New
#1
BSOD 3 times on new laptop. Will love you forever for help
First post. This forums looks quite helpful, so I decided to try and seek help here.
Thanks in advance :)
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000010, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 8ac5b2da, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 833bb718
Unable to read MiSystemVaType memory at 8339b160
00000010
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpBeginTcbSend+9f6
8ac5b2da f00fc111 lock xadd dword ptr [ecx],edx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 9aae3f44 -- (.trap 0xffffffff9aae3f44)
ErrCode = 00000002
eax=00000001 ebx=8903edf8 ecx=00000010 edx=00000001 esi=86678c68 edi=9aae3fd8
eip=8ac5b2da esp=9aae3fb8 ebp=9aae40e0 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
tcpip!TcpBeginTcbSend+0x9f6:
8ac5b2da f00fc111 lock xadd dword ptr [ecx],edx ds:0023:00000010=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8ac5b2da to 8329981b
STACK_TEXT:
9aae3f44 8ac5b2da badb0d00 00000001 00000000 nt!KiTrap0E+0x2cf
9aae40e0 8ac5a35f 8903edf8 00000000 00000001 tcpip!TcpBeginTcbSend+0x9f6
9aae4244 8ac8416b 8903edf8 00000002 00000002 tcpip!TcpTcbSend+0x426
9aae4294 8ac646ef 00000002 00000000 89476918 tcpip!TcpFlushDelay+0x1f1
9aae42a8 8ac52b54 00000002 00000001 00000000 tcpip!TcpExitReceiveDpc+0x61
9aae42e0 8ac528ae 885f3428 8862b000 00001900 tcpip!TcpPreValidatedReceive+0x29b
9aae42fc 8ac58273 885f3428 8862b000 9aae4338 tcpip!TcpReceive+0x2d
9aae430c 8ac8a50e 9aae4320 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
9aae4338 8ac8a2d1 8ace9f88 9aae438c c000023e tcpip!IppDeliverListToProtocol+0x49
9aae4358 8ac89fa6 8ace9d98 00000006 9aae438c tcpip!IppProcessDeliverList+0x2a
9aae43b0 8ac87be4 8ace9d98 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1f2
9aae4444 8ac86b75 8a4aafa8 00000000 00000001 tcpip!IpFlcReceivePackets+0xbe5
9aae44c0 8ac86ce6 8a4b1d00 88957570 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
9aae44f4 832e3092 88957570 bb3860e5 885eb628 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
9aae455c 8ac86d6e 8ac86bc8 9aae4584 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
9aae4598 8a8ed18d 8a4b1d02 88957500 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
9aae45d0 8a8db670 8a4b17a0 88957570 00000000 NDIS!ndisMIndicateNetBufferListsToOpen+0x188
9aae45f8 8a8db5e7 00000000 88957570 88b8f628 NDIS!ndisIndicateSortedNetBufferLists+0x4a
9aae4774 8a886ca5 88ea50e0 00000000 00000000 NDIS!ndisMDispatchReceiveNetBufferLists+0x129
9aae4790 8a8b6a87 88ea50e0 88957570 00000000 NDIS!ndisMTopReceiveNetBufferLists+0x2d
9aae47ac 8a8b6a21 88b8f628 88957570 00000000 NDIS!ndisFilterIndicateReceiveNetBufferLists+0x46
9aae47c8 8ff9a53d 88b8f628 88957570 00000000 NDIS!NdisFIndicateReceiveNetBufferLists+0x2f
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 00000000 00000000 00000000 KmxFilter+0x653d
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpBeginTcbSend+9f6
8ac5b2da f00fc111 lock xadd dword ptr [ecx],edx
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: tcpip!TcpBeginTcbSend+9f6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c15a3db
FAILURE_BUCKET_ID: 0xD1_tcpip!TcpBeginTcbSend+9f6
BUCKET_ID: 0xD1_tcpip!TcpBeginTcbSend+9f6
Followup: MachineOwner
---------