Unsolved
1 Rookie
•
1 Message
0
37
March 29th, 2025 13:23
Hyperv 2022 Server keep BSOD - DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
Hi,
Would like to check how to solve this BSOD <DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)> Error?
HyperV server 2022, VM SWITCH using SET.
Model: PowerEdgeR760
NIC: Broadcom NetXtreme-E SFP28 25G
Disabled vmq and rss.
Minidump file as below,
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff805306ec6f8, address which referenced memory
Debugging Details:
------------------
BUGCHECK_CODE: d1
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff805306ec6f8
FILE_IN_CAB: 032725-21781-01.dmp
FAULTING_THREAD: fffff8052c73ec00
READ_ADDRESS: fffff8052c70f3d0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000008
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80531973c80 -- (.trap 0xfffff80531973c80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff80531973f80
rdx=ffff9a0388617010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805306ec6f8 rsp=fffff80531973e10 rbp=fffff80531973e89
r8=ffff9a0388617010 r9=0000000000007f93 r10=ffff9a038baa7570
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c:
fffff805`306ec6f8 488b4808 mov rcx,qword ptr [rax+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
fffff805`31973b38 fffff805`2be38c29 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`31973b40 fffff805`2be34261 : fffff805`31974270 00000000`00000000 00000000`00000000 fffff805`4598db08 : nt!KiBugCheckDispatch+0x69
fffff805`31973c80 fffff805`306ec6f8 : ffff9a03`88617010 fffff805`31973e89 fffff805`31973f48 ffff9a03`88617010 : nt!KiPageFault+0x461
fffff805`31973e10 fffff805`306ec40f : ffff9a03`88617010 ffff9a03`88617010 00000000`00000000 fffff805`31974270 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c
fffff805`31973ee0 fffff805`306eae9f : ffff920d`30940014 fffff805`459cd490 ffff9a03`00000002 fffff805`319748c8 : NETIO!StreamProcessCallout+0x3df
fffff805`31974010 fffff805`306ea149 : 00000000`00000014 fffff805`319748c8 fffff805`319748f0 fffff805`31974770 : NETIO!ProcessCallout+0x8df
fffff805`319741c0 fffff805`306e8df4 : 8907b4c6`ecfabf1c 00000000`00000000 ffff920d`3094caa0 0100010e`00000001 : NETIO!ArbitrateAndEnforce+0x5b9
fffff805`319742f0 fffff805`306e6f00 : ffff920d`00000000 00000000`00000000 ffff920d`6590a890 fffff805`31974f50 : NETIO!KfdClassify+0x374
fffff805`319746c0 fffff805`306e6ae2 : 00000000`00022428 00000000`00000000 fffff805`31974c10 00000000`00000000 : NETIO!StreamClassify+0x2c0
fffff805`31974860 fffff805`306e6349 : fffff805`306e2a40 00000000`00000000 00000000`00000000 ffff920d`3a0e8000 : NETIO!StreamCommonInspect+0x296
fffff805`31974c50 fffff805`31383c64 : ffff920d`469c1c00 ffff9a03`aba06100 00000000`00000000 ffff9a03`899d3a20 : NETIO!WfpStreamInspectReceive+0x199
fffff805`31974cd0 fffff805`31383d97 : ffff9a03`aba061e0 fffff805`31974dd0 00000000`000005b4 ffff9a03`aba06010 : tcpip!InetInspectReceive+0x80
fffff805`31974d80 fffff805`313cd3ab : ffff920d`3a0e8000 ffff920d`3a0e8000 ffff920d`489a9aa0 ffff920d`489a9aa0 : tcpip!TcpInspectReceive+0xcb
fffff805`31974e00 fffff805`313c3a82 : 00000001`00000000 00000000`00000025 ffff920d`4475ba20 fffff805`307b9408 : tcpip!TcpTcbCarefulDatagram+0x3fdb
fffff805`31975170 fffff805`313c131f : 00000000`00000000 00000000`00000000 fffff805`31975408 ffff920d`39f9f9a0 : tcpip!TcpTcbReceive+0x382
fffff805`31975310 fffff805`313c055d : fffff805`00000000 fffff805`31975561 ffff920d`464327a2 fffff805`46d601d0 : tcpip!TcpMatchReceive+0x51f
fffff805`319754e0 fffff805`313bff95 : 00000000`00008ade fffff805`00000002 ffff920d`00000000 00000000`3135ff00 : tcpip!TcpReceive+0x44d
fffff805`319755d0 fffff805`313599c7 : 000012b5`00000b02 00000000`00000000 00000000`0000000c 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x25
fffff805`31975610 fffff805`31358316 : ffff920d`4cced820 00000000`00000000 00000000`00000006 00000000`00000000 : tcpip!IpFlcReceivePreValidatedPackets+0xea7
fffff805`319757a0 fffff805`2bc8a6f8 : 00000000`00000000 fffff805`313581d0 fffff805`2c73ec00 00000000`00000002 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x146
fffff805`319758e0 fffff805`2bc8a66d : fffff805`313581d0 fffff805`31975a90 ffff920d`39df78a0 00000000`00000801 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff805`31975950 fffff805`313ce82d : 00000000`00000000 00000000`00000000 ffff920d`00000801 ffff920d`4785f520 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff805`31975990 fffff805`313cdf5f : 00000000`00000000 fffff805`31975af0 ffff920d`4cdce000 00000000`00000000 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff805`319759f0 fffff805`30782c00 : ffff920d`00000000 00001f80`00000000 00000000`00000000 00000000`00040086 : tcpip!FlReceiveNetBufferListChain+0x5df
fffff805`31975ce0 fffff805`3078263d : ffff920d`4cd53820 00000000`00000008 ffff920d`00000000 00000000`00000002 : NDIS!ndisMIndicateNetBufferListsToOpen+0x140
fffff805`31975dc0 fffff805`307b969c : ffff920d`494421a0 00000000`00000001 ffff920d`494421a0 fffff805`31975fc0 : NDIS!ndisMTopReceiveNetBufferLists+0x23d
fffff805`31975ea0 fffff805`307966ea : 00000000`009baa18 00000000`00000002 00000000`00000001 fffff805`2bc5f949 : NDIS!ndisInvokeNextReceiveHandler+0x54
fffff805`31975f00 fffff805`46d0b3d0 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : NDIS!NdisMIndicateReceiveNetBufferLists+0x10a
fffff805`31975f90 fffff805`46d0da4b : ffff920d`494421a0 ffff920d`492404c0 fffff805`31976300 00000000`00000000 : vmswitch!VmsMpNicPvtReceiveRssProcessNblGroup+0xa0
fffff805`31975ff0 fffff805`2bc316dc : 00000000`00000000 00000000`00000000 fffff805`29d81180 00000000`00000000 : vmswitch!VmsVrssDpc+0x9b
fffff805`31976070 fffff805`2bc302ad : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x95c
fffff805`31976250 fffff805`2be2812e : 00000000`00000000 fffff805`29d81180 fffff805`2c73ec00 ffff920d`566585c0 : nt!KiRetireDpcList+0x25d
fffff805`31976500 00000000`00000000 : fffff805`31977000 fffff805`31970000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+5c
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.20348.3145
STACK_COMMAND: .process /r /p 0xfffff8052c73cb00; .thread 0xfffff8052c73ec00 ; kb
BUCKET_ID_FUNC_OFFSET: 5c
FAILURE_BUCKET_ID: AV_NETIO!StreamInvokeCalloutAndNormalizeAction
OS_VERSION: 10.0.20348.2849
BUILDLAB_STR: fe_release_svc_prod1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04}
DELL-Young E
Moderator
•
5.1K Posts
0
March 31st, 2025 01:01
Hello, thanks for choosing Dell.
This is MS logs, so it is best directed by MS.
You can send us your service tag here (https://www.dell.com/community/en/direct-messaging) as well and continue describing what you are experiencing to the existing thread.
Respectfully,