1. Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
  2. Copyright (c) Microsoft Corporation. All rights reserved.
  3. Loading Dump File [C:\Windows\Minidump\110315-9671-01.dmp]
  4. Mini Kernel Dump File: Only registers and stack trace are available
  5. ************* Symbol Path validation summary **************
  6. Response Time (ms) Location
  7. Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  8. Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  9. Executable search path is:
  10. Windows 8 Kernel Version 9200 MP (8 procs) Free x64
  11. Product: WinNt, suite: TerminalServer SingleUserTS Personal
  12. Built by: 9200.16384.amd64fre.win8_rtm.120725-1247
  13. Machine Name:
  14. Kernel base = 0xfffff802`fe407000 PsLoadedModuleList = 0xfffff802`fe6d1a60
  15. Debug session time: Tue Nov 3 08:47:40.693 2015 (UTC - 5:00)
  16. System Uptime: 4 days 19:03:04.336
  17. Loading Kernel Symbols
  18. ...............................................................
  19. ................................................................
  20. ................................................
  21. Loading User Symbols
  22. Loading unloaded module list
  23. .......................
  24. *******************************************************************************
  25. * *
  26. * Bugcheck Analysis *
  27. * *
  28. *******************************************************************************
  29. Use !analyze -v to get detailed debugging information.
  30. BugCheck D1, {158, 2, 1, fffff88001c23ec3}
  31. Probably caused by : tcpip.sys ( tcpip! ?? ::FNODOBFM::`string'+20e51 )
  32. Followup: MachineOwner
  33. ---------
  34. 5: kd> !analyze -v
  35. *******************************************************************************
  36. * *
  37. * Bugcheck Analysis *
  38. * *
  39. *******************************************************************************
  40. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  41. An attempt was made to access a pageable (or completely invalid) address at an
  42. interrupt request level (IRQL) that is too high. This is usually
  43. caused by drivers using improper addresses.
  44. If kernel debugger is available get stack backtrace.
  45. Arguments:
  46. Arg1: 0000000000000158, memory referenced
  47. Arg2: 0000000000000002, IRQL
  48. Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
  49. Arg4: fffff88001c23ec3, address which referenced memory
  50. Debugging Details:
  51. ------------------
  52. WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff802fe75d168
  53. GetUlongFromAddress: unable to read from fffff802fe75d1f8
  54. 0000000000000158 Nonpaged pool
  55. CURRENT_IRQL: 2
  56. FAULTING_IP:
  57. tcpip! ?? ::FNODOBFM::`string'+20e51
  58. fffff880`01c23ec3 f0ff8058010000 lock inc dword ptr [rax+158h]
  59. CUSTOMER_CRASH_COUNT: 1
  60. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  61. BUGCHECK_STR: AV
  62. PROCESS_NAME: Skype.exe
  63. ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
  64. TRAP_FRAME: fffff8800ff3d130 -- (.trap 0xfffff8800ff3d130)
  65. NOTE: The trap frame does not contain all registers.
  66. Some register values may be zeroed or incorrect.
  67. rax=0000000000000000 rbx=0000000000000000 rcx=fffffa801c461260
  68. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
  69. rip=fffff88001c23ec3 rsp=fffff8800ff3d2c0 rbp=fffff8800ff3d410
  70. r8=fffff8800ff3d468 r9=fffff8800ff3d558 r10=fffffa800f1febc0
  71. r11=000000000000002d r12=0000000000000000 r13=0000000000000000
  72. r14=0000000000000000 r15=0000000000000000
  73. iopl=0 nv up ei pl nz na po nc
  74. tcpip! ?? ::FNODOBFM::`string'+0x20e51:
  75. fffff880`01c23ec3 f0ff8058010000 lock inc dword ptr [rax+158h] ds:00000000`00000158=????????
  76. Resetting default scope
  77. LAST_CONTROL_TRANSFER: from fffff802fe481369 to fffff802fe482040
  78. STACK_TEXT:
  79. fffff880`0ff3cfe8 fffff802`fe481369 : 00000000`0000000a 00000000`00000158 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  80. fffff880`0ff3cff0 fffff802`fe47fbe0 : 00000000`00000001 fffffa80`1c461260 ffff2038`c6832100 fffff880`0ff3d130 : nt!KiBugCheckDispatch+0x69
  81. fffff880`0ff3d130 fffff880`01c23ec3 : fffff880`0ff3d410 fffffa80`0f1fadb0 00000000`00000001 fffffa80`1c461260 : nt!KiPageFault+0x260
  82. fffff880`0ff3d2c0 fffff880`01b3396e : fffff880`0ff3d880 fffff880`00000002 fffffa80`12303d3f fffff880`01783d3f : tcpip! ?? ::FNODOBFM::`string'+0x20e51
  83. fffff880`0ff3d4e0 fffff880`01b7af7e : 00000000`00000000 fffffa80`1ceb0170 fffffa80`1ceb0170 fffffa80`0f7c7b0c : tcpip!WfpInspectSendNonTcpDatagram+0x15e
  84. fffff880`0ff3d5f0 fffff880`01b784ba : 00000000`0000000e fffff880`01b38888 fffff880`0ff3d890 00000000`00000000 : tcpip!IppInspectLocalDatagramsOut+0x4de
  85. fffff880`0ff3d7a0 fffff880`01b326df : 00000000`00000004 fffff880`01c7bb90 fffffa80`1ceb0170 00000000`00000000 : tcpip!IppSendDatagramsCommon+0x3da
  86. fffff880`0ff3d960 fffff880`01b31819 : fffffa80`1bd71440 fffffa80`1a584fe4 fffff880`0ff3e430 fffff880`01c7bb90 : tcpip!UdpSendMessagesOnPathCreation+0x90f
  87. fffff880`0ff3dd80 fffff880`01b33a88 : fffffa80`1b0f5070 00000001`1b0f5070 fffff880`0ff3e330 fffffa80`12363d70 : tcpip!UdpSendMessages+0x259
  88. fffff880`0ff3e190 fffff802`fe4c2df5 : 00000000`00000000 fffffa80`1b162160 00000000`00000000 fffffa80`1b162238 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
  89. fffff880`0ff3e1c0 fffff802`fe4c3d85 : fffff880`01b33a74 fffff880`0ff3e330 00000000`196c0000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0xe5
  90. fffff880`0ff3e2c0 fffff880`01b33c70 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x25
  91. fffff880`0ff3e300 fffff880`03cf1bfa : fffffa80`19960760 fffff880`0ff3eb80 fffffa80`1a584f80 fffffa80`19960760 : tcpip!UdpTlProviderSendMessages+0x70
  92. fffff880`0ff3e380 fffff880`03cd9cd2 : fffffa80`19960760 fffff880`0ff3e620 00000000`00000004 00000000`00000000 : afd!AfdFastDatagramSend+0x51a
  93. fffff880`0ff3e4e0 fffff802`fe86b02a : fffffa80`1d314d80 fffffa80`1d314d30 00000000`00000000 00000000`00000000 : afd!AfdFastIoDeviceControl+0xcc2
  94. fffff880`0ff3e890 fffff802`fe86bdb6 : 000003c4`591bd5cb fffffa80`1ff58330 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x3d9
  95. fffff880`0ff3ea20 fffff802`fe481053 : fffff880`0ff3ead8 fffffa80`173f4dc0 00000000`00000001 fffff802`fe853f00 : nt!NtDeviceIoControlFile+0x56
  96. fffff880`0ff3ea90 00000000`76ea2ad2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
  97. 00000000`06cef128 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76ea2ad2
  98. STACK_COMMAND: kb
  99. FOLLOWUP_IP:
  100. tcpip! ?? ::FNODOBFM::`string'+20e51
  101. fffff880`01c23ec3 f0ff8058010000 lock inc dword ptr [rax+158h]
  102. SYMBOL_STACK_INDEX: 3
  103. SYMBOL_NAME: tcpip! ?? ::FNODOBFM::`string'+20e51
  104. FOLLOWUP_NAME: MachineOwner
  105. MODULE_NAME: tcpip
  106. IMAGE_NAME: tcpip.sys
  107. DEBUG_FLR_IMAGE_TIMESTAMP: 5010aad0
  108. IMAGE_VERSION: 6.2.9200.16384
  109. BUCKET_ID_FUNC_OFFSET: 20e51
  110. FAILURE_BUCKET_ID: AV_tcpip!_??_::FNODOBFM::_string_
  111. BUCKET_ID: AV_tcpip!_??_::FNODOBFM::_string_
  112. ANALYSIS_SOURCE: KM
  113. FAILURE_ID_HASH_STRING: km:av_tcpip!_??_::fnodobfm::_string_
  114. FAILURE_ID_HASH: {2508d6ce-e866-07a1-6351-8f053de6a9a0}
  115. Followup: MachineOwner
  116. ---------

BSOD - DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)