Surface Pro 2 Crash after standby --- ndis.sys

Dear

The SurfacePro 2  is joined to the domain, and when logged into it with my domain user login -- ON the corporate wireless network -- it runs perfectly fine.  However, when I am mobile, using a Mi-Fi card, or even my home wireless, I log in using the same profile (cached profile login), and all of a sudden the tiles don't open, although I have internet just fine, and after a few minutes, I get the "Your PC has had an error and needs to shut down" and the error "driver_irql_not_less_or_equal (ndis.sys)" comes up on the BSOD.  It reboots, and I'm right back where I started. 

In attach the link to dump file.. 

https://skydrive.live.com/redir?resid=47AA0066C89F47F8!391&authkey=!AL6RsOHVdU9frWc&ithint=file%2c.dmp

Thanks

Luca

January 13th, 2014 11:41am

LL

This was related to StoneSoft StoneGate Firewall/VPN software driver. Driver Update Site: http://www.stonesoft.com/en/customer_care/support/.  Yours is 2 years old.

I would re-install the newest driver available.

Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff802`9940a000 PsLoadedModuleList = 0xfffff802`996ce990
Debug session time: Mon Jan 13 11:08:36.842 2014 (UTC - 5:00)
System Uptime: 0 days 0:12:42.587
Loading Kernel Symbols.

BugCheck D1, {1000, 2, 1, fffff80000a5062f}

*** WARNING: Unable to verify timestamp for sgravpn.sys
*** ERROR: Module load completed but symbols could not be loaded for sgravpn.sys
Probably caused by : sgravpn.sys ( sgravpn+c57c )

Followup: MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000001000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80000a5062f, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80299757150
GetUlongFromAddress: unable to read from fffff80299757208
 0000000000001000 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
ndis!NdisFSendNetBufferLists+22f
fffff800`00a5062f 4c0111          add     qword ptr [rcx],r10

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

ANALYSIS_VERSION: 6.3.9600.16384 (debuggers(dbg).130821-1623) amd64fre

TRAP_FRAME:  ffffd0003428b080 -- (.trap 0xffffd0003428b080)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000001000 rbx=0000000000000000 rcx=0000000000001000
rdx=ffffe00004386110 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000a5062f rsp=ffffd0003428b210 rbp=ffffe000019d3850
 r8=0000000000000000  r9=ffffe00004386110 r10=ffffffffffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
ndis!NdisFSendNetBufferLists+0x22f:
fffff800`00a5062f 4c0111          add     qword ptr [rcx],r10 ds:00000000`00001000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802995637e9 to fffff80299557ca0

STACK_TEXT:  
ffffd000`3428af38 fffff802`995637e9 : 00000000`0000000a 00000000`00001000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`3428af40 fffff802`9956203a : 00000000`00000001 ffffe000`0639d9c3 ffffe000`00000000 ffffd000`3428b080 : nt!KiBugCheckDispatch+0x69
ffffd000`3428b080 fffff800`00a5062f : ffffe000`022f06c8 fffff800`0144a901 ffffe000`00282b20 00000000`00000000 : nt!KiPageFault+0x23a
ffffd000`3428b210 fffff800`0140c57c : ffffe000`022f070c ffffe000`0093fb80 ffffe000`00283000 00000000`00000002 : ndis!NdisFSendNetBufferLists+0x22f
ffffd000`3428b290 ffffe000`022f070c : ffffe000`0093fb80 ffffe000`00283000 00000000`00000002 ffffe000`019d39e0 : sgravpn+0xc57c
ffffd000`3428b298 ffffe000`0093fb80 : ffffe000`00283000 00000000`00000002 ffffe000`019d39e0 fffff800`01449b64 : 0xffffe000`022f070c
ffffd000`3428b2a0 ffffe000`00283000 : 00000000`00000002 ffffe000`019d39e0 fffff800`01449b64 ffffe000`019d3850 : 0xffffe000`0093fb80
ffffd000`3428b2a8 00000000`00000002 : ffffe000`019d39e0 fffff800`01449b64 ffffe000`019d3850 ffffe000`019d39c0 : 0xffffe000`00283000
ffffd000`3428b2b0 ffffe000`019d39e0 : fffff800`01449b64 ffffe000`019d3850 ffffe000`019d39c0 00000000`00000037 : 0x2
ffffd000`3428b2b8 fffff800`01449b64 : ffffe000`019d3850 ffffe000`019d39c0 00000000`00000037 ffffe000`015f1e30 : 0xffffe000`019d39e0
ffffd000`3428b2c0 ffffe000`019d3850 : ffffe000`019d39c0 00000000`00000037 ffffe000`015f1e30 ffffe000`015ef1c8 : sgravpn+0x49b64
ffffd000`3428b2c8 ffffe000`019d39c0 : 00000000`00000037 ffffe000`015f1e30 ffffe000`015ef1c8 ffffe000`062c51a0 : 0xffffe000`019d3850
ffffd000`3428b2d0 00000000`00000037 : ffffe000`015f1e30 ffffe000`015ef1c8 ffffe000`062c51a0 ffffe000`00282b20 : 0xffffe000`019d39c0
ffffd000`3428b2d8 ffffe000`015f1e30 : ffffe000`015ef1c8 ffffe000`062c51a0 ffffe000`00282b20 00000000`00000000 : 0x37
ffffd000`3428b2e0 ffffe000`015ef1c8 : ffffe000`062c51a0 ffffe000`00282b20 00000000`00000000 ffffe000`019d3850 : 0xffffe000`015f1e30
ffffd000`3428b2e8 ffffe000`062c51a0 : ffffe000`00282b20 00000000`00000000 ffffe000`019d3850 ffffe000`00000000 : 0xffffe000`015ef1c8
ffffd000`3428b2f0 ffffe000`00282b20 : 00000000`00000000 ffffe000`019d3850 ffffe000`00000000 00000000`00000000 : 0xffffe000`062c51a0
ffffd000`3428b2f8 00000000`00000000 : ffffe000`019d3850 ffffe000`00000000 00000000`00000000 fffff800`00e4fc10 : 0xffffe000`00282b20


STACK_COMMAND:  kb

FOLLOWUP_IP: 
sgravpn+c57c
fffff800`0140c57c ??              ???

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  sgravpn+c57c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: sgravpn

IMAGE_NAME:  sgravpn.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  51d16e36

FAILURE_BUCKET_ID:  AV_sgravpn+c57c

BUCKET_ID:  AV_sgravpn+c57c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_sgravpn+c57c

FAILURE_ID_HASH:  {47510ee4-ba4f-59e0-0058-5a8dc1357b7e}

Followup: MachineOwner
---------


Free Windows Admin Tool Kit Click here and download it now
January 13th, 2014 12:35pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics