I have been experiencing BSOD on my Dell XPS 9500, each time with the error message: DRIVER_IRQL_NOT_LESS_OR_EQUAL
After analyzing the crashdump with WinDbg, it appears … (read more)
I have been experiencing BSOD on my Dell XPS 9500, each time with the error message: DRIVER_IRQL_NOT_LESS_OR_EQUAL
After analyzing the crashdump with WinDbg, it appears the culprit is Firefox. I have experienced 5 crashes in the past week and in each case, the analysis reveals Firefox as the culprit.
Below is the output of the analysis of the last crash dump. Someone please take a look and advise.
I have verified my Firefox is up to date.
'''''
..................................
For analysis of this file, run !analyze -v
9: kd> !analyze -v
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8063ceac82c, address which referenced memory
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3015
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 16894
Key : Analysis.Init.CPU.mSec
Value: 968
Key : Analysis.Init.Elapsed.mSec
Value: 96173
Key : Analysis.Memory.CommitPeak.Mb
Value: 128
FILE_IN_CAB: 101022-16687-01.dmp
DUMP_FILE_ATTRIBUTES: 0x808
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8063ceac82c
READ_ADDRESS: fffff8063a51c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000008
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: firefox.exe
TRAP_FRAME: ffffee03ba39def0 -- (.trap 0xffffee03ba39def0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffee03ba39e1f8
rdx=ffffc8861f890880 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8063ceac82c rsp=ffffee03ba39e080 rbp=ffffee03ba39e0f9
r8=ffffc8861f890950 r9=0000000000000026 r10=ffffc88623668410
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c:
fffff806`3ceac82c 488b4808 mov rcx,qword ptr [rax+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
ffffee03`ba39dda8 fffff806`39c33fa9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffee03`ba39ddb0 fffff806`39c2fee8 : ffffee03`ba39df60 ffffc886`35d05e50 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffee03`ba39def0 fffff806`3ceac82c : ffffee03`ba39e1c0 ffffc886`1f890950 ffffee03`ba39e1c0 ffffc886`1f890950 : nt!KiPageFault+0x468
ffffee03`ba39e080 fffff806`3ceac0db : ffffc886`1f890950 ffffc886`1f890880 ffffc886`23668401 00000000`00000000 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c
ffffee03`ba39e150 fffff806`3cea9c7b : ffffc885`d3520014 fffff806`a1774cd0 ffffc885`00000000 ffffee03`ba39eae8 : NETIO!StreamProcessCallout+0x2c7
ffffee03`ba39e280 fffff806`3cea8d2d : 00000000`00000014 ffffee03`ba39eae8 ffffee03`ba39eb10 ffffee03`ba39e990 : NETIO!ProcessCallout+0xa4b
ffffee03`ba39e400 fffff806`3cea7a3e : 00000000`00000005 ffffee03`ba39eb10 ffffc885`d351aaa0 00000000`00000001 : NETIO!ArbitrateAndEnforce+0x59d
ffffee03`ba39e530 fffff806`3cea5525 : ffffee03`ba39eea8 ffffee03`ba39e9e0 ffffee03`ba39e9e0 00000000`00000000 : NETIO!KfdClassify+0x33e
ffffee03`ba39e8e0 fffff806`3cea5128 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc886`236ed830 : NETIO!StreamClassify+0x279
ffffee03`ba39ea80 fffff806`3cea4b06 : ffffc886`22a243d0 ffffc885`d3ae8dc0 00000000`00000000 00000000`00000014 : NETIO!StreamCommonInspect+0x2ac
ffffee03`ba39ee60 fffff806`3d0669db : ffffc886`1cd4c5b0 ffffc886`1cd4c5b0 ffffee03`ba39ef60 ffffee03`ba39ef80 : NETIO!WfpStreamInspectSend+0x256
ffffee03`ba39eef0 fffff806`3d066275 : 00000000`00000000 00000000`00000000 ffffc886`155e11b8 ffffc886`155e11b8 : tcpip!TcpEnqueueTcbSend+0x74b
ffffee03`ba39f010 fffff806`39a9746a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc885`d34d83b0 : tcpip!TcpTlConnectionSendCalloutRoutine+0x25
ffffee03`ba39f050 fffff806`39a973dd : fffff806`3d066250 ffffee03`ba39f130 ffffc886`3596d6b0 ffffc886`1ca7b020 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
ffffee03`ba39f0c0 fffff806`3d09c01d : ffffc886`14dfc000 fffff806`39a9a235 ffffffff`ffffffff 00000000`00000032 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffee03`ba39f100 fffff806`3e4e3070 : ffffc886`3596d6b0 ffffee03`ba39fa60 ffffc886`1bac19e0 ffffc886`22dba560 : tcpip!TcpTlConnectionSend+0x8d
ffffee03`ba39f170 fffff806`3e4e6989 : ffffc886`1bac19e0 ffffee03`ba39f7b0 00000006`eae7e3a0 fffff806`3a29a87f : afd!AfdFastConnectionSend+0x550
ffffee03`ba39f350 fffff806`39ec951e : 00000000`00000000 00000000`0001201f ffffee03`ba39fa60 ffffc886`1ca7b010 : afd!AfdFastIoDeviceControl+0xfa9
ffffee03`ba39f6f0 fffff806`39ec7ab6 : 00000000`000004d8 00000000`00000001 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x46e
ffffee03`ba39f900 fffff806`39c33965 : 00000000`00000000 ffffde09`82f7fb40 00000000`00000000 ffffc886`22dba560 : nt!NtDeviceIoControlFile+0x56
ffffee03`ba39f970 00007ffd`e646ee54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000006`eae7e3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e646ee54
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+5c
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.22621.601
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c
FAILURE_BUCKET_ID: AV_NETIO!StreamInvokeCalloutAndNormalizeAction
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04}
Followup: MachineOwner
'''''