Hello,
We 've updated our server and the network card driver also but still getting random bsod.
This time we had a BSOD DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
Below a new dump Analysis.
Do you think that the network card driver still caused this BSOD ?
Thanks
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff801950a9091, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
*Key : Analysis.CPU.mSec*
*Value: 2687*
*Key : Analysis.Elapsed.mSec*
*Value: 2704*
*Key : Analysis.IO.Other.Mb*
*Value: 0*
*Key : Analysis.IO.Read.Mb*
*Value: 0*
*Key : Analysis.IO.Write.Mb*
*Value: 0*
*Key : Analysis.Init.CPU.mSec*
*Value: 1280*
*Key : Analysis.Init.Elapsed.mSec*
*Value: 9938*
*Key : Analysis.Memory.CommitPeak.Mb*
*Value: 101*
*Key : Bugcheck.Code.KiBugCheckData*
*Value: 0xd1*
*Key : Bugcheck.Code.LegacyAPI*
*Value: 0xd1*
*Key : Failure.Bucket*
*Value: AV\_tcpip!UdpSendMessages*
*Key : Failure.Hash*
*Value: {e1c12319-f038-0371-bd54-083fccc44512}*
*Key : Hypervisor.Enlightenments.Value*
*Value: 0*
*Key : Hypervisor.Enlightenments.ValueHex*
*Value: 0*
*Key : Hypervisor.Flags.AnyHypervisorPresent*
*Value: 0*
*Key : Hypervisor.Flags.ApicEnlightened*
*Value: 0*
*Key : Hypervisor.Flags.AsyncMemoryHint*
*Value: 0*
*Key : Hypervisor.Flags.CpuManager*
*Value: 0*
*Key : Hypervisor.Flags.DeprecateAutoEoi*
*Value: 0*
*Key : Hypervisor.Flags.DynamicCpuDisabled*
*Value: 0*
*Key : Hypervisor.Flags.Epf*
*Value: 0*
*Key : Hypervisor.Flags.ExtendedProcessorMasks*
*Value: 0*
*Key : Hypervisor.Flags.HardwareMbecAvailable*
*Value: 0*
*Key : Hypervisor.Flags.MaxBankNumber*
*Value: 0*
*Key : Hypervisor.Flags.MemoryZeroingControl*
*Value: 0*
*Key : Hypervisor.Flags.NoExtendedRangeFlush*
*Value: 0*
*Key : Hypervisor.Flags.NoNonArchCoreSharing*
*Value: 0*
*Key : Hypervisor.Flags.Phase0InitDone*
*Value: 0*
*Key : Hypervisor.Flags.PowerSchedulerQos*
*Value: 0*
*Key : Hypervisor.Flags.RootScheduler*
*Value: 0*
*Key : Hypervisor.Flags.SynicAvailable*
*Value: 0*
*Key : Hypervisor.Flags.UseQpcBias*
*Value: 0*
*Key : Hypervisor.Flags.Value*
*Value: 0*
*Key : Hypervisor.Flags.ValueHex*
*Value: 0*
*Key : Hypervisor.Flags.VpAssistPage*
*Value: 0*
*Key : Hypervisor.Flags.VsmAvailable*
*Value: 0*
*Key : Hypervisor.RootFlags.Value*
*Value: 0*
*Key : Hypervisor.RootFlags.ValueHex*
*Value: 0*
*Key : WER.OS.Branch*
*Value: rs5\_release*
*Key : WER.OS.Version*
*Value: 10.0.17763.1*
BUGCHECK_CODE: d1
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff801950a9091
FILE_IN_CAB: MEMORY.DMP
READ_ADDRESS: 0000000000000008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
PROCESS_NAME: PBSWDolphinStream.exe
TRAP_FRAME: fffff380f8194cd0 -- (.trap 0xfffff380f8194cd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=000000000018198e
rdx=ffffd00f8d31aa00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801950a9091 rsp=fffff380f8194e60 rbp=fffff380f8194f60
r8=ffffd00f8d31aa00 r9=0000000000000001 r10=0000fffff8019504
r11=ffffa07c7ba00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
tcpip!UdpSendMessages+0x121:
fffff801950a9091 488b4808 mov rcx,qword ptr [rax+8] ds:00000000
00000008=????????????????
Resetting default scope
STACK_TEXT:
fffff380f8194b88 fffff800
7567b3a9 : 000000000000000a 00000000
00000008 0000000000000002 00000000
00000000 : nt!KeBugCheckEx
fffff380f8194b90 fffff800
7567700e : fffff380f8194ce0 00000000
00000018 fffff38000000000 00001f80
00bf02c0 : nt!KiBugCheckDispatch+0x69
fffff380f8194cd0 fffff801
950a9091 : 0000000000000000 fffff800
75669ec4 ffffb0807e291840 80000000
00000000 : nt!KiPageFault+0x44e
fffff380f8194e60 fffff801
950a8f55 : 000000000000002d 00000000
00000001 fffff380f8195310 fffff380
f8195310 : tcpip!UdpSendMessages+0x121
fffff380f8195200 fffff800
754b7a68 : fffff380f8195460 ffffd00f
98f0b000 0000000000000000 00000000
00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff380f8195230 fffff800
754b79dd : fffff801950a8f40 fffff380
f8195310 0000000000000000 fffff801
950aeb94 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff380f81952a0 fffff801
950aeb92 : fffff380f81953c4 ffffd00f
98f03020 fffff8007555a350 fffff801
949638f0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff380f81952e0 fffff801
9497d020 : ffffc80e599ef250 fffff380
f8195b80 fffff380f81956b0 fffff800
7566fa1f : tcpip!UdpTlProviderSendMessages+0x72
fffff380f8195360 fffff801
949637cb : fffff380f8195580 ffffb080
7e72b000 ffffd00f9af426c0 ffffd00f
9806c180 : afd!AfdFastDatagramSend+0xa90
fffff380f8195550 fffff800
75a6a12b : ffffb0807d159180 ffff9dfe
b524828b 0000000000000002 ffffb080
7d159180 : afd!AfdFastIoDeviceControl+0x177b
fffff380f81958d0 fffff800
75b2ec16 : d3764fe76d6adb69 00000000
00000000 0000000000000000 000001a1
018ae310 : nt!IopXxxControlFile+0x81b
fffff380f8195a20 fffff800
7567ab38 : fffff380f8195ad8 00000000
00000001 0000000000000000 fffff800
7566fa00 : nt!NtDeviceIoControlFile+0x56
fffff380f8195a90 00007ffb
e157fcd4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007089cff3e8 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007ffb`e157fcd4
SYMBOL_NAME: tcpip!UdpSendMessages+121
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 121
FAILURE_BUCKET_ID: AV_tcpip!UdpSendMessages
OS_VERSION: 10.0.17763.1
BUILDLAB_STR: rs5_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e1c12319-f038-0371-bd54-083fccc44512}