Windows 10 BSOD freqüente (1-2 vezes por semana)

0

Continuo recebendo BSODs no meu laptop do Windows 10 e tentei corrigir tudo sem resultados. Se alguém souber o que está acontecendo, por favor, ajude! Obrigado antecipadamente.

Veja o que o arquivo de despejo diz:

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80a43fb512e, address which referenced memory

Debugging Details:
------------------


    READ_ADDRESS:  0000000000000000 

    CURRENT_IRQL:  2

    FAULTING_IP: 
    tcpip!memset+3f7ee
    fffff80a'43fb512e 488b01          mov     rax,qword ptr [rcx]

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    BUGCHECK_STR:  AV

    PROCESS_NAME:  System

    ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

    TRAP_FRAME:  ffff87804f07c0e0 -- (.trap 0xffff87804f07c0e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff80a43f26c40 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80a43fb512e rsp=ffff87804f07c270 rbp=0000000000000000
     r8=0000000000000001  r9=0000000000000050 r10=ffffb18cc083ac60
    r11=ffff87804f07c3b8 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    tcpip!memset+0x3f7ee:
    fffff80a'43fb512e 488b01          mov     rax,qword ptr [rcx] ds:00000000'00000000=????????????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from fffff80334f7d7a9 to fffff80334f723f0

    STACK_TEXT:  
    ffff8780'4f07bf98 fffff803'34f7d7a9 : 00000000'0000000a 00000000'00000000 00000000'00000002 00000000'00000000 : nt!KeBugCheckEx
    ffff8780'4f07bfa0 fffff803'34f7bd7d : 00000001'4f000010 fffff80a'00000000 ffffb18c'b7592c90 00000000'00000005 : nt!KiBugCheckDispatch+0x69
    ffff8780'4f07c0e0 fffff80a'43fb512e : ffffb18c'00000001 ffffb18c'b8d18d80 fffff80a'43f26c40 ffffb18c'bc10d7e0 : nt!KiPageFault+0x23d
    ffff8780'4f07c270 fffff80a'43e0151e : 00000000'00000000 00000000'00000006 00000000'00000006 fffff803'00000000 : tcpip!memset+0x3f7ee
    ffff8780'4f07c2c0 fffff80a'43ecff91 : ffffb18c'bef75010 ffffb18c'bde17201 ffffb18c'bd3c1760 ffffb18c'bde172d0 : NETIO!NetioDereferenceNetBufferListChain+0xee
    ffff8780'4f07c340 fffff80a'43ed0728 : ffff8780'4f891930 ffffb18c'b8ccacd0 00000000'00000000 ffffb18c'b8cf5fd0 : tcpip!TcpFlushDelay+0x81
    ffff8780'4f07c3c0 fffff80a'43f02ce9 : ffffb18c'b8d18d80 ffffb18c'bb03f000 ffff8780'4f07bb01 ffffb18c'c05c8fe7 : tcpip!TcpPreValidatedReceive+0x3c8
    ffff8780'4f07c4b0 fffff80a'43f02952 : 00000000'00000001 fffff80a'00000000 00000000'00000000 00000000'00000006 : tcpip!IppDeliverListToProtocol+0x59
    ffff8780'4f07c560 fffff80a'43ecd88c : ffffb18c'bef75010 ffff8780'4f07c600 ffffb18c'c05c64a0 00000000'00000000 : tcpip!IppProcessDeliverList+0x62
    ffff8780'4f07c5d0 fffff80a'43ede66e : fffff80a'44095000 ffffb18c'b7ffe010 00000000'00000000 00000000'00000000 : tcpip!IppReceiveHeaderBatch+0x20c
    ffff8780'4f07c6d0 fffff80a'43edf39f : ffffb18c'c1b0ef70 ffffb18c'bd3c1760 ffff8780'4f07c801 ffffb18c'bef75000 : tcpip!IppFlcReceivePacketsCore+0x31e
    ffff8780'4f07c7f0 fffff80a'43ece4f8 : ffffb18c'bef70002 ffff8780'00000006 fffff80a'43f26c40 00000000'00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
    ffff8780'4f07c8d0 fffff803'34e1c20b : 00000000'00000002 ffffb18c'bb08d040 fffff80a'43ece3a0 ffff8780'4f07ca80 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x158
    ffff8780'4f07ca00 fffff80a'43f27176 : ffffb18c'b8d3e8a0 00000000'00000002 ffffb18c'b8d3e840 ffffb18c'bd3c1700 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
    ffff8780'4f07ca50 fffff80a'44e52da7 : 00000000'00000000 ffff8780'4f07cb50 ffff8780'00000006 ffffb18c'c2e37010 : tcpip!FlReceiveNetBufferListChain+0xb6
    ffff8780'4f07cad0 fffff80a'44e52a9f : fffff80a'45a89801 fffff80a'44e70000 ffffb18c'00000000 00000000'00000006 : ndis!ndisMIndicateNetBufferListsToOpen+0x117
    ffff8780'4f07cb90 fffff80a'44e5fffb : ffffb18c'c0c651a0 00000000'00000000 ffffb18c'bd3c1760 00000000'00000200 : ndis!ndisMTopReceiveNetBufferLists+0x22f
    ffff8780'4f07cc90 fffff80a'44e8072f : 00000000'00000000 00000000'00000000 ffffb18c'bd3c1760 00000000'00000001 : ndis!ndisInvokeNextReceiveHandler+0x4f
    ffff8780'4f07cd60 fffff80a'44e5e2bf : ffffb18c'c1c4ef00 ffffb18c'bd3c1760 ffffb18c'00000000 00000000'00000006 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2244f
    ffff8780'4f07ce10 fffff80a'45a8cbc6 : ffffb18c'c2093010 00000000'00000000 ffffb18c'c2093010 00000000'00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x3f
    ffff8780'4f07ce50 fffff80a'44e53317 : ffffb18c'be7bb020 ffff8780'4f07d021 fffff80a'44e6eac0 fffff80a'431b3aae : nwifi!Pt6Receive+0x2b6
    ffff8780'4f07ceb0 fffff80a'44e6eafe : ffffb18c'bb08d040 fffff80a'431c6a7e 00000000'00000000 fffff80a'432249d8 : ndis!ndisCallReceiveHandler+0x47
    ffff8780'4f07cf00 fffff803'34e1c20b : ffff8780'4f07d021 ffff8780'4f07d008 00000000'00000053 ffff8780'4f07d060 : ndis!ndisDataPathExpandStackCallback+0x3e
    ffff8780'4f07cf50 fffff80a'44e600ef : ffffb18c'c0873bc0 00000000'00000000 ffffb18c'b7e909c0 00000000'000000c0 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
    ffff8780'4f07cfa0 fffff80a'44e8072f : 00000000'00000000 00000000'00000000 ffffb18c'c0873bc0 ffff8780'4f07d0f8 : ndis!ndisInvokeNextReceiveHandler+0x143
    ffff8780'4f07d070 fffff80a'44e5e2bf : ffffb18c'bd7cb400 ffffb18c'c0873bc0 00000000'00000000 00000000'00000006 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2244f
    ffff8780'4f07d120 fffff80a'456c1630 : ffffb18c'bfb5e620 ffffb18c'bd7cb460 00000000'00000006 00000000'00000001 : ndis!NdisFIndicateReceiveNetBufferLists+0x3f
    ffff8780'4f07d160 fffff80a'44e53317 : ffffb18c'bd7cb460 ffff8780'4f07d331 fffff80a'44e6eac0 ffff8780'00000006 : vwififlt!FilterReceiveNetBufferLists+0xf0
    ffff8780'4f07d1c0 fffff80a'44e6eafe : ffffb18c'bb08d040 00000000'00000000 ffffb18c'b7f83950 fffff80a'4365e7b8 : ndis!ndisCallReceiveHandler+0x47
    ffff8780'4f07d210 fffff803'34e1c20b : ffff8780'4f07d331 ffff8780'4f07d318 ffffb18c'be969980 ffffb18c'c03b57a4 : ndis!ndisDataPathExpandStackCallback+0x3e
    ffff8780'4f07d260 fffff80a'44e600ef : ffffb18c'c0873bc0 00000000'00000000 ffffb18c'bf505c60 00000000'000000c0 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
    ffff8780'4f07d2b0 fffff80a'44e8072f : 00000000'00000000 00000000'00000000 ffffb18c'c0873bc0 fffff80a'43e0454e : ndis!ndisInvokeNextReceiveHandler+0x143
    ffff8780'4f07d380 fffff80a'44e5e2bf : ffffca4c'68ee8600 ffffb18c'c0873bc0 ffffb18c'00000000 00000000'00000006 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2244f
    ffff8780'4f07d430 fffff80a'441d1293 : 00000000'00000000 ffffb18c'b7f64050 00000000'00000000 00000000'00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x3f
    ffff8780'4f07d470 fffff80a'44e53317 : 00000000'10000148 00000000'00000000 00000000'00000000 00000000'00000001 : wfplwfs!LwfLowerRecvNetBufferLists+0x173
    ffff8780'4f07d5d0 fffff80a'44e6eafe : ffffb18c'bb08d040 ffffb18c'bc4a2801 ffff8780'4f07d602 fffff80a'00000000 : ndis!ndisCallReceiveHandler+0x47
    ffff8780'4f07d620 fffff803'34e1c20b : ffff8780'4f07d7c0 ffff8780'4f07d808 00000000'00000000 ffffb18c'b7b5e940 : ndis!ndisDataPathExpandStackCallback+0x3e
    ffff8780'4f07d670 fffff80a'44e79095 : 00000000'01f46226 ffffb18c'b84e0aa0 fffff80a'441d1120 00000000'00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
    ffff8780'4f07d6c0 fffff803'488e19b8 : ffffb18c'c216d3d0 ffff8780'4f07d910 00000000'00000000 ffffb18c'c216d340 : ndis!NdisMIndicateReceiveNetBufferLists+0x27125
    ffff8780'4f07d8b0 fffff803'4889b0e9 : fffff803'00000006 ffffb18c'b82050e0 00000000'00000009 00000000'00000000 : wdiwifi!CPort::IndicateFrames+0x29c
    ffff8780'4f07d950 fffff803'4889a4a8 : fffff803'48939dd0 00000000'00000000 ffff8780'4f07da69 ffffb18c'b8207970 : wdiwifi!CRxMgr::RxIndicatePortFrames+0x129
    ffff8780'4f07d9c0 fffff803'4889b8ca : ffffb18c'b7ff1700 fffff803'34ea808b ffffb18c'b8207970 ffffb18c'bb615cd0 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x6d0
    ffff8780'4f07dad0 fffff803'34e24e8b : ffffb18c'bb615cd0 ffffb18c'b7ff1700 fffff80a'44ef9700 ffffb18c'bb08d040 : wdiwifi!RxMgrWorkItemRoutine+0x6a
    ffff8780'4f07db10 fffff803'34e43ca8 : 00000000'00000300 ffffb18c'bb08d040 fffff803'34e24d90 be7cb3c0'0000000c : nt!IopProcessWorkItem+0xfb
    ffff8780'4f07db80 fffff803'34ee2a37 : 00000a20'001fffff 00000000'00000080 ffffb18c'b6cdc500 ffffb18c'bb08d040 : nt!ExpWorkerThread+0xd8
    ffff8780'4f07dc10 fffff803'34f77876 : ffff8780'44d9e180 ffffb18c'bb08d040 fffff803'34ee29f0 bdbd9b30'02e0001c : nt!PspSystemThreadStartup+0x47
    ffff8780'4f07dc60 00000000'00000000 : ffff8780'4f07e000 ffff8780'4f078000 00000000'00000000 00000000'00000000 : nt!KiStartSystemThread+0x16


    STACK_COMMAND:  kb

    FOLLOWUP_IP: 
    NETIO!NetioDereferenceNetBufferListChain+ee
    fffff80a'43e0151e 8bc6            mov     eax,esi

    SYMBOL_STACK_INDEX:  4

    SYMBOL_NAME:  NETIO!NetioDereferenceNetBufferListChain+ee

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: NETIO

    IMAGE_NAME:  NETIO.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP:  0

    BUCKET_ID_FUNC_OFFSET:  ee

    FAILURE_BUCKET_ID:  AV_NETIO!NetioDereferenceNetBufferListChain

    BUCKET_ID:  AV_NETIO!NetioDereferenceNetBufferListChain

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:av_netio!netiodereferencenetbufferlistchain

    FAILURE_ID_HASH:  {b14cf127-5933-4e45-71a8-f23e2243d43b}

    Followup: MachineOwner
    ---------

Mini Dump:

---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffffd0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80f63d31de5, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  ffffffffffffffd0 

CURRENT_IRQL:  2

FAULTING_IP: 
wdiwifi!CAdapter::ReturnNetBufferLists+8d
fffff80f'63d31de5 0fb768d0        movzx   ebp,word ptr [rax-30h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

TRAP_FRAME:  ffffc70147dc5110 -- (.trap 0xffffc70147dc5110)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffde0fae6583a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80f63d31de5 rsp=ffffc70147dc52a0 rbp=0000000000000000
 r8=ffffde0fad72f2b0  r9=ffffde0fae6583a0 r10=fffff80f63dc2c90
r11=ffffde0fb204e1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
wdiwifi!CAdapter::ReturnNetBufferLists+0x8d:
fffff80f'63d31de5 0fb768d0        movzx   ebp,word ptr [rax-30h] ds:ffffffff'ffffffd0=????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802df3fe7a9 to fffff802df3f33f0

STACK_TEXT:  
ffffc701'47dc4fc8 fffff802'df3fe7a9 : 00000000'0000000a ffffffff'ffffffd0 00000000'00000002 00000000'00000000 : nt!KeBugCheckEx
ffffc701'47dc4fd0 fffff802'df3fcd7d : 00000000'00000001 ffffde0f'b7348030 00000000'00000000 fffff80f'61bc3def : nt!KiBugCheckDispatch+0x69
ffffc701'47dc5110 fffff80f'63d31de5 : ffffde0f'b7348030 fffff80f'5fc65b36 ffffde0f'b7348030 ffffde0f'b7348030 : nt!KiPageFault+0x23d
ffffc701'47dc52a0 fffff80f'63d2be24 : ffffde0f'ae6583a0 ffffde0f'ae6583a0 ffffc701'47dc5401 00000000'00000000 : wdiwifi!CAdapter::ReturnNetBufferLists+0x8d
ffffc701'47dc5300 fffff80f'5fc64f4a : ffffde0f'b204e1a0 ffffde0f'ae6583a0 ffffde0f'b204f0d8 ffffde0f'ae6583a0 : wdiwifi!MPWrapperReturnNetBufferLists+0x64
ffffc701'47dc5340 fffff80f'5fc64e83 : fffff80f'5fc64e90 ffffc701'47dc5499 ffffde0f'b57426e0 ffffde0f'b5742a20 : ndis!ndisReturnNblWithPowerQueue+0xba
ffffc701'47dc53a0 fffff80f'5fc64e39 : 8f648eb9'0000e0e3 ffffde0f'af360a00 00000000'00000000 ffffde0f'e0000001 : ndis!ndisCallReceiveCompleteHandler+0x33
ffffc701'47dc53e0 fffff80f'61816ce0 : ffffc459'6df5c502 fffff80f'00000000 ffffde0f'ae658510 00000000'00000002 : ndis!NdisReturnNetBufferLists+0x419
ffffc701'47dc5500 fffff80f'5fda151e : 00000000'00000000 00000000'00000001 00000000'00000001 fffff80f'00000000 : tcpip!FlpReturnNetBufferListChain+0xa0
ffffc701'47dc5550 fffff80f'617bd929 : ffffde0f'b57b3980 ffffc701'47dc5600 ffffde0f'b7348030 00000000'00000000 : NETIO!NetioDereferenceNetBufferListChain+0xee
ffffc701'47dc55d0 fffff80f'617ce66e : fffff80f'61985000 ffffde0f'af360940 00000000'00000000 00000000'00000000 : tcpip!IppReceiveHeaderBatch+0x2a9
ffffc701'47dc56d0 fffff80f'617cf39f : ffffde0f'b5741c80 ffffde0f'b7348030 ffffc701'47dc5801 ffffde0f'b57b3900 : tcpip!IppFlcReceivePacketsCore+0x31e
ffffc701'47dc57f0 fffff80f'617be4f8 : ffffde0f'b57b0002 ffffc701'00000001 fffff80f'61816c40 00000000'00000001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f
ffffc701'47dc58d0 fffff802'df29d20b : 00000000'00000002 ffffde0f'b7ec5700 fffff80f'617be3a0 ffffc701'47dc5a80 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x158
ffffc701'47dc5a00 fffff80f'61817176 : ffffde0f'af33e860 00000000'00000003 ffffde0f'af33c8a0 ffffde0f'b7348000 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
ffffc701'47dc5a50 fffff80f'5fc62da7 : 00000000'00000000 ffffc701'47dc5b50 ffffc701'00000001 ffffde0f'b5787430 : tcpip!FlReceiveNetBufferListChain+0xb6
ffffc701'47dc5ad0 fffff80f'5fc62a9f : fffff80f'61659801 fffff80f'5fc80000 ffffde0f'00000000 00000000'00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x117
ffffc701'47dc5b90 fffff80f'5fc6fffb : ffffde0f'b204e1a0 00000000'00000000 ffffde0f'b7348030 ffffc701'00000000 : ndis!ndisMTopReceiveNetBufferLists+0x22f
ffffc701'47dc5c90 fffff80f'5fc9072f : 00000000'00000000 00000000'00000000 ffffde0f'b7348030 00000000'00000001 : ndis!ndisInvokeNextReceiveHandler+0x4f
ffffc701'47dc5d60 fffff80f'5fc6e2bf : ffffde0f'b86d9300 ffffde0f'b7348030 ffffde0f'00000000 00000000'00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2244f
ffffc701'47dc5e10 fffff80f'6165cbc6 : ffffde0f'b5774010 00000000'00000000 ffffde0f'b5774010 fffff802'00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x3f
ffffc701'47dc5e50 fffff80f'5fc63317 : ffffde0f'b5753020 ffffc701'47dc6021 fffff80f'5fc7eac0 fffff80f'5f3a3aae : nwifi!Pt6Receive+0x2b6
ffffc701'47dc5eb0 fffff80f'5fc7eafe : ffffde0f'b7ec5700 fffff80f'5f3b6a7e 00000000'00000000 fffff80f'5f4149d8 : ndis!ndisCallReceiveHandler+0x47
ffffc701'47dc5f00 fffff802'df29d20b : ffffc701'47dc6021 ffffc701'47dc6008 00000000'00000053 ffffc701'47dc6060 : ndis!ndisDataPathExpandStackCallback+0x3e
ffffc701'47dc5f50 fffff80f'5fc700ef : ffffde0f'ae6583a0 00000000'00000000 ffffde0f'b572cc60 00000000'00000120 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
ffffc701'47dc5fa0 fffff80f'5fc9072f : 00000000'00000000 00000000'00000000 ffffde0f'ae6583a0 fffff80f'5f3baa43 : ndis!ndisInvokeNextReceiveHandler+0x143
ffffc701'47dc6070 fffff80f'5fc6e2bf : ffffde0f'b5755000 ffffde0f'ae6583a0 00000000'00000000 ffffde0f'00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2244f
ffffc701'47dc6120 fffff80f'622a1630 : ffffde0f'b579f100 ffffde0f'b5755010 00000000'00000001 ffffde0f'b871e088 : ndis!NdisFIndicateReceiveNetBufferLists+0x3f
ffffc701'47dc6160 fffff80f'5fc63317 : ffffde0f'b5755010 ffffc701'47dc6331 fffff80f'5fc7eac0 ffffc701'00000001 : vwififlt!FilterReceiveNetBufferLists+0xf0
ffffc701'47dc61c0 fffff80f'5fc7eafe : ffffde0f'b7ec5700 ffffde0f'ae449098 00000000'00000000 00000000'00000000 : ndis!ndisCallReceiveHandler+0x47
ffffc701'47dc6210 fffff802'df29d20b : ffffc701'47dc6331 ffffc701'47dc6318 ffffde0f'b5008180 ffffde0f'b573e384 : ndis!ndisDataPathExpandStackCallback+0x3e
ffffc701'47dc6260 fffff80f'5fc700ef : ffffde0f'ae6583a0 00000000'00000000 ffffde0f'b575ebc0 00000000'00000120 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
ffffc701'47dc62b0 fffff80f'5fc9072f : 00000000'00000000 00000000'00000000 ffffde0f'ae6583a0 fffff80f'5fda454e : ndis!ndisInvokeNextReceiveHandler+0x143
ffffc701'47dc6380 fffff80f'5fc6e2bf : ffff2744'16b88800 ffffde0f'ae6583a0 ffffde0f'00000000 00000000'00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x2244f
ffffc701'47dc6430 fffff80f'61ac1293 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : ndis!NdisFIndicateReceiveNetBufferLists+0x3f
ffffc701'47dc6470 fffff80f'5fc63317 : ffffc701'47dc66d0 fffff802'df20def5 fffff7ad'4000a580 ffffde0f'b78f3001 : wfplwfs!LwfLowerRecvNetBufferLists+0x173
ffffc701'47dc65d0 fffff80f'5fc7eafe : ffffde0f'b7ec5700 ffffc588'00000004 00000000'00741300 00000000'00000002 : ndis!ndisCallReceiveHandler+0x47
ffffc701'47dc6620 fffff802'df29d20b : ffffc701'47dc67c0 ffffc701'47dc6808 00000000'00000000 00000000'0000000f : ndis!ndisDataPathExpandStackCallback+0x3e
ffffc701'47dc6670 fffff80f'5fc89095 : 00000000'000c687d ffffde0f'b5742a20 fffff80f'61ac1120 00000000'00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x8b
ffffc701'47dc66c0 fffff80f'63d619b8 : ffffde0f'b3b5fb30 ffffc701'47dc6910 00000000'00000000 ffffde0f'b3b5faa0 : ndis!NdisMIndicateReceiveNetBufferLists+0x27125
ffffc701'47dc68b0 fffff80f'63d1b0e9 : ffffc701'00000001 ffffde0f'b2d660e0 00000000'00000001 fffff802'00000000 : wdiwifi!CPort::IndicateFrames+0x29c
ffffc701'47dc6950 fffff80f'63d1a4a8 : fffff80f'63db9dd0 00000000'00000000 ffffc701'47dc6a69 ffffde0f'b2d68970 : wdiwifi!CRxMgr::RxIndicatePortFrames+0x129
ffffc701'47dc69c0 fffff80f'63d1b8ca : 00000000'00000000 ffffde0f'b7ec5840 ffffde0f'b2d68970 00000000'0000000c : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x6d0
ffffc701'47dc6ad0 fffff802'df2a5e8b : ffffde0f'b18207d0 00000000'00000000 fffff80f'5fd09700 ffffde0f'b7ec5700 : wdiwifi!RxMgrWorkItemRoutine+0x6a
ffffc701'47dc6b10 fffff802'df2c4ca8 : 00000000'00000300 ffffde0f'b7ec5700 fffff802'df2a5d90 00000000'0000000c : nt!IopProcessWorkItem+0xfb
ffffc701'47dc6b80 fffff802'df363a37 : ffffde0f'ae722580 00000000'00000080 ffffde0f'ad2fe500 ffffde0f'b7ec5700 : nt!ExpWorkerThread+0xd8
ffffc701'47dc6c10 fffff802'df3f8876 : ffffc701'3fe40180 ffffde0f'b7ec5700 fffff802'df3639f0 fffff719'40a4a601 : nt!PspSystemThreadStartup+0x47
ffffc701'47dc6c60 00000000'00000000 : ffffc701'47dc7000 ffffc701'47dc1000 00000000'00000000 00000000'00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
wdiwifi!CAdapter::ReturnNetBufferLists+8d
fffff80f'63d31de5 0fb768d0        movzx   ebp,word ptr [rax-30h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  wdiwifi!CAdapter::ReturnNetBufferLists+8d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: wdiwifi

IMAGE_NAME:  wdiwifi.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  725be04b

IMAGE_VERSION:  10.0.15052.0

BUCKET_ID_FUNC_OFFSET:  8d

FAILURE_BUCKET_ID:  AV_wdiwifi!CAdapter::ReturnNetBufferLists

BUCKET_ID:  AV_wdiwifi!CAdapter::ReturnNetBufferLists

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_wdiwifi!cadapter::returnnetbufferlists

FAILURE_ID_HASH:  {bd5c91cc-2f50-b8a3-2dd2-379450acc367}

Followup: MachineOwner

---------
    
por nemnemnemnem 29.06.2017 / 22:19

0 respostas