- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Would anyone help to check what's wrong?
OS: Windows server 2012 R2
Driver: 12.11.97.1
Other configuration: router and remove access enabled
Probably caused by : e1r64x64.sys ( e1r64x64+21494 )
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe801de4ce009, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80026f1e494, address which referenced memory
ADDITIONAL_DEBUG_TEXT:
You can run '.symfix; .reload' to try to fix the symbol path and load symbols.
FAULTING_MODULE: fffff803d7c11000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 53e3c3c0
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffe801de4ce009
CURRENT_IRQL: 0
FAULTING_IP:
e1r64x64+21494
fffff800`26f1e494 0fb644300c movzx eax,byte ptr [rax+rsi+0Ch]
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from fffff803d7d707e9 to fffff803d7d64ca0
STACK_TEXT:
ffffd000`8c3dd0a8 fffff803`d7d707e9 : 00000000`0000000a ffffe801`de4ce009 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`8c3dd0b0 fffff803`d7d6f03a : 00000000`00000000 ffffe801`ddc84160 00000000`00000000 ffffd000`8c3dd1f0 : nt!setjmpex+0x37e9
ffffd000`8c3dd1f0 fffff800`26f1e494 : ffffe801`e06d8f00 00000000`00000000 00000000`00000000 00000000`00000002 : nt!setjmpex+0x203a
ffffd000`8c3dd380 fffff800`26f1f497 : 00000000`430005ac ffffe801`e06d1000 00000000`00000030 00000000`00000000 : e1r64x64+0x21494
ffffd000`8c3dd3d0 fffff800`26f205c2 : 00000000`430005ac ffffd000`8c3dd499 ffffe801`e06d1000 ffffe801`e06d1000 : e1r64x64+0x22497
ffffd000`8c3dd400 fffff800`26f1f771 : ffffe801`de238b00 ffffe801`e06d1000 00000000`00000000 ffffe801`ddc84198 : e1r64x64+0x235c2
ffffd000`8c3dd500 fffff800`26f1d149 : ffffe801`ddc84198 00000000`00000030 00000000`00000000 00000000`00000000 : e1r64x64+0x22771
ffffd000`8c3dd530 fffff803`d83a0a37 : ffffe000`d2dbf578 ffffe000`d2000050 ffffe000`d2dbf540 ffffe000`d2dbf540 : e1r64x64+0x20149
ffffd000`8c3dd570 fffff800`25a3520c : ffffe000`d2dbf540 ffffe000`d2000050 ffffe000`d2dbf540 ffffe000`d2dbf578 : hal!HalSendSoftwareInterrupt+0x567
ffffd000`8c3dd610 fffff800`26f2009b : ffffe000`d2ae4a30 ffffe000`d17aad00 ffffe000`d0cc6bb0 00000000`00000000 : NDIS!NdisMAllocateNetBufferSGList+0x20c
ffffd000`8c3dd6d0 fffff800`26f20437 : 00000000`00000001 00000000`00000000 00000000`0000000b 00000000`00000000 : e1r64x64+0x2309b
ffffd000`8c3dd740 fffff800`26f1d17e : 00000000`00000000 ffffd000`8c3dd8e0 00000000`00000000 ffffe000`cf6d0af0 : e1r64x64+0x23437
ffffd000`8c3dd7a0 fffff800`25a35a21 : 00002b83`0000001b 00000000`00000000 ffffd000`0000001c 00000000`0000000c : e1r64x64+0x2017e
ffffd000`8c3dd7e0 fffff800`2632d97b : ffffe801`e02a8c10 ffffe000`d0cc6a50 00000000`00000000 00000000`00000002 : NDIS!NdisSendNetBufferLists+0x551
ffffd000`8c3dd9d0 fffff800`26320862 : fffff800`26498180 00000000`00000000 00000000`e0000000 ffffe000`cd840800 : tcpip+0x5b97b
ffffd000`8c3ddb10 fffff800`2643a498 : ffffe000`cf6e1890 00000000`00000000 00000000`00000001 ffffd000`88a37900 : tcpip+0x4e862
ffffd000`8c3dde90 fffff800`26548f05 : 00000000`00000002 ffffd000`8c3ddfd0 ffffd000`88a379a1 ffffd000`88a4cbc0 : tcpip+0x168498
ffffd000`8c3ddef0 fffff803`d7d685f7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fwpkclnt!FwpsVirtualIfTunnelInfoGet0+0x141
ffffd000`8c3ddf80 fffff803`d7d685bd : ffffe000`c43ad01a 00000000`00000000 00000000`00000000 fffff803`d7cddad8 : nt!KeSynchronizeExecution+0x2d07
ffffd000`88a377b0 fffff803`d7cddad8 : ffffe000`c43af1e8 fffff800`00000019 00000000`00000000 fffff800`00000001 : nt!KeSynchronizeExecution+0x2ccd
ffffd000`88a377d0 fffff800`2655a4a8 : fffff800`26548e20 ffffd000`88a37930 00000000`00000010 00000000`00000001 : nt!KeExpandKernelStackAndCalloutEx+0x238
ffffd000`88a378c0 fffff800`27678a8a : ffffe000`d0cc6a50 ffffe000`cad0c808 ffffe000`cad0c800 00000000`00000003 : fwpkclnt!FwpsInjectNetworkReceiveAsync0+0x22c
ffffd000`88a379e0 fffff800`25b53d05 : ffffe000`c45d6820 ffffe000`cad0c830 00000000`00000000 00000000`00000000 : ipnat+0x17a8a
ffffd000`88a37a70 fffff800`25b490c5 : ffffe000`cf3a0008 ffffd000`88a380a0 00000000`00000000 ffffe000`d28fe030 : NETIO!KfdDiagnoseEvent+0x395
ffffd000`88a37b90 fffff800`263765c6 : ffffd000`88a381d0 ffffe000`cad0c830 ffffe801`e0671000 ffffe000`cad0c600 : NETIO!KfdClassify+0x205
ffffd000`88a38010 fffff800`263760bf : 00000000`00000000 00000000`00000000 ffffd000`88a38250 ffffe801`ddd26140 : tcpip+0xa45c6
ffffd000`88a38150 fffff800`263209b3 : fffff800`26498180 ffffe000`cf6d0ae0 00000000`e0000001 00000000`00000000 : tcpip+0xa40bf
ffffd000`88a38290 fffff800`26316ded : ffffe000`cf6e1890 00000000`00000000 ffffd000`88a38601 fffff800`26c8a700 : tcpip+0x4e9b3
ffffd000`88a38610 fffff800`26316995 : ffffe000`cf6d0002 00000000`00000000 fffff800`26316750 00000000`00000001 : tcpip+0x44ded
ffffd000`88a38700 fffff803`d7cdd9a6 : ffffe000`cf6890b8 00000000`00000000 ffffe000`cd929610 ffffd000`88a34000 : tcpip+0x44995
ffffd000`88a38830 fffff800`26316a96 : fffff800`26316840 ffffd000`88a38950 ffffe000`00000010 00000003`00000597 : nt!KeExpandKernelStackAndCalloutEx+0x106
ffffd000`88a38920 fffff800`25a2f903 : 00000000`00000000 ffffd000`88a38a01 ffffd000`00000002 ffffd000`88a38a30 : tcpip+0x44a96
ffffd000`88a389a0 fffff800`25a3008a : 00000000`00000001 ffffd000`87400008 00000000`00000000 00000000`00000002 : NDIS!NdisAcquireRWLockWrite+0x593
ffffd000`88a38a60 fffff800`26c89b70 : ffffe000`d2845030 00000000`c0000001 ffffe000`d0ef0b60 ffffe000`d2465000 : NDIS!NdisMIndicateReceiveNetBufferLists+0x32a
ffffd000`88a38c40 fffff800`26c9ecb5 : ffffe000`00000000 ffffd000`88a30000 ffffd000`88a38d50 00000000`00000000 : vmswitch+0x4b70
ffffd000`88a38cf0 fffff800`26c9bd8a : ffffe000`d2460000 ffffe000`d2465000 ffffe000`d0ef0b01 fffff800`26c87701 : vmswitch+0x19cb5
ffffd000`88a38dd0 fffff800`25a2f903 : 00000000`00000000 00000000`00000000 ffffd000`88a38e91 00000000`0000c001 : vmswitch+0x16d8a
ffffd000`88a38e30 fffff800`25a3f29b : ffffd000`8801ff98 fffff800`26c88247 ffffe000`00000000 ffffe801`00000001 : NDIS!NdisAcquireRWLockWrite+0x593
ffffd000`88a38ef0 fffff800`25a308f6 : ffffe000`ceb8f1a0 00000000`00000001 00000000`00000000 00000000`00000000 : NDIS!NdisFIndicateReceiveNetBufferLists+0x36b
ffffd000`88a38f80 fffff800`26c889c9 : ffffe000`d2465000 ffffe801`de77e000 ffffe000`d0ef0b60 ffffe000`d0ef0b60 : NDIS!NdisMIndicateReceiveNetBufferLists+0xb96
ffffd000`88a39160 fffff800`25a35a21 : ffffe000`ceb4e000 ffffd000`88a39301 00000000`00000000 00000000`00000021 : vmswitch+0x39c9
ffffd000`88a392f0 fffff800`26c8e347 : ffffe000`cf687c10 ffffe000`d0ef0b60 ffffe000`00000000 00000000`00000000 : NDIS!NdisSendNetBufferLists+0x551
ffffd000`88a394e0 fffff800`26c8d3f7 : ffffe000`d0ef0b00 ffffe000`d0ef0b60 ffffe000`d2465000 ffffe000`d2465000 : vmswitch+0x9347
ffffd000`88a395b0 fffff800`26c8d128 : ffffe000`d08c0b00 ffffd000`88a39760 00000000`00000000 00000000`0000ff02 : vmswitch+0x83f7
ffffd000`88a39660 fffff800`261c41e0 : 00000000`00000003 ffffe000`cf526a02 00000000`00000034...
Link Copied
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
SR_IOV is also enabled.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi zhouson, there's latest network adapter posted in Intel website, you may want to try it out.
https://downloadcenter.intel.com/Detail_Desc.aspx?DwnldID=21694&lang=eng https://downloadcenter.intel.com/Detail_Desc.aspx?DwnldID=21694&lang=eng
hope this help.
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page