Този сайт ще има ограничена функционалност, докато се извършва тече неговата поддръжка. Ако дадена статия не може реши проблема ви и искате да зададете въпрос, нашата общност е готова да ви помогне на @firefox в Twitter и /r/firefox в Reddit.

Търсене в помощните статии

Избягвайте измамите при поддръжката. Никога няма да ви помолим да се обадите или изпратите SMS на телефонен номер или да споделите лична информация. Моля, докладвайте подозрителна активност на "Докладване за злоупотреба".

Научете повече

Firefox seemingly causing computer to crash

  • 1 отговор
  • 2 имат този проблем
  • 1 изглед
  • Последен отговор от ddmas

more options

I have been experiencing BSOD on my Dell XPS 9500, each time with the error message: DRIVER_IRQL_NOT_LESS_OR_EQUAL

After analyzing the crashdump with WinDbg, it appears the culprit is Firefox. I have experienced 5 crashes in the past week and in each case, the analysis reveals Firefox as the culprit.

Below is the output of the analysis of the last crash dump. Someone please take a look and advise.

I have verified my Firefox is up to date.

''''' .................................. For analysis of this file, run !analyze -v 9: kd> !analyze -v

  • *
  • Bugcheck Analysis *
  • *

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000008, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8063ceac82c, address which referenced memory

Debugging Details:



KEY_VALUES_STRING: 1

   Key  : Analysis.CPU.mSec
   Value: 3015
   Key  : Analysis.DebugAnalysisManager
   Value: Create
   Key  : Analysis.Elapsed.mSec
   Value: 16894
   Key  : Analysis.Init.CPU.mSec
   Value: 968
   Key  : Analysis.Init.Elapsed.mSec
   Value: 96173
   Key  : Analysis.Memory.CommitPeak.Mb
   Value: 128


FILE_IN_CAB: 101022-16687-01.dmp

DUMP_FILE_ATTRIBUTES: 0x808

 Kernel Generated Triage Dump

BUGCHECK_CODE: d1

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8063ceac82c

READ_ADDRESS: fffff8063a51c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse

0000000000000008 

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: firefox.exe

TRAP_FRAME: ffffee03ba39def0 -- (.trap 0xffffee03ba39def0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffee03ba39e1f8 rdx=ffffc8861f890880 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8063ceac82c rsp=ffffee03ba39e080 rbp=ffffee03ba39e0f9

r8=ffffc8861f890950  r9=0000000000000026 r10=ffffc88623668410

r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c: fffff806`3ceac82c 488b4808 mov rcx,qword ptr [rax+8] ds:00000000`00000008=???????????????? Resetting default scope

STACK_TEXT: ffffee03`ba39dda8 fffff806`39c33fa9  : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffee03`ba39ddb0 fffff806`39c2fee8  : ffffee03`ba39df60 ffffc886`35d05e50 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffee03`ba39def0 fffff806`3ceac82c  : ffffee03`ba39e1c0 ffffc886`1f890950 ffffee03`ba39e1c0 ffffc886`1f890950 : nt!KiPageFault+0x468 ffffee03`ba39e080 fffff806`3ceac0db  : ffffc886`1f890950 ffffc886`1f890880 ffffc886`23668401 00000000`00000000 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c ffffee03`ba39e150 fffff806`3cea9c7b  : ffffc885`d3520014 fffff806`a1774cd0 ffffc885`00000000 ffffee03`ba39eae8 : NETIO!StreamProcessCallout+0x2c7 ffffee03`ba39e280 fffff806`3cea8d2d  : 00000000`00000014 ffffee03`ba39eae8 ffffee03`ba39eb10 ffffee03`ba39e990 : NETIO!ProcessCallout+0xa4b ffffee03`ba39e400 fffff806`3cea7a3e  : 00000000`00000005 ffffee03`ba39eb10 ffffc885`d351aaa0 00000000`00000001 : NETIO!ArbitrateAndEnforce+0x59d ffffee03`ba39e530 fffff806`3cea5525  : ffffee03`ba39eea8 ffffee03`ba39e9e0 ffffee03`ba39e9e0 00000000`00000000 : NETIO!KfdClassify+0x33e ffffee03`ba39e8e0 fffff806`3cea5128  : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc886`236ed830 : NETIO!StreamClassify+0x279 ffffee03`ba39ea80 fffff806`3cea4b06  : ffffc886`22a243d0 ffffc885`d3ae8dc0 00000000`00000000 00000000`00000014 : NETIO!StreamCommonInspect+0x2ac ffffee03`ba39ee60 fffff806`3d0669db  : ffffc886`1cd4c5b0 ffffc886`1cd4c5b0 ffffee03`ba39ef60 ffffee03`ba39ef80 : NETIO!WfpStreamInspectSend+0x256 ffffee03`ba39eef0 fffff806`3d066275  : 00000000`00000000 00000000`00000000 ffffc886`155e11b8 ffffc886`155e11b8 : tcpip!TcpEnqueueTcbSend+0x74b ffffee03`ba39f010 fffff806`39a9746a  : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc885`d34d83b0 : tcpip!TcpTlConnectionSendCalloutRoutine+0x25 ffffee03`ba39f050 fffff806`39a973dd  : fffff806`3d066250 ffffee03`ba39f130 ffffc886`3596d6b0 ffffc886`1ca7b020 : nt!KeExpandKernelStackAndCalloutInternal+0x7a ffffee03`ba39f0c0 fffff806`3d09c01d  : ffffc886`14dfc000 fffff806`39a9a235 ffffffff`ffffffff 00000000`00000032 : nt!KeExpandKernelStackAndCalloutEx+0x1d ffffee03`ba39f100 fffff806`3e4e3070  : ffffc886`3596d6b0 ffffee03`ba39fa60 ffffc886`1bac19e0 ffffc886`22dba560 : tcpip!TcpTlConnectionSend+0x8d ffffee03`ba39f170 fffff806`3e4e6989  : ffffc886`1bac19e0 ffffee03`ba39f7b0 00000006`eae7e3a0 fffff806`3a29a87f : afd!AfdFastConnectionSend+0x550 ffffee03`ba39f350 fffff806`39ec951e  : 00000000`00000000 00000000`0001201f ffffee03`ba39fa60 ffffc886`1ca7b010 : afd!AfdFastIoDeviceControl+0xfa9 ffffee03`ba39f6f0 fffff806`39ec7ab6  : 00000000`000004d8 00000000`00000001 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x46e ffffee03`ba39f900 fffff806`39c33965  : 00000000`00000000 ffffde09`82f7fb40 00000000`00000000 ffffc886`22dba560 : nt!NtDeviceIoControlFile+0x56 ffffee03`ba39f970 00007ffd`e646ee54  : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000006`eae7e3c8 00000000`00000000  : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e646ee54


SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+5c

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

IMAGE_VERSION: 10.0.22621.601

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 5c

FAILURE_BUCKET_ID: AV_NETIO!StreamInvokeCalloutAndNormalizeAction

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04}

Followup: MachineOwner '''''

I have been experiencing BSOD on my Dell XPS 9500, each time with the error message: '''DRIVER_IRQL_NOT_LESS_OR_EQUAL''' After analyzing the crashdump with WinDbg, it appears the culprit is Firefox. I have experienced 5 crashes in the past week and in each case, the analysis reveals Firefox as the culprit. Below is the output of the analysis of the last crash dump. Someone please take a look and advise. I have verified my Firefox is up to date. '''''''''' .................................. For analysis of this file, run !analyze -v 9: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000008, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8063ceac82c, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3015 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 16894 Key : Analysis.Init.CPU.mSec Value: 968 Key : Analysis.Init.Elapsed.mSec Value: 96173 Key : Analysis.Memory.CommitPeak.Mb Value: 128 FILE_IN_CAB: 101022-16687-01.dmp DUMP_FILE_ATTRIBUTES: 0x808 Kernel Generated Triage Dump BUGCHECK_CODE: d1 BUGCHECK_P1: 8 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8063ceac82c READ_ADDRESS: fffff8063a51c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000008 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: firefox.exe TRAP_FRAME: ffffee03ba39def0 -- (.trap 0xffffee03ba39def0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffee03ba39e1f8 rdx=ffffc8861f890880 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8063ceac82c rsp=ffffee03ba39e080 rbp=ffffee03ba39e0f9 r8=ffffc8861f890950 r9=0000000000000026 r10=ffffc88623668410 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c: fffff806`3ceac82c 488b4808 mov rcx,qword ptr [rax+8] ds:00000000`00000008=???????????????? Resetting default scope STACK_TEXT: ffffee03`ba39dda8 fffff806`39c33fa9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffee03`ba39ddb0 fffff806`39c2fee8 : ffffee03`ba39df60 ffffc886`35d05e50 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffee03`ba39def0 fffff806`3ceac82c : ffffee03`ba39e1c0 ffffc886`1f890950 ffffee03`ba39e1c0 ffffc886`1f890950 : nt!KiPageFault+0x468 ffffee03`ba39e080 fffff806`3ceac0db : ffffc886`1f890950 ffffc886`1f890880 ffffc886`23668401 00000000`00000000 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c ffffee03`ba39e150 fffff806`3cea9c7b : ffffc885`d3520014 fffff806`a1774cd0 ffffc885`00000000 ffffee03`ba39eae8 : NETIO!StreamProcessCallout+0x2c7 ffffee03`ba39e280 fffff806`3cea8d2d : 00000000`00000014 ffffee03`ba39eae8 ffffee03`ba39eb10 ffffee03`ba39e990 : NETIO!ProcessCallout+0xa4b ffffee03`ba39e400 fffff806`3cea7a3e : 00000000`00000005 ffffee03`ba39eb10 ffffc885`d351aaa0 00000000`00000001 : NETIO!ArbitrateAndEnforce+0x59d ffffee03`ba39e530 fffff806`3cea5525 : ffffee03`ba39eea8 ffffee03`ba39e9e0 ffffee03`ba39e9e0 00000000`00000000 : NETIO!KfdClassify+0x33e ffffee03`ba39e8e0 fffff806`3cea5128 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc886`236ed830 : NETIO!StreamClassify+0x279 ffffee03`ba39ea80 fffff806`3cea4b06 : ffffc886`22a243d0 ffffc885`d3ae8dc0 00000000`00000000 00000000`00000014 : NETIO!StreamCommonInspect+0x2ac ffffee03`ba39ee60 fffff806`3d0669db : ffffc886`1cd4c5b0 ffffc886`1cd4c5b0 ffffee03`ba39ef60 ffffee03`ba39ef80 : NETIO!WfpStreamInspectSend+0x256 ffffee03`ba39eef0 fffff806`3d066275 : 00000000`00000000 00000000`00000000 ffffc886`155e11b8 ffffc886`155e11b8 : tcpip!TcpEnqueueTcbSend+0x74b ffffee03`ba39f010 fffff806`39a9746a : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc885`d34d83b0 : tcpip!TcpTlConnectionSendCalloutRoutine+0x25 ffffee03`ba39f050 fffff806`39a973dd : fffff806`3d066250 ffffee03`ba39f130 ffffc886`3596d6b0 ffffc886`1ca7b020 : nt!KeExpandKernelStackAndCalloutInternal+0x7a ffffee03`ba39f0c0 fffff806`3d09c01d : ffffc886`14dfc000 fffff806`39a9a235 ffffffff`ffffffff 00000000`00000032 : nt!KeExpandKernelStackAndCalloutEx+0x1d ffffee03`ba39f100 fffff806`3e4e3070 : ffffc886`3596d6b0 ffffee03`ba39fa60 ffffc886`1bac19e0 ffffc886`22dba560 : tcpip!TcpTlConnectionSend+0x8d ffffee03`ba39f170 fffff806`3e4e6989 : ffffc886`1bac19e0 ffffee03`ba39f7b0 00000006`eae7e3a0 fffff806`3a29a87f : afd!AfdFastConnectionSend+0x550 ffffee03`ba39f350 fffff806`39ec951e : 00000000`00000000 00000000`0001201f ffffee03`ba39fa60 ffffc886`1ca7b010 : afd!AfdFastIoDeviceControl+0xfa9 ffffee03`ba39f6f0 fffff806`39ec7ab6 : 00000000`000004d8 00000000`00000001 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x46e ffffee03`ba39f900 fffff806`39c33965 : 00000000`00000000 ffffde09`82f7fb40 00000000`00000000 ffffc886`22dba560 : nt!NtDeviceIoControlFile+0x56 ffffee03`ba39f970 00007ffd`e646ee54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000006`eae7e3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e646ee54 SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+5c MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS IMAGE_VERSION: 10.0.22621.601 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 5c FAILURE_BUCKET_ID: AV_NETIO!StreamInvokeCalloutAndNormalizeAction OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04} Followup: MachineOwner ''''''''''

Всички отговори (1)

more options

This is Windows 11 by the way if that is not clear