Alguém pode me ajudar com o seguinte BSOD tcpip.sys, ou talvez me ajudar a entender o minidump relacionado a esse erro que é colado abaixo?
Eu continuo recebendo o mesmo BSOD com tcpip.sys. Parece ser ao acordar o pc do modo de suspensão. Eu tentei pesquisar o que pode ser, mas parece que o tcpip se comunica com muitos drivers e raramente é a fonte da falha em si.
Instalei o windbg na tentativa de descobrir o que está acontecendo, mas tudo que descobri é que não sei de nada: D
Para minha mente inculta, a linha do arquivo de dump que parece suspeita é "GetPointerFromAddress: não é possível ler de fffff800b376b168" mas não sei o que isso significa.
Qualquer ajuda seria apreciada:)
Obrigado!
(colei o minidump completo abaixo).
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft (R) Windows Debugger Version 6.2.9200.20512 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump1513-26078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Windows\Minidump\localsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9200.16628.amd64fre.win8_gdr.130531-1504
Machine Name:
Kernel base = 0xfffff800'b3413000 PsLoadedModuleList = 0xfffff800'b36dfa20
Debug session time: Sun Sep 15 18:45:25.731 2013 (UTC + 2:00)
System Uptime: 7 days 5:40:03.726
Loading Kernel Symbols
...............................................................
................................................................
.............................................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {3c, 2, 1, fffff880024b6f15}
Probably caused by : tcpip.sys ( tcpip!TcpBeginTcbSend+2a5 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000003c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880024b6f15, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800b376b168
GetUlongFromAddress: unable to read from fffff800b376b1f8
000000000000003c Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
tcpip!TcpBeginTcbSend+2a5
fffff880'024b6f15 f0ff403c lock inc dword ptr [rax+3Ch]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TRAP_FRAME: fffff8801b5450b0 -- (.trap 0xfffff8801b5450b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8004a61940
rdx=fffff8801b545328 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880024b6f15 rsp=fffff8801b545240 rbp=fffff8801b545340
r8=fffffa8004a61930 r9=fffffa8004a61a88 r10=fffffa8004a61870
r11=00000382c4a3c668 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
tcpip!TcpBeginTcbSend+0x2a5:
fffff880'024b6f15 f0ff403c lock inc dword ptr [rax+3Ch] ds:00000000'0000003c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800b346c769 to fffff800b346d440
STACK_TEXT:
fffff880'1b544f68 fffff800'b346c769 : 00000000'0000000a 00000000'0000003c 00000000'00000002 00000000'00000001 : nt!KeBugCheckEx
fffff880'1b544f70 fffff800'b346afe0 : 00000000'00000001 00000000'00000001 fffff38a'd69c9800 fffff880'1b5450b0 : nt!KiBugCheckDispatch+0x69
fffff880'1b5450b0 fffff880'024b6f15 : 00000000'00000001 fffff880'1b545360 00000000'00000001 00000000'00000000 : nt!KiPageFault+0x260
fffff880'1b545240 fffff880'024b8798 : fffffa80'0c210010 00000000'00000001 fffff880'1b5456a0 00000000'00000001 : tcpip!TcpBeginTcbSend+0x2a5
fffff880'1b5454d0 fffff880'024cb55e : fffffa80'05e402a0 00000000'80b417e4 00000000'00000000 fffff880'02014471 : tcpip!TcpTcbSend+0x1e8
fffff880'1b545840 fffff880'024be233 : fffffa80'04aa545c 00000000'03b9fdba 00000000'00000000 fffffa80'0ad38200 : tcpip!TcpFlushDelay+0x20d
fffff880'1b5458f0 fffff880'024f0610 : fffffa80'05f536f0 fffffa80'0000e4c4 fffff880'1b54350b fffff880'1b545aa8 : tcpip!TcpPreValidatedReceive+0x403
fffff880'1b5459d0 fffff880'024ed657 : fffff800'b3476c00 fffff800'b3699106 00000000'00000000 00000000'00000000 : tcpip!IppLoopbackIndicatePackets+0xa0
fffff880'1b545aa0 fffff800'b34bbb77 : fffff880'024ed460 fffffa80'05e5d8a0 00000000'00000000 fffff800'b3699110 : tcpip!IppLoopbackTransmit+0x1f7
fffff880'1b545b10 fffff800'b34ab2a1 : fffff800'b3699110 fffffa80'04b23380 fffff800'b34bbb18 fffff800'00000000 : nt!IopProcessWorkItem+0x5f
fffff880'1b545b80 fffff800'b343ffd9 : 00000000'00000000 00000000'00000080 fffff800'b34ab160 fffffa80'04b23380 : nt!ExpWorkerThread+0x142
fffff880'1b545c10 fffff800'b34f47e6 : fffff880'00a82180 fffffa80'04b23380 fffffa80'03961040 fffffa80'0395e040 : nt!PspSystemThreadStartup+0x59
fffff880'1b545c60 00000000'00000000 : fffff880'1b546000 fffff880'1b540000 00000000'00000000 00000000'00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip!TcpBeginTcbSend+2a5
fffff880'024b6f15 f0ff403c lock inc dword ptr [rax+3Ch]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip!TcpBeginTcbSend+2a5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 51db3c2e
BUCKET_ID_FUNC_OFFSET: 2a5
FAILURE_BUCKET_ID: AV_tcpip!TcpBeginTcbSend
BUCKET_ID: AV_tcpip!TcpBeginTcbSend
Followup: MachineOwner
---------