BSOD with tcpip.sys when device is exiting from sleep

J

jamjabroni

A few days ago I built a new PC, and I am seeing that it crashes every time I exit from sleep mode.


The code is always the same with tcpip.sys causing the driver version error, so I assume it is related to networking. Odd because I'm not even using wakeup over LAN yet.


I've tried re-installing my network device drivers (both Ethernet and WLAN) to no avail.


The attached dump below shows Spotify.exe as the "cause" but I doubt it's strictly due to that process; if I close Spotify before going to sleep the same exact error occurs with a different process being named.


So far this is the only BSOD I get from this system but it is getting annoying because I prefer to put my system to sleep rather than booting it down and up between my usages.


*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If kernel debugger is available get stack backtrace.

Arguments:

Arg1: 0000000000000098, memory referenced

Arg2: 0000000000000002, IRQL

Arg3: 0000000000000000, value 0 = read operation, 1 = write operation

Arg4: fffff8071e5428c0, address which referenced memory



Debugging Details:

------------------



*** WARNING: Unable to verify timestamp for win32k.sys



KEY_VALUES_STRING: 1



Key : Analysis.CPU.Sec

Value: 3



Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on 52BLOOAMD



Key : Analysis.DebugData

Value: CreateObject



Key : Analysis.DebugModel

Value: CreateObject



Key : Analysis.Elapsed.Sec

Value: 6



Key : Analysis.Memory.CommitPeak.Mb

Value: 82



Key : Analysis.System

Value: CreateObject





BUGCHECK_CODE: d1



BUGCHECK_P1: 98



BUGCHECK_P2: 2



BUGCHECK_P3: 0



BUGCHECK_P4: fffff8071e5428c0



READ_ADDRESS: fffff8071aafa388: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

fffff8071aa0f2a8: Unable to get Flags value from nt!KdVersionBlock

fffff8071aa0f2a8: Unable to get Flags value from nt!KdVersionBlock

unable to get nt!MmSpecialPagesInUse

0000000000000098



BLACKBOXBSD: 1 (!blackboxbsd)





BLACKBOXNTFS: 1 (!blackboxntfs)





BLACKBOXPNP: 1 (!blackboxpnp)





BLACKBOXWINLOGON: 1



CUSTOMER_CRASH_COUNT: 1



PROCESS_NAME: Spotify.exe



TRAP_FRAME: fffff5035ec8b530 -- (.trap 0xfffff5035ec8b530)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000000000 rbx=0000000000000000 rcx=ffff860f8422dac8

rdx=ffff860f8422dac8 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8071e5428c0 rsp=fffff5035ec8b6c0 rbp=ffff860f8422dac8

r8=fffff5035ec8b7ac r9=0000000000000002 r10=fffff8071e6ca230

r11=00000000000000bf r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl zr ac po nc

tcpip!IppCanonicalizeScopeId+0x34:

fffff807`1e5428c0 498b8698000000 mov rax,qword ptr [r14+98h] ds:00000000`00000098=????????????????

Resetting default scope



STACK_TEXT:

fffff503`5ec8b3e8 fffff807`1a1ef929 : 00000000`0000000a 00000000`00000098 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx

fffff503`5ec8b3f0 fffff807`1a1ebc29 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69

fffff503`5ec8b530 fffff807`1e5428c0 : 00000000`00000000 00000000`00000000 00000000`00000c05 00000000`00000000 : nt!KiPageFault+0x469

fffff503`5ec8b6c0 fffff807`1e50879a : ffff860f`8422dac8 fffff503`5ec8b800 ffff860f`8422d9e8 00000000`00000000 : tcpip!IppCanonicalizeScopeId+0x34

fffff503`5ec8b700 fffff807`1e507d20 : 00000000`00000000 ffff860f`8cad2030 fffff807`1e6ca230 00000000`00000000 : tcpip!IppSendDatagramsCommon+0xa5a

fffff503`5ec8b880 fffff807`1e55fd9e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IpNlpSendDatagrams+0x40

fffff503`5ec8b8c0 fffff807`1e5d1556 : 00000000`00000000 ffff860f`8cad22c8 00000000`00000003 00000000`00000005 : tcpip!InetSendDatagramsAf+0xbe

fffff503`5ec8b9c0 fffff807`1e58e41c : ffff860f`86785c1c fffff503`5ec8bb80 00000000`00000001 ffff860f`92dff040 : tcpip!TcpResetSend+0x31e

fffff503`5ec8ba80 fffff807`1e50ed68 : 000000b6`103e5fa0 00000000`00989680 00000000`8196072d 00000000`00000001 : tcpip!TcpMatchReceive+0x7ec5c

fffff503`5ec8bd30 fffff807`1e50d80e : ffff860f`843b5380 00000000`0000f3fc 00000000`0000000e fffff503`5ec8be00 : tcpip!TcpReceive+0x358

fffff503`5ec8be20 fffff807`1e50b537 : 00000000`00000006 00000000`00000001 fffff503`5ec8be80 fffff503`5ec8bf10 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e

fffff503`5ec8be60 fffff807`1e50b2f8 : 00000000`00000006 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppLbIndicatePackets+0x127

fffff503`5ec8bf10 fffff807`1a1e12fe : ffff860f`842f9cd0 fffff503`5ec8bfd0 ffff860f`8eebb640 fffff503`64459170 : tcpip!IppLbTransmitStackCallout+0x2a8

fffff503`5ec8bf80 fffff807`1a1e12bc : fffff503`5ec8bfd0 ffff860f`8eebb640 fffff503`5ec8c000 fffff807`1a03755d : nt!KxSwitchKernelStackCallout+0x2e

fffff503`64459170 fffff807`1a03755d : fffff503`5ec8bfd0 ffff860f`8eebb640 fffff503`64459218 00000000`00000100 : nt!KiSwitchKernelStackContinue

fffff503`64459190 fffff807`1a037352 : fffff807`1e50b050 fffff503`64459400 fffff503`00000002 fffff807`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d

fffff503`64459230 fffff807`1a0371b3 : fffff503`64459450 ffff860f`842f9cd0 00000000`00000003 00000000`00000000 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2

fffff503`644592a0 fffff807`1a03716d : fffff807`1e50b050 fffff503`64459400 ffff860f`83dff660 ffff860f`8b196b40 : nt!KeExpandKernelStackAndCalloutInternal+0x33

fffff503`64459310 fffff807`1e50c179 : ffff860f`8422d8a8 ffff860f`83dff660 00000000`00006c02 fffff503`64459680 : nt!KeExpandKernelStackAndCalloutEx+0x1d

fffff503`64459350 fffff807`1e5587c7 : 00000000`00000007 ffff860f`8422d8a8 ffff860f`92dff040 fffff503`644596b0 : tcpip!IppLoopbackEnqueue+0x729

fffff503`644595b0 fffff807`1e589a80 : 00000000`00000000 fffff503`00000014 ffff860f`8e9e5010 00000000`0000ad00 : tcpip!IpNlpFastContinueSendLoopbackDatagrams+0x737

fffff503`644596f0 fffff807`1e504b89 : ffff860f`7c010101 00000000`00000000 fffff807`1e6ca230 ffff860f`9cbbda20 : tcpip!IppSendDatagramsCommon+0x81d40

fffff503`64459870 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IpNlpFastSendDatagram+0x349





SYMBOL_NAME: tcpip!IppCanonicalizeScopeId+34



MODULE_NAME: tcpip



IMAGE_NAME: tcpip.sys



IMAGE_VERSION: 10.0.19041.264



STACK_COMMAND: .thread ; .cxr ; kb



BUCKET_ID_FUNC_OFFSET: 34



FAILURE_BUCKET_ID: AV_tcpip!IppCanonicalizeScopeId



OS_VERSION: 10.0.19041.1



BUILDLAB_STR: vb_release



OSPLATFORM_TYPE: x64



OSNAME: Windows 10



FAILURE_ID_HASH: {e84599e8-d44f-de34-654b-f4462d9b9a60}



Followup: MachineOwner

---------

Continue reading...
 

Similar threads

Back
Top Bottom