New laptop random BSOD

Page 1 of 2 12 LastLast

  1. Posts : 9
    Win 10 64bit
       #1

    New laptop random BSOD


    Hi there, having some problems with a new laptop that BSOD at random times. I can't pinpoint any particular activity or program that seems to trigger the event so I come to ask for help.

    I cant find any .dmp files so I have set it up to create a complete memory.dmp next time there is a crash in case the attached information isnt enough to try and see what it going on.

    Thanks in advance !
      My Computer


  2. Posts : 14,903
    Windows 10 Pro
       #2

    Hi takitoes,

    Since some time Windows 10 is deleting minidumps after a day or 2, so it's no surprise there are no dumps.
    Change the startup and recovery settings to kernel dump and upload a new zip a.s.a.p. when another crash has occured.

    Also, it seems your pc has had some trouble with generating dumps.
    Code:
    2019-05-26T14:41:38.755		Dump file creation failed due to error during dump creation.
    2019-05-20T19:18:10.172		Unable to produce a minidump file from the full dump file.
    2019-05-20T19:18:02.708		Dump file creation failed due to error during dump creation.
      My Computers


  3. Posts : 9
    Win 10 64bit
    Thread Starter
       #3

    axe0 said:
    Hi takitoes,

    Since some time Windows 10 is deleting minidumps after a day or 2, so it's no surprise there are no dumps.
    Change the startup and recovery settings to kernel dump and upload a new zip a.s.a.p. when another crash has occured.
    Ive managed to get one ready for someone to check please. I got a full minidump and uploaded it to my Onedrive. Sorry to take so long, my wife had the laptop for a while.

    Microsoft services

    Let me know if there is anything else needed.

    Thanks!
      My Computer


  4. Posts : 14,903
    Windows 10 Pro
       #4

    Just to let you know, a full memory dump is not necessary. In fact it would be mostly wasted memory/space, because most of what it contains is basically irrelevant for troubleshooting BSOD crashes. A kernel memory dump is the best option, saves a lot of space and has the relevant data and not much more.

    The download is currently running and should be done in ~25 minutes. While waiting, could you provide a new zip created by the V2 or DM Log Collector please.
      My Computers


  5. Posts : 1,538
    Windows 8.1 Enterprise x64
       #5

    The DRIVER_IRQL_NOT_LESS_OR_EQUAL bug check has a value of 0x000000D1. This indicates that a kernel-mode driver attempted to access pageable memory at a process IRQL that was too high.
    Code:
    Microsoft (R) Windows Debugger Version 10.0.17763.132 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\michal01\Downloads\MEMORY (3).DMP]
    Kernel Bitmap Dump File: Full address space is available
    
    
    ************* Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       SRV*
    Symbol search path is: SRV*
    Executable search path is: 
    Windows 10 Kernel Version 17763 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 17763.1.amd64fre.rs5_release.180914-1434
    Machine Name:
    Kernel base = 0xfffff807`2b019000 PsLoadedModuleList = 0xfffff807`2b4345d0
    Debug session time: Fri Jun  7 14:02:55.954 2019 (UTC + 2:00)
    System Uptime: 1 days 8:45:59.117
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ....................
    Loading User Symbols
    ................................................................
    ............................
    Loading unloaded module list
    ..........................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {ffffa90022f28130, 2, 1, fffff80780e66465}
    
    *** ERROR: Module load completed but symbols could not be loaded for RfeCo10X64.sys
    *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for chrome_child.dll - 
    Probably caused by : RfeCo10X64.sys ( RfeCo10X64+6465 )
    
    Followup:     MachineOwner
    ---------
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: ffffa90022f28130, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffff80780e66465, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    
    STACKHASH_ANALYSIS: 1
    
    TIMELINE_ANALYSIS: 1
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 402
    
    BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434
    
    SYSTEM_MANUFACTURER:  Dell Inc.
    
    SYSTEM_PRODUCT_NAME:  XPS 15 9575
    
    SYSTEM_SKU:  080D
    
    BIOS_VENDOR:  Dell Inc.
    
    BIOS_VERSION:  1.5.1
    
    BIOS_DATE:  03/25/2019
    
    BASEBOARD_MANUFACTURER:  Dell Inc.
    
    BASEBOARD_PRODUCT:  0C32VW
    
    BASEBOARD_VERSION:  A00
    
    DUMP_TYPE:  0
    
    BUGCHECK_P1: ffffa90022f28130
    
    BUGCHECK_P2: 2
    
    BUGCHECK_P3: 1
    
    BUGCHECK_P4: fffff80780e66465
    
    WRITE_ADDRESS:  ffffa90022f28130 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    RfeCo10X64+6465
    fffff807`80e66465 f0480fc13b      lock xadd qword ptr [rbx],rdi
    
    CPU_COUNT: 8
    
    CPU_MHZ: c18
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 9e
    
    CPU_STEPPING: 9
    
    CPU_MICROCODE: 6,9e,9,0 (F,M,S,R)  SIG: 8E'00000000 (cache) 8E'00000000 (init)
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXPNP: 1 (!blackboxpnp)
    
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  chrome.exe
    
    ANALYSIS_SESSION_HOST:  MICHAL
    
    ANALYSIS_SESSION_TIME:  06-08-2019 20:54:30.0921
    
    ANALYSIS_VERSION: 10.0.17763.132 amd64fre
    
    DPC_STACK_BASE:  FFFFF90B37647FB0
    
    TRAP_FRAME:  fffff90b37646e50 -- (.trap 0xfffff90b37646e50)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffff90b37647018
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80780e66465 rsp=fffff90b37646fe0 rbp=ffff970b1ccf8b40
     r8=0000000000048344  r9=0000000000000014 r10=ffff970b16714440
    r11=ffff970b20fd8b50 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    RfeCo10X64+0x6465:
    fffff807`80e66465 f0480fc13b      lock xadd qword ptr [rbx],rdi ds:00000000`00000000=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8072b1de669 to fffff8072b1ccef0
    
    STACK_TEXT:  
    fffff90b`37646d08 fffff807`2b1de669 : 00000000`0000000a ffffa900`22f28130 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff90b`37646d10 fffff807`2b1daa8e : ffff970b`1e0d9010 fffff807`38ef72ee ffffa900`2112db00 ffff970b`1e0d9010 : nt!KiBugCheckDispatch+0x69
    fffff90b`37646e50 fffff807`80e66465 : ffffa900`22f28130 00000000`00000000 ffff970b`20fd8b50 fffff807`3873418c : nt!KiPageFault+0x44e
    fffff90b`37646fe0 fffff807`80e65875 : ffff970b`23f8a060 ffff970b`20fd8b50 ffff970b`1ccf8b40 00000000`00000001 : RfeCo10X64+0x6465
    fffff90b`37647040 fffff807`387363d1 : fffff807`2baf3d40 00000000`00000000 ffff970b`23b0edd0 fffff807`38202160 : RfeCo10X64+0x5875
    fffff90b`37647090 fffff807`38372db7 : ffff970b`20fd8b50 00000000`00000000 00000000`00000001 ffff970b`19d78330 : fwpkclnt!FwppInjectComplete+0xb1
    fffff90b`376470d0 fffff807`38372cdb : 00000000`00000000 00000000`00000000 00000000`00000000 ffff970b`20fd8b50 : NETIO!NetioDereferenceNetBufferList+0xb7
    fffff90b`37647110 fffff807`38495e64 : 00000000`00000000 ffff970b`1caa5001 00000000`00000000 ffff970b`1eda17e0 : NETIO!NetioDereferenceNetBufferListChain+0x21b
    fffff90b`37647190 fffff807`3820194d : 00000000`00000001 fffff90b`37647229 ffff970b`1e10ec00 00000000`00000001 : tcpip!FlSendNetBufferListChainComplete+0x64
    fffff90b`376471c0 fffff807`382066a3 : 00000000`00000001 ffff970b`232aa701 ffff970b`00000001 fffff90b`37647350 : ndis!ndisMSendCompleteNetBufferListsInternal+0x22d
    fffff90b`37647290 fffff807`38201f91 : ffff970b`1de2eed3 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallSendCompleteHandler+0x33
    fffff90b`376472d0 fffff807`3b66593d : ffff970b`1a1e71a0 ffff970b`232aa780 ffff970b`1aa44a90 ffff970b`232aa700 : ndis!NdisMSendNetBufferListsComplete+0x301
    fffff90b`376473e0 fffff807`3b632ef0 : ffff970b`1aa44a90 fffff807`3b4e5d01 ffff970b`232aa780 00000000`00000000 : wdiwifi!CPort::SendCompleteNetBufferLists+0xf5
    fffff90b`37647430 fffff807`3b6274da : ffff970b`19c0d7d0 fffff807`3b6c2500 ffff970b`232aa780 00000000`00000000 : wdiwifi!CAdapter::SendCompleteNbl+0x11c
    fffff90b`376474a0 fffff807`3b6271f1 : ffff970b`19c0d7d0 fffff807`3b6c2540 fffff90b`37647600 ffff970b`20cd7be0 : wdiwifi!CTxMgr::CompleteNdisNbl+0xbe
    fffff90b`37647500 fffff807`3b624aaa : 00000000`0000ffff fffff90b`376476c0 00000000`00000000 00000000`00000000 : wdiwifi!CTxMgr::CompleteNBLs+0x59
    fffff90b`37647540 fffff807`3b61746a : fffff807`3b617450 fffff807`00000000 00000000`00000000 fffff90b`376476c0 : wdiwifi!CTxMgr::TxSendCompleteInd+0x6c2
    fffff90b`37647610 fffff807`3b479828 : ffff970b`21944b90 fffff807`3b4aa6d1 00000000`000003ff ffff970b`21944b90 : wdiwifi!AdapterTxSendCompleteInd+0x1a
    fffff90b`37647650 fffff807`3b4b9454 : ffff970b`2191e030 ffff970b`21944b90 ffffa900`1f370608 fffff807`3821fccd : Qcamain10x64+0xf9828
    fffff90b`37647790 fffff807`3b4d62ba : fffff807`3b4b9150 00000000`00000001 ffff970b`2210cca0 ffff970b`21ea5210 : Qcamain10x64+0x139454
    fffff90b`37647810 fffff807`3b4d6a81 : ffff970b`2210cca0 ffff970b`23ea8c00 00000000`00000000 fffff807`3b4abdfb : Qcamain10x64+0x1562ba
    fffff90b`37647850 fffff807`3b4ab9b9 : ffff970b`21944b90 ffff970b`19da0008 fffff807`3b4d64f0 fffff90b`00000000 : Qcamain10x64+0x156a81
    fffff90b`37647900 fffff807`3b4ab291 : ffff970b`21944b90 fffff90b`376479a8 ffff970b`21944bb8 ffff970b`19daab20 : Qcamain10x64+0x12b9b9
    fffff90b`37647950 fffff807`3b4b26ab : ffff970b`23907710 ffff970b`21944c48 ffff970b`18bd2b60 fffff90b`3e3cf600 : Qcamain10x64+0x12b291
    fffff90b`376479f0 fffff807`3b49b638 : 00000000`00000010 ffff970b`00003fff 00000000`3e3cf600 fffff807`2ba8c9f5 : Qcamain10x64+0x1326ab
    fffff90b`37647aa0 fffff807`3b49b513 : ffff970b`19bf1950 fffff90b`37647bf9 ffff970b`1a1e71a0 00000000`00000000 : Qcamain10x64+0x11b638
    fffff90b`37647ae0 fffff807`38206838 : 00000000`00000003 00000000`00000003 ffffa900`1fb0a180 fffff807`2ba8c945 : Qcamain10x64+0x11b513
    fffff90b`37647b30 fffff807`2b092677 : 00000000`00000000 ffff970b`1ab7d300 ffff970b`1ab7d300 fffff807`2b09eeb1 : ndis!ndisInterruptDpc+0x188
    fffff90b`37647c60 fffff807`2b091cbe : 00000000`00000000 00000000`00989680 ffff970b`21b93080 00000000`00000019 : nt!KiExecuteAllDpcs+0x2e7
    fffff90b`37647da0 fffff807`2b1d3d65 : 25048b48`65ea8b48 ffffa900`1fa79180 fffff90b`3d107a80 00000000`00000000 : nt!KiRetireDpcList+0x1ae
    fffff90b`37647fb0 fffff807`2b1d3b50 : 00000000`000005c4 00000000`00000000 00007ff9`7b222270 00000000`000005c4 : nt!KxRetireDpcList+0x5
    fffff90b`3d1079d0 fffff807`2b1d323c : ffff970b`00000000 0000001a`00000001 00000000`00000000 fffff90b`3d107a80 : nt!KiDispatchInterruptContinue
    fffff90b`3d107a00 00007ff9`18783d73 : 0000011c`c7402fb0 00007ff9`1878c693 00000000`00000010 00007ff9`1878c88a : nt!KiDpcInterrupt+0x2dc
    0000001a`1a3ff600 00007ff9`18783c4b : 0000001a`1a3ff7a0 80000000`00000000 0000011c`c7402fb0 00000000`00000001 : chrome_child!ChromeMain+0x52233
    0000001a`1a3ff660 00007ff9`1878370f : 0000011c`c7402450 00007ff9`1873144b 00000000`00000000 00007ff9`7dd7267d : chrome_child!ChromeMain+0x5210b
    0000001a`1a3ff720 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : chrome_child!ChromeMain+0x51bcf
    
    
    THREAD_SHA1_HASH_MOD_FUNC:  022f77b82a53087b3ffc60aea8329f0cad3d8cc4
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  45154741357001877003fe820cf184f0133934f4
    
    THREAD_SHA1_HASH_MOD:  0e0d699cbfc7c0b564ddb9b18a53de88c4f10c8d
    
    FOLLOWUP_IP: 
    RfeCo10X64+6465
    fffff807`80e66465 f0480fc13b      lock xadd qword ptr [rbx],rdi
    
    FAULT_INSTR_CODE:  c10f48f0
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  RfeCo10X64+6465
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: RfeCo10X64
    
    IMAGE_NAME:  RfeCo10X64.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5a4fa4c2
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  6465
    
    FAILURE_BUCKET_ID:  AV_RfeCo10X64!unknown_function
    
    BUCKET_ID:  AV_RfeCo10X64!unknown_function
    
    PRIMARY_PROBLEM_CLASS:  AV_RfeCo10X64!unknown_function
    
    TARGET_TIME:  2019-06-07T12:02:55.000Z
    
    OSBUILD:  17763
    
    OSSERVICEPACK:  0
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  784
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2021-07-31 17:45:35
    
    BUILDDATESTAMP_STR:  180914-1434
    
    BUILDLAB_STR:  rs5_release
    
    BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434
    
    ANALYSIS_SESSION_ELAPSED_TIME:  77ef
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_rfeco10x64!unknown_function
    
    FAILURE_ID_HASH:  {92b9b66f-5dad-203d-ac33-c7234d721dcc}
    
    Followup:     MachineOwner
    ---------
    
    2: kd> lmvm RfeCo10X64
    Browse full module list
    start             end                 module name
    fffff807`80e60000 fffff807`85413000   RfeCo10X64   (no symbols)           
        Loaded symbol image file: RfeCo10X64.sys
        Image path: \SystemRoot\system32\DRIVERS\RfeCo10X64.sys
        Image name: RfeCo10X64.sys
        Browse all global symbols  functions  data
        Timestamp:        Fri Jan  5 08:16:02 2018 (5A4FA4C2)
        CheckSum:         00022E7D
        ImageSize:        045B3000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    2: kd> !blackboxpnp
        PnpActivityId      : {00000000-0000-0000-0000-000000000000}
        PnpActivityTime    : 132043825667230304
        PnpEventInformation: 3
        PnpEventInProgress : 0
        PnpProblemCode     : 24
        PnpVetoType        : 0
        DeviceId           : SWD\RADIO\Bluetooth_9cb6d08ed028
        VetoString         : 
    
    2: kd> lmvm qcamain10x64
    Browse full module list
    start             end                 module name
    fffff807`3b380000 fffff807`3b608000   Qcamain10x64   (no symbols)           
        Loaded symbol image file: Qcamain10x64.sys
        Image path: \SystemRoot\System32\drivers\Qcamain10x64.sys
        Image name: Qcamain10x64.sys
        Browse all global symbols  functions  data
        Timestamp:        Mon Jul 23 22:30:14 2018 (5B56B966)
        CheckSum:         0024B1C1
        ImageSize:        00288000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    2: kd> lmvm chrome_child
    Browse full module list
    start             end                 module name
    00007ff9`18730000 00007ff9`1e19a000   chrome_child   (export symbols)       chrome_child.dll
        Loaded symbol image file: chrome_child.dll
        Image path: C:\Program Files (x86)\Google\Chrome\Application\74.0.3729.169\chrome_child.dll
        Image name: chrome_child.dll
        Browse all global symbols  functions  data
        Timestamp:        Sun May 19 22:00:00 2019 (5CE23450)
        CheckSum:         0587C68E
        ImageSize:        05A6A000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
        Information from resource tables:
    2: kd> !pte ffffa90022f28130
                                               VA ffffa90022f28130
    PXE at FFFFDCEE773B9A90    PPE at FFFFDCEE77352000    PDE at FFFFDCEE6A4008B8    PTE at FFFFDCD480117940
    contains 0A00000004282863  contains 0A00000004283863  contains 0A0000014965A863  contains 0000000000000000
    pfn 4282      ---DA--KWEV  pfn 4283      ---DA--KWEV  pfn 14965a    ---DA--KWEV  not valid
    
    
    2: kd> .load pde
    =========================================================================================
     PDE v11.3 - Copyright 2017 Andrew Richards
    =========================================================================================
    2: kd> !dpx
    Start memory scan  : 0xfffff90b37646d08 ($csp)
    End memory scan    : 0xfffff90b37647fb0 (DPC Stack Base)
    
                   rsp : 0xfffff90b37646d08 : 0xfffff8072b1de669 : nt!KiBugCheckDispatch+0x69
    0xfffff90b37646d08 : 0xfffff8072b1de669 : nt!KiBugCheckDispatch+0x69
    *** ERROR: Module load completed but symbols could not be loaded for RfeCo10X64.sys
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for chrome_child.dll - 
    0xfffff90b37646d50 : 0x00007ff91d440cf9 :  !da "src_file"
    0xfffff90b37646d58 : 0x00007ff91d2f999b :  !da "src_func"
    0xfffff90b37646e48 : 0xfffff8072b1daa8e : nt!KiPageFault+0x44e
    0xfffff90b37646e58 : 0xfffff80738ef72ee : nwifi!Dot11QueueRecvPacket+0x11a
    0xfffff90b37646f48 : 0xfffff80738362870 : NETIO!MdpFree+0x70
    0xfffff90b37646f58 : 0xfffff80738201585 : ndis!NdisFreeCloneNetBufferList+0x145
    0xfffff90b37646f68 : 0xfffff80738202781 : ndis!ndisMIndicateNetBufferListsToOpen+0x221
    0xfffff90b37646ff8 : 0xfffff8073873418c : fwpkclnt!FwpsFreeCloneNetBufferList0+0x1fc
    0xfffff90b37647068 : 0xfffff80738efd612 : nwifi!Pt6Receive+0x2e2
    0xfffff90b37647078 : 0xfffff8072bab3eda : hal!HalpDmaFreeMapRegisters+0xfa
    0xfffff90b37647088 : 0xfffff807387363d1 : fwpkclnt!FwppInjectComplete+0xb1
    0xfffff90b37647090 : 0xfffff8072baf3d40 : hal!MasterAdapterV2
    0xfffff90b376470a8 : 0xfffff80738202160 : ndis!ndisMTopReceiveNetBufferLists
    0xfffff90b376470c8 : 0xfffff80738372db7 : NETIO!NetioDereferenceNetBufferList+0xb7
    0xfffff90b37647108 : 0xfffff80738372cdb : NETIO!NetioDereferenceNetBufferListChain+0x21b
    0xfffff90b37647178 : 0xffff970b1e0f38a0 : 0xfffff8073864a390 : tcpip!gWfpGlobalTriageBlock
    0xfffff90b37647188 : 0xfffff80738495e64 : tcpip!FlSendNetBufferListChainComplete+0x64
    0xfffff90b376471b8 : 0xfffff8073820194d : ndis!ndisMSendCompleteNetBufferListsInternal+0x22d
    0xfffff90b376471e8 : 0xfffff807394d10be : pacer!PcFilterSendNetBufferListsComplete+0x2e
    0xfffff90b37647240 : 0xffff970b1e0d2010 : 0xfffff807394c0140 : vwififlt!FilterModuleList
    0xfffff90b37647278 : 0xfffff80738201720 : ndis!ndisMSendCompleteNetBufferListsInternal
    0xfffff90b37647288 : 0xfffff807382066a3 : ndis!ndisCallSendCompleteHandler+0x33
    0xfffff90b376472c8 : 0xfffff80738201f91 : ndis!NdisMSendNetBufferListsComplete+0x301
    0xfffff90b37647320 : 0xfffff80738201720 : ndis!ndisMSendCompleteNetBufferListsInternal
    0xfffff90b37647378 : 0xfffff8073b6657ef : wdiwifi!CPort::FreeTxWfcFrame+0x20b
    0xfffff90b376473a8 : 0xfffff8073b6c3c58 : wdiwifi!WPP_196647d4e2813e9e18ee82314aa41a19_Traceguids
    0xfffff90b376473c0 : 0xffff970b19c0a000 :  dt wdiwifi!CAdapter
    0xfffff90b376473d8 : 0xfffff8073b66593d : wdiwifi!CPort::SendCompleteNetBufferLists+0xf5
    0xfffff90b376473f0 : 0xffff970b1aa44a90 :  dt wdiwifi!CPort
    *** ERROR: Module load completed but symbols could not be loaded for Qcamain10x64.sys
    0xfffff90b37647428 : 0xfffff8073b632ef0 : wdiwifi!CAdapter::SendCompleteNbl+0x11c
    0xfffff90b37647430 : 0xffff970b1aa44a90 :  dt wdiwifi!CPort
    0xfffff90b37647438 : 0xfffff8073b4e5d01 :  !da ""oint with status %d.""
    0xfffff90b37647458 : 0xfffff8073b6236f9 : wdiwifi!CTxMgr::TxTargetDescDeinit+0xad
    0xfffff90b37647468 : 0xffff970b19c0d7d0 :  dt wdiwifi!CTxMgr
    0xfffff90b37647480 : 0xfffff8073b6c2540 : wdiwifi!WPP_571c4b53a7e93995593833a71eb533d1_Traceguids
    0xfffff90b37647498 : 0xfffff8073b6274da : wdiwifi!CTxMgr::CompleteNdisNbl+0xbe
    0xfffff90b376474a0 : 0xffff970b19c0d7d0 :  dt wdiwifi!CTxMgr
    0xfffff90b376474a8 : 0xfffff8073b6c2500 :  !da "itialization."
    0xfffff90b376474c8 : 0xfffff8073b61af7b : wdiwifi!CRxMgr::RxInOrderDataInd+0x177
    0xfffff90b376474d0 : 0xfffff8073b6c2510 : wdiwifi!WPP_983731aa4cbd38c939d2cb57b6e4f6ef_Traceguids
    0xfffff90b376474e0 : 0xffff970b19c0d7d0 :  dt wdiwifi!CTxMgr
    0xfffff90b376474f8 : 0xfffff8073b6271f1 : wdiwifi!CTxMgr::CompleteNBLs+0x59
    0xfffff90b37647500 : 0xffff970b19c0d7d0 :  dt wdiwifi!CTxMgr
    0xfffff90b37647508 : 0xfffff8073b6c2540 : wdiwifi!WPP_571c4b53a7e93995593833a71eb533d1_Traceguids
    0xfffff90b37647538 : 0xfffff8073b624aaa : wdiwifi!CTxMgr::TxSendCompleteInd+0x6c2
    0xfffff90b37647568 : 0xfffff8073b617653 : wdiwifi!AdapterRxInorderDataInd+0x83
    0xfffff90b37647608 : 0xfffff8073b61746a : wdiwifi!AdapterTxSendCompleteInd+0x1a
    0xfffff90b37647610 : 0xfffff8073b617450 : wdiwifi!AdapterTxSendCompleteInd
    0xfffff90b376476f8 : 0xfffff8072b06b5c4 : nt!MmBuildMdlForNonPagedPool+0x2a4
    0xfffff90b37647708 : 0xfffff80738205be3 : ndis!NdisFreeNetBufferList+0xc3
    0xfffff90b37647718 : 0xfffff8072b02fe5a : nt!ExInterlockedInsertTailList+0x4a
    0xfffff90b376477a8 : 0xfffff8073821fccd : ndis!NdisAllocateMdl+0x3d
    0xfffff90b37647998 : 0xfffff8072b0fcbf0 : nt!PpmCheckSnapAllDeliveredPerformance+0x400
    0xfffff90b376479b8 : 0xfffff8073b552ce8 :  !da "CE_per_engine_service"
    0xfffff90b37647ab8 : 0xfffff8072ba8c9f5 : hal!HalpApicRequestInterrupt+0x95
    0xfffff90b37647b08 : 0xfffff8072b0301ce : nt!KeQueryInterruptTimePrecise+0x5e
    0xfffff90b37647b18 : 0xfffff8072b2afd6f : nt!KiHeteroChooseTargetProcessor+0x83
    0xfffff90b37647b28 : 0xfffff80738206838 : ndis!ndisInterruptDpc+0x188
    0xfffff90b37647b48 : 0xfffff8072ba8c945 : hal!HalSendSoftwareInterrupt+0xa5
    0xfffff90b37647c28 : 0xfffff90b37647e70 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
    0xfffff90b37647c58 : 0xfffff8072b092677 : nt!KiExecuteAllDpcs+0x2e7
    0xfffff90b37647c78 : 0xfffff8072b09eeb1 : nt!KiReadyThread+0x71
    0xfffff90b37647cb0 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
    0xfffff90b37647cc8 : 0xfffff8072b1069a3 : nt!KiTimer2Expiration+0x323
    0xfffff90b37647d38 : 0xfffff90b37647cb0 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
    0xfffff90b37647d98 : 0xfffff8072b091cbe : nt!KiRetireDpcList+0x1ae
    0xfffff90b37647e70 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
    0xfffff90b37647e80 : 0xfffff8072b14fbf0 : nt!PpmCheckRun
    0xfffff90b37647e90 : 0xfffff80737f2f5b0 : storport!RaidpAdapterRedirectDpcRoutine
    0xfffff90b37647ea0 : 0xfffff80737f2f5b0 : storport!RaidpAdapterRedirectDpcRoutine
    0xfffff90b37647eb0 : 0xfffff80737e7d3ac : "iaStorAVC!`anonymous namespace'::dpcRoutine"
    0xfffff90b37647ec0 : 0xfffff80737f2f5b0 : storport!RaidpAdapterRedirectDpcRoutine
    0xfffff90b37647ed0 : 0xfffff8072b1041f0 : nt!PpmCheckPeriodicStart
    0xfffff90b37647ee0 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
    0xfffff90b37647ef0 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
    0xfffff90b37647f00 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
    0xfffff90b37647f10 : 0xfffff807382066b0 : ndis!ndisInterruptDpc
    0xfffff90b37647fa8 : 0xfffff8072b1d3d65 : nt!KxRetireDpcList+0x5
    I do not know how you did it, but for some reason there was a dump from ... your Google Chrome browser
    So update:
    Wi-Fi drivers and killer networking suite (Page not found – Killer Networking | Killernetworking | Killer Control Center or check in SDI Download)
    Google Chrome (check updates in program)
      My Computer


  6. Posts : 9
    Win 10 64bit
    Thread Starter
       #6

    axe0 said:
    Just to let you know, a full memory dump is not necessary. In fact it would be mostly wasted memory/space, because most of what it contains is basically irrelevant for troubleshooting BSOD crashes. A kernel memory dump is the best option, saves a lot of space and has the relevant data and not much more.

    The download is currently running and should be done in ~25 minutes. While waiting, could you provide a new zip created by the V2 or DM Log Collector please.
    Ive switched to Kernel dump :)

    Running the log now. EDIT: done.

    MrPepka said:
    The DRIVER_IRQL_NOT_LESS_OR_EQUAL bug check has a value of 0x000000D1. This indicates that a kernel-mode driver attempted to access pageable memory at a process IRQL that was too high.

    I do not know how you did it, but for some reason there was a dump from ... your Google Chrome browser
    So update:
    Wi-Fi drivers and killer networking suite (Page not found – Killer Networking | Killernetworking | Killer Control Center or check in SDI Download)
    Google Chrome (check updates in program)
    Thanks, i have downloaded the latest suite of drivers from Killers website. Im pretty sure I have the latest drivers sets from the Dell page but they aren't always the greatest at staying up to date im sure...
      My Computer


  7. Posts : 1,538
    Windows 8.1 Enterprise x64
       #7

    Well. As they say to me, "how not charm is a saber". This time, the driver for Intel rapid storage is guilty (iastoravc.sys). So:
    Update Intel rapid storage driver (Download Intel(R) Rapid Storage Technology (Intel(R) RST) User Interface and Driver)
      My Computer


  8. Posts : 9
    Win 10 64bit
    Thread Starter
       #8

    Alritey, thanks! I'm at work now but I'll update asap and get back if I notice any other problems :)
      My Computer


  9. Posts : 14,903
    Windows 10 Pro
       #9

    Please update the Intel Dynamic Platform and Thermal Framework drivers and the Killer network drivers from Dell, as it appears to be a laptop Dell will have drivers that are better suited.
      My Computers


  10. Posts : 9
    Win 10 64bit
    Thread Starter
       #10

    axe0 said:
    Please update the Intel Dynamic Platform and Thermal Framework drivers and the Killer network drivers from Dell, as it appears to be a laptop Dell will have drivers that are better suited.
    I have already updated the Killer drivers from the Killer networking website.

    But i downloaded the latest Dynamic Platform and Thermal Framework drivers from Dell and installed those, as well as the latest Intel Rapid Storage Technology drivers from the Intel website.

    See how things go, thanks for the help so far!
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 08:08.
Find Us




Windows 10 Forums