Problem:


When accessing the network (e.g. Veeam Backup Agent), a Blue Screen of Death occurs!  

*******************************************************************************

*                                                                             *

*                        Bugcheck Analysis                                    *

*                                                                             *

*******************************************************************************

 

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high.  This is usually

caused by drivers using improper addresses.

If kernel debugger is available get stack backtrace.

Arguments:

Arg1: 0000000000000000, memory referenced

Arg2: 0000000000000002, IRQL

Arg3: 0000000000000001, value 0 = read operation, 1 = write operation

Arg4: fffff80000efa7b8, address which referenced memory

 

Debugging Details:

------------------

 

 

WRITE_ADDRESS: fffff8001592f340: Unable to get special pool info

fffff8001592f340: Unable to get special pool info

 0000000000000000 

 

CURRENT_IRQL:  2

 

FAULTING_IP: 

tcpip!TcpDeliverLoopbackDataToClient+218

fffff800`00efa7b8 4d890c24        mov     qword ptr [r12],r9

 

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

 

BUGCHECK_STR:  AV

 

PROCESS_NAME:  System

 

TRAP_FRAME:  ffffd00021528d40 -- (.trap 0xffffd00021528d40)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=ffffe00004aa0160 rbx=0000000000000000 rcx=0000000000000061

rdx=0000000000000061 rsi=0000000000000000 rdi=0000000000000000

rip=fffff80000efa7b8 rsp=ffffd00021528ed0 rbp=ffffd00021528fd0

 r8=fffff80001419200  r9=0000000000000000 r10=ffffe00002ccfac0

r11=fffff80001402f83 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0         nv up ei pl nz na pe nc

tcpip!TcpDeliverLoopbackDataToClient+0x218:

fffff800`00efa7b8 4d890c24        mov     qword ptr [r12],r9 ds:00000000`00000000=????????????????

Resetting default scope

 

LAST_CONTROL_TRANSFER:  from fffff800157d67e9 to fffff800157caca0

 

STACK_TEXT:  

ffffd000`21528bf8 fffff800`157d67e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx

ffffd000`21528c00 fffff800`157d503a : 00000000`00000001 00000000`00000000 fffff800`01691300 ffffd000`21528d40 : nt!KiBugCheckDispatch+0x69

ffffd000`21528d40 fffff800`00efa7b8 : ffffe000`027e1f70 fffff800`00d4ad50 ffffd000`21528fd0 ffffe000`0140dc90 : nt!KiPageFault+0x23a

ffffd000`21528ed0 fffff800`00efa3fe : 00000000`00000000 ffffd000`21529094 ffffe000`04aa0100 ffffe000`027e13c7 : tcpip!TcpDeliverLoopbackDataToClient+0x218

ffffd000`21529030 fffff800`00ef988f : 00000000`00000030 00000000`00000002 ffffe000`0298aa70 ffffe000`02962710 : tcpip!TcpLoopbackTcbSend+0x1f6

ffffd000`21529100 fffff800`00ef3275 : 00000000`00000000 00000000`00000000 fffff780`00000008 00000000`00000000 : tcpip!TcpResumeLoopbackTcbSend+0x47

ffffd000`21529130 fffff800`00ef1740 : 00000000`00000010 00000000`4624f1e5 00000000`9b179cfb 00000000`00000004 : tcpip!TcpCreateAndAcceptTcbComplete+0xc4d

ffffd000`21529470 fffff800`00e9e8d4 : ffffe000`00eda980 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTcbCarefulDatagram+0xfb0

ffffd000`21529670 fffff800`00f02fc2 : 00000000`00000001 ffffe000`029ad710 ffffe000`01c3b010 ffffe000`01d68adc : tcpip!TcpTcbReceive+0x314

ffffd000`215297c0 fffff800`00eee53a : ffffe000`029ad780 ffffc808`00000001 00000086`00000000 00000000`00000000 : tcpip!TcpSynTcbReceive+0x162

ffffd000`21529850 fffff800`00e9d8b5 : ffffe000`0287d9fc ffffe000`01c04040 00000000`00000000 ffffe000`00e6e4f0 : tcpip!TcpMatchReceive+0x91d

ffffd000`215299e0 fffff800`00ee7c57 : ffffe000`00e4f410 ffffe000`03ae28c8 ffffd000`215213c7 ffffd000`215213c7 : tcpip!TcpPreValidatedReceive+0x385

ffffd000`21529ae0 fffff800`00e7639e : ffffe000`02cca060 ffffe000`20206f06 00000000`00000000 00000000`00000000 : tcpip!IppLoopbackIndicatePackets+0xa7

ffffd000`21529bc0 fffff800`1571da0e : ffffe000`00ef7a60 ffffe000`02cca060 00000000`00000000 ffffe000`006113d0 : tcpip!IppLoopbackTransmit+0x11a

ffffd000`21529c30 fffff800`1571e1b9 : ffffe000`03b9c880 fffff800`1571d998 ffffd000`21529d10 ffffe000`00ef7a60 : nt!IopProcessWorkItem+0x76

ffffd000`21529c90 fffff800`1570a2e4 : 02000000`00000000 ffffe000`03b9c880 ffffe000`03b9c880 ffffe000`0010c040 : nt!ExpWorkerThread+0x2b5

ffffd000`21529d40 fffff800`157d12c6 : ffffd000`207d5180 ffffe000`03b9c880 ffffe000`00183880 00000000`00000000 : nt!PspSystemThreadStartup+0x58

ffffd000`21529da0 00000000`00000000 : ffffd000`2152a000 ffffd000`21524000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16

 

 

STACK_COMMAND:  kb

 

FOLLOWUP_IP: 

tcpip!TcpDeliverLoopbackDataToClient+218

fffff800`00efa7b8 4d890c24        mov     qword ptr [r12],r9

 

SYMBOL_STACK_INDEX:  3

 

SYMBOL_NAME:  tcpip!TcpDeliverLoopbackDataToClient+218

 

FOLLOWUP_NAME:  MachineOwner

 

MODULE_NAME: tcpip

 

IMAGE_NAME:  tcpip.sys

 

DEBUG_FLR_IMAGE_TIMESTAMP:  52e84de5

 

BUCKET_ID_FUNC_OFFSET:  218

 

FAILURE_BUCKET_ID:  AV_tcpip!TcpDeliverLoopbackDataToClient

 

BUCKET_ID:  AV_tcpip!TcpDeliverLoopbackDataToClient

 

Followup: MachineOwner

---------


Resolution: 

 

The resolution for them was to uninstall the item listed in the VM tools VMCI "Guest Introspection Drivers" then reboot the hosts one by one.

Removing the VMCI "Guest Introspection" worked. All resources moved from one node to the other and back with no problems.