2 Replies Latest reply on Nov 2, 2014 7:03 PM by vince_intel

    [Bug report]intel i350 Network Adater driver crash and system bluescreen

    zhouson

      Would anyone help to check what's wrong?

       

       

      OS: Windows server 2012 R2

      Driver: 12.11.97.1

      Other configuration:  router and remove access enabled

       

      Probably caused by : e1r64x64.sys ( e1r64x64+21494 )

       

      DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)

      An attempt was made to access a pageable (or completely invalid) address at an

      interrupt request level (IRQL) that is too high.  This is usually

      caused by drivers using improper addresses.

      If kernel debugger is available get stack backtrace.

      Arguments:

      Arg1: ffffe801de4ce009, memory referenced

      Arg2: 0000000000000002, IRQL

      Arg3: 0000000000000000, value 0 = read operation, 1 = write operation

      Arg4: fffff80026f1e494, address which referenced memory

       

      ADDITIONAL_DEBUG_TEXT: 

      You can run '.symfix; .reload' to try to fix the symbol path and load symbols.

       

       

      FAULTING_MODULE: fffff803d7c11000 nt

       

       

      DEBUG_FLR_IMAGE_TIMESTAMP:  53e3c3c0

       

       

      READ_ADDRESS: unable to get nt!MmSpecialPoolStart

      unable to get nt!MmSpecialPoolEnd

      unable to get nt!MmPagedPoolEnd

      unable to get nt!MmNonPagedPoolStart

      unable to get nt!MmSizeOfNonPagedPoolInBytes

      ffffe801de4ce009

       

       

      CURRENT_IRQL:  0

       

       

      FAULTING_IP:

      e1r64x64+21494

      fffff800`26f1e494 0fb644300c      movzx   eax,byte ptr [rax+rsi+0Ch]

       

       

      DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

       

       

      BUGCHECK_STR:  AV

       

       

      ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

       

       

      LAST_CONTROL_TRANSFER:  from fffff803d7d707e9 to fffff803d7d64ca0

       

       

      STACK_TEXT: 

      ffffd000`8c3dd0a8 fffff803`d7d707e9 : 00000000`0000000a ffffe801`de4ce009 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx

      ffffd000`8c3dd0b0 fffff803`d7d6f03a : 00000000`00000000 ffffe801`ddc84160 00000000`00000000 ffffd000`8c3dd1f0 : nt!setjmpex+0x37e9

      ffffd000`8c3dd1f0 fffff800`26f1e494 : ffffe801`e06d8f00 00000000`00000000 00000000`00000000 00000000`00000002 : nt!setjmpex+0x203a

      ffffd000`8c3dd380 fffff800`26f1f497 : 00000000`430005ac ffffe801`e06d1000 00000000`00000030 00000000`00000000 : e1r64x64+0x21494

      ffffd000`8c3dd3d0 fffff800`26f205c2 : 00000000`430005ac ffffd000`8c3dd499 ffffe801`e06d1000 ffffe801`e06d1000 : e1r64x64+0x22497

      ffffd000`8c3dd400 fffff800`26f1f771 : ffffe801`de238b00 ffffe801`e06d1000 00000000`00000000 ffffe801`ddc84198 : e1r64x64+0x235c2

      ffffd000`8c3dd500 fffff800`26f1d149 : ffffe801`ddc84198 00000000`00000030 00000000`00000000 00000000`00000000 : e1r64x64+0x22771

      ffffd000`8c3dd530 fffff803`d83a0a37 : ffffe000`d2dbf578 ffffe000`d2000050 ffffe000`d2dbf540 ffffe000`d2dbf540 : e1r64x64+0x20149

      ffffd000`8c3dd570 fffff800`25a3520c : ffffe000`d2dbf540 ffffe000`d2000050 ffffe000`d2dbf540 ffffe000`d2dbf578 : hal!HalSendSoftwareInterrupt+0x567

      ffffd000`8c3dd610 fffff800`26f2009b : ffffe000`d2ae4a30 ffffe000`d17aad00 ffffe000`d0cc6bb0 00000000`00000000 : NDIS!NdisMAllocateNetBufferSGList+0x20c

      ffffd000`8c3dd6d0 fffff800`26f20437 : 00000000`00000001 00000000`00000000 00000000`0000000b 00000000`00000000 : e1r64x64+0x2309b

      ffffd000`8c3dd740 fffff800`26f1d17e : 00000000`00000000 ffffd000`8c3dd8e0 00000000`00000000 ffffe000`cf6d0af0 : e1r64x64+0x23437

      ffffd000`8c3dd7a0 fffff800`25a35a21 : 00002b83`0000001b 00000000`00000000 ffffd000`0000001c 00000000`0000000c : e1r64x64+0x2017e

      ffffd000`8c3dd7e0 fffff800`2632d97b : ffffe801`e02a8c10 ffffe000`d0cc6a50 00000000`00000000 00000000`00000002 : NDIS!NdisSendNetBufferLists+0x551

      ffffd000`8c3dd9d0 fffff800`26320862 : fffff800`26498180 00000000`00000000 00000000`e0000000 ffffe000`cd840800 : tcpip+0x5b97b

      ffffd000`8c3ddb10 fffff800`2643a498 : ffffe000`cf6e1890 00000000`00000000 00000000`00000001 ffffd000`88a37900 : tcpip+0x4e862

      ffffd000`8c3dde90 fffff800`26548f05 : 00000000`00000002 ffffd000`8c3ddfd0 ffffd000`88a379a1 ffffd000`88a4cbc0 : tcpip+0x168498

      ffffd000`8c3ddef0 fffff803`d7d685f7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fwpkclnt!FwpsVirtualIfTunnelInfoGet0+0x141

      ffffd000`8c3ddf80 fffff803`d7d685bd : ffffe000`c43ad01a 00000000`00000000 00000000`00000000 fffff803`d7cddad8 : nt!KeSynchronizeExecution+0x2d07

      ffffd000`88a377b0 fffff803`d7cddad8 : ffffe000`c43af1e8 fffff800`00000019 00000000`00000000 fffff800`00000001 : nt!KeSynchronizeExecution+0x2ccd

      ffffd000`88a377d0 fffff800`2655a4a8 : fffff800`26548e20 ffffd000`88a37930 00000000`00000010 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0x238

      ffffd000`88a378c0 fffff800`27678a8a : ffffe000`d0cc6a50 ffffe000`cad0c808 ffffe000`cad0c800 00000000`00000003 : fwpkclnt!FwpsInjectNetworkReceiveAsync0+0x22c

      ffffd000`88a379e0 fffff800`25b53d05 : ffffe000`c45d6820 ffffe000`cad0c830 00000000`00000000 00000000`00000000 : ipnat+0x17a8a

      ffffd000`88a37a70 fffff800`25b490c5 : ffffe000`cf3a0008 ffffd000`88a380a0 00000000`00000000 ffffe000`d28fe030 : NETIO!KfdDiagnoseEvent+0x395

      ffffd000`88a37b90 fffff800`263765c6 : ffffd000`88a381d0 ffffe000`cad0c830 ffffe801`e0671000 ffffe000`cad0c600 : NETIO!KfdClassify+0x205

      ffffd000`88a38010 fffff800`263760bf : 00000000`00000000 00000000`00000000 ffffd000`88a38250 ffffe801`ddd26140 : tcpip+0xa45c6

      ffffd000`88a38150 fffff800`263209b3 : fffff800`26498180 ffffe000`cf6d0ae0 00000000`e0000001 00000000`00000000 : tcpip+0xa40bf

      ffffd000`88a38290 fffff800`26316ded : ffffe000`cf6e1890 00000000`00000000 ffffd000`88a38601 fffff800`26c8a700 : tcpip+0x4e9b3

      ffffd000`88a38610 fffff800`26316995 : ffffe000`cf6d0002 00000000`00000000 fffff800`26316750 00000000`00000001 : tcpip+0x44ded

      ffffd000`88a38700 fffff803`d7cdd9a6 : ffffe000`cf6890b8 00000000`00000000 ffffe000`cd929610 ffffd000`88a34000 : tcpip+0x44995

      ffffd000`88a38830 fffff800`26316a96 : fffff800`26316840 ffffd000`88a38950 ffffe000`00000010 00000003`00000597 : nt!KeExpandKernelStackAndCalloutEx+0x106

      ffffd000`88a38920 fffff800`25a2f903 : 00000000`00000000 ffffd000`88a38a01 ffffd000`00000002 ffffd000`88a38a30 : tcpip+0x44a96

      ffffd000`88a389a0 fffff800`25a3008a : 00000000`00000001 ffffd000`87400008 00000000`00000000 00000000`00000002 : NDIS!NdisAcquireRWLockWrite+0x593

      ffffd000`88a38a60 fffff800`26c89b70 : ffffe000`d2845030 00000000`c0000001 ffffe000`d0ef0b60 ffffe000`d2465000 : NDIS!NdisMIndicateReceiveNetBufferLists+0x32a

      ffffd000`88a38c40 fffff800`26c9ecb5 : ffffe000`00000000 ffffd000`88a30000 ffffd000`88a38d50 00000000`00000000 : vmswitch+0x4b70

      ffffd000`88a38cf0 fffff800`26c9bd8a : ffffe000`d2460000 ffffe000`d2465000 ffffe000`d0ef0b01 fffff800`26c87701 : vmswitch+0x19cb5

      ffffd000`88a38dd0 fffff800`25a2f903 : 00000000`00000000 00000000`00000000 ffffd000`88a38e91 00000000`0000c001 : vmswitch+0x16d8a

      ffffd000`88a38e30 fffff800`25a3f29b : ffffd000`8801ff98 fffff800`26c88247 ffffe000`00000000 ffffe801`00000001 : NDIS!NdisAcquireRWLockWrite+0x593

      ffffd000`88a38ef0 fffff800`25a308f6 : ffffe000`ceb8f1a0 00000000`00000001 00000000`00000000 00000000`00000000 : NDIS!NdisFIndicateReceiveNetBufferLists+0x36b

      ffffd000`88a38f80 fffff800`26c889c9 : ffffe000`d2465000 ffffe801`de77e000 ffffe000`d0ef0b60 ffffe000`d0ef0b60 : NDIS!NdisMIndicateReceiveNetBufferLists+0xb96

      ffffd000`88a39160 fffff800`25a35a21 : ffffe000`ceb4e000 ffffd000`88a39301 00000000`00000000 00000000`00000021 : vmswitch+0x39c9

      ffffd000`88a392f0 fffff800`26c8e347 : ffffe000`cf687c10 ffffe000`d0ef0b60 ffffe000`00000000 00000000`00000000 : NDIS!NdisSendNetBufferLists+0x551

      ffffd000`88a394e0 fffff800`26c8d3f7 : ffffe000`d0ef0b00 ffffe000`d0ef0b60 ffffe000`d2465000 ffffe000`d2465000 : vmswitch+0x9347

      ffffd000`88a395b0 fffff800`26c8d128 : ffffe000`d08c0b00 ffffd000`88a39760 00000000`00000000 00000000`0000ff02 : vmswitch+0x83f7

      ffffd000`88a39660 fffff800`261c41e0 : 00000000`00000003 ffffe000`cf526a02 00000000`00000034 00000000`000005ea : vmswitch+0x8128

      ffffd000`88a39790 fffff800`26189e3d : 00000000`00000001 ffffe000`d226e010 000090d0`eb3d26c2 00000000`00000000 : vmbkmclr+0x21e0

      ffffd000`88a39810 fffff803`d7c54130 : ffffd000`88a39960 ffffe000`cd9cc140 ffffd000`88a40180 fffff803`d7c76ae0 : vmbusr+0x3e3d

      ffffd000`88a39860 fffff803`d7c5334b : ffffd000`88a40180 ffffe000`ce19a430 ffffe000`cd808260 ffffd000`88a40180 : nt!KeRemoveQueueEx+0x4550

      ffffd000`88a399b0 fffff803`d7d687ea : ffffd000`88a40180 ffffd000`88a40180 ffffd000`88a4cbc0 ffffe000`d0cb1080 : nt!KeRemoveQueueEx+0x376b

      ffffd000`88a39c60 00000000`00000000 : ffffd000`88a3a000 ffffd000`88a34000 00000000`00000000 00000000`00000000 : nt!KeSynchronizeExecution+0x2efa

       

       

       

       

      STACK_COMMAND:  kb

       

       

      FOLLOWUP_IP:

      e1r64x64+21494

      fffff800`26f1e494 0fb644300c      movzx   eax,byte ptr [rax+rsi+0Ch]

       

       

      SYMBOL_STACK_INDEX:  3

       

       

      SYMBOL_NAME:  e1r64x64+21494

       

       

      FOLLOWUP_NAME:  MachineOwner

       

       

      MODULE_NAME: e1r64x64

       

       

      IMAGE_NAME:  e1r64x64.sys

       

       

      BUCKET_ID:  WRONG_SYMBOLS

       

       

      FAILURE_BUCKET_ID:  WRONG_SYMBOLS

       

       

      ANALYSIS_SOURCE:  KM

       

       

      FAILURE_ID_HASH_STRING:  km:wrong_symbols

       

       

      FAILURE_ID_HASH:  {70b057e8-2462-896f-28e7-ac72d4d365f8}

       

       

      Followup: MachineOwner

      ---------