Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The !ndiskd.nb extension displays information about a NET_BUFFER (NB) structure.
!ndiskd.nb [-handle <x>] [-verbosity <x>] [-basic] [-chain] [-data]
Parameters
-handle
Required. Address of a NET_BUFFER structure.
-verbosity
Level of detail to display.
-basic
Displays basic information about an NB.
-chain
Displays all the MDLs associated with an NB.
-data
Dumps the actual data payload of an NB.
DLL
Ndiskd.dll
Examples
The NET_BUFFER in the following examples was obtained from the NET_BUFFER_LIST in the Examples section of the !ndiskd.nbl topic. The NB's handle is ffffdf8014952610.
2: kd> !ndiskd.nbl ffffdf80149524a0 -data
NET_BUFFER ffffdf8014952610
You can click the NET_BUFFER's handle or run the !ndiskd.nb -handle command to see its details.
2: kd> !ndiskd.nb ffffdf8014952610
NB ffffdf8014952610 Next NB 0
Length 0 Source pool ffffdf80147e4a40
First MDL ffffdf8014a37930 DataOffset 0
Current MDL [First MDL] Current MDL offset 0
View associated NBL
Use the !ndiskd.nb -chain command to see this NET_BUFFER's MDL chain in addition to its basic details. In the following example, there is only one MDL. Its handle is ffffdf8014a37930.
2: kd> !ndiskd.nb ffffdf8014952610 -chain
NB ffffdf8014952610 Next NB 0
Length 0 Source pool ffffdf80147e4a40
First MDL ffffdf8014a37930 DataOffset 0
Current MDL [First MDL] Current MDL offset 0
MDL [current] ffffdf8014a37930 MDL Flags c
MappedSystemVa ffffdf8014bf0024 ByteCount 0n1514
Process [System process] ByteOffset 0n36