For the last couple days, my Windows 2012 R2 DC crashed and rebooted. Below are the minidumps for the two crashes. I will be updating the network drivers, etc this evening and see if that would help.
BugCheck 139, {3, ffffd001da67b1e0, ffffd001da67b138, 0}
Probably caused by : NETIO.SYS ( NETIO!NsiEnumerateObjectsAllParametersEx+618 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd001da67b1e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd001da67b138, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
TRAP_FRAME: ffffd001da67b1e0 -- (.trap 0xffffd001da67b1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe000dec6eef0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe000dc3e74e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800d08a25f5 rsp=ffffd001da67b370 rbp=ffffd001da67b409
r8=0000000000000000 r9=0000000000000000 r10=ffffe000ddea8210
r11=ffffe000dec6ea20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
NDIS!ndisNsiGetAllInterfaceInformation+0x26795:
fffff800`d08a25f5 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd001da67b138 -- (.exr 0xffffd001da67b138)
ExceptionAddress: fffff800d08a25f5 (NDIS!ndisNsiGetAllInterfaceInformation+0x0000000000026795)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
BUGCHECK_STR: 0x139
PROCESS_NAME: Agent.Service.
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_PARAMETER1: 0000000000000003
LAST_CONTROL_TRANSFER: from fffff8030735d7e9 to fffff80307351ca0
STACK_TEXT:
ffffd001`da67aeb8 fffff803`0735d7e9 : 00000000`00000139 00000000`00000003 ffffd001`da67b1e0 ffffd001`da67b138 : nt!KeBugCheckEx
ffffd001`da67aec0 fffff803`0735db10 : 00000000`00000000 00000000`00000000 ffffe000`dad2ab20 fffff803`072bdf3d : nt!KiBugCheckDispatch+0x69
ffffd001`da67b000 fffff803`0735cd34 : ffffd001`da67b3d0 00000000`00000000 ffffe000`df203080 ffffe000`e236d000 : nt!KiFastFailDispatch+0xd0
ffffd001`da67b1e0 fffff800`d08a25f5 : 00000000`ffffe000 ffffe000`dec19460 ffffd001`da67b409 00000000`00000002 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd001`da67b370 fffff800`d0762878 : ffffd001`da67b510 ffffd001`da67b502 00000000`00000000 00000000`00000001 : NDIS!ndisNsiGetAllInterfaceInformation+0x26795
ffffd001`da67b470 fffff800`d196bfc1 : ffffe000`e236d070 ffffe000`00000070 00000000`1e17d580 00000000`00000000 : NETIO!NsiEnumerateObjectsAllParametersEx+0x618
ffffd001`da67b650 fffff800`d196bbea : 00000000`00000000 ffffe000`dd379580 ffffe000`dd3794b0 00000000`00000000 : nsiproxy!NsippEnumerateObjectsAllParameters+0x201
ffffd001`da67b840 fffff803`0762677f : 00000000`00000000 ffffe000`dd3794b0 ffffe000`dd3794b0 00000000`00000001 : nsiproxy!NsippDispatch+0x5a
ffffd001`da67b880 fffff803`07625d22 : ffffd001`da67ba38 0000000d`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xa4f
ffffd001`da67ba20 fffff803`0735d4b3 : ffffe000`df203080 ffffd001`001f0003 00000000`1e17d468 0000000f`00000001 : nt!NtDeviceIoControlFile+0x56
ffffd001`da67ba90 00007ffa`5770123a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`1e17d4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5770123a
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NsiEnumerateObjectsAllParametersEx+618
fffff800`d0762878 8bd8 mov ebx,eax
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: NETIO!NsiEnumerateObjectsAllParametersEx+618
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 540ebbe6
BUCKET_ID_FUNC_OFFSET: 618
FAILURE_BUCKET_ID: 0x139_3_NETIO!NsiEnumerateObjectsAllParametersEx
BUCKET_ID: 0x139_3_NETIO!NsiEnumerateObjectsAllParametersEx
Followup: MachineOwner
---------
2: kd> lmvm NETIO
start end module name
fffff800`d0758000 fffff800`d07d0000 NETIO (private pdb symbols) c:\symbol\netio.pdb\1A13EC2D01DC4013A4E57B7EB995FD8F2\netio.pdb
Loaded symbol image file: NETIO.SYS
Mapped memory image file: c:\symbol\NETIO.SYS\540EBBE678000\NETIO.SYS
Image path: \SystemRoot\system32\DRIVERS\NETIO.SYS
Image name: NETIO.SYS
Timestamp: Tue Sep 09 03:35:50 2014 (540EBBE6)
CheckSum: 0007D1B9
ImageSize: 00078000
File version: 6.3.9600.17337
Product version: 6.3.9600.17337
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft Windows Operating System
InternalName: netio.sys
OriginalFilename: netio.sys
ProductVersion: 6.3.9600.17337
FileVersion: 6.3.9600.17337 (winblue_r3.140908-1537)
FileDescription: Network I/O Subsystem
BugCheck 133, {1, 1e00, 0, 0}
Probably caused by : NETIO.SYS ( NETIO!NsiEnumerateObjectsAllParametersEx+618 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT_SERVER
BUGCHECK_STR: 0x133
PROCESS_NAME: Agent.Service.
CURRENT_IRQL: d
LAST_CONTROL_TRANSFER: from fffff8039d389f7e to fffff8039d36eca0
STACK_TEXT:
fffff803`9ead9c88 fffff803`9d389f7e : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt!KeBugCheckEx
fffff803`9ead9c90 fffff803`9d25af67 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0xadbe
fffff803`9ead9d20 fffff803`9d9ba67f : ffffd000`848e3510 ffffe000`5ce566c8 fffff803`9da069b0 ffffd000`848e3510 : nt!KeClockInterruptNotify+0x787
fffff803`9ead9f40 fffff803`9d2f5143 : fffff803`9da06900 fffff803`9d31d057 00000000`00000000 00000000`00000000 : hal!HalpTimerClockInterrupt+0x4f
fffff803`9ead9f70 fffff803`9d37012a : fffff803`9da06900 ffffe000`5ce566c8 00000000`00000000 00000000`848e3409 : nt!KiCallInterruptServiceRoutine+0xa3
fffff803`9ead9fb0 fffff803`9d37050f : ffffe000`5ce566c8 00000000`24c8e44c ffffe000`5ce566c8 00001f80`008e02e4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xea
ffffd000`848e3130 fffff803`9d2f611e : 00000000`00000000 00000000`00010008 fffff800`a8c668c0 00000000`00000000 : nt!KiInterruptDispatchLBControl+0x11f
ffffd000`848e32c0 fffff803`9d400c2e : fffff803`9d521180 00000000`00000000 fffff803`9d521a60 fffff803`9d4c21a6 : nt!KxWaitForSpinLockAndAcquire+0x22
ffffd000`848e32f0 fffff803`9d2f60f0 : 00000000`00000002 ffffd000`848e3409 ffffd000`848e3409 00000000`00000000 : nt!KiAcquireSpinLockInstrumented+0x62
ffffd000`848e3340 fffff800`a8cd0576 : 00000000`00000002 ffffe000`5ce56010 ffffd000`848e33e0 00000000`00000002 : nt!KeAcquireSpinLockRaiseToDpc+0x40
ffffd000`848e3370 fffff800`a8c0a878 : ffffd000`848e3510 ffffd000`848e3502 00000000`00000000 00000000`00000001 : NDIS!ndisNsiGetAllInterfaceInformation+0x71c
ffffd000`848e3470 fffff800`a9c8ffc1 : ffffe000`629c94f0 ffffe000`00000070 00000000`1e62d360 00000000`00000000 : NETIO!NsiEnumerateObjectsAllParametersEx+0x618
ffffd000`848e3650 fffff800`a9c8fbea : 00000000`00000000 ffffe000`5ebb8460 ffffe000`5ebb8390 00000000`00000000 : nsiproxy!NsippEnumerateObjectsAllParameters+0x201
ffffd000`848e3840 fffff803`9d64377f : 00000000`00000000 ffffe000`5ebb8390 ffffe000`5ebb8390 00000000`00000001 : nsiproxy!NsippDispatch+0x5a
ffffd000`848e3880 fffff803`9d642d22 : ffffd000`848e3a38 0000000d`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xa4f
ffffd000`848e3a20 fffff803`9d37a4b3 : ffffe000`5e79f080 ffffd000`001f0003 00000000`1e62d248 0000000f`00000001 : nt!NtDeviceIoControlFile+0x56
ffffd000`848e3a90 00007fff`f89b123a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`1e62d2c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`f89b123a
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NsiEnumerateObjectsAllParametersEx+618
fffff800`a8c0a878 8bd8 mov ebx,eax
SYMBOL_STACK_INDEX: b
SYMBOL_NAME: NETIO!NsiEnumerateObjectsAllParametersEx+618
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 540ebbe6
BUCKET_ID_FUNC_OFFSET: 618
FAILURE_BUCKET_ID: 0x133_ISR_NETIO!NsiEnumerateObjectsAllParametersEx
BUCKET_ID: 0x133_ISR_NETIO!NsiEnumerateObjectsAllParametersEx
Followup: MachineOwner
---------
0: kd> lmvm NETIO
start end module name
fffff800`a8c00000 fffff800`a8c78000 NETIO (private pdb symbols) c:\symbol\netio.pdb\1A13EC2D01DC4013A4E57B7EB995FD8F2\netio.pdb
Loaded symbol image file: NETIO.SYS
Mapped memory image file: c:\symbol\NETIO.SYS\540EBBE678000\NETIO.SYS
Image path: \SystemRoot\system32\DRIVERS\NETIO.SYS
Image name: NETIO.SYS
Timestamp: Tue Sep 09 03:35:50 2014 (540EBBE6)
CheckSum: 0007D1B9
ImageSize: 00078000
File version: 6.3.9600.17337
Product version: 6.3.9600.17337
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft Windows Operating System
InternalName: netio.sys
OriginalFilename: netio.sys
ProductVersion: 6.3.9600.17337
FileVersion: 6.3.9600.17337 (winblue_r3.140908-1537)
FileDescription: Network I/O Subsystem
LegalCopyright: Microsoft Corporation. All rights reserved.