:  NETIO.SYS
 
DEBUG_FLR_IMAGE_TIMESTAMP:  5215f7e4
 
BUCKET_ID_FUNC_OFFSET:  1f
 
FAILURE_BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
Followup: MachineOwner
---------
 
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80000e1a43f, address which referenced memory
 
Debugging Details:
------------------
 
 
READ_ADDRESS:  0000000000000028 
 
CURRENT_IRQL:  2
 
FAULTING_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
 
BUGCHECK_STR:  AV
 
PROCESS_NAME:  System
 
TRAP_FRAME:  ffffd000209533d0 -- (.trap 0xffffd000209533d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd00020953600 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000e1a43f rsp=ffffd00020953560 rbp=ffffe0000867c7c0
 r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000001000
r11=ffffd00020953590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1f:
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h] ds:00000000`00000028=????????
Resetting default scope
 
LAST_CONTROL_TRANSFER:  from fffff8039c7d77e9 to fffff8039c7cbca0
 
STACK_TEXT:  
ffffd000`20953288 fffff803`9c7d77e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`20953290 fffff803`9c7d603a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd000`209533d0 : nt!KiBugCheckDispatch+0x69
ffffd000`209533d0 fffff800`00e1a43f : ffffd000`20953990 00000000`00000004 00000000`0000004e ffffe000`090a7650 : nt!KiPageFault+0x23a
ffffd000`20953560 fffff800`0123a9db : 00000000`00000000 00000000`00000001 ffffe000`01c0dd10 00000000`00000011 : NETIO!RtlCopyBufferToMdl+0x1f
ffffd000`209535c0 fffff800`0128b3c9 : 00000000`00000000 00000000`00000001 ffffd000`20953710 fffff800`037613b1 : tcpip!TcpTcbReassemblyRetrieveSegments+0x3bb
ffffd000`20953650 fffff800`01239644 : 00000000`00000000 fffff800`03732e5f ffffe000`05b73c40 ffffe000`06043f20 : tcpip!TcpTcbCarefulDatagram+0xa39
ffffd000`20953a00 fffff800`01288007 : 00000000`00000000 00000000`00000000 ffffe000`05cee300 ffffe000`02179da8 : tcpip!TcpTcbReceive+0x314
ffffd000`20953b50 fffff800`01238625 : ffffe000`0911b114 ffffe000`025f6000 00000000`00000000 ffffe000`001cefa0 : tcpip!TcpMatchReceive+0x1e7
ffffd000`20953ce0 fffff800`0123c9bf : ffffe000`036b25b0 ffffd000`209520cf ffffd000`20959992 ffffe000`07629992 : tcpip!TcpPreValidatedReceive+0x385
ffffd000`20953de0 fffff800`0123ccc3 : ffffe000`01b56030 00000000`00000000 ffffd000`20953ea8 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`20953ea0 fffff800`0124d13c : fffff800`013da180 ffffe000`001b5700 ffffe000`001b56c8 ffffd000`20953fa8 : tcpip!IppProcessDeliverList+0x63
ffffd000`20953f40 fffff800`0124a3da : ffffe000`04bb0880 00000000`20954400 ffffe000`025f6000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x1fc
ffffd000`20954070 fffff800`01249b3c : ffffe000`0879c320 00000000`00000000 ffffd000`20954400 ffffe000`01cfec00 : tcpip!IppFlcReceivePacketsCore+0x68a
ffffd000`209543f0 fffff800`012497ff : 00000000`00000017 00000000`00000000 fffff800`01248fa0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x31c
ffffd000`209544d0 fffff803`9c7363f9 : ffffe000`086c09f0 fffff803`00000001 ffffe000`036cb800 ffffd000`2094f000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17e
ffffd000`20954600 fffff800`01248f56 : fffff800`01249680 ffffd000`20954780 00000000`00000000 ffffd000`20954a50 : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`20954750 fffff800`010aecde : 00000000`00000000 ffffd000`20954831 ffffc000`00000002 00001f80`00260040 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`209547d0 fffff800`010af45d : ffffe000`00000702 fffff800`010b0000 00000000`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x11e
ffffd000`20954890 fffff800`04016046 : fffff800`04027330 fffff800`04011dc2 00000000`00000002 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x32d
ffffd000`20954a80 fffff800`04011f8a : fffff800`04027330 00000000`00000000 fffff803`9c96c180 ffffe000`00266140 : tunnel!TeredoWfpIndicationWorker+0x67
ffffd000`20954ac0 fffff803`9c71ea0e : ffffe000`0805ab00 ffffe000`088bbcc0 00000000`00000000 fffff803`9c91d100 : tunnel!LwWorker+0x1e
ffffd000`20954af0 fffff803`9c71f1b9 : ffffe000`01da5a40 fffff803`9c71e998 ffffd000`20954bd0 ffffe000`0805ab00 : nt!IopProcessWorkItem+0x76
ffffd000`20954b50 fffff803`9c70b2e4 : 00000000`00000000 ffffe000`00266040 ffffe000`00266040 ffffe000`00173480 : nt!ExpWorkerThread+0x2b5
ffffd000`20954c00 fffff803`9c7d22c6 : ffffd000`201e7180 ffffe000`00266040 ffffd000`201f3340 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd000`20954c60 00000000`00000000 : ffffd000`20955000 ffffd000`2094f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
 
 
STACK_COMMAND:  kb
 
FOLLOWUP_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
SYMBOL_STACK_INDEX:  3
 
SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1f
 
FOLLOWUP_NAME:  MachineOwner
 
MODULE_NAME: NETIO
 
IMAGE_NAME:  NETIO.SYS
 
DEBUG_FLR_IMAGE_TIMESTAMP:  5215f7e4
 
BUCKET_ID_FUNC_OFFSET:  1f
 
FAILURE_BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
Followup: MachineOwner
---------


#6 alonadel

alonadel

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Clearfield Utah
  • Local time:10:30 PM

Posted 04 July 2014 - 12:03 AM

It looks like NETIO.SYS is faulting, probably a faulty network driver, the issue your having is probably exacerbated by the increased traffic with your torrent use, thus the crashes. 

 

Grab the latest drivers for your NIC card if its a stand alone, if its a built in one then you'l prob need to just grab the chip-set package from the motherboard manufacturer. 

 

What brand and model pc are you using?


 

Im pretty sure it has someting to do with the drivers but i cant figure out which one.
Ill reupload the dump file so u can tell me the exact one. Thanks again

http://www.fast-files.com/getfile.aspx?file=75912

Had did the debug for u.... Here's his PC info...

 

 

 
Microsoft ® Windows Debugger Version 6.2.9200.20512 AMD64
Copyright © Microsoft Corporation. All rights reserved.
 
 
Loading Dump File [C:\Users\JinXiang\Downloads\0702142882801.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
 
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.16422.amd64fre.winblue_gdr.131006-1505
Machine Name:
Kernel base = 0xfffff803`9c67e000 PsLoadedModuleList = 0xfffff803`9c942990
Debug session time: Wed Jul  2 05:48:13.825 2014 (UTC + 8:00)
System Uptime: 0 days 0:20:05.542
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
Use !analyze -v to get detailed debugging information.
 
BugCheck D1, {28, 2, 0, fffff80000e1a43f}
 
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1f )
 
Followup: MachineOwner
---------
 
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80000e1a43f, address which referenced memory
 
Debugging Details:
------------------
 
 
READ_ADDRESS: fffff8039c930340: Unable to get special pool info
fffff8039c930340: Unable to get special pool info
GetUlongFromAddress: unable to read from fffff8039c9cb208
 0000000000000028 
 
CURRENT_IRQL:  2
 
FAULTING_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
 
BUGCHECK_STR:  AV
 
PROCESS_NAME:  System
 
TRAP_FRAME:  ffffd000209533d0 -- (.trap 0xffffd000209533d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd00020953600 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000e1a43f rsp=ffffd00020953560 rbp=ffffe0000867c7c0
 r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000001000
r11=ffffd00020953590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1f:
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h] ds:00000000`00000028=????????
Resetting default scope
 
LAST_CONTROL_TRANSFER:  from fffff8039c7d77e9 to fffff8039c7cbca0
 
STACK_TEXT:  
ffffd000`20953288 fffff803`9c7d77e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`20953290 fffff803`9c7d603a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd000`209533d0 : nt!KiBugCheckDispatch+0x69
ffffd000`209533d0 fffff800`00e1a43f : ffffd000`20953990 00000000`00000004 00000000`0000004e ffffe000`090a7650 : nt!KiPageFault+0x23a
ffffd000`20953560 fffff800`0123a9db : 00000000`00000000 00000000`00000001 ffffe000`01c0dd10 00000000`00000011 : NETIO!RtlCopyBufferToMdl+0x1f
ffffd000`209535c0 fffff800`0128b3c9 : 00000000`00000000 00000000`00000001 ffffd000`20953710 fffff800`037613b1 : tcpip!TcpTcbReassemblyRetrieveSegments+0x3bb
ffffd000`20953650 fffff800`01239644 : 00000000`00000000 fffff800`03732e5f ffffe000`05b73c40 ffffe000`06043f20 : tcpip!TcpTcbCarefulDatagram+0xa39
ffffd000`20953a00 fffff800`01288007 : 00000000`00000000 00000000`00000000 ffffe000`05cee300 ffffe000`02179da8 : tcpip!TcpTcbReceive+0x314
ffffd000`20953b50 fffff800`01238625 : ffffe000`0911b114 ffffe000`025f6000 00000000`00000000 ffffe000`001cefa0 : tcpip!TcpMatchReceive+0x1e7
ffffd000`20953ce0 fffff800`0123c9bf : ffffe000`036b25b0 ffffd000`209520cf ffffd000`20959992 ffffe000`07629992 : tcpip!TcpPreValidatedReceive+0x385
ffffd000`20953de0 fffff800`0123ccc3 : ffffe000`01b56030 00000000`00000000 ffffd000`20953ea8 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`20953ea0 fffff800`0124d13c : fffff800`013da180 ffffe000`001b5700 ffffe000`001b56c8 ffffd000`20953fa8 : tcpip!IppProcessDeliverList+0x63
ffffd000`20953f40 fffff800`0124a3da : ffffe000`04bb0880 00000000`20954400 ffffe000`025f6000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x1fc
ffffd000`20954070 fffff800`01249b3c : ffffe000`0879c320 00000000`00000000 ffffd000`20954400 ffffe000`01cfec00 : tcpip!IppFlcReceivePacketsCore+0x68a
ffffd000`209543f0 fffff800`012497ff : 00000000`00000017 00000000`00000000 fffff800`01248fa0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x31c
ffffd000`209544d0 fffff803`9c7363f9 : ffffe000`086c09f0 fffff803`00000001 ffffe000`036cb800 ffffd000`2094f000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17e
ffffd000`20954600 fffff800`01248f56 : fffff800`01249680 ffffd000`20954780 00000000`00000000 ffffd000`20954a50 : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`20954750 fffff800`010aecde : 00000000`00000000 ffffd000`20954831 ffffc000`00000002 00001f80`00260040 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`209547d0 fffff800`010af45d : ffffe000`00000702 fffff800`010b0000 00000000`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x11e
ffffd000`20954890 fffff800`04016046 : fffff800`04027330 fffff800`04011dc2 00000000`00000002 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x32d
ffffd000`20954a80 fffff800`04011f8a : fffff800`04027330 00000000`00000000 fffff803`9c96c180 ffffe000`00266140 : tunnel!TeredoWfpIndicationWorker+0x67
ffffd000`20954ac0 fffff803`9c71ea0e : ffffe000`0805ab00 ffffe000`088bbcc0 00000000`00000000 fffff803`9c91d100 : tunnel!LwWorker+0x1e
ffffd000`20954af0 fffff803`9c71f1b9 : ffffe000`01da5a40 fffff803`9c71e998 ffffd000`20954bd0 ffffe000`0805ab00 : nt!IopProcessWorkItem+0x76
ffffd000`20954b50 fffff803`9c70b2e4 : 00000000`00000000 ffffe000`00266040 ffffe000`00266040 ffffe000`00173480 : nt!ExpWorkerThread+0x2b5
ffffd000`20954c00 fffff803`9c7d22c6 : ffffd000`201e7180 ffffe000`00266040 ffffd000`201f3340 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd000`20954c60 00000000`00000000 : ffffd000`20955000 ffffd000`2094f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
 
 
STACK_COMMAND:  kb
 
FOLLOWUP_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
SYMBOL_STACK_INDEX:  3
 
SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1f
 
FOLLOWUP_NAME:  MachineOwner
 
MODULE_NAME: NETIO
 
IMAGE_NAME:  NETIO.SYS
 
DEBUG_FLR_IMAGE_TIMESTAMP:  5215f7e4
 
BUCKET_ID_FUNC_OFFSET:  1f
 
FAILURE_BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
Followup: MachineOwner
---------
 
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80000e1a43f, address which referenced memory
 
Debugging Details:
------------------
 
 
READ_ADDRESS:  0000000000000028 
 
CURRENT_IRQL:  2
 
FAULTING_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
 
BUGCHECK_STR:  AV
 
PROCESS_NAME:  System
 
TRAP_FRAME:  ffffd000209533d0 -- (.trap 0xffffd000209533d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd00020953600 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000e1a43f rsp=ffffd00020953560 rbp=ffffe0000867c7c0
 r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000001000
r11=ffffd00020953590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1f:
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h] ds:00000000`00000028=????????
Resetting default scope
 
LAST_CONTROL_TRANSFER:  from fffff8039c7d77e9 to fffff8039c7cbca0
 
STACK_TEXT:  
ffffd000`20953288 fffff803`9c7d77e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`20953290 fffff803`9c7d603a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd000`209533d0 : nt!KiBugCheckDispatch+0x69
ffffd000`209533d0 fffff800`00e1a43f : ffffd000`20953990 00000000`00000004 00000000`0000004e ffffe000`090a7650 : nt!KiPageFault+0x23a
ffffd000`20953560 fffff800`0123a9db : 00000000`00000000 00000000`00000001 ffffe000`01c0dd10 00000000`00000011 : NETIO!RtlCopyBufferToMdl+0x1f
ffffd000`209535c0 fffff800`0128b3c9 : 00000000`00000000 00000000`00000001 ffffd000`20953710 fffff800`037613b1 : tcpip!TcpTcbReassemblyRetrieveSegments+0x3bb
ffffd000`20953650 fffff800`01239644 : 00000000`00000000 fffff800`03732e5f ffffe000`05b73c40 ffffe000`06043f20 : tcpip!TcpTcbCarefulDatagram+0xa39
ffffd000`20953a00 fffff800`01288007 : 00000000`00000000 00000000`00000000 ffffe000`05cee300 ffffe000`02179da8 : tcpip!TcpTcbReceive+0x314
ffffd000`20953b50 fffff800`01238625 : ffffe000`0911b114 ffffe000`025f6000 00000000`00000000 ffffe000`001cefa0 : tcpip!TcpMatchReceive+0x1e7
ffffd000`20953ce0 fffff800`0123c9bf : ffffe000`036b25b0 ffffd000`209520cf ffffd000`20959992 ffffe000`07629992 : tcpip!TcpPreValidatedReceive+0x385
ffffd000`20953de0 fffff800`0123ccc3 : ffffe000`01b56030 00000000`00000000 ffffd000`20953ea8 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`20953ea0 fffff800`0124d13c : fffff800`013da180 ffffe000`001b5700 ffffe000`001b56c8 ffffd000`20953fa8 : tcpip!IppProcessDeliverList+0x63
ffffd000`20953f40 fffff800`0124a3da : ffffe000`04bb0880 00000000`20954400 ffffe000`025f6000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x1fc
ffffd000`20954070 fffff800`01249b3c : ffffe000`0879c320 00000000`00000000 ffffd000`20954400 ffffe000`01cfec00 : tcpip!IppFlcReceivePacketsCore+0x68a
ffffd000`209543f0 fffff800`012497ff : 00000000`00000017 00000000`00000000 fffff800`01248fa0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x31c
ffffd000`209544d0 fffff803`9c7363f9 : ffffe000`086c09f0 fffff803`00000001 ffffe000`036cb800 ffffd000`2094f000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17e
ffffd000`20954600 fffff800`01248f56 : fffff800`01249680 ffffd000`20954780 00000000`00000000 ffffd000`20954a50 : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`20954750 fffff800`010aecde : 00000000`00000000 ffffd000`20954831 ffffc000`00000002 00001f80`00260040 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`209547d0 fffff800`010af45d : ffffe000`00000702 fffff800`010b0000 00000000`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x11e
ffffd000`20954890 fffff800`04016046 : fffff800`04027330 fffff800`04011dc2 00000000`00000002 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x32d
ffffd000`20954a80 fffff800`04011f8a : fffff800`04027330 00000000`00000000 fffff803`9c96c180 ffffe000`00266140 : tunnel!TeredoWfpIndicationWorker+0x67
ffffd000`20954ac0 fffff803`9c71ea0e : ffffe000`0805ab00 ffffe000`088bbcc0 00000000`00000000 fffff803`9c91d100 : tunnel!LwWorker+0x1e
ffffd000`20954af0 fffff803`9c71f1b9 : ffffe000`01da5a40 fffff803`9c71e998 ffffd000`20954bd0 ffffe000`0805ab00 : nt!IopProcessWorkItem+0x76
ffffd000`20954b50 fffff803`9c70b2e4 : 00000000`00000000 ffffe000`00266040 ffffe000`00266040 ffffe000`00173480 : nt!ExpWorkerThread+0x2b5
ffffd000`20954c00 fffff803`9c7d22c6 : ffffd000`201e7180 ffffe000`00266040 ffffd000`201f3340 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd000`20954c60 00000000`00000000 : ffffd000`20955000 ffffd000`2094f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
 
 
STACK_COMMAND:  kb
 
FOLLOWUP_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
SYMBOL_STACK_INDEX:  3
 
SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1f
 
FOLLOWUP_NAME:  MachineOwner
 
MODULE_NAME: NETIO
 
IMAGE_NAME:  NETIO.SYS
 
DEBUG_FLR_IMAGE_TIMESTAMP:  5215f7e4
 
BUCKET_ID_FUNC_OFFSET:  1f
 
FAILURE_BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
Followup: MachineOwner
---------

 

JinXiang, thanks for debugging that, I dont have package installed for it atm.



#7 L_Alive

L_Alive
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:10:00 AM

Posted 04 July 2014 - 04:40 AM

Thanks for the replies. I am using the Asus n550jv. The issues seemed to have resolved once i reinstalled clean windows 8 and havent occured since. Though i did google a bit and it seems there is indeed a problem with the wifi of this model



#8 alonadel

alonadel

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Clearfield Utah
  • Local time:10:30 PM

Posted 06 July 2014 - 08:42 PM

Glad to help out, A clean install is a very good way of getting a bad driver off as it wipes it out :-)). 

I would suggest making sure to check the Asus site for any special drivers for windows 8 if you continue to have issues again in the future. 



#9 jinxiang

jinxiang

  • Members
  • 97 posts
  • OFFLINE
  •  
  • Local time:12:30 PM

Posted 07 July 2014 - 07:36 AM

It looks like NETIO.SYS is faulting, probably a faulty network driver, the issue your having is probably exacerbated by the increased traffic with your torrent use, thus the crashes. 

 

Grab the latest drivers for your NIC card if its a stand alone, if its a built in one then you'l prob need to just grab the chip-set package from the motherboard manufacturer. 

 

What brand and model pc are you using?


 

Im pretty sure it has someting to do with the drivers but i cant figure out which one.
Ill reupload the dump file so u can tell me the exact one. Thanks again

http://www.fast-files.com/getfile.aspx?file=75912

Had did the debug for u.... Here's his PC info...

 

 

 
Microsoft ® Windows Debugger Version 6.2.9200.20512 AMD64
Copyright © Microsoft Corporation. All rights reserved.
 
 
Loading Dump File [C:\Users\JinXiang\Downloads\0702142882801.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
 
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.16422.amd64fre.winblue_gdr.131006-1505
Machine Name:
Kernel base = 0xfffff803`9c67e000 PsLoadedModuleList = 0xfffff803`9c942990
Debug session time: Wed Jul  2 05:48:13.825 2014 (UTC + 8:00)
System Uptime: 0 days 0:20:05.542
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
Use !analyze -v to get detailed debugging information.
 
BugCheck D1, {28, 2, 0, fffff80000e1a43f}
 
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1f )
 
Followup: MachineOwner
---------
 
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80000e1a43f, address which referenced memory
 
Debugging Details:
------------------
 
 
READ_ADDRESS: fffff8039c930340: Unable to get special pool info
fffff8039c930340: Unable to get special pool info
GetUlongFromAddress: unable to read from fffff8039c9cb208
 0000000000000028 
 
CURRENT_IRQL:  2
 
FAULTING_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
 
BUGCHECK_STR:  AV
 
PROCESS_NAME:  System
 
TRAP_FRAME:  ffffd000209533d0 -- (.trap 0xffffd000209533d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd00020953600 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000e1a43f rsp=ffffd00020953560 rbp=ffffe0000867c7c0
 r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000001000
r11=ffffd00020953590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1f:
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h] ds:00000000`00000028=????????
Resetting default scope
 
LAST_CONTROL_TRANSFER:  from fffff8039c7d77e9 to fffff8039c7cbca0
 
STACK_TEXT:  
ffffd000`20953288 fffff803`9c7d77e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`20953290 fffff803`9c7d603a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd000`209533d0 : nt!KiBugCheckDispatch+0x69
ffffd000`209533d0 fffff800`00e1a43f : ffffd000`20953990 00000000`00000004 00000000`0000004e ffffe000`090a7650 : nt!KiPageFault+0x23a
ffffd000`20953560 fffff800`0123a9db : 00000000`00000000 00000000`00000001 ffffe000`01c0dd10 00000000`00000011 : NETIO!RtlCopyBufferToMdl+0x1f
ffffd000`209535c0 fffff800`0128b3c9 : 00000000`00000000 00000000`00000001 ffffd000`20953710 fffff800`037613b1 : tcpip!TcpTcbReassemblyRetrieveSegments+0x3bb
ffffd000`20953650 fffff800`01239644 : 00000000`00000000 fffff800`03732e5f ffffe000`05b73c40 ffffe000`06043f20 : tcpip!TcpTcbCarefulDatagram+0xa39
ffffd000`20953a00 fffff800`01288007 : 00000000`00000000 00000000`00000000 ffffe000`05cee300 ffffe000`02179da8 : tcpip!TcpTcbReceive+0x314
ffffd000`20953b50 fffff800`01238625 : ffffe000`0911b114 ffffe000`025f6000 00000000`00000000 ffffe000`001cefa0 : tcpip!TcpMatchReceive+0x1e7
ffffd000`20953ce0 fffff800`0123c9bf : ffffe000`036b25b0 ffffd000`209520cf ffffd000`20959992 ffffe000`07629992 : tcpip!TcpPreValidatedReceive+0x385
ffffd000`20953de0 fffff800`0123ccc3 : ffffe000`01b56030 00000000`00000000 ffffd000`20953ea8 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`20953ea0 fffff800`0124d13c : fffff800`013da180 ffffe000`001b5700 ffffe000`001b56c8 ffffd000`20953fa8 : tcpip!IppProcessDeliverList+0x63
ffffd000`20953f40 fffff800`0124a3da : ffffe000`04bb0880 00000000`20954400 ffffe000`025f6000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x1fc
ffffd000`20954070 fffff800`01249b3c : ffffe000`0879c320 00000000`00000000 ffffd000`20954400 ffffe000`01cfec00 : tcpip!IppFlcReceivePacketsCore+0x68a
ffffd000`209543f0 fffff800`012497ff : 00000000`00000017 00000000`00000000 fffff800`01248fa0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x31c
ffffd000`209544d0 fffff803`9c7363f9 : ffffe000`086c09f0 fffff803`00000001 ffffe000`036cb800 ffffd000`2094f000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17e
ffffd000`20954600 fffff800`01248f56 : fffff800`01249680 ffffd000`20954780 00000000`00000000 ffffd000`20954a50 : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`20954750 fffff800`010aecde : 00000000`00000000 ffffd000`20954831 ffffc000`00000002 00001f80`00260040 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`209547d0 fffff800`010af45d : ffffe000`00000702 fffff800`010b0000 00000000`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x11e
ffffd000`20954890 fffff800`04016046 : fffff800`04027330 fffff800`04011dc2 00000000`00000002 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x32d
ffffd000`20954a80 fffff800`04011f8a : fffff800`04027330 00000000`00000000 fffff803`9c96c180 ffffe000`00266140 : tunnel!TeredoWfpIndicationWorker+0x67
ffffd000`20954ac0 fffff803`9c71ea0e : ffffe000`0805ab00 ffffe000`088bbcc0 00000000`00000000 fffff803`9c91d100 : tunnel!LwWorker+0x1e
ffffd000`20954af0 fffff803`9c71f1b9 : ffffe000`01da5a40 fffff803`9c71e998 ffffd000`20954bd0 ffffe000`0805ab00 : nt!IopProcessWorkItem+0x76
ffffd000`20954b50 fffff803`9c70b2e4 : 00000000`00000000 ffffe000`00266040 ffffe000`00266040 ffffe000`00173480 : nt!ExpWorkerThread+0x2b5
ffffd000`20954c00 fffff803`9c7d22c6 : ffffd000`201e7180 ffffe000`00266040 ffffd000`201f3340 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd000`20954c60 00000000`00000000 : ffffd000`20955000 ffffd000`2094f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
 
 
STACK_COMMAND:  kb
 
FOLLOWUP_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
SYMBOL_STACK_INDEX:  3
 
SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1f
 
FOLLOWUP_NAME:  MachineOwner
 
MODULE_NAME: NETIO
 
IMAGE_NAME:  NETIO.SYS
 
DEBUG_FLR_IMAGE_TIMESTAMP:  5215f7e4
 
BUCKET_ID_FUNC_OFFSET:  1f
 
FAILURE_BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
Followup: MachineOwner
---------
 
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
 
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80000e1a43f, address which referenced memory
 
Debugging Details:
------------------
 
 
READ_ADDRESS:  0000000000000028 
 
CURRENT_IRQL:  2
 
FAULTING_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
 
BUGCHECK_STR:  AV
 
PROCESS_NAME:  System
 
TRAP_FRAME:  ffffd000209533d0 -- (.trap 0xffffd000209533d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd00020953600 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000e1a43f rsp=ffffd00020953560 rbp=ffffe0000867c7c0
 r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000001000
r11=ffffd00020953590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1f:
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h] ds:00000000`00000028=????????
Resetting default scope
 
LAST_CONTROL_TRANSFER:  from fffff8039c7d77e9 to fffff8039c7cbca0
 
STACK_TEXT:  
ffffd000`20953288 fffff803`9c7d77e9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`20953290 fffff803`9c7d603a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd000`209533d0 : nt!KiBugCheckDispatch+0x69
ffffd000`209533d0 fffff800`00e1a43f : ffffd000`20953990 00000000`00000004 00000000`0000004e ffffe000`090a7650 : nt!KiPageFault+0x23a
ffffd000`20953560 fffff800`0123a9db : 00000000`00000000 00000000`00000001 ffffe000`01c0dd10 00000000`00000011 : NETIO!RtlCopyBufferToMdl+0x1f
ffffd000`209535c0 fffff800`0128b3c9 : 00000000`00000000 00000000`00000001 ffffd000`20953710 fffff800`037613b1 : tcpip!TcpTcbReassemblyRetrieveSegments+0x3bb
ffffd000`20953650 fffff800`01239644 : 00000000`00000000 fffff800`03732e5f ffffe000`05b73c40 ffffe000`06043f20 : tcpip!TcpTcbCarefulDatagram+0xa39
ffffd000`20953a00 fffff800`01288007 : 00000000`00000000 00000000`00000000 ffffe000`05cee300 ffffe000`02179da8 : tcpip!TcpTcbReceive+0x314
ffffd000`20953b50 fffff800`01238625 : ffffe000`0911b114 ffffe000`025f6000 00000000`00000000 ffffe000`001cefa0 : tcpip!TcpMatchReceive+0x1e7
ffffd000`20953ce0 fffff800`0123c9bf : ffffe000`036b25b0 ffffd000`209520cf ffffd000`20959992 ffffe000`07629992 : tcpip!TcpPreValidatedReceive+0x385
ffffd000`20953de0 fffff800`0123ccc3 : ffffe000`01b56030 00000000`00000000 ffffd000`20953ea8 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4f
ffffd000`20953ea0 fffff800`0124d13c : fffff800`013da180 ffffe000`001b5700 ffffe000`001b56c8 ffffd000`20953fa8 : tcpip!IppProcessDeliverList+0x63
ffffd000`20953f40 fffff800`0124a3da : ffffe000`04bb0880 00000000`20954400 ffffe000`025f6000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x1fc
ffffd000`20954070 fffff800`01249b3c : ffffe000`0879c320 00000000`00000000 ffffd000`20954400 ffffe000`01cfec00 : tcpip!IppFlcReceivePacketsCore+0x68a
ffffd000`209543f0 fffff800`012497ff : 00000000`00000017 00000000`00000000 fffff800`01248fa0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x31c
ffffd000`209544d0 fffff803`9c7363f9 : ffffe000`086c09f0 fffff803`00000001 ffffe000`036cb800 ffffd000`2094f000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17e
ffffd000`20954600 fffff800`01248f56 : fffff800`01249680 ffffd000`20954780 00000000`00000000 ffffd000`20954a50 : nt!KeExpandKernelStackAndCalloutInternal+0xe9
ffffd000`20954750 fffff800`010aecde : 00000000`00000000 ffffd000`20954831 ffffc000`00000002 00001f80`00260040 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd000`209547d0 fffff800`010af45d : ffffe000`00000702 fffff800`010b0000 00000000`00000000 00000000`00000002 : ndis!ndisMIndicateNetBufferListsToOpen+0x11e
ffffd000`20954890 fffff800`04016046 : fffff800`04027330 fffff800`04011dc2 00000000`00000002 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x32d
ffffd000`20954a80 fffff800`04011f8a : fffff800`04027330 00000000`00000000 fffff803`9c96c180 ffffe000`00266140 : tunnel!TeredoWfpIndicationWorker+0x67
ffffd000`20954ac0 fffff803`9c71ea0e : ffffe000`0805ab00 ffffe000`088bbcc0 00000000`00000000 fffff803`9c91d100 : tunnel!LwWorker+0x1e
ffffd000`20954af0 fffff803`9c71f1b9 : ffffe000`01da5a40 fffff803`9c71e998 ffffd000`20954bd0 ffffe000`0805ab00 : nt!IopProcessWorkItem+0x76
ffffd000`20954b50 fffff803`9c70b2e4 : 00000000`00000000 ffffe000`00266040 ffffe000`00266040 ffffe000`00173480 : nt!ExpWorkerThread+0x2b5
ffffd000`20954c00 fffff803`9c7d22c6 : ffffd000`201e7180 ffffe000`00266040 ffffd000`201f3340 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd000`20954c60 00000000`00000000 : ffffd000`20955000 ffffd000`2094f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
 
 
STACK_COMMAND:  kb
 
FOLLOWUP_IP: 
NETIO!RtlCopyBufferToMdl+1f
fffff800`00e1a43f 8b5228          mov     edx,dword ptr [rdx+28h]
 
SYMBOL_STACK_INDEX:  3
 
SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1f
 
FOLLOWUP_NAME:  MachineOwner
 
MODULE_NAME: NETIO
 
IMAGE_NAME:  NETIO.SYS
 
DEBUG_FLR_IMAGE_TIMESTAMP:  5215f7e4
 
BUCKET_ID_FUNC_OFFSET:  1f
 
FAILURE_BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
BUCKET_ID:  AV_NETIO!RtlCopyBufferToMdl
 
Followup: MachineOwner
---------

 

JinXiang, thanks for debugging that, I dont have package installed for it atm.

No prob.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users