Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\111617-15022-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\Symbols\*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.23915.amd64fre.win7sp1_ldr.170913-0600 Machine Name: Kernel base = 0xfffff800`0e416000 PsLoadedModuleList = 0xfffff800`0e658750 Debug session time: Thu Nov 16 11:15:47.735 2017 (UTC + 1:00) System Uptime: 0 days 0:02:47.093 Loading Kernel Symbols ............................................................... ................................................................ ................ Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {7c7085, 2, 1, fffff88001c01de7} Probably caused by : afd.sys ( afd!AfdCompleteIrpListEx+57 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000000007c7085, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff88001c01de7, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000e6c2100 00000000007c7085 CURRENT_IRQL: 2 FAULTING_IP: afd!AfdCompleteIrpListEx+57 fffff880`01c01de7 48895808 mov qword ptr [rax+8],rbx CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff8000ec06200 -- (.trap 0xfffff8000ec06200) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000007c707d rbx=0000000000000000 rcx=fffffa8006d40b38 rdx=fffffa8008fada50 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88001c01de7 rsp=fffff8000ec06390 rbp=fffffa8008fada50 r8=0000000000000000 r9=fffff88001c5fb60 r10=fffff8000e416000 r11=fffff8000ec06400 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc afd!AfdCompleteIrpListEx+0x57: fffff880`01c01de7 48895808 mov qword ptr [rax+8],rbx ds:00000000`007c7085=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8000e4863a9 to fffff8000e486e00 STACK_TEXT: fffff800`0ec060b8 fffff800`0e4863a9 : 00000000`0000000a 00000000`007c7085 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`0ec060c0 fffff800`0e485020 : fffff800`0e604e80 fffffa80`038b4001 00000000`00000000 fffffa80`06c40b38 : nt!KiBugCheckDispatch+0x69 fffff800`0ec06200 fffff880`01c01de7 : 00000000`0760f030 00000000`00000000 fffffa80`03b51cb0 fffff880`01c50245 : nt!KiPageFault+0x260 fffff800`0ec06390 fffff880`01c4fdaa : 00000000`00000000 fffff880`01c5fb60 fffffa80`06c40b38 fffffa80`03bc6ce8 : afd!AfdCompleteIrpListEx+0x57 fffff800`0ec063d0 fffff880`01c5456f : fffffa80`06c40b00 fffffa80`08fada50 fffffa80`06c40b38 fffffa80`06c40b38 : afd!AfdCompleteIrpList+0x4a fffff800`0ec06430 fffff880`01c426dc : fffffa80`048d8010 fffff880`00000000 00000000`00000011 fffffa80`06c40b00 : afd! ?? ::GFJBLGFE::`string'+0x3adf fffff800`0ec064c0 fffff880`01a8fb38 : fffffa80`048d8010 fffff880`04f157b3 fffffa80`00000006 fffffa80`089a04b0 : afd!AfdTLDisconnectEventHandler+0x4c fffff800`0ec06500 fffff880`01a80f67 : fffffa80`00000002 fffffa80`076d2808 fffffa80`03b51cb0 fffff880`04f20e8a : tcpip!TcpNotifyDisconnectDelivery+0x28 fffff800`0ec06530 fffff880`01a8124c : 00000000`00000000 fffffa80`048d8010 ffff0080`0f7614df 00000000`00000000 : tcpip!TcpDeliverFinToClient+0x157 fffff800`0ec065e0 fffff880`01a758da : 00000000`00000000 00000000`00000010 fffffa80`00000014 fffffa80`048d8010 : tcpip!TcpAllowFin+0x9c fffff800`0ec06610 fffff880`01a624e7 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0192517b : tcpip!TcpTcbCarefulDatagram+0x1c0a fffff800`0ec067c0 fffff880`01a6171a : fffffa80`048d8010 fffff880`01a5a100 fffffa80`045ff700 fffffa80`08426810 : tcpip!TcpTcbReceive+0x3ab fffff800`0ec068d0 fffff880`01a6291b : fffffa80`089a7124 fffffa80`04750000 00000000`00000000 fffff800`0ec06c00 : tcpip!TcpMatchReceive+0x1fa fffff800`0ec06a20 fffff880`01a5a877 : fffffa80`04635880 fffffa80`04635000 fffffa80`000085c0 00000000`000085c0 : tcpip!TcpPreValidatedReceive+0x36b fffff800`0ec06af0 fffff880`01a5a3ea : 00000000`00000000 fffff880`01b6da10 fffff800`0ec06cb0 fffff880`05da102c : tcpip!IppDeliverListToProtocol+0x97 fffff800`0ec06bb0 fffff880`01a599a1 : fffff880`05da10e8 00000000`00000000 fffff880`05da105e fffff800`0ec06ca0 : tcpip!IppProcessDeliverList+0x5a fffff800`0ec06c50 fffff880`01a5767f : fffffa80`1b2b2517 fffff880`01b6da10 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x232 fffff800`0ec06d50 fffff880`01a56c9c : fffffa80`083cf8f0 00000000`00000000 fffff880`01b9e801 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x64f fffff800`0ec06f50 fffff880`01a5568a : fffffa80`08429ba0 fffff800`0ec07090 fffffa80`08429ba0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0xcec fffff800`0ec07040 fffff800`0e4936f8 : fffffa80`091b68a0 00000000`00004800 fffff800`0e612cc0 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda fffff800`0ec07090 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8 STACK_COMMAND: kb FOLLOWUP_IP: afd!AfdCompleteIrpListEx+57 fffff880`01c01de7 48895808 mov qword ptr [rax+8],rbx SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: afd!AfdCompleteIrpListEx+57 FOLLOWUP_NAME: MachineOwner MODULE_NAME: afd IMAGE_NAME: afd.sys DEBUG_FLR_IMAGE_TIMESTAMP: 58e3b35c FAILURE_BUCKET_ID: X64_0xD1_afd!AfdCompleteIrpListEx+57 BUCKET_ID: X64_0xD1_afd!AfdCompleteIrpListEx+57 Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000000007c7085, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff88001c01de7, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: 00000000007c7085 CURRENT_IRQL: 2 FAULTING_IP: afd!AfdCompleteIrpListEx+57 fffff880`01c01de7 48895808 mov qword ptr [rax+8],rbx CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff8000ec06200 -- (.trap 0xfffff8000ec06200) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000007c707d rbx=0000000000000000 rcx=fffffa8006d40b38 rdx=fffffa8008fada50 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88001c01de7 rsp=fffff8000ec06390 rbp=fffffa8008fada50 r8=0000000000000000 r9=fffff88001c5fb60 r10=fffff8000e416000 r11=fffff8000ec06400 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc afd!AfdCompleteIrpListEx+0x57: fffff880`01c01de7 48895808 mov qword ptr [rax+8],rbx ds:00000000`007c7085=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8000e4863a9 to fffff8000e486e00 STACK_TEXT: fffff800`0ec060b8 fffff800`0e4863a9 : 00000000`0000000a 00000000`007c7085 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`0ec060c0 fffff800`0e485020 : fffff800`0e604e80 fffffa80`038b4001 00000000`00000000 fffffa80`06c40b38 : nt!KiBugCheckDispatch+0x69 fffff800`0ec06200 fffff880`01c01de7 : 00000000`0760f030 00000000`00000000 fffffa80`03b51cb0 fffff880`01c50245 : nt!KiPageFault+0x260 fffff800`0ec06390 fffff880`01c4fdaa : 00000000`00000000 fffff880`01c5fb60 fffffa80`06c40b38 fffffa80`03bc6ce8 : afd!AfdCompleteIrpListEx+0x57 fffff800`0ec063d0 fffff880`01c5456f : fffffa80`06c40b00 fffffa80`08fada50 fffffa80`06c40b38 fffffa80`06c40b38 : afd!AfdCompleteIrpList+0x4a fffff800`0ec06430 fffff880`01c426dc : fffffa80`048d8010 fffff880`00000000 00000000`00000011 fffffa80`06c40b00 : afd! ?? ::GFJBLGFE::`string'+0x3adf fffff800`0ec064c0 fffff880`01a8fb38 : fffffa80`048d8010 fffff880`04f157b3 fffffa80`00000006 fffffa80`089a04b0 : afd!AfdTLDisconnectEventHandler+0x4c fffff800`0ec06500 fffff880`01a80f67 : fffffa80`00000002 fffffa80`076d2808 fffffa80`03b51cb0 fffff880`04f20e8a : tcpip!TcpNotifyDisconnectDelivery+0x28 fffff800`0ec06530 fffff880`01a8124c : 00000000`00000000 fffffa80`048d8010 ffff0080`0f7614df 00000000`00000000 : tcpip!TcpDeliverFinToClient+0x157 fffff800`0ec065e0 fffff880`01a758da : 00000000`00000000 00000000`00000010 fffffa80`00000014 fffffa80`048d8010 : tcpip!TcpAllowFin+0x9c fffff800`0ec06610 fffff880`01a624e7 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0192517b : tcpip!TcpTcbCarefulDatagram+0x1c0a fffff800`0ec067c0 fffff880`01a6171a : fffffa80`048d8010 fffff880`01a5a100 fffffa80`045ff700 fffffa80`08426810 : tcpip!TcpTcbReceive+0x3ab fffff800`0ec068d0 fffff880`01a6291b : fffffa80`089a7124 fffffa80`04750000 00000000`00000000 fffff800`0ec06c00 : tcpip!TcpMatchReceive+0x1fa fffff800`0ec06a20 fffff880`01a5a877 : fffffa80`04635880 fffffa80`04635000 fffffa80`000085c0 00000000`000085c0 : tcpip!TcpPreValidatedReceive+0x36b fffff800`0ec06af0 fffff880`01a5a3ea : 00000000`00000000 fffff880`01b6da10 fffff800`0ec06cb0 fffff880`05da102c : tcpip!IppDeliverListToProtocol+0x97 fffff800`0ec06bb0 fffff880`01a599a1 : fffff880`05da10e8 00000000`00000000 fffff880`05da105e fffff800`0ec06ca0 : tcpip!IppProcessDeliverList+0x5a fffff800`0ec06c50 fffff880`01a5767f : fffffa80`1b2b2517 fffff880`01b6da10 00000000`00000000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x232 fffff800`0ec06d50 fffff880`01a56c9c : fffffa80`083cf8f0 00000000`00000000 fffff880`01b9e801 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x64f fffff800`0ec06f50 fffff880`01a5568a : fffffa80`08429ba0 fffff800`0ec07090 fffffa80`08429ba0 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0xcec fffff800`0ec07040 fffff800`0e4936f8 : fffffa80`091b68a0 00000000`00004800 fffff800`0e612cc0 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda fffff800`0ec07090 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8 STACK_COMMAND: kb FOLLOWUP_IP: afd!AfdCompleteIrpListEx+57 fffff880`01c01de7 48895808 mov qword ptr [rax+8],rbx SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: afd!AfdCompleteIrpListEx+57 FOLLOWUP_NAME: MachineOwner MODULE_NAME: afd IMAGE_NAME: afd.sys DEBUG_FLR_IMAGE_TIMESTAMP: 58e3b35c FAILURE_BUCKET_ID: X64_0xD1_afd!AfdCompleteIrpListEx+57 BUCKET_ID: X64_0xD1_afd!AfdCompleteIrpListEx+57 Followup: MachineOwner ---------