Your PC ran into a problem and needs to restart - EVENT ID 41
Hi there, my new Lenovo Yoga 3 keeps shutting down with this annoying error message. I've read up that decimal needs to be changed to hex?? How do you do that? Is that what this error looks like to you?

BugcheckCode 268435583

BugcheckParameter1	0x8
BugcheckParameter2	0xffffd001e641d130
BugcheckParameter3	0xffffd001f951f000
BugcheckParameter4	0xfffff803e2ebce74
SleepInProgress	0
PowerButtonTimestamp	0
BootAppStatus	0


The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly


August 2nd, 2015 8:10am

  We do need the actual log files (called a DMP files) as they contain the only record of the sequence of events leading up to the crash, what drivers were loaded, and what was responsible.  

Please follow our instructions for finding and uploading the files we need to help you fix your computer. They can be found here If you have any questions about the procedure please ask
Free Windows Admin Tool Kit Click here and download it now
August 2nd, 2015 8:59am

Thank you so much for the feedback Wanikiya, could you take a look at this link for me?

I have a link to my google drive which contains the dmp files, but this won't let me add the link here until my account is verified. What else can I do? Is there anywhere else i can load it? 

https:
//drive.google.com/open?id=0B91RyYpJ-VYlfnZUOWxK
dGIyMV9yRkRMSzhLUGN4eW1ER3lOeHV4UVl4Um95UlQ1RG80Qlk

Michael Jeffrey

August 5th, 2015 7:28am

Hi,

The Google Drive link cannot be opened, please try to upload the dump file to Microsoft OneDrive and provide us the public link for further analysis.

https://onedrive.live.com/

Regards,

Arthur Li

Free Windows Admin Tool Kit Click here and download it now
August 5th, 2015 8:25am

MJ

These are related to tcpip (networking).  More specifically your outbound (upload) network connection.  Can you tell us more about the issue and what your network connection is?

Microsoft (R) Windows Debugger Version 10.0.10240.9 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\zigza\Desktop\080415-15296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*E:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*E:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
No .natvis files found at C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers.
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.17736.amd64fre.winblue_r9.150322-1500
Machine Name:
Kernel base = 0xfffff803`00889000 PsLoadedModuleList = 0xfffff803`00b62850
Debug session time: Tue Aug  4 03:34:25.422 2015 (UTC - 4:00)
System Uptime: 1 days 18:05:59.726
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
...................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, fffff8030263ee70, ffffd0017fb25fc0, fffff80300945e50}

Probably caused by : tcpip.sys ( tcpip!WfpAlepReauthorizeOutboundConnection+7d9 )

Followup:     MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff8030263ee70
Arg3: ffffd0017fb25fc0
Arg4: fffff80300945e50

Debugging Details:
------------------


SYSTEM_SKU:  LENOVO_MT_80J8_BU_idea_FM_Lenovo Yoga 3 11

SYSTEM_VERSION:  Lenovo Yoga 3 11

BIOS_DATE:  01/19/2015

BASEBOARD_PRODUCT:  Paganini

BASEBOARD_VERSION:  31900058 WIN

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_P1: 8

BUGCHECK_P2: fffff8030263ee70

BUGCHECK_P3: ffffd0017fb25fc0

BUGCHECK_P4: fffff80300945e50

BUGCHECK_STR:  0x7f_8

STACK_OVERFLOW: Stack Limit: ffffd0017fb26000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xFFFFF801D22FAD1D was blamed for the stack overflow. It is using 6912 bytes of stack total in 16 instances (likely recursion).

FOLLOWUP_IP: 
tcpip!WfpAlepReauthorizeOutboundConnection+7d9
fffff801`d22fad1d 4533c0          xor     r8d,r8d

CPU_COUNT: 4

CPU_MHZ: 3e6

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3d

CPU_STEPPING: 4

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 10.0.10240.9 amd64fre

STACK_COMMAND:  kb

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  tcpip!WfpAlepReauthorizeOutboundConnection+7d9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54505542

IMAGE_VERSION:  6.3.9600.17415

BUCKET_ID_FUNC_OFFSET:  7d9

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_RECURSION_tcpip!WfpAlepReauthorizeOutboundConnection

BUCKET_ID:  0x7f_8_STACK_USAGE_RECURSION_tcpip!WfpAlepReauthorizeOutboundConnection

PRIMARY_PROBLEM_CLASS:  0x7f_8_STACK_USAGE_RECURSION_tcpip!WfpAlepReauthorizeOutboundConnection

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x7f_8_stack_usage_recursion_tcpip!wfpalepreauthorizeoutboundconnection

FAILURE_ID_HASH:  {c9eb388a-91c7-128d-733d-4bd7096a996a}

Followup:     MachineOwner
---------

0: kd> kF
 #   Memory  Child-SP          RetAddr           Call Site
00           ffffd001`7fb25fc0 fffff803`009455d0 nt!SepAccessCheck+0x200
01       160 ffffd001`7fb26120 fffff803`009450ec nt!SeAccessCheckWithHint+0x400
02       190 ffffd001`7fb262b0 fffff801`d1e04eb0 nt!SeAccessCheckFromStateEx+0x88
03        90 ffffd001`7fb26340 fffff801`d1e058a0 NETIO!MatchValues+0x1f0
04        a0 ffffd001`7fb263e0 fffff801`d1e03c39 NETIO!IndexHashClassify+0x28d
05        d0 ffffd001`7fb264b0 fffff801`d2309864 NETIO!KfdClassify+0x9d3
06       4b0 ffffd001`7fb26960 fffff801`d22fad1d tcpip!WfpAleClassify+0x4c
07        40 ffffd001`7fb269a0 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
08       1b0 ffffd001`7fb26b50 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
09       140 ffffd001`7fb26c90 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
0a       100 ffffd001`7fb26d90 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
0b        40 ffffd001`7fb26dd0 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
0c       1b0 ffffd001`7fb26f80 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
0d       140 ffffd001`7fb270c0 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
0e       100 ffffd001`7fb271c0 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
0f        40 ffffd001`7fb27200 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
10       1b0 ffffd001`7fb273b0 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
11       140 ffffd001`7fb274f0 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
12       100 ffffd001`7fb275f0 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
13        40 ffffd001`7fb27630 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
14       1b0 ffffd001`7fb277e0 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
15       140 ffffd001`7fb27920 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
16       100 ffffd001`7fb27a20 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
17        40 ffffd001`7fb27a60 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
18       1b0 ffffd001`7fb27c10 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
19       140 ffffd001`7fb27d50 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
1a       100 ffffd001`7fb27e50 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
1b        40 ffffd001`7fb27e90 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
1c       1b0 ffffd001`7fb28040 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
1d       140 ffffd001`7fb28180 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
1e       100 ffffd001`7fb28280 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
1f        40 ffffd001`7fb282c0 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
20       1b0 ffffd001`7fb28470 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
21       140 ffffd001`7fb285b0 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
22       100 ffffd001`7fb286b0 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
23        40 ffffd001`7fb286f0 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
24       1b0 ffffd001`7fb288a0 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
25       140 ffffd001`7fb289e0 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
26       100 ffffd001`7fb28ae0 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
27        40 ffffd001`7fb28b20 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
28       1b0 ffffd001`7fb28cd0 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
29       140 ffffd001`7fb28e10 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
2a       100 ffffd001`7fb28f10 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
2b        40 ffffd001`7fb28f50 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
2c       1b0 ffffd001`7fb29100 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
2d       140 ffffd001`7fb29240 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
2e       100 ffffd001`7fb29340 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
2f        40 ffffd001`7fb29380 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
30       1b0 ffffd001`7fb29530 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
31       140 ffffd001`7fb29670 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
32       100 ffffd001`7fb29770 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
33        40 ffffd001`7fb297b0 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
34       1b0 ffffd001`7fb29960 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
35       140 ffffd001`7fb29aa0 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
36       100 ffffd001`7fb29ba0 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
37        40 ffffd001`7fb29be0 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
38       1b0 ffffd001`7fb29d90 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
39       140 ffffd001`7fb29ed0 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
3a       100 ffffd001`7fb29fd0 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
3b        40 ffffd001`7fb2a010 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
3c       1b0 ffffd001`7fb2a1c0 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
3d       140 ffffd001`7fb2a300 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
3e       100 ffffd001`7fb2a400 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
3f        40 ffffd001`7fb2a440 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
40       1b0 ffffd001`7fb2a5f0 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
41       140 ffffd001`7fb2a730 fffff801`d23ed4b6 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
42       100 ffffd001`7fb2a830 fffff801`d22fad1d tcpip!WfpAleClassify+0xe3c9e
43        40 ffffd001`7fb2a870 fffff801`d22fb60c tcpip!WfpAlepReauthorizeOutboundConnection+0x7d9
44       1b0 ffffd001`7fb2aa20 fffff801`d2442b62 tcpip!WfpAleReauthorizeOutboundConnection+0x190
45       140 ffffd001`7fb2ab60 fffff801`d23dce58 tcpip!WfpAlepAuthorizeConnectCompletion+0x136
46       100 ffffd001`7fb2ac60 fffff801`d234a76a tcpip!WfpAlepAuthorizeConnect+0x92368
47       1d0 ffffd001`7fb2ae30 fffff801`d234cd74 tcpip!WfpAleAuthorizeConnect+0x67a
48       460 ffffd001`7fb2b290 fffff801`d234e64b tcpip!TcpContinueCreateAndConnect+0x5bc
49       230 ffffd001`7fb2b4c0 fffff801`d234ddf8 tcpip!TcpCreateAndConnectTcbWorkQueueRoutine+0x347
4a        f0 ffffd001`7fb2b5b0 fffff801`d325d163 tcpip!TcpCreateAndConnectTcb+0x578
4b       130 ffffd001`7fb2b6e0 fffff801`d3252216 afd!AfdSuperConnect+0x48f
4c       170 ffffd001`7fb2b850 fffff803`00cae77f afd!AfdDispatchDeviceControl+0x66
4d        30 ffffd001`7fb2b880 fffff803`00cadd22 nt!IopXxxControlFile+0xa4f
4e       1a0 ffffd001`7fb2ba20 fffff803`009e54b3 nt!NtDeviceIoControlFile+0x56
4f        70 ffffd001`7fb2ba90 00007ff9`1fb1123a nt!KiSystemServiceCopyEnd+0x13
50           000000e6`66b1f218 00000000`00000000 0x00007ff9`1fb1123a
0: kd> !stackusage
Stack Usage By Function
=================================================================================

      Size     Count  Module
0x00001B00        16  tcpip!WfpAlepReauthorizeOutboundConnection
0x00001400        16  tcpip!WfpAleReauthorizeOutboundConnection
0x00001000        16  tcpip!WfpAlepAuthorizeConnectCompletion
0x000004B0         1  NETIO!KfdClassify
0x00000460         1  tcpip!WfpAleAuthorizeConnect
0x000003C0        15  tcpip!WfpAleClassify
0x00000230         1  tcpip!TcpContinueCreateAndConnect
0x000001D0         1  tcpip!WfpAlepAuthorizeConnect
0x000001A0         1  nt!IopXxxControlFile
0x00000190         1  nt!SeAccessCheckWithHint
0x00000170         1  afd!AfdSuperConnect
0x00000160         2  nt!SepAccessCheck
0x00000130         1  tcpip!TcpCreateAndConnectTcb
0x000000F0         1  tcpip!TcpCreateAndConnectTcbWorkQueueRoutine
0x000000D0         1  NETIO!IndexHashClassify
0x000000A0         1  NETIO!MatchValues
0x00000090         1  nt!SeAccessCheckFromStateEx
0x00000070         1  nt!NtDeviceIoControlFile
0x00000040         1  tcpip!WfpAleClassify
0x00000030         1  afd!AfdDispatchDeviceControl

Total Size: 0x00005AD0


Stack Usage By Module
=================================================================================

      Size     Count  Module
0x00004D80        69  tcpip
0x00000620         3  NETIO
0x00000590         6  nt
0x000001A0         2  afd

Total Size: 0x00005AD0

August 5th, 2015 8:41am

ADSL2. WiFi connection. My daughter uses the laptop - I've seen the error 5 times. She's seen it 25+ times. It can happen any time. It just pops up with the stupid message and wants to shut down.
Free Windows Admin Tool Kit Click here and download it now
August 5th, 2015 8:57am

Hi,

Have you tried to uninstall and reinstall the network adapter driver?

  1. Launch Device Manager
  2. Right click your network adapter and click Uninstall to uninstall the driver.

After that, you may reinstall it by step 3.

 3. Tap or click the Driver tab, tap or click Update Driver, and then follow the instructions.

For more information, please refer to the following link:

Download and install drivers

http://windows.microsoft.com/en-us/windows-8/all-drivers

If the issue persists, please try to uninstall and reinstall the last version of the driver from manufacturer website.

Regards,

August 6th, 2015 4:48am

No, I haven't tried uninstalling and reinstalling  the network adapter driver Arthur Li, thanks so much for the tip... I will give it a go! 
Free Windows Admin Tool Kit Click here and download it now
August 16th, 2015 7:24am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics