After updating my Wifi driver to 20.0.2.3 (2-3 weeks ago), I've twice gotten a blue screen crash on resume from sleep. As this driver version is the first to include the KRACK vulnerability fix, it is not reasonable to roll back to an older version. An inspection of the last memory dump reveals the following:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8009f4c00000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80032d896af, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: LENOVO
SYSTEM_PRODUCT_NAME: 20FQS04X00
SYSTEM_SKU: LENOVO_MT_20FQ_BU_Think_FM_ThinkPad X1 Carbon 4th
SYSTEM_VERSION: ThinkPad X1 Carbon 4th
BIOS_VENDOR: LENOVO
BIOS_VERSION: N1FET55W (1.29 )
BIOS_DATE: 09/08/2017
BASEBOARD_MANUFACTURER: LENOVO
BASEBOARD_PRODUCT: 20FQS04X00
BASEBOARD_VERSION: SDK0J40697 WIN
DUMP_TYPE: 1
BUGCHECK_P1: ffff8009f4c00000
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80032d896af
BUGCHECK_P4: 2
READ_ADDRESS: ffff8009f4c00000 Nonpaged pool
FAULTING_IP:
nt!memcpy+af
fffff800`32d896af 660f7f41e0 movdqa xmmword ptr [rcx-20h],xmm0
MM_INTERNAL_CODE: 2
CPU_COUNT: 4
CPU_MHZ: af8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 4e
CPU_STEPPING: 3
CPU_MICROCODE: 6,4e,3,0 (F,M,S,R) SIG: BA'00000000 (cache) BA'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
TRAP_FRAME: ffffcb80e41c3ec0 -- (.trap 0xffffcb80e41c3ec0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000040000 rbx=0000000000000000 rcx=ffff8009f4c00020
rdx=0000377d57080000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80032d896af rsp=ffffcb80e41c4058 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000800 r10=00000000ffffffff
r11=ffff8009f4c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!memcpy+0xaf:
fffff800`32d896af 660f7f41e0 movdqa xmmword ptr [rcx-20h],xmm0 ds:ffff8009`f4c00000=????????????????????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80032db3156 to fffff80032d7d580
STACK_TEXT:
ffffcb80`e41c3c28 fffff800`32db3156 : 00000000`00000050 ffff8009`f4c00000 00000000`00000002 ffffcb80`e41c3ec0 : nt!KeBugCheckEx
ffffcb80`e41c3c30 fffff800`32c9e6c6 : 00000000`00000002 ffff8009`f4c00000 ffffcb80`e41c3ec0 ffff8009`d7e8d500 : nt!MiSystemFault+0x116c36
ffffcb80`e41c3cd0 fffff800`32d86d72 : ffff8009`00000005 ffff8009`00000001 00000000`00000000 ffffcb80`e41c3f30 : nt!MmAccessFault+0xae6
ffffcb80`e41c3ec0 fffff800`32d896af : fffff800`3309960a 00000000`00040000 00000000`00000000 ffff8009`00000005 : nt!KiPageFault+0x132
ffffcb80`e41c4058 fffff800`3309960a : 00000000`00040000 00000000`00000000 ffff8009`00000005 ffff8009`eb7c7190 : nt!memcpy+0xaf
ffffcb80`e41c4060 fffff800`330993a4 : 00000000`00040000 00000000`00040000 00000000`00f3ef48 ffffcb80`e41c4160 : nt!CcCopyBytesToUserBuffer+0x4a
ffffcb80`e41c40b0 fffff800`32c5588b : ffff8009`f11081f0 00000000`00000000 ffff8009`00040000 00000000`00000001 : nt!CcMapAndCopyFromCache+0x114
ffffcb80`e41c4150 fffff802`b07d4032 : ffffa08d`00000002 00000000`00000001 ffffa08d`00f3ef48 ffffa08d`00000000 : nt!CcCopyReadEx+0x12b
ffffcb80`e41c41e0 fffff802`b07cc5e3 : ffff8009`d7e50180 ffffcb80`e41c4470 ffffa08d`fa82fc00 00000000`000000ff : NTFS!NtfsCachedRead+0x1a6
ffffcb80`e41c4250 fffff802`b07cb93e : ffff8009`ea73bad8 ffff8009`e4b70880 ffffa08d`fa82fc90 00000000`00000001 : NTFS!NtfsCommonRead+0xad3
ffffcb80`e41c4440 fffff802`ae60563d : ffff8009`eb629b00 ffff8009`e4b70880 ffff8009`dc0c3df0 ffff8009`e4b70c68 : NTFS!NtfsFsdRead+0x1ee
ffffcb80`e41c44f0 fffff802`ae6034d6 : ffffcb80`e41c4580 00000000`00000001 00000000`00000000 ffffcb80`e1cc0180 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x18d
ffffcb80`e41c4560 fffff800`330a672f : ffff8009`eb7c7190 ffff8009`e4b70880 ffff8009`e4b70cb0 00000000`00000001 : FLTMGR!FltpDispatch+0xb6
ffffcb80`e41c45c0 fffff800`330a5499 : ffff8009`00000001 ffff8009`eb7c7104 ffff8009`eb7c71e0 ffffcb80`e41c4870 : nt!IopSynchronousServiceTail+0x1af
ffffcb80`e41c4680 fffff800`32d88413 : 00000000`00000100 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x6a9
ffffcb80`e41c4780 fffff800`32d80760 : fffff802`b5f73ea9 fffff802`b5e27a60 00000000`00000100 fffff802`b5e27ac8 : nt!KiSystemServiceCopyEnd+0x13
ffffcb80`e41c4988 fffff802`b5f73ea9 : fffff802`b5e27a60 00000000`00000100 fffff802`b5e27ac8 fffff802`b5e27a98 : nt!KiServiceLinkage
ffffcb80`e41c4990 fffff802`b5f74188 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00f3ef48 : Netwtw06+0x533ea9
ffffcb80`e41c4a30 fffff800`32c2fe9b : ffff8009`00f3ef48 ffff8009`dcbc12f0 ffff8009`dcbcd060 ffff8009`e2333040 : Netwtw06+0x534188
ffffcb80`e41c4a90 fffff800`32c4f168 : 00000000`00000100 ffff8009`ed89d640 fffff800`32c2fda0 00000000`00000000 : nt!IopProcessWorkItem+0xfb
ffffcb80`e41c4b00 fffff800`32cedeb7 : 00000000`00000001 00000000`00000080 ffff8009`d7e8d500 ffff8009`ed89d640 : nt!ExpWorkerThread+0xd8
ffffcb80`e41c4b90 fffff800`32d82a06 : fffff800`311fa180 ffff8009`ed89d640 fffff800`32cede70 ffffcb80`e41c4d29 : nt!PspSystemThreadStartup+0x47
ffffcb80`e41c4be0 00000000`00000000 : ffffcb80`e41c5000 ffffcb80`e41be000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: e8a4222b200fd5e09a45e55f7343347a90e99999
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 3008069a119e51096ddb4b95f9511eca7af74429
THREAD_SHA1_HASH_MOD: acd05c535281c782b7d45b17bb5c152018f5e1ee
FOLLOWUP_IP:
Netwtw06+533ea9
fffff802`b5f73ea9 33d2 xor edx,edx
FAULT_INSTR_CODE: 4489d233
SYMBOL_STACK_INDEX: 11
SYMBOL_NAME: Netwtw06+533ea9
MODULE_NAME: Netwtw06
IMAGE_NAME: Netwtw06.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 59d213eb
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 533ea9
FAILURE_BUCKET_ID: AV_INVALID_Netwtw06!unknown_function
BUCKET_ID: AV_INVALID_Netwtw06!unknown_function
PRIMARY_PROBLEM_CLASS: AV_INVALID_Netwtw06!unknown_function
OSBUILD: 15063
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-09-29 09:20:26
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: c5e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_invalid_netwtw06!unknown_function
FAILURE_ID_HASH: {2101a6f1-56d4-96a1-954f-0b4ab4996965}