Hi,
I've been having trouble with a recurring BSOD, i was confident i fixed it after updating network card drivers when i didnt get a new bsod for 5 days but it just happened again.
I'm copying my dumpfile here so i dont have to hassle with uploading it:
I've only had the bsod's when i've got VMware virtual machine running (although i have it running almost all of the time i can't be sure it has anything to do with it)
And as the most common cause for this error is zone alarm: No i don't use it.
If there is anything else you need to know. Please ask!
I've been having trouble with a recurring BSOD, i was confident i fixed it after updating network card drivers when i didnt get a new bsod for 5 days but it just happened again.
I'm copying my dumpfile here so i dont have to hassle with uploading it:
I've only had the bsod's when i've got VMware virtual machine running (although i have it running almost all of the time i can't be sure it has anything to do with it)
And as the most common cause for this error is zone alarm: No i don't use it.
If there is anything else you need to know. Please ask!
Code:
...............................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 0, fffff8800175de01}
Probably caused by : tcpip.sys ( tcpip! ?? ::FNODOBFM::`string'+29161 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800175de01, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb80e8
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
tcpip! ?? ::FNODOBFM::`string'+29161
fffff880`0175de01 8b08 mov ecx,dword ptr [rax]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: vmware-vmx.exe
TRAP_FRAME: fffff880009aee20 -- (.trap 0xfffff880009aee20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80087a7108
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800175de01 rsp=fffff880009aefb0 rbp=0000000000000014
r8=0000000000000000 r9=0000000000000000 r10=0000000000000011
r11=0000000000000c04 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei pl zr na po nc
tcpip! ?? ::FNODOBFM::`string'+0x29161:
fffff880`0175de01 8b08 mov ecx,dword ptr [rax] ds:bb01:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c86be9 to fffff80002c87640
STACK_TEXT:
fffff880`009aecd8 fffff800`02c86be9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009aece0 fffff800`02c85860 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`08796010 : nt!KiBugCheckDispatch+0x69
fffff880`009aee20 fffff880`0175de01 : 00000000`00000000 00000000`00000014 00000000`0000001c 00000000`00000001 : nt!KiPageFault+0x260
fffff880`009aefb0 fffff880`016ad54c : 00000000`00000001 fffffa80`078dc140 00000000`00000000 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x29161
fffff880`009af390 fffff880`016adb75 : fffff880`08618122 fffffa80`07795820 fffffa80`078dc140 fffffa80`086594c0 : tcpip!InetInspectReceiveControlMessage+0x18c
fffff880`009af440 fffff880`016ad39f : 00000000`00000000 00000000`00000000 00000000`00000002 fffff880`014a8df3 : tcpip!UdpReceiveControlMessages+0xd5
fffff880`009af4d0 fffff880`016ad2ee : fffff880`018199a0 fffff880`016adc81 00000000`3053a84f ffffffff`ffffffff : tcpip!UdpNlClientReceiveControlMessage+0x1f
fffff880`009af500 fffff880`016ada19 : fffff880`01813128 00000000`00000014 00000000`00000014 fffffa80`08659a10 : tcpip!IppDeliverControlToProtocol+0x5e
fffff880`009af540 fffff880`016ade2e : fffff880`018199a0 fffffa80`083fd140 fffffa80`078dc000 fffff880`018199a0 : tcpip!Icmpv4pHandleError+0x1d9
fffff880`009af6b0 fffff880`0170519e : fffffa80`08716800 00000000`00000000 fffff880`018199a0 fffff880`009af920 : tcpip!Icmpv4ReceiveDatagrams+0x15e
fffff880`009af760 fffff880`01704caa : 00000000`00000000 fffff880`018199a0 fffff880`009af920 fffffa80`08658730 : tcpip!IppDeliverListToProtocol+0xfe
fffff880`009af820 fffff880`017042a9 : fffff880`018199a0 fffffa80`08658800 fffff880`009af8a0 fffff880`009af910 : tcpip!IppProcessDeliverList+0x5a
fffff880`009af8c0 fffff880`01701fff : fffffa80`0786bf50 fffffa80`078dc140 fffff880`018199a0 00000000`08716801 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`009af9a0 fffff880`017015f2 : fffffa80`0878f930 00000000`00000000 fffffa80`08716801 fffff880`00000002 : tcpip!IpFlcReceivePackets+0x64f
fffff880`009afba0 fffff880`01700a8a : fffffa80`08716800 fffff880`009afcd0 fffffa80`08716800 fffffa80`07280000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`009afc80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
STACK_COMMAND: kb
FOLLOWUP_IP:
tcpip! ?? ::FNODOBFM::`string'+29161
fffff880`0175de01 8b08 mov ecx,dword ptr [rax]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tcpip! ?? ::FNODOBFM::`string'+29161
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79420
FAILURE_BUCKET_ID: X64_0xD1_tcpip!_??_::FNODOBFM::_string_+29161
BUCKET_ID: X64_0xD1_tcpip!_??_::FNODOBFM::_string_+29161
Followup: MachineOwner
---------