Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18741.amd64fre.win7sp1_gdr.150202-1526
Machine Name:
Kernel base = 0xfffff800`03a0b000 PsLoadedModuleList = 0xfffff800`03c4f890
Debug session time: Sat Mar 21 10:29:27.094 2015 (UTC + 1:00)
System Uptime: 0 days 2:01:16.108
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 1, fffff88003b8df4e}
*** ERROR: Module load completed but symbols could not be loaded for avgtdia.sys
Probably caused by : avgtdia.sys ( avgtdia+6805 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88003b8df4e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: 0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
afd!AfdBReceiveEventHandler+4de
fffff880`03b8df4e 8801 mov byte ptr [rcx],al
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: vprot.exe
ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
TRAP_FRAME: fffff88009a63bc0 -- (.trap 0xfffff88009a63bc0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800a01b700 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000c4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003b8df4e rsp=fffff88009a63d50 rbp=0000000000000001
r8=fffffa8007069201 r9=000000000000084c r10=fffffa8006f50a00
r11=000000000000afd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
afd!AfdBReceiveEventHandler+0x4de:
fffff880`03b8df4e 8801 mov byte ptr [rcx],al ds:00000000`00000000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003a7f469 to fffff80003a7fec0
STACK_TEXT:
fffff880`09a63a78 fffff800`03a7f469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`09a63a80 fffff800`03a7e0e0 : fffffa80`087596a0 00000000`a000000c 00000000`00000000 00000000`000000c4 : nt!KiBugCheckDispatch+0x69
fffff880`09a63bc0 fffff880`03b8df4e : 00000000`000000c4 00000000`00000000 fffffa80`08c66410 fffffa80`08c66410 : nt!KiPageFault+0x260
fffff880`09a63d50 fffff880`03aa1805 : fffffa80`08e23a30 00000000`00000001 00000000`00000c20 00000000`000000c4 : afd!AfdBReceiveEventHandler+0x4de
fffff880`09a63e10 fffff880`019a5f28 : fffffa80`08de39a0 fffffa80`08e23c30 fffff880`00000c20 fffffa80`000000c4 : avgtdia+0x6805
fffff880`09a63eb0 fffff880`01666f44 : fffffa80`087e4080 fffffa80`06e4dc00 fffffa80`085417f0 fffffa80`06e35d78 : tdx!TdxEventReceiveConnection+0x178
fffff880`09a63ff0 fffff880`016666a7 : 00000000`000000bc fffffa80`08541950 fffffa80`085417f0 00000000`00000000 : tcpip!TcpIndicateData+0x104
fffff880`09a640f0 fffff880`016650a7 : 00000000`00000000 00000000`00000000 fffffa80`06e2bf00 00000000`0000c81b : tcpip!TcpDeliverDataToClient+0x2b7
fffff880`09a64270 fffff880`0166321e : fffffa80`08c653a0 00000000`000000bc fffffa80`06f770a8 fffff880`0140c81b : tcpip!TcpDeliverReceive+0xa7
fffff880`09a64370 fffff880`01664d9b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`00030000 : tcpip!TcpTcbFastDatagram+0x3ae
fffff880`09a64400 fffff880`0166299a : fffffa80`085417f0 fffff880`00000000 fffffa80`06e01200 fffff800`03a0b000 : tcpip!TcpTcbReceive+0x1df
fffff880`09a64510 fffff880`016636cb : fffffa80`07d67c80 fffffa80`089e3080 00000000`00000000 00000000`00000000 : tcpip!TcpMatchReceive+0x1fa
fffff880`09a64660 fffff880`0163e01a : fffffa80`06e2bf00 fffffa80`000008c0 fffff880`0000c81b fffff880`09a6c81b : tcpip!TcpPreValidatedReceive+0x36b
fffff880`09a64730 fffff800`03a8c7b8 : fffff880`0176e9a0 00000000`00000006 00000000`00000000 00000000`00000000 : tcpip!IppLoopbackTransmit+0x11a
fffff880`09a647e0 fffff880`0163e92f : fffff880`016916fc fffff800`03d764b0 fffff880`09a64a02 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`09a648c0 fffff880`01662597 : fffffa80`07d679e0 00000000`00000004 fffff880`09a64d01 fffffa80`08c65860 : tcpip!IppLoopbackEnqueue+0x22f
fffff880`09a64970 fffff880`01668895 : fffffa80`06e38820 fffff800`03d7f501 fffff8a0`00000001 00000000`00000080 : tcpip!IpNlpFastSendDatagram+0xb77
fffff880`09a64d20 fffff880`01669450 : fffff880`09a652a0 fffff880`000c000c 00000000`00000000 00000000`00004800 : tcpip!TcpTcbSend+0x495
fffff880`09a64fa0 fffff880`016681a8 : 00000000`00000000 00000000`00000000 fffff880`09a651c0 fffff880`09a65280 : tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0xa0
fffff880`09a64fd0 fffff880`0166836b : fffff880`09a651e8 fffff880`09a65460 00000000`00004800 00000000`00000000 : tcpip!TcpEnqueueTcbSend+0x258
fffff880`09a65080 fffff800`03a8c7b8 : 00000000`00000000 fffffa80`09c05240 fffffa80`06ec4950 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
fffff880`09a650b0 fffff880`0166922a : fffff880`01668350 00000000`00000009 fffffa80`09a09e00 fffff880`01243301 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`09a65190 fffff880`019a1ef2 : fffffa80`08c65d80 00000000`00000000 fffff880`0199f070 00000000`00000000 : tcpip!TcpTlConnectionSend+0x7a
fffff880`09a65200 fffff880`019a0c79 : 00000000`000000e0 fffffa80`08c65d80 fffffa80`08003140 00000000`000000c4 : tdx!TdxSendConnection+0x252
fffff880`09a652f0 fffff880`03aa54f7 : fffffa80`07069170 00000000`02c4dfe0 fffffa80`07069010 fffffa80`0879baa0 : tdx!TdxTdiDispatchInternalDeviceControl+0x389
fffff880`09a65370 fffff880`03b7cfb5 : fffffa80`0879baa0 fffff880`09a65b60 00000000`000000c4 fffffa80`070697e0 : avgtdia+0xa4f7
fffff880`09a653a0 fffff880`03b51469 : fffffa80`066e2501 00000000`00000001 00000000`00000004 00000000`0040ee4c : afd! ?? ::GFJBLGFE::`string'+0x6bbe
fffff880`09a65560 fffff800`03d9f8a3 : 00000000`000000c4 fffffa80`089ebf20 00000000`0040ee08 00000000`00000001 : afd!AfdFastIoDeviceControl+0x459
fffff880`09a658d0 fffff800`03da0396 : 00000000`00000000 00000000`000001f4 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373
fffff880`09a65a00 fffff800`03a7f153 : ffffffff`ffffffff 00000000`00000000 00000000`0040ee4c 00000000`00000004 : nt!NtDeviceIoControlFile+0x56
fffff880`09a65a70 00000000`74a72e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0016eba8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74a72e09
STACK_COMMAND: kb
FOLLOWUP_IP:
avgtdia+6805
fffff880`03aa1805 8bf8 mov edi,eax
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: avgtdia+6805
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: avgtdia
IMAGE_NAME: avgtdia.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 54b8e542
FAILURE_BUCKET_ID: X64_0xD1_avgtdia+6805
BUCKET_ID: X64_0xD1_avgtdia+6805
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xd1_avgtdia+6805
FAILURE_ID_HASH: {059eb8c4-e126-f0b8-cd62-4e3cbe0227fb}
Followup: MachineOwner
---------