- Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\110315-9671-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
- Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 8 Kernel Version 9200 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS Personal
- Built by: 9200.16384.amd64fre.win8_rtm.120725-1247
- Machine Name:
- Kernel base = 0xfffff802`fe407000 PsLoadedModuleList = 0xfffff802`fe6d1a60
- Debug session time: Tue Nov 3 08:47:40.693 2015 (UTC - 5:00)
- System Uptime: 4 days 19:03:04.336
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................
- Loading User Symbols
- Loading unloaded module list
- .......................
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D1, {158, 2, 1, fffff88001c23ec3}
- Probably caused by : tcpip.sys ( tcpip! ?? ::FNODOBFM::`string'+20e51 )
- Followup: MachineOwner
- ---------
- 5: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000000158, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
- Arg4: fffff88001c23ec3, address which referenced memory
- Debugging Details:
- ------------------
- WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff802fe75d168
- GetUlongFromAddress: unable to read from fffff802fe75d1f8
- 0000000000000158 Nonpaged pool
- CURRENT_IRQL: 2
- FAULTING_IP:
- tcpip! ?? ::FNODOBFM::`string'+20e51
- fffff880`01c23ec3 f0ff8058010000 lock inc dword ptr [rax+158h]
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: Skype.exe
- ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
- TRAP_FRAME: fffff8800ff3d130 -- (.trap 0xfffff8800ff3d130)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=fffffa801c461260
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff88001c23ec3 rsp=fffff8800ff3d2c0 rbp=fffff8800ff3d410
- r8=fffff8800ff3d468 r9=fffff8800ff3d558 r10=fffffa800f1febc0
- r11=000000000000002d r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- tcpip! ?? ::FNODOBFM::`string'+0x20e51:
- fffff880`01c23ec3 f0ff8058010000 lock inc dword ptr [rax+158h] ds:00000000`00000158=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff802fe481369 to fffff802fe482040
- STACK_TEXT:
- fffff880`0ff3cfe8 fffff802`fe481369 : 00000000`0000000a 00000000`00000158 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- fffff880`0ff3cff0 fffff802`fe47fbe0 : 00000000`00000001 fffffa80`1c461260 ffff2038`c6832100 fffff880`0ff3d130 : nt!KiBugCheckDispatch+0x69
- fffff880`0ff3d130 fffff880`01c23ec3 : fffff880`0ff3d410 fffffa80`0f1fadb0 00000000`00000001 fffffa80`1c461260 : nt!KiPageFault+0x260
- fffff880`0ff3d2c0 fffff880`01b3396e : fffff880`0ff3d880 fffff880`00000002 fffffa80`12303d3f fffff880`01783d3f : tcpip! ?? ::FNODOBFM::`string'+0x20e51
- fffff880`0ff3d4e0 fffff880`01b7af7e : 00000000`00000000 fffffa80`1ceb0170 fffffa80`1ceb0170 fffffa80`0f7c7b0c : tcpip!WfpInspectSendNonTcpDatagram+0x15e
- fffff880`0ff3d5f0 fffff880`01b784ba : 00000000`0000000e fffff880`01b38888 fffff880`0ff3d890 00000000`00000000 : tcpip!IppInspectLocalDatagramsOut+0x4de
- fffff880`0ff3d7a0 fffff880`01b326df : 00000000`00000004 fffff880`01c7bb90 fffffa80`1ceb0170 00000000`00000000 : tcpip!IppSendDatagramsCommon+0x3da
- fffff880`0ff3d960 fffff880`01b31819 : fffffa80`1bd71440 fffffa80`1a584fe4 fffff880`0ff3e430 fffff880`01c7bb90 : tcpip!UdpSendMessagesOnPathCreation+0x90f
- fffff880`0ff3dd80 fffff880`01b33a88 : fffffa80`1b0f5070 00000001`1b0f5070 fffff880`0ff3e330 fffffa80`12363d70 : tcpip!UdpSendMessages+0x259
- fffff880`0ff3e190 fffff802`fe4c2df5 : 00000000`00000000 fffffa80`1b162160 00000000`00000000 fffffa80`1b162238 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
- fffff880`0ff3e1c0 fffff802`fe4c3d85 : fffff880`01b33a74 fffff880`0ff3e330 00000000`196c0000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
- fffff880`0ff3e2c0 fffff880`01b33c70 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x25
- fffff880`0ff3e300 fffff880`03cf1bfa : fffffa80`19960760 fffff880`0ff3eb80 fffffa80`1a584f80 fffffa80`19960760 : tcpip!UdpTlProviderSendMessages+0x70
- fffff880`0ff3e380 fffff880`03cd9cd2 : fffffa80`19960760 fffff880`0ff3e620 00000000`00000004 00000000`00000000 : afd!AfdFastDatagramSend+0x51a
- fffff880`0ff3e4e0 fffff802`fe86b02a : fffffa80`1d314d80 fffffa80`1d314d30 00000000`00000000 00000000`00000000 : afd!AfdFastIoDeviceControl+0xcc2
- fffff880`0ff3e890 fffff802`fe86bdb6 : 000003c4`591bd5cb fffffa80`1ff58330 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x3d9
- fffff880`0ff3ea20 fffff802`fe481053 : fffff880`0ff3ead8 fffffa80`173f4dc0 00000000`00000001 fffff802`fe853f00 : nt!NtDeviceIoControlFile+0x56
- fffff880`0ff3ea90 00000000`76ea2ad2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
- 00000000`06cef128 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76ea2ad2
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- tcpip! ?? ::FNODOBFM::`string'+20e51
- fffff880`01c23ec3 f0ff8058010000 lock inc dword ptr [rax+158h]
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: tcpip! ?? ::FNODOBFM::`string'+20e51
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: tcpip
- IMAGE_NAME: tcpip.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 5010aad0
- IMAGE_VERSION: 6.2.9200.16384
- BUCKET_ID_FUNC_OFFSET: 20e51
- FAILURE_BUCKET_ID: AV_tcpip!_??_::FNODOBFM::_string_
- BUCKET_ID: AV_tcpip!_??_::FNODOBFM::_string_
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_tcpip!_??_::fnodobfm::_string_
- FAILURE_ID_HASH: {2508d6ce-e866-07a1-6351-8f053de6a9a0}
- Followup: MachineOwner
- ---------
BSOD - DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)