BugCheck D1, {8, 2, 0, fffff880018796e4}
Unable to load image \SystemRoot\system32\DRIVERS\[B][U][COLOR=#FF0000]e1q62x64.sys[/COLOR][/U][/B], Win32 error 0n2
*** WARNING: Unable to verify timestamp for e1q62x64.sys
*** ERROR: Module load completed but symbols could not be loaded for e1q62x64.sys
[B][U][COLOR=#FF0000]Probably caused by : e1q62x64.sys [/COLOR][/U][/B]( e1q62x64+21219 )
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880018796e4, address which referenced memory
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c0100
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!IpFlcReceivePreValidatedPackets+2d4
fffff880`018796e4 440fb62c01 movzx r13d,byte ptr [rcx+rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800db02f90 -- (.trap 0xfffff8800db02f90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=000000000000000c rsi=0000000000000000 rdi=0000000000000000
rip=fffff880018796e4 rsp=fffff8800db03120 rbp=fffffa8009369080
r8=0000000000000009 r9=0000000000000001 r10=0000000000000001
r11=0000000000000014 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!IpFlcReceivePreValidatedPackets+0x2d4:
fffff880`018796e4 440fb62c01 movzx r13d,byte ptr [rcx+rax] ds:6f00:00000000`00000008=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000308d1e9 to fffff8000308dc40
STACK_TEXT:
fffff880`0db02e48 fffff800`0308d1e9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0db02e50 fffff800`0308be60 : 00000000`00005000 fffff800`0309a241 fffffa80`07a3e790 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0db02f90 fffff880`018796e4 : fffffa80`0791e8a0 00000000`00005000 00000000`000008d6 fffff800`030908d6 : nt!KiPageFault+0x260
fffff880`0db03120 fffff880`01889b02 : fffffa80`085122f0 fffffa80`085144e0 fffffa80`08510006 00000000`00000006 : tcpip!IpFlcReceivePreValidatedPackets+0x2d4
fffff880`0db03280 fffff800`0309a618 : 00000000`00000000 00000000`00004800 fffffa80`0ae85060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xa2
fffff880`0db032d0 fffff880`0188a202 : fffff880`01889a60 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0db033b0 fffff880`0170c0eb : fffffa80`085123a0 00000000`00000000 fffffa80`083041a0 00000000`000011a0 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0db03420 fffff880`016d5ad6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0db03490 fffff880`0164ecc1 : fffffa80`083041a0 00000000`00000002 00000000`00000002 fffff880`0170c21d : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0db03910 fffff880`08221219 : fffffa80`084d2000 fffffa80`085bd2e0 fffffa80`085bd250 00000000`00000002 : ndis!NdisMIndicateReceiveNetBufferLists+0xc1
fffff880`0db03960 fffffa80`084d2000 : fffffa80`085bd2e0 fffffa80`085bd250 00000000`00000002 00000000`00000801 : [COLOR=#ff0000][U][B]e1q62x64[/B][/U][/COLOR]+0x21219
fffff880`0db03968 fffffa80`085bd2e0 : fffffa80`085bd250 00000000`00000002 00000000`00000801 00000000`00000002 : 0xfffffa80`084d2000
fffff880`0db03970 fffffa80`085bd250 : 00000000`00000002 00000000`00000801 00000000`00000002 fffffa80`084d6500 : 0xfffffa80`085bd2e0
fffff880`0db03978 00000000`00000002 : 00000000`00000801 00000000`00000002 fffffa80`084d6500 fffff880`082213b4 : 0xfffffa80`085bd250
fffff880`0db03980 00000000`00000801 : 00000000`00000002 fffffa80`084d6500 fffff880`082213b4 00000000`00000001 : 0x2
fffff880`0db03988 00000000`00000002 : fffffa80`084d6500 fffff880`082213b4 00000000`00000001 fffffa80`085bd2e0 : 0x801
fffff880`0db03990 fffffa80`084d6500 : fffff880`082213b4 00000000`00000001 fffffa80`085bd2e0 fffffa80`08593d50 : 0x2
fffff880`0db03998 fffff880`082213b4 : 00000000`00000001 fffffa80`085bd2e0 fffffa80`08593d50 00000000`00000002 : 0xfffffa80`084d6500
fffff880`0db039a0 00000000`00000001 : fffffa80`085bd2e0 fffffa80`08593d50 00000000`00000002 0000000a`00000001 : [COLOR=#ff0000][U][B]e1q62x64[/B][/U][/COLOR]+0x213b4
fffff880`0db039a8 fffffa80`085bd2e0 : fffffa80`08593d50 00000000`00000002 0000000a`00000001 00000000`00000000 : 0x1
fffff880`0db039b0 fffffa80`08593d50 : 00000000`00000002 0000000a`00000001 00000000`00000000 00000000`00000000 : 0xfffffa80`085bd2e0
fffff880`0db039b8 00000000`00000002 : 0000000a`00000001 00000000`00000000 00000000`00000000 fffff880`0db03c18 : 0xfffffa80`08593d50
fffff880`0db039c0 0000000a`00000001 : 00000000`00000000 00000000`00000000 fffff880`0db03c18 00000000`00000000 : 0x2
fffff880`0db039c8 00000000`00000000 : 00000000`00000000 fffff880`0db03c18 00000000`00000000 fffffa80`08245c10 : 0xa`00000001
STACK_COMMAND: kb
FOLLOWUP_IP:
e1q62x64+21219
fffff880`08221219 ?? ???
SYMBOL_STACK_INDEX: a
SYMBOL_NAME: e1q62x64+21219
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: e1q62x64
IMAGE_NAME: e1q62x64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4af31807
FAILURE_BUCKET_ID: X64_0xD1_e1q62x64+21219
BUCKET_ID: X64_0xD1_e1q62x64+21219