6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000009, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8010ed9009d, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1124
Key : Analysis.Elapsed.mSec
Value: 4955
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 93
Key : Analysis.Init.Elapsed.mSec
Value: 5480
Key : Analysis.Memory.CommitPeak.Mb
Value: 127
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_NETIO!CmRegUtilUcValueGetFullBuffer
Key : Failure.Hash
Value: {a382ffb4-3138-b303-0926-0bd418cdbdba}
BUGCHECK_CODE: d1
BUGCHECK_P1: 9
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8010ed9009d
FILE_IN_CAB: 030124-12671-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
READ_ADDRESS: fffff8010cf1c470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000009
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffaf00258a4d20 -- (.trap 0xffffaf00258a4d20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffaf00258a5770 rbx=0000000000000000 rcx=fffff8010ed90007
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8010ed9009d rsp=ffffaf00258a4eb0 rbp=ffffaf00258a4ef0
r8=fffff8010ed00000 r9=ffff8d8fbd4fdf68 r10=ffffaf00258a5770
r11=597ba027fed9d7b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
NETIO!CmRegUtilUcValueGetFullBuffer+0x12d:
fffff801`0ed9009d 837b0403 cmp dword ptr [rbx+4],3 ds:00000000`00000004=????????
Resetting default scope
STACK_TEXT:
ffffaf00`258a4bd8 fffff801`0c62c5e9 : 00000000`0000000a 00000000`00000009 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaf00`258a4be0 fffff801`0c627b34 : 00000000`00200001 fffff801`0c43c355 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaf00`258a4d20 fffff801`0ed9009d : ffffe700`8695d180 00000000`00000008 fffff801`0cf4b0d0 fffff801`0eb73940 : nt!KiPageFault+0x474
ffffaf00`258a4eb0 fffff801`0ed0806d : 00000000`00000005 ffffaf00`258a54e0 ffff8d8f`a875baa0 ffff2ed4`00000001 : NETIO!CmRegUtilUcValueGetFullBuffer+0x12d
ffffaf00`258a4f00 fffff801`0ed051d5 : ffff8d8f`b5bb8010 fffff801`0c40e93d ffff8d8f`ac9a2000 ffffaf00`258a5830 : NETIO!KfdClassify+0xcbd
ffffaf00`258a52b0 fffff801`0ed04dd8 : 00000000`00002702 fffff801`0ee34f54 00000000`00002702 ffffaf00`258a5590 : NETIO!StreamClassify+0x279
ffffaf00`258a5450 fffff801`0ed04a47 : ffffaf00`258a5ba0 fffff801`00000001 00000000`00000054 00000000`00000000 : NETIO!StreamCommonInspect+0x2ac
ffffaf00`258a5840 fffff801`0ee29511 : ffff8d8f`ba811a00 ffff8d8f`ba811ce0 ffffaf00`258a59c0 ffff8d8f`ba811ab0 : NETIO!WfpStreamInspectReceive+0x157
ffffaf00`258a58c0 fffff801`0ee279ee : ffff8d8f`ad763200 fffff801`255da772 00000000`00000000 00000000`00000000 : tcpip!TcpTcbFastDatagram+0x1351
ffffaf00`258a5ac0 fffff801`0ee23e19 : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8d8f`ac9d5148 : tcpip!TcpTcbReceive+0x29e
ffffaf00`258a5c60 fffff801`0ee22f36 : 00000000`5981e2a9 00000000`00000010 ffff8d8f`b1305080 ffff8d8f`ac9d5148 : tcpip!TcpMatchReceive+0x519
ffffaf00`258a5e30 fffff801`0ee1f966 : ffff8d8f`a83ff480 ffff8d8f`b1036078 00000000`00000001 ffff8d8f`b9ee3130 : tcpip!TcpReceive+0x486
ffffaf00`258a5f40 fffff801`0ee47f46 : fffff801`0efd5400 00000000`00000000 00000000`00000014 ffff8d8f`ac9d53d8 : tcpip!TcpNlClientReceiveDatagrams+0x16
ffffaf00`258a5f70 fffff801`0ee47d39 : 00000000`00000000 ffff8d8f`00000006 ffff8d8f`ac9d5000 ffffaf00`258a60c0 : tcpip!IppProcessDeliverList+0xb6
ffffaf00`258a6060 fffff801`0ee46a02 : fffff801`0f0049d0 ffff8d8f`ac8308a0 ffff8d8f`ac9d5000 ffffaf00`258a61a0 : tcpip!IppReceiveHeaderBatch+0x3a9
ffffaf00`258a6150 fffff801`0ee9b6c6 : ffff8d8f`b64dfe50 ffff8d8f`c19cd160 ffffaf00`258a6201 00000000`00000000 : tcpip!IppReceivePackets+0x502
ffffaf00`258a6280 fffff801`0ee66a1b : ffff8d8f`b64dfe50 ffff8d8f`c19cd160 ffff8d8f`a4010380 ffff8d8f`a4010100 : tcpip!IpFlcReceivePreValidatedPackets+0x11c6
ffffaf00`258a6410 fffff801`0c4eb8aa : 00000000`00000006 fffff801`0ee668d0 ffff8d8f`b6f500b4 00000000`00000002 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x14b
ffffaf00`258a6560 fffff801`0c4eb81d : fffff801`0ee668d0 ffffaf00`258a66a8 ffff8d8f`a7effd90 ffffaf00`258a6c00 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
ffffaf00`258a65d0 fffff801`0ee67d30 : 00000000`00000000 fffff801`0c485de8 00000000`0000000c ffffaf00`258a66e9 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffaf00`258a6610 fffff801`0eb826e1 : 00000000`00000001 00000000`00000000 00000000`00000005 ffff8d8f`bed18920 : tcpip!FlReceiveNetBufferListChain+0x530
ffffaf00`258a68f0 fffff801`0eb820fa : ffff8d8f`b6e1fb20 fffff801`0eba0801 ffff8d8f`00000000 ffff8d8f`00000005 : ndis!ndisMIndicateNetBufferListsToOpen+0x141
ffffaf00`258a69d0 fffff801`0eba6298 : ffff8d8f`ad32f1a0 00000000`00000000 fffffff0`00000000 ffff8d8f`ad32f1a0 : ndis!ndisMTopReceiveNetBufferLists+0x24a
ffffaf00`258a6ab0 fffff801`0eba873b : 00000000`00000000 00000000`00000000 ffff8d8f`c19cd160 fffff801`0eb732ed : ndis!ndisInvokeNextReceiveHandler+0x54
ffffaf00`258a6b10 fffff801`09851279 : ffff8d8f`00000000 00000000`00000000 ffff8d8f`00000000 fffff801`00000005 : ndis!NdisFIndicateReceiveNetBufferLists+0x340bb
ffffaf00`258a6bc0 fffff801`0eba6225 : 00000000`00000001 ffff8d8f`b6eeb028 00000000`00000000 00000000`00000005 : nwifi!Pt6Receive+0x159
ffffaf00`258a6c80 fffff801`0eba5c93 : 00000000`00005db8 ffffaf00`258a6da0 00000000`00000000 fffff801`0c4ebaa5 : ndis!ndisCallReceiveHandler+0xb9
ffffaf00`258a6cd0 fffff801`0ebac70a : ffffaf00`258a6db8 ffffaf00`00000000 00000000`00011505 ffffaf00`258a6e98 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
ffffaf00`258a6d20 fffff801`0eba631f : ffff8d8f`c17df940 fffff801`00000000 ffffaf00`00000005 ffffe700`00000000 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
ffffaf00`258a6dc0 fffff801`0eba873b : 00000000`00000000 00000000`00000000 ffff8d8f`c17df940 00000011`00000011 : ndis!ndisInvokeNextReceiveHandler+0xdb
ffffaf00`258a6e20 fffff801`24755ffb : ffff8d8f`b6edeb00 00000000`00000000 00000000`00000000 fffff801`00000005 : ndis!NdisFIndicateReceiveNetBufferLists+0x340bb
ffffaf00`258a6ed0 fffff801`0eba6225 : ffff8d8f`b6eddb30 fffff801`24755f20 ffff8d8f`b6eeb010 ffffaf00`258a7108 : vwififlt!FilterReceiveNetBufferLists+0xdb
ffffaf00`258a6f30 fffff801`0eba5c93 : 00000000`00006068 ffffaf00`258a7050 00000000`00000000 fffff801`0c4ebaa5 : ndis!ndisCallReceiveHandler+0xb9
ffffaf00`258a6f80 fffff801`0ebac70a : ffffaf00`258a7068 00000000`00000000 ffffaf00`258a70c0 ffffaf00`258a7110 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
ffffaf00`258a6fd0 fffff801`0eba631f : ffff8d8f`c17df940 fffff801`00000000 00000000`00000005 00000000`00000000 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
ffffaf00`258a7070 fffff801`0eba873b : 00000000`00000000 00000000`00000000 ffff8d8f`c17df940 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb
ffffaf00`258a70d0 fffff801`0f1b12dc : ffff8d8f`b6edc000 ffffaf00`258a71e1 00000000`00000000 00000000`00000005 : ndis!NdisFIndicateReceiveNetBufferLists+0x340bb
ffffaf00`258a7180 fffff801`0eba6225 : 00000000`00000005 ffff8d8f`c17df940 ffff8d8f`c17df940 00000000`00000001 : wfplwfs!LwfLowerRecvNetBufferLists+0x14c
ffffaf00`258a7240 fffff801`0eba5c93 : 00000000`00006378 ffffaf00`258a7360 00000000`00000000 fffff801`0c4ebaa5 : ndis!ndisCallReceiveHandler+0xb9
ffffaf00`258a7290 fffff801`0ebac70a : ffffaf00`258a7378 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
ffffaf00`258a72e0 fffff801`0eba631f : ffff8d8f`c17df940 00000000`00000000 ffff8d8f`00000005 00000000`00000000 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
ffffaf00`258a7380 fffff801`0eb83766 : 00000000`0004f30a 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb
ffffaf00`258a73e0 fffff801`255dc94d : ffff8d8f`a50ea002 ffff8d8f`ad2b8ab0 ffffaf00`258a7570 00000000`00000005 : ndis!NdisMIndicateReceiveNetBufferLists+0x116
ffffaf00`258a7470 fffff801`255dbf9e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : wdiwifi!CPort::IndicateFrames+0xad
ffffaf00`258a75b0 fffff801`255db417 : 00000000`00000000 ffffaf00`258a7748 fffff801`256bf040 ffffc28b`4d600000 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x41e
ffffaf00`258a76e0 fffff801`255db268 : ffff8d8f`c17df940 ffff8d8f`00000003 00000000`0000000a ffff2ed4`16a8052a : wdiwifi!CRxMgr::RxInOrderDataInd+0x127
ffffaf00`258a7790 fffff801`3178bd0e : ffff8d8f`ad57d8c0 ffff8d8f`ad497270 00000000`00000001 ffff8d8f`ac7de040 : wdiwifi!AdapterRxInorderDataInd+0x88
ffffaf00`258a77e0 ffff8d8f`ad57d8c0 : ffff8d8f`ad497270 00000000`00000001 ffff8d8f`ac7de040 ffffaf00`258a7828 : Netwtw12+0x4bd0e
ffffaf00`258a77e8 ffff8d8f`ad497270 : 00000000`00000001 ffff8d8f`ac7de040 ffffaf00`258a7828 ffffaf00`258a7820 : 0xffff8d8f`ad57d8c0
ffffaf00`258a77f0 00000000`00000001 : ffff8d8f`ac7de040 ffffaf00`258a7828 ffffaf00`258a7820 00000000`00000004 : 0xffff8d8f`ad497270
ffffaf00`258a77f8 ffff8d8f`ac7de040 : ffffaf00`258a7828 ffffaf00`258a7820 00000000`00000004 00000000`00000002 : 0x1
ffffaf00`258a7800 ffffaf00`258a7828 : ffffaf00`258a7820 00000000`00000004 00000000`00000002 00000000`00000000 : 0xffff8d8f`ac7de040
ffffaf00`258a7808 ffffaf00`258a7820 : 00000000`00000004 00000000`00000002 00000000`00000000 fffffffe`ffffffff : 0xffffaf00`258a7828
ffffaf00`258a7810 00000000`00000004 : 00000000`00000002 00000000`00000000 fffffffe`ffffffff ffff4b55`f205ac89 : 0xffffaf00`258a7820
ffffaf00`258a7818 00000000`00000002 : 00000000`00000000 fffffffe`ffffffff ffff4b55`f205ac89 ffff8d8f`b6f50040 : 0x4
ffffaf00`258a7820 00000000`00000000 : fffffffe`ffffffff ffff4b55`f205ac89 ffff8d8f`b6f50040 00000000`00000009 : 0x2
SYMBOL_NAME: NETIO!CmRegUtilUcValueGetFullBuffer+12d
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.22621.3155
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 12d
FAILURE_BUCKET_ID: AV_NETIO!CmRegUtilUcValueGetFullBuffer
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a382ffb4-3138-b303-0926-0bd418cdbdba}
Followup: MachineOwner
---------