I need a help to understand the bug check analysis report

A

AKDara

There was an unexpected shutdown of a server. I need help in understanding the below.

Server OS: Windows Server 2012 R2

Here is the report :

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000003c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff801f52b73c2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 5

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on ARUN

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 51

Key : Analysis.Memory.CommitPeak.Mb
Value: 71

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: d1

BUGCHECK_P1: 3c

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff801f52b73c2

WRITE_ADDRESS: 000000000000003c

PROCESS_NAME: EXCEL.EXE

DPC_STACK_BASE: FFFFD001D597BFB0

TRAP_FRAME: ffffd001d5979e40 -- (.trap 0xffffd001d5979e40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe000e6b5eea0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801f52b73c2 rsp=ffffd001d5979fd0 rbp=ffffd001d597a0d0
r8=ffffe000e6b5ee90 r9=ffffe000e6b5edd0 r10=ffffe000e6b5edd0
r11=ffffe000e6b5efe8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x732:
fffff801`f52b73c2 f0ff403c lock inc dword ptr [rax+3Ch] ds:00000000`0000003c=????????
Resetting default scope

STACK_TEXT:
ffffd001`d5979cf8 fffff803`d9fd8669 : 00000000`0000000a 00000000`0000003c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd001`d5979d00 fffff803`d9fd5ba8 : ffffe000`e5609420 ffffe000`e5609424 00000014`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd001`d5979e40 fffff801`f52b73c2 : 00000000`fffffffe ffffe000`e5609360 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x428
ffffd001`d5979fd0 fffff801`f52b678f : 00024dc0`bb010000 00000000`00000004 ffffe000`e4a47d70 ffffe000`e5609360 : tcpip!TcpBeginTcbSend+0x732
ffffd001`d597a2b0 fffff801`f52d29e1 : 00000000`a3ea2dd3 00000000`00002dd3 0624dd2f`1a9fbe00 fffff801`f52d5360 : tcpip!TcpTcbSend+0x5df
ffffd001`d597a5a0 fffff801`f52adfcc : ffffe000`00000001 00000000`00be77b9 00000000`00000000 00000000`00000000 : tcpip!TcpFlushDelay+0x1c1
ffffd001`d597a640 fffff801`f52dd72a : ffffe000`dd8481c0 ffffd001`d597a8b8 ffffd001`d5974dc0 00000000`00000006 : tcpip!TcpPreValidatedReceive+0x3cc
ffffd001`d597a740 fffff801`f52d939b : ffff3e94`c1085ea2 ffffe000`de1c51a0 ffffe000`00000000 00000000`00000001 : tcpip!IppDeliverListToProtocol+0x9a
ffffd001`d597a800 fffff801`f52d77f2 : 00000000`00000000 ffffd001`d597a919 00000000`00000006 002d0043`00340043 : tcpip!IppProcessDeliverList+0x6b
ffffd001`d597a860 fffff801`f52d5bd0 : ffffe000`de523580 ffffe000`ddf0abb0 ffffe000`dd852000 ffffe000`dd852000 : tcpip!IppReceiveHeaderBatch+0x232
ffffd001`d597a980 fffff801`f52a732a : ffffe000`de743900 00000000`00000000 ffffe000`e15a0f01 ffffe000`e15a0f00 : tcpip!IppFlcReceivePacketsCore+0x680
ffffd001`d597ad00 fffff801`f52d52c2 : ffffe000`de743900 ffffd001`d597b180 00000000`00000002 ffffd001`d5970000 : tcpip!IpFlcReceivePreValidatedPackets+0x8d0
ffffd001`d597aee0 fffff803`d9ecbee9 : ffffe000`dd89f610 ffffe000`dd8cffb0 ffffe000`dd89f610 ffffe000`e39c7880 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x102
ffffd001`d597b010 fffff801`f52d5506 : fffff801`f52d51c0 ffffd001`d597b120 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x2d9
ffffd001`d597b0f0 fffff801`f4833a53 : 00000000`00000000 ffffd001`d597b1d1 00000000`00000001 fffff801`f48432e5 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffd001`d597b170 fffff801`f4833e7f : ffffe000`ddf0ab01 fffff801`f4830008 ffffe000`00000000 fffff801`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0x123
ffffd001`d597b230 fffff801`f48346b2 : ffffe000`de1c51a0 ffffe000`ddf0ab01 fffff801`f4840560 ffffe000`00000001 : NDIS!ndisMTopReceiveNetBufferLists+0x22f
ffffd001`d597b2c0 fffff801`f4c6b814 : ffffe000`de1f48a0 ffffe000`ddf44000 ffffe000`ddf0abb0 ffffe000`dd94ec60 : NDIS!NdisMIndicateReceiveNetBufferLists+0x732
ffffd001`d597b4b0 fffff801`f4c6b23e : ffffe000`de556670 ffffe000`ddf44000 00000000`00000801 ffffe000`00000001 : NdisImPlatform!implatTryToIndicateReceiveNBLs+0x1e8
ffffd001`d597b520 fffff801`f4833a53 : 00000000`0001ff00 00000000`00000000 ffffd001`d597b601 00000000`00000001 : NdisImPlatform!implatReceiveNetBufferLists+0x1a2
ffffd001`d597b5a0 fffff801`f4833f19 : 00000000`00000000 ffffe000`de2b2978 ffffe000`00000000 ffffe000`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0x123
ffffd001`d597b660 fffff801`f4834094 : ffffe000`dd86c1a0 00000000`00000001 00000000`0079e62e 00000000`00000000 : NDIS!ndisMTopReceiveNetBufferLists+0x2c9
ffffd001`d597b6f0 fffff801`f5e12b7e : 00000000`00000000 00000000`00000000 ffffe000`de204580 ffffe000`ddf0ab20 : NDIS!NdisMIndicateReceiveNetBufferLists+0x114
ffffd001`d597b8e0 fffff801`f5e13def : ffffe000`ddf0ab00 00000000`00000001 ffffe000`de204580 ffffd001`d597b978 : e1r64x64!DriverEntry+0xf0a2
ffffd001`d597b940 fffff801`f5e0bb49 : ffffe000`dd01ef70 ffffe000`de203000 ffffe000`de203101 00000000`00000001 : e1r64x64!DriverEntry+0x10313
ffffd001`d597b9c0 fffff801`f5e0be57 : ffffe000`dcf712f0 ffff0001`00000001 ffff0001`00000001 ffffe000`de1d1000 : e1r64x64!DriverEntry+0x806d
ffffd001`d597ba30 fffff801`f5e0b5ec : 00000000`00000000 ffffe000`00000000 00000000`00000001 00000000`00000000 : e1r64x64!DriverEntry+0x837b
ffffd001`d597bac0 fffff801`f4835e12 : 00000000`00000001 00000000`00000040 ffffd001`d261e010 00000000`0000ffff : e1r64x64!DriverEntry+0x7b10
ffffd001`d597bb00 fffff803`d9f02320 : 00000000`0000fffe 0032bd2b`0079e62d ffff0765`00000004 00000000`000001e0 : NDIS!ndisInterruptDpc+0x1a3
ffffd001`d597bbe0 fffff803`d9f01667 : ffffe000`e06ff800 ffffe000`e06ff880 00000000`00000000 ffffd001`00000001 : nt!KiExecuteAllDpcs+0x1b0
ffffd001`d597bd30 fffff803`d9fcb495 : 80000000`00f00121 ffffd001`d5940180 ffffd001`d1fe2600 00000000`1cbf04a8 : nt!KiRetireDpcList+0xd7
ffffd001`d597bfb0 fffff803`d9fcb299 : 00000000`00000000 ffffd000`271c7060 ffffc001`19bfa940 ffffd000`271c7368 : nt!KxRetireDpcList+0x5
ffffd000`271c6eb0 fffff803`d9fcdd05 : ffffd000`271c7098 fffff803`d9fc996f ffffd000`271c71e0 fffff801`f4fa9af0 : nt!KiDispatchInterruptContinue
ffffd000`271c6ee0 fffff803`d9fc996f : ffffd000`271c71e0 fffff801`f4fa9af0 ffffc001`10e3e000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffd000`271c6ef0 fffff803`da2452ed : 00000075`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xaf
ffffd000`271c7080 fffff803`da428088 : ffffd000`0000001c ffffd000`271c7490 ffffe000`e8852001 ffffe000`0000001d : nt!CmpBuildHashStackAndLookupCache+0x16d
ffffd000`271c72e0 fffff803`da314c6e : 00000000`00000000 00000000`00000000 ffffe000`00020000 ffffd000`271c7601 : nt!CmpParseKey+0x504
ffffd000`271c75a0 fffff803`da24a2b3 : 00000000`00000000 ffffd000`271c7758 ffffc001`00000040 ffffe000`dca457b0 : nt!ObpLookupObjectName+0x7be
ffffd000`271c76e0 fffff803`da249ae4 : 00000000`00000001 000000d3`dddee618 000000d3`dddee660 00000000`02000000 : nt!ObOpenObjectByName+0x1e3
ffffd000`271c7810 fffff803`da2e7102 : ffff0764`436b06c2 00000000`00000000 00007ffa`686384d0 00007ffa`68638668 : nt!CmOpenKey+0x2a4
ffffd000`271c79c0 fffff803`d9fd82e3 : ffffe000`e39c7880 000000d3`d3588a10 000000d3`d5120810 00007ffa`686384a8 : nt!NtOpenKey+0x12
ffffd000`271c7a00 00007ffa`9412087a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000d3`dddee5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`9412087a


SYMBOL_NAME: NdisImPlatform!implatTryToIndicateReceiveNBLs+1e8

MODULE_NAME: NdisImPlatform

IMAGE_NAME: NdisImPlatform.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1e8

FAILURE_BUCKET_ID: AV_NdisImPlatform!implatTryToIndicateReceiveNBLs

OS_VERSION: 8.1.9600.19426

BUILDLAB_STR: winblue_ltsb_escrow

OSPLATFORM_TYPE: x64

OSNAME: Windows 8.1

FAILURE_ID_HASH: {c27b062f-04a2-1f4b-44f0-c511c01d02fa}

Followup: MachineOwner
---------

Continue reading...
 

Similar threads

M
Replies
0
Views
384
Manjunath_bn
M
H
Replies
0
Views
468
hebinGurung
H
B
Replies
0
Views
240
Babu.G - IT
B
Back
Top Bottom