Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031211-20202-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0304b000 PsLoadedModuleList = 0xfffff800`03290e90
Debug session time: Fri Mar 11 19:44:53.181 2011 (UTC - 5:00)
System Uptime: 0 days 1:15:20.539
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1c, 2, 1, fffff88001ad187e}
Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001ad187e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032fc0e8
000000000000001c
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpBeginTcbSend+33e
fffff880`01ad187e f083401c01 lock add dword ptr [rax+1Ch],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800674a460 -- (.trap 0xfffff8800674a460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80039f0ce0
rdx=fffffa80039f0d98 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001ad187e rsp=fffff8800674a5f0 rbp=fffff8800674a700
r8=fffffa80039f0cd0 r9=fffffa80039f0ce0 r10=fffffa80039f0c10
r11=fffff8800674a820 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x33e:
fffff880`01ad187e f083401c01 lock add dword ptr [rax+1Ch],1 ds:00000000`0000001c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030cabe9 to fffff800030cb640
STACK_TEXT:
fffff880`0674a318 fffff800`030cabe9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0674a320 fffff800`030c9860 : 00000000`00000006 00000000`00000000 00000002`8b008df9 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`0674a460 fffff880`01ad187e : 00000000`00000001 fffffa80`037aa860 00000014`00000000 fffff880`01aecdbf : nt!KiPageFault+0x260
fffff880`0674a5f0 fffff880`01ad5b29 : 00000000`00000000 fffff880`0674abd8 fffffa80`04bf0000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e
fffff880`0674a870 fffff880`01af67e6 : 00000000`00000000 fffffa80`04a96f01 fffff880`01bd6128 00000000`00000000 : tcpip!TcpTcbSend+0x1d9
fffff880`0674aaf0 fffff880`01ad1325 : fffff880`0697e200 00000000`00000000 00000000`00000000 00000000`00005000 : tcpip!TcpFlushDelay+0x316
fffff880`0674abd0 fffff880`01ac8137 : fffffa80`04a87f00 fffffa80`04afaf30 fffffa80`00008b00 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x3e5
fffff880`0674aca0 fffff880`01ac7caa : 00000000`00000000 fffff880`01bdc9a0 fffff880`0674ae60 fffffa80`0655f460 : tcpip!IppDeliverListToProtocol+0x97
fffff880`0674ad60 fffff880`01ac72a9 : 00000000`00000000 00000000`00000000 fffff880`0674ad00 fffff880`0674ae50 : tcpip!IppProcessDeliverList+0x5a
fffff880`0674ae00 fffff880`01ac4fff : fffffa80`0653fae0 fffffa80`04bf0000 fffff880`01bdc9a0 00000000`061f8401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0674aee0 fffff880`01ac45f2 : fffffa80`065e0cd0 00000000`00000000 fffffa80`061f8401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`0674b0e0 fffff880`01ac3a8a : fffffa80`061f8490 fffff880`0674b210 fffffa80`061f8490 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0674b1c0 fffff800`030d8078 : fffffa80`06561b40 00000000`00004800 fffffa80`072a2060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0674b210 fffff880`01ac4152 : fffff880`01ac39b0 00000000`00000018 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0674b2f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpBeginTcbSend+33e
fffff880`01ad187e f083401c01 lock add dword ptr [rax+1Ch],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpBeginTcbSend+33e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79420
FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+33e
BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+33e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031211-20826-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0300a000 PsLoadedModuleList = 0xfffff800`0324fe90
Debug session time: Fri Mar 11 21:56:53.246 2011 (UTC - 5:00)
System Uptime: 0 days 0:05:17.604
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1c, 2, 1, fffff88001a9787e}
Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001a9787e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bb0e8
000000000000001c
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpBeginTcbSend+33e
fffff880`01a9787e f083401c01 lock add dword ptr [rax+1Ch],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: SF Diagnostic
TRAP_FRAME: fffff80000ba17e0 -- (.trap 0xfffff80000ba17e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80048f49d0
rdx=fffffa80048f4a88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001a9787e rsp=fffff80000ba1970 rbp=fffff80000ba1a80
r8=fffffa80048f49c0 r9=fffffa80048f49d0 r10=fffffa80048f4900
r11=fffff80000ba1b20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x33e:
fffff880`01a9787e f083401c01 lock add dword ptr [rax+1Ch],1 ds:00000000`0000001c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003089be9 to fffff8000308a640
STACK_TEXT:
fffff800`00ba1698 fffff800`03089be9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00ba16a0 fffff800`03088860 : 00000000`00000006 00000000`00000000 00000002`8b006dfb 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff800`00ba17e0 fffff880`01a9787e : 00000000`00000001 fffffa80`0493b8b0 ffff0014`00000000 fffff880`01ab2dbf : nt!KiPageFault+0x260
fffff800`00ba1970 fffff880`01a9bb29 : 00000000`00000000 fffff800`00ba1f58 fffffa80`04312000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e
fffff800`00ba1bf0 fffff880`01abc7e6 : 00000000`00000000 00000001`041d4f01 fffff880`01b9c128 fffffa80`04185080 : tcpip!TcpTcbSend+0x1d9
fffff800`00ba1e70 fffff880`01a97325 : fffff880`0605fd00 00000000`00000000 00000000`00000000 fffff880`01174600 : tcpip!TcpFlushDelay+0x316
fffff800`00ba1f50 fffff880`01a8e137 : fffffa80`0432f400 fffffa80`041f4830 fffffa80`00008b00 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x3e5
fffff800`00ba2020 fffff880`01a8dcaa : 00000000`00000000 fffff880`01ba29a0 fffff800`00ba21e0 fffffa80`08365a02 : tcpip!IppDeliverListToProtocol+0x97
fffff800`00ba20e0 fffff880`01a8d2a9 : 0000057f`f7c9a758 fffff880`01602bee fffffa80`040e02d0 fffff800`00ba21d0 : tcpip!IppProcessDeliverList+0x5a
fffff800`00ba2180 fffff880`01a8afff : 00000000`74617402 fffffa80`04312000 fffff880`01ba29a0 00000000`06647001 : tcpip!IppReceiveHeaderBatch+0x23a
fffff800`00ba2260 fffff880`01a8a5f2 : fffffa80`06716730 00000000`00000000 fffffa80`06647001 fffff780`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff800`00ba2460 fffff880`01a89a8a : fffffa80`06647010 fffff800`00ba2590 fffffa80`06647010 fffff800`03090000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff800`00ba2540 fffff800`03097078 : fffffa80`063b7330 00000000`00004800 fffffa80`069da980 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff800`00ba2590 fffff880`01a8a152 : fffff880`01a899b0 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff800`00ba2670 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpBeginTcbSend+33e
fffff880`01a9787e f083401c01 lock add dword ptr [rax+1Ch],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpBeginTcbSend+33e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79420
FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+33e
BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+33e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031211-21262-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03067000 PsLoadedModuleList = 0xfffff800`032ace90
Debug session time: Fri Mar 11 21:44:53.645 2011 (UTC - 5:00)
System Uptime: 0 days 0:11:13.613
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1c, 2, 1, fffff88001b2d87e}
Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001b2d87e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800033180e8
000000000000001c
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpBeginTcbSend+33e
fffff880`01b2d87e f083401c01 lock add dword ptr [rax+1Ch],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: WDFME.exe
TRAP_FRAME: fffff88003391730 -- (.trap 0xfffff88003391730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8004940d10
rdx=fffffa8004940dc8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001b2d87e rsp=fffff880033918c0 rbp=fffff880033919d0
r8=fffffa8004940d00 r9=fffffa8004940d10 r10=fffffa8004940c40
r11=fffff88003391b20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x33e:
fffff880`01b2d87e f083401c01 lock add dword ptr [rax+1Ch],1 ds:00000000`0000001c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030e6be9 to fffff800030e7640
STACK_TEXT:
fffff880`033915e8 fffff800`030e6be9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`033915f0 fffff800`030e5860 : fffffa80`041ee938 00000000`00000382 00000002`8b0043fb 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`03391730 fffff880`01b2d87e : 00000000`00000001 fffffa80`03e78860 fffffb43`06934101 fffff880`01b48dbf : nt!KiPageFault+0x260
fffff880`033918c0 fffff880`01b31b29 : 00000000`00000000 fffff880`03391ea8 fffffa80`0431e000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e
fffff880`03391b40 fffff880`01b527e6 : 00000000`00000000 fffffa80`03e74301 fffff880`01c32128 00000000`00008b00 : tcpip!TcpTcbSend+0x1d9
fffff880`03391dc0 fffff880`01b2d325 : fffff880`06975300 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpFlushDelay+0x316
fffff880`03391ea0 fffff880`01b24137 : fffffa80`041f3900 fffffa80`0432b3c0 fffffa80`00008b00 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x3e5
fffff880`03391f70 fffff880`01b23caa : 00000000`00000000 fffff880`01c389a0 fffff880`03392130 fffffa80`0646be20 : tcpip!IppDeliverListToProtocol+0x97
fffff880`03392030 fffff880`01b232a9 : fffff8a0`0ab8b000 fffff800`030f3900 fffff880`03392000 fffff880`03392120 : tcpip!IppProcessDeliverList+0x5a
fffff880`033920d0 fffff880`01b20fff : fffff880`03392340 fffffa80`0431e000 fffff880`01c389a0 00000000`061fc401 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`033921b0 fffff880`01b205f2 : fffffa80`065a5cf0 00000000`00000000 fffffa80`061fc401 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`033923b0 fffff880`01b1fa8a : fffffa80`061fc400 fffff880`033924e0 fffffa80`061fc400 fffffa80`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`03392490 fffff800`030f4078 : fffffa80`0646c3f0 00000000`00004800 fffffa80`07d0a060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`033924e0 fffff880`01b20152 : fffff880`01b1f9b0 fffff880`03392838 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`033925c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpBeginTcbSend+33e
fffff880`01b2d87e f083401c01 lock add dword ptr [rax+1Ch],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpBeginTcbSend+33e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79420
FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+33e
BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+33e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031211-21106-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03014000 PsLoadedModuleList = 0xfffff800`03259e90
Debug session time: Fri Mar 11 21:50:52.804 2011 (UTC - 5:00)
System Uptime: 0 days 0:05:15.162
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1c, 2, 1, fffff88001af787e}
Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+33e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000001c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88001af787e, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c50e8
000000000000001c
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpBeginTcbSend+33e
fffff880`01af787e f083401c01 lock add dword ptr [rax+1Ch],1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800a904460 -- (.trap 0xfffff8800a904460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800883d690
rdx=fffffa800883d748 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001af787e rsp=fffff8800a9045f0 rbp=fffff8800a904700
r8=fffffa800883d680 r9=fffffa800883d690 r10=fffffa800883d5c0
r11=fffff8800a904820 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x33e:
fffff880`01af787e f083401c01 lock add dword ptr [rax+1Ch],1 ds:00000000`0000001c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003093be9 to fffff80003094640
STACK_TEXT:
fffff880`0a904318 fffff800`03093be9 : 00000000`0000000a 00000000`0000001c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0a904320 fffff800`03092860 : 00000000`00000006 00000000`00000000 00000002`8b0052fb 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`0a904460 fffff880`01af787e : 00000000`00000001 fffffa80`0887acf0 00000014`00000000 fffff880`01b12dbf : nt!KiPageFault+0x260
fffff880`0a9045f0 fffff880`01afbb29 : 00000000`00000000 fffff880`0a904bd8 fffffa80`04c13000 00000000`00000001 : tcpip!TcpBeginTcbSend+0x33e
fffff880`0a904870 fffff880`01b1c7e6 : 00000000`00000000 fffffa80`0887ac01 fffff880`01bfc128 00000000`00000000 : tcpip!TcpTcbSend+0x1d9
fffff880`0a904af0 fffff880`01af7325 : fffff880`06927a00 00000000`00000000 00000000`00000000 00000000`00005000 : tcpip!TcpFlushDelay+0x316
fffff880`0a904bd0 fffff880`01aee137 : fffffa80`04c1a6f0 fffffa80`04adc820 fffffa80`00008b00 00000000`00000000 : tcpip!TcpPreValidatedReceive+0x3e5
fffff880`0a904ca0 fffff880`01aedcaa : 00000000`00000000 fffff880`01c029a0 fffff880`0a904e60 fffffa80`066119b0 : tcpip!IppDeliverListToProtocol+0x97
fffff880`0a904d60 fffff880`01aed2a9 : 00000000`00000000 00000000`00000000 fffff880`0a904d00 fffff880`0a904e50 : tcpip!IppProcessDeliverList+0x5a
fffff880`0a904e00 fffff880`01aeafff : 00000000`0400a8c0 fffffa80`04c13000 fffff880`01c029a0 00000000`064a1001 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0a904ee0 fffff880`01aea5f2 : fffffa80`066e94f0 00000000`00000000 fffffa80`064a1001 00000000`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`0a9050e0 fffff880`01ae9a8a : fffffa80`064a1010 fffff880`0a905210 fffffa80`064a1010 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0a9051c0 fffff800`030a1078 : fffffa80`06613e20 00000000`00004800 fffffa80`089c3060 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0a905210 fffff880`01aea152 : fffff880`01ae99b0 00000000`00000018 00000000`00000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0a9052f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpBeginTcbSend+33e
fffff880`01af787e f083401c01 lock add dword ptr [rax+1Ch],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpBeginTcbSend+33e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79420
FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+33e
BUCKET_ID: X64_0xD1_tcpip!TcpBeginTcbSend+33e
Followup: MachineOwner
---------