......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff880074b8775, 2, 1, fffff880017486df}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff880074b8775, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880017486df, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800036c4100
fffff880074b8775
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!IpNlpQuerySessionInfo+f
fffff880`017486df c883ec20 enter 0EC83h,20h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xD1
PROCESS_NAME: uTorrent.exe
TRAP_FRAME: fffff880074c7270 -- (.trap 0xfffff880074c7270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800182d0d0 rbx=0000000000000000 rcx=fffff880074c7440
rdx=fffffa80063f3910 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880017486df rsp=fffff880074c7400 rbp=0000000000000001
r8=fffff880074c7400 r9=0000000000000000 r10=0000000000000014
r11=fffff880074c73f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
tcpip!IpNlpQuerySessionInfo+0xf:
fffff880`017486df c883ec20 enter 0EC83h,20h
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800034911e9 to fffff80003491c40
STACK_TEXT:
fffff880`074c7128 fffff800`034911e9 : 00000000`0000000a fffff880`074b8775 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`074c7130 fffff800`0348fe60 : ffff0000`06c8906b fffff880`0174dce0 00000000`00000000 fffffa80`08bcbcf0 : nt!KiBugCheckDispatch+0x69
fffff880`074c7270 fffff880`017486df : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`01748941 : nt!KiPageFault+0x260
fffff880`074c7400 fffff880`01748941 : fffffa80`08bcbcf0 00000000`00000001 00000000`00000001 00000000`00000000 : tcpip!IpNlpQuerySessionInfo+0xf
fffff880`074c7420 fffff880`0174ce8b : fffffa80`08bcbcf0 00000000`00000000 00000000`00000002 00000000`00000017 : tcpip!TcpUpdatePathInfoTcb+0x181
fffff880`074c7540 fffff880`0174f3ac : 00000000`00000000 00000000`00000000 fffffa80`08bcbcf0 fffffa80`08bcbcf0 : tcpip!TcpContinueCreateAndConnect+0x10b
fffff880`074c7640 fffff880`0174ed83 : fffffa80`08566d80 fffffa80`08bcbcf0 00000000`00000002 fffffa80`08bcbf48 : tcpip!TcpCreateAndConnectTcbInspectConnectRequestComplete+0x5c
fffff880`074c7670 fffff880`0174f2c6 : 00000000`00004f89 00000000`00004f89 fffffa80`07016b20 00000000`00000000 : tcpip!TcpCreateAndConnectTcbWorkQueueRoutine+0x273
fffff880`074c7740 fffff880`0470e21e : fffffa80`05c90a00 fffff880`074c7ca0 fffffa80`05f6e2f0 fffffa80`0978d580 : tcpip!TcpCreateAndConnectTcb+0x4c6
fffff880`074c7830 fffff800`037aca97 : fffffa80`0978d580 fffffa80`05c90a00 00000000`00000000 fffffa80`05f6e2f0 : afd!AfdConnect+0x6be
fffff880`074c7a10 fffff800`037ad2f6 : fffff880`074c7bf8 00000000`00000000 00000000`00000001 00000000`03612ea0 : nt!IopXxxControlFile+0x607
fffff880`074c7b40 fffff800`03490ed3 : fffff880`074c7ca0 fffffa80`088d1060 fffff880`074c7bf8 00000000`00000001 : nt!NtDeviceIoControlFile+0x56
fffff880`074c7bb0 00000000`75052e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`024bf0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75052e09
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !tcpip
fffff880017486df - tcpip!IpNlpQuerySessionInfo+f
[ 48:c8 ]
1 error : !tcpip (fffff880017486df)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption