Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\111317-20732-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\Symbols\*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.23915.amd64fre.win7sp1_ldr.170913-0600 Machine Name: Kernel base = 0xfffff800`0e45a000 PsLoadedModuleList = 0xfffff800`0e69c750 Debug session time: Mon Nov 13 19:56:45.758 2017 (UTC + 1:00) System Uptime: 0 days 0:00:25.585 Loading Kernel Symbols ............................................................... ................................................................ .......... Loading User Symbols Loading unloaded module list ... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {0, 2, 8, 0} Probably caused by : rdyboost.sys ( rdyboost!SmdGlobals+1510 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000008, value 0 = read operation, 1 = write operation Arg4: 0000000000000000, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000e706100 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: +3636356230373336 00000000`00000000 ?? ??? PROCESS_NAME: explorer.exe CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0xD1 TRAP_FRAME: fffff88008870470 -- (.trap 0xfffff88008870470) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000c0000225 rbx=0000000000000000 rcx=0000000001bb5133 rdx=fffffa800abf601c rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000000 rsp=fffff88008870600 rbp=0000000000223165 r8=fffffa800abf6000 r9=0000000000000002 r10=0000000000000001 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc 00000000`00000000 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8000e4ca3a9 to fffff8000e4cae00 FAILED_INSTRUCTION_ADDRESS: +3636356230373336 00000000`00000000 ?? ??? STACK_TEXT: fffff880`08870600 fffff880`019ad870 : fffff880`01996057 00000000`00223165 00000000`00223165 00000000`000000ff : 0x0 fffff880`08870608 fffff880`01996057 : 00000000`00223165 00000000`00223165 00000000`000000ff 00000000`00000000 : rdyboost!SmdGlobals+0x1510 fffff880`08870610 fffff880`0199ee6a : fffff880`00000009 fffff880`0022316d 00000000`00000000 fffff880`08870878 : rdyboost!SMKM_STORE_MGR::SmFeCheckPresent+0xd3 fffff880`08870740 fffff880`0199c91f : fffffa80`0bf0f3f0 fffff880`08870878 fffffa80`0bf12780 fffffa80`0bf0f420 : rdyboost!SMKM_STORE_MGR::SmPageRead+0x66 fffff880`08870800 fffff880`01989bc1 : 00000000`000002b0 fffffa80`0bf0f3f0 fffffa80`0bf0f6b8 00000000`800000a6 : rdyboost!SmdReadFromStore+0xe3 fffff880`08870850 fffff880`019913e3 : fffffa80`090f1d90 fffffa80`000002b0 00000000`00000009 fffff8a0`000000a6 : rdyboost!SmdRBDispatchReadWrite+0x2a5 fffff880`08870920 fffff800`0e979880 : fffffa80`0bf0f3f0 fffff880`08870c60 fffffa80`090f1c40 fffffa80`0bdca1c8 : rdyboost!SmdDispatchReadWrite+0xb7 fffff880`08870950 fffff880`01936df4 : fffffa80`0a2c5190 fffff880`08870c60 fffffa80`0a2c5040 fffff6fc`50018070 : nt!IovCallDriver+0xa0 fffff880`088709b0 fffff800`0e979880 : fffffa80`0bf0f3f0 fffff8a0`0300e9a8 00000000`00000000 00000000`00000000 : volsnap! ?? ::FNODOBFM::`string'+0x57b fffff880`088709e0 fffff880`01429a66 : fffff880`08870b88 fffff880`08870c60 00000000`00006000 fffff8a0`02d34c70 : nt!IovCallDriver+0xa0 fffff880`08870a40 fffff800`0e4d76f8 : 00000000`00008000 fffff880`08870c10 fffff880`08870f20 fffff880`01428895 : Ntfs!NtfsStorageDriverCallout+0x16 fffff880`08870a70 fffff880`014295a9 : fffff880`01429a50 00000000`00149400 00000000`00008000 fffff800`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8 fffff880`08870b50 fffff880`0142905c : 00000000`00000000 fffffa80`0a326180 00000000`00000000 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xa9 fffff880`08870bc0 fffff880`01421f88 : fffff880`08870f20 fffffa80`0bf0f3f0 fffff8a0`02d34b08 fffff880`08870e40 : Ntfs!NtfsNonCachedIo+0x58b fffff880`08870d80 fffff880`01422458 : fffff880`08870f20 fffffa80`0bf0f3f0 fffff880`08871001 fffffa80`0a326001 : Ntfs!NtfsCommonRead+0x18df fffff880`08870ef0 fffff800`0e979880 : fffffa80`0bf0f3f0 fffffa80`0bf0f3f0 fffffa80`0a326030 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8 fffff880`08871100 fffff880`00c5ebcf : fffffa80`0bf0f790 fffff880`088711a0 fffffa80`0bd58540 fffff8a0`03016a03 : nt!IovCallDriver+0xa0 fffff880`08871160 fffff880`00c5d6df : fffffa80`0912ade0 fffffa80`0912ade0 fffffa80`0912ad00 fffffa80`0bf0f3f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`088711f0 fffff800`0e979880 : fffffa80`0bf0f3f0 fffff800`0e978bf1 fffffa80`0bf0f3f0 00000000`00000000 : fltmgr!FltpDispatch+0xcf fffff880`08871250 fffff800`0e5454f3 : fffffa80`0bf0f3f0 fffff880`08871301 fffffa80`0912ade0 000007fe`fbc5211c : nt!IovCallDriver+0xa0 fffff880`088712b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x396f6 STACK_COMMAND: .trap 0xfffff88008870470 ; kb FOLLOWUP_IP: rdyboost!SmdGlobals+1510 fffff880`019ad870 b040 mov al,40h SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: rdyboost!SmdGlobals+1510 FOLLOWUP_NAME: MachineOwner MODULE_NAME: rdyboost IMAGE_NAME: rdyboost.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7982e FAILURE_BUCKET_ID: X64_0xD1_VRF_CODE_AV_NULL_IP_rdyboost!SmdGlobals+1510 BUCKET_ID: X64_0xD1_VRF_CODE_AV_NULL_IP_rdyboost!SmdGlobals+1510 Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000008, value 0 = read operation, 1 = write operation Arg4: 0000000000000000, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: +3636356230373336 00000000`00000000 ?? ??? PROCESS_NAME: explorer.exe CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0xD1 TRAP_FRAME: fffff88008870470 -- (.trap 0xfffff88008870470) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000c0000225 rbx=0000000000000000 rcx=0000000001bb5133 rdx=fffffa800abf601c rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000000 rsp=fffff88008870600 rbp=0000000000223165 r8=fffffa800abf6000 r9=0000000000000002 r10=0000000000000001 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc 00000000`00000000 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8000e4ca3a9 to fffff8000e4cae00 FAILED_INSTRUCTION_ADDRESS: +3636356230373336 00000000`00000000 ?? ??? STACK_TEXT: fffff880`08870600 fffff880`019ad870 : fffff880`01996057 00000000`00223165 00000000`00223165 00000000`000000ff : 0x0 fffff880`08870608 fffff880`01996057 : 00000000`00223165 00000000`00223165 00000000`000000ff 00000000`00000000 : rdyboost!SmdGlobals+0x1510 fffff880`08870610 fffff880`0199ee6a : fffff880`00000009 fffff880`0022316d 00000000`00000000 fffff880`08870878 : rdyboost!SMKM_STORE_MGR::SmFeCheckPresent+0xd3 fffff880`08870740 fffff880`0199c91f : fffffa80`0bf0f3f0 fffff880`08870878 fffffa80`0bf12780 fffffa80`0bf0f420 : rdyboost!SMKM_STORE_MGR::SmPageRead+0x66 fffff880`08870800 fffff880`01989bc1 : 00000000`000002b0 fffffa80`0bf0f3f0 fffffa80`0bf0f6b8 00000000`800000a6 : rdyboost!SmdReadFromStore+0xe3 fffff880`08870850 fffff880`019913e3 : fffffa80`090f1d90 fffffa80`000002b0 00000000`00000009 fffff8a0`000000a6 : rdyboost!SmdRBDispatchReadWrite+0x2a5 fffff880`08870920 fffff800`0e979880 : fffffa80`0bf0f3f0 fffff880`08870c60 fffffa80`090f1c40 fffffa80`0bdca1c8 : rdyboost!SmdDispatchReadWrite+0xb7 fffff880`08870950 fffff880`01936df4 : fffffa80`0a2c5190 fffff880`08870c60 fffffa80`0a2c5040 fffff6fc`50018070 : nt!IovCallDriver+0xa0 fffff880`088709b0 fffff800`0e979880 : fffffa80`0bf0f3f0 fffff8a0`0300e9a8 00000000`00000000 00000000`00000000 : volsnap! ?? ::FNODOBFM::`string'+0x57b fffff880`088709e0 fffff880`01429a66 : fffff880`08870b88 fffff880`08870c60 00000000`00006000 fffff8a0`02d34c70 : nt!IovCallDriver+0xa0 fffff880`08870a40 fffff800`0e4d76f8 : 00000000`00008000 fffff880`08870c10 fffff880`08870f20 fffff880`01428895 : Ntfs!NtfsStorageDriverCallout+0x16 fffff880`08870a70 fffff880`014295a9 : fffff880`01429a50 00000000`00149400 00000000`00008000 fffff800`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8 fffff880`08870b50 fffff880`0142905c : 00000000`00000000 fffffa80`0a326180 00000000`00000000 00000000`00000000 : Ntfs!NtfsMultipleAsync+0xa9 fffff880`08870bc0 fffff880`01421f88 : fffff880`08870f20 fffffa80`0bf0f3f0 fffff8a0`02d34b08 fffff880`08870e40 : Ntfs!NtfsNonCachedIo+0x58b fffff880`08870d80 fffff880`01422458 : fffff880`08870f20 fffffa80`0bf0f3f0 fffff880`08871001 fffffa80`0a326001 : Ntfs!NtfsCommonRead+0x18df fffff880`08870ef0 fffff800`0e979880 : fffffa80`0bf0f3f0 fffffa80`0bf0f3f0 fffffa80`0a326030 00000000`00000000 : Ntfs!NtfsFsdRead+0x1b8 fffff880`08871100 fffff880`00c5ebcf : fffffa80`0bf0f790 fffff880`088711a0 fffffa80`0bd58540 fffff8a0`03016a03 : nt!IovCallDriver+0xa0 fffff880`08871160 fffff880`00c5d6df : fffffa80`0912ade0 fffffa80`0912ade0 fffffa80`0912ad00 fffffa80`0bf0f3f0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`088711f0 fffff800`0e979880 : fffffa80`0bf0f3f0 fffff800`0e978bf1 fffffa80`0bf0f3f0 00000000`00000000 : fltmgr!FltpDispatch+0xcf fffff880`08871250 fffff800`0e5454f3 : fffffa80`0bf0f3f0 fffff880`08871301 fffffa80`0912ade0 000007fe`fbc5211c : nt!IovCallDriver+0xa0 fffff880`088712b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x396f6 STACK_COMMAND: .trap 0xfffff88008870470 ; kb FOLLOWUP_IP: rdyboost!SmdGlobals+1510 fffff880`019ad870 b040 mov al,40h SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: rdyboost!SmdGlobals+1510 FOLLOWUP_NAME: MachineOwner MODULE_NAME: rdyboost IMAGE_NAME: rdyboost.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7982e FAILURE_BUCKET_ID: X64_0xD1_VRF_CODE_AV_NULL_IP_rdyboost!SmdGlobals+1510 BUCKET_ID: X64_0xD1_VRF_CODE_AV_NULL_IP_rdyboost!SmdGlobals+1510 Followup: MachineOwner ---------