R
RanjitGW
Hi, Good evening!
Can some one please help me to resolve the problem with my PC that crashed. Below is the minidum that ws created.
Thanks
--------------------------------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini081420-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Windows\symbol_cache*Symbol information
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.19598.amd64fre.vistasp2_gdr.160205-1520
Machine Name:
Kernel base = 0xfffff800`02a01000 PsLoadedModuleList = 0xfffff800`02bc6e30
Debug session time: Fri Aug 14 20:20:58.963 2020 (UTC + 10:00)
System Uptime: 0 days 0:05:28.983
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {10, 2, 0, fffffa600107d168}
Probably caused by : tcpip.sys ( tcpip!TcpUpdateIsnGenerator+48 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffffa600107d168, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002c29080
0000000000000010
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpUpdateIsnGenerator+48
fffffa60`0107d168 410fb74810 movzx ecx,word ptr [r8+10h]
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffffa6001b8aae0 -- (.trap 0xfffffa6001b8aae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=fffffa8005650002
rdx=00000000000000c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa600107d168 rsp=fffffa6001b8ac70 rbp=0000000000008090
r8=0000000000000000 r9=0000000000000002 r10=0000000000000006
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
tcpip!TcpUpdateIsnGenerator+0x48:
fffffa60`0107d168 410fb74810 movzx ecx,word ptr [r8+10h] ds:f000:00000000`00000010=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a543ee to fffff80002a54650
STACK_TEXT:
fffffa60`01b8a998 fffff800`02a543ee : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa60`01b8a9a0 fffff800`02a532cb : 00000000`00000000 00000000`9a73293f fffffa60`01b63180 00000000`00000001 : nt!KiBugCheckDispatch+0x6e
fffffa60`01b8aae0 fffffa60`0107d168 : fffffa60`01b66c01 00000000`01d67224 00000000`00000004 00000000`00000000 : nt!KiPageFault+0x20b
fffffa60`01b8ac70 fffffa60`01078190 : fffffa80`0561db80 00000000`00000012 00000000`00000002 00000000`00000000 : tcpip!TcpUpdateIsnGenerator+0x48
fffffa60`01b8aca0 fffff800`02a580e7 : 00000000`00000022 00000000`00000022 00000000`01d67224 fffffa80`0561dba0 : tcpip!TcpPeriodicTimeoutHandler+0x300
fffffa60`01b8ad10 fffff800`02a58ad2 : fffffa60`01077e90 fffffa60`01b63180 00000000`00000000 fffffa60`01b6cd40 : nt!KiRetireDpcList+0x117
fffffa60`01b8ad80 fffff800`02c2d841 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62
fffffa60`01b8adb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemStartup+0x1c1
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpUpdateIsnGenerator+48
fffffa60`0107d168 410fb74810 movzx ecx,word ptr [r8+10h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpUpdateIsnGenerator+48
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 533f96cf
FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpUpdateIsnGenerator+48
BUCKET_ID: X64_0xD1_tcpip!TcpUpdateIsnGenerator+48
Followup: MachineOwner
Continue reading...
Can some one please help me to resolve the problem with my PC that crashed. Below is the minidum that ws created.
Thanks
--------------------------------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini081420-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Windows\symbol_cache*Symbol information
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.19598.amd64fre.vistasp2_gdr.160205-1520
Machine Name:
Kernel base = 0xfffff800`02a01000 PsLoadedModuleList = 0xfffff800`02bc6e30
Debug session time: Fri Aug 14 20:20:58.963 2020 (UTC + 10:00)
System Uptime: 0 days 0:05:28.983
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {10, 2, 0, fffffa600107d168}
Probably caused by : tcpip.sys ( tcpip!TcpUpdateIsnGenerator+48 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffffa600107d168, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002c29080
0000000000000010
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpUpdateIsnGenerator+48
fffffa60`0107d168 410fb74810 movzx ecx,word ptr [r8+10h]
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffffa6001b8aae0 -- (.trap 0xfffffa6001b8aae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=fffffa8005650002
rdx=00000000000000c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa600107d168 rsp=fffffa6001b8ac70 rbp=0000000000008090
r8=0000000000000000 r9=0000000000000002 r10=0000000000000006
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
tcpip!TcpUpdateIsnGenerator+0x48:
fffffa60`0107d168 410fb74810 movzx ecx,word ptr [r8+10h] ds:f000:00000000`00000010=????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a543ee to fffff80002a54650
STACK_TEXT:
fffffa60`01b8a998 fffff800`02a543ee : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa60`01b8a9a0 fffff800`02a532cb : 00000000`00000000 00000000`9a73293f fffffa60`01b63180 00000000`00000001 : nt!KiBugCheckDispatch+0x6e
fffffa60`01b8aae0 fffffa60`0107d168 : fffffa60`01b66c01 00000000`01d67224 00000000`00000004 00000000`00000000 : nt!KiPageFault+0x20b
fffffa60`01b8ac70 fffffa60`01078190 : fffffa80`0561db80 00000000`00000012 00000000`00000002 00000000`00000000 : tcpip!TcpUpdateIsnGenerator+0x48
fffffa60`01b8aca0 fffff800`02a580e7 : 00000000`00000022 00000000`00000022 00000000`01d67224 fffffa80`0561dba0 : tcpip!TcpPeriodicTimeoutHandler+0x300
fffffa60`01b8ad10 fffff800`02a58ad2 : fffffa60`01077e90 fffffa60`01b63180 00000000`00000000 fffffa60`01b6cd40 : nt!KiRetireDpcList+0x117
fffffa60`01b8ad80 fffff800`02c2d841 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62
fffffa60`01b8adb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemStartup+0x1c1
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpUpdateIsnGenerator+48
fffffa60`0107d168 410fb74810 movzx ecx,word ptr [r8+10h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpUpdateIsnGenerator+48
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 533f96cf
FAILURE_BUCKET_ID: X64_0xD1_tcpip!TcpUpdateIsnGenerator+48
BUCKET_ID: X64_0xD1_tcpip!TcpUpdateIsnGenerator+48
Followup: MachineOwner
Continue reading...