AdguardTeam / AdguardForWindows

AdGuard for Windows open bug tracker
https://adguard.com/
693 stars 72 forks source link

NETIO.SYS BSOD 0x000000d1 when playing content on cda.pl #3523

Closed FadeMind closed 4 years ago

FadeMind commented 4 years ago

I wannna know what exactly part of software create this annoying BSOD during watching movies on cda.pl site.

What? BSOD: 0x000000d1 DRIVER_IRQL_NOT_LESS_OR_EQUAL When? Watching movie on cda.pl Where? Edge Chromium or self Chrome in the past.

Chromium report is here https://bugs.chromium.org/p/chromium/issues/detail?id=1123287

Edge Chromium 85.0.564.41 X64 Windows 10 Pro 2004 20H1 10.0.19041.487 X64 ESET IS 13.2.18.0 Adguard For Windows WFP mode 7.5.1 Stable IDM 6.38b2

@ameshkov @TheHasagi see this too https://www.tenforums.com/bsod-crashes-debugging/93179-netio-sys-bsod-while-using-chrome-bugcheck-0x0000003b.html

ameshkov commented 4 years ago

It definitely has nothing to do with Chrome.

ameshkov commented 4 years ago

Removed the memory dump link, it's unsafe to share full dumps in public (only the minidumps)

zzebrum commented 4 years ago

@FadeMind there is nothing about AdGuard driver in the dump.

Debugging Details:
------------------

Page 458337 not present in the dump file. Type ".hh dbgerr004" for details

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 6

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on ADGUARDIO5C57

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 38

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

BUGCHECK_CODE:  d1

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802200ad744

READ_ADDRESS:  0000000000000008 

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8b0f4a21cb90 -- (.trap 0xffff8b0f4a21cb90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8b0f4a21ce98
rdx=ffffe18f79e264b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802200ad744 rsp=ffff8b0f4a21cd20 rbp=ffff8b0f4a21cd99
 r8=ffffe18f79e264b0  r9=0000000000000b20 r10=ffffe18f80368a70
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c:
fffff802`200ad744 488b4808        mov     rcx,qword ptr [rax+8] ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT:  
ffff8b0f`4a21ca48 fffff802`1c605e29 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8b0f`4a21ca50 fffff802`1c602129 : ffffe18f`6b977040 ffff8b0f`4a21ce60 ffff8b0f`4a21ccd0 00000000`0000b401 : nt!KiBugCheckDispatch+0x69
ffff8b0f`4a21cb90 fffff802`200ad744 : ffffe18f`79e264b0 ffff8b0f`4a21cd99 ffff8b0f`4a21ce60 ffffe18f`79e264b0 : nt!KiPageFault+0x469
ffff8b0f`4a21cd20 fffff802`200ad458 : ffff8b0f`4a21d180 ffffe18f`79e264b0 00000000`00000000 ffffe18f`79e264b0 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c
ffff8b0f`4a21cdf0 fffff802`200acad6 : ffffe18f`6b600014 fffff802`2cb031b0 00000000`00000000 ffff8b0f`4a21d7f0 : NETIO!StreamProcessCallout+0x3fc
ffff8b0f`4a21cf20 fffff802`200a953b : 00000000`00000014 ffff8b0f`4a21d7f0 ffff8b0f`4a21d820 ffff8b0f`4a21d6a0 : NETIO!ProcessCallout+0x706
ffff8b0f`4a21d0a0 fffff802`200a80da : ffffe18f`7e44e020 ffffe18f`6b333960 00000000`00000000 00000001`00000090 : NETIO!ArbitrateAndEnforce+0x71b
ffff8b0f`4a21d200 fffff802`200a77eb : 00000db7`65e74700 00000000`00000000 ffff8b0f`4a21d640 ffffe18f`7948b040 : NETIO!KfdClassify+0x37a
ffff8b0f`4a21d5f0 fffff802`200a740a : 00000000`00000748 00000000`0000006c 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x28b
ffff8b0f`4a21d790 fffff802`200a6d1d : 00000000`8ad5bb01 ffffe18f`00000000 fffff802`200a26d0 00000000`00000000 : NETIO!StreamCommonInspect+0x282
ffff8b0f`4a21db70 fffff802`201e5a74 : ffffe18f`7a908900 ffffe18f`79b1a400 ffffe18f`79c99340 ffffe18f`79b1a4e0 : NETIO!WfpStreamInspectReceive+0x18d
ffff8b0f`4a21dc00 fffff802`201e422f : ffffe18f`79b1a4e0 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTcbFastDatagram+0x15b4
ffff8b0f`4a21ddf0 fffff802`201e3844 : ffffe18f`6ba28000 ffffe18f`6ba28780 00000000`00001002 ffffe18f`6b98cc60 : tcpip!TcpTcbReceive+0x18f
ffff8b0f`4a21e040 fffff802`201e2be8 : ffffad81`ecb19f30 00000000`00000014 ffffad81`eb877d30 fffff802`2037a598 : tcpip!TcpMatchReceive+0x204
ffff8b0f`4a21e2f0 fffff802`2018e392 : ffffe18f`6b39b370 00000000`0000bb01 00000000`00000000 ffffe18f`6ba28701 : tcpip!TcpReceive+0x358
ffff8b0f`4a21e3e0 fffff802`201de541 : ffffe18f`7a906930 00000000`00000000 00000000`76090000 ffffe18f`6b0fc4c0 : tcpip!TcpNlClientReceiveDatagrams+0x22
ffff8b0f`4a21e420 fffff802`201dec7b : 00000000`0000000a 00000000`00000250 00000000`00000000 ffffe18f`6ba28000 : tcpip!IppProcessDeliverList+0xc1
ffff8b0f`4a21e500 fffff802`201db2ff : fffff802`2037a230 ffffe18f`6ba688e0 ffffe18f`6ba28000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x21b
ffff8b0f`4a21e600 fffff802`201dafbc : ffffe18f`760f1800 ffffe18f`7d6b9070 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f
ffff8b0f`4a21e720 fffff802`201fa480 : ffffe18f`7a906930 00000000`00000000 ffff8b0f`4a21e7f1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc
ffff8b0f`4a21e750 fffff802`201f9a7c : 00000000`00000001 ffffe18f`72ea7600 fffff802`20183780 ffff8b0f`4a21eb2c : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x270
ffff8b0f`4a21e850 fffff802`1c4b8908 : ffffe18f`6ba7b4e0 00000000`00000002 ffffe18f`6b977040 ffff8b0f`4a21eb48 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c
ffff8b0f`4a21e9a0 fffff802`1c4b887d : fffff802`201f9900 ffff8b0f`4a21eb48 ffffe18f`6b3169c0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8b0f`4a21ea10 fffff802`2018331d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff8b0f`4a21ea50 fffff802`201829fd : 00000000`00000001 ffff8b0f`4a21ebb0 ffffe18f`72ea7620 ffffad81`eb877d14 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffff8b0f`4a21eab0 fffff802`1ff31eb1 : 00000000`00000001 ffffe18f`75f88e51 00000000`00000020 00000000`00000001 : tcpip!FlReceiveNetBufferListChain+0x46d
ffff8b0f`4a21ed60 fffff802`1ff31ccb : ffffe18f`76249a20 00000000`00000001 ffff8b0f`00000000 ffff8b0f`00000007 : ndis!ndisMIndicateNetBufferListsToOpen+0x141
ffff8b0f`4a21ee40 fffff802`1ff37ef1 : ffffe18f`729a81a0 ffffe18f`7d6b9001 ffffe18f`729a81a0 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffff8b0f`4a21eec0 fffff802`1ff6dcf3 : ffffe18f`7d6b9070 ffff8b0f`4a21ef91 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x61
ffff8b0f`4a21ef10 fffff802`1ff34a94 : 00000000`000954ac 00000000`00000001 ffffe18f`729a81a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffff8b0f`4a21efe0 fffff802`30a21f88 : fffff802`30888ef0 ffffe18f`72266010 ffff8b0f`4a21f0d0 ffffe18f`7f024da0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffff8b0f`4a21f070 fffff802`309e7167 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : wdiwifi!CPort::IndicateFrames+0x2d8
ffff8b0f`4a21f110 fffff802`309cbb67 : ffffe18f`7f024da0 ffff8b0f`4a21f239 ffffe18f`71dfabb0 00000000`00000000 : wdiwifi!CAdapter::IndicateFrames+0x137
ffff8b0f`4a21f180 fffff802`309cc2a6 : ffffe18f`71dfabb0 ffffe18f`70517490 ffffe18f`71dfabb0 00000000`00000003 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x7f7
ffff8b0f`4a21f2a0 fffff802`309c8142 : ffffe18f`7f024da0 ffffe18f`71fea628 ffffe18f`71e8e050 fffff802`30823b3c : wdiwifi!CRxMgr::RxInOrderDataInd+0x35a
ffff8b0f`4a21f340 fffff802`30823ed5 : ffffe18f`71fea080 ffffe18f`71fea660 ffffe18f`7209dbc0 fffff802`309c86dd : wdiwifi!AdapterRxInorderDataInd+0x92
ffff8b0f`4a21f390 fffff802`30823258 : ffffe18f`00000001 ffffe18f`7209dbc0 ffffe18f`6be820e8 ffffe18f`704e63b0 : Qcamain10x64+0x103ed5
ffff8b0f`4a21f410 fffff802`30818131 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`30861500 : Qcamain10x64+0x103258
ffff8b0f`4a21f480 fffff802`308184f6 : ffffe18f`72846e80 ffffe18f`71cb1a70 ffffe18f`00000000 ffff8b0f`4a21f530 : Qcamain10x64+0xf8131
ffff8b0f`4a21f500 fffff802`30860b75 : ffffe18f`70517490 ffffad81`eb9a4608 ffffe18f`704e9bc0 00000000`00000400 : Qcamain10x64+0xf84f6
ffff8b0f`4a21f570 fffff802`3087d4db : ffff8b0f`4a21f688 00000000`00000001 ffffe18f`71f1c130 ffffe18f`71f1c040 : Qcamain10x64+0x140b75
ffff8b0f`4a21f5f0 fffff802`3087dc9e : ffffe18f`71f51840 ffffe18f`7796b940 ffffe18f`6be45c60 fffff802`308531f3 : Qcamain10x64+0x15d4db
ffff8b0f`4a21f630 fffff802`30852d9e : ffffe18f`6be45a70 ffffe18f`6be40040 ffffe18f`6be45a70 ffff8b0f`00000000 : Qcamain10x64+0x15dc9e
ffff8b0f`4a21f6e0 fffff802`30852622 : ffffe18f`6be45a70 ffff8b0f`4a21f788 ffffe18f`6be45a98 ffffe18f`71f83e10 : Qcamain10x64+0x132d9e
ffff8b0f`4a21f730 fffff802`30859e65 : ffffe18f`71e52530 ffffe18f`6be45b28 ffffe18f`704e9bc0 ffff8b0f`8904c600 : Qcamain10x64+0x132622
ffff8b0f`4a21f7d0 fffff802`30842a07 : ffffe18f`00000048 ffffe18f`00003fff 00000000`8904c600 ffff8b0f`4a21f930 : Qcamain10x64+0x139e65
ffff8b0f`4a21f880 fffff802`308428e3 : ffffe18f`6be82040 00000000`00000000 ffffe18f`729a81a0 00000000`00000000 : Qcamain10x64+0x122a07
ffff8b0f`4a21f8c0 fffff802`1ff96449 : 00000000`00000000 ffff8b0f`00000000 00000000`00000000 ffffe18f`6b977180 : Qcamain10x64+0x1228e3
ffff8b0f`4a21f910 fffff802`1ff9693c : ffffe18f`71da7968 00000000`0000000a 00000000`00000001 00000000`00000000 : ndis!ndisMiniportDpc+0xf1
ffff8b0f`4a21f9a0 fffff802`1ff874c2 : ffffe18f`6b7addf0 ffffe18f`6b7addf0 ffff8b0f`4a21faa9 fffff802`1ff66e00 : ndis!ndisQueuedMiniportDpcWorkItem+0x11c
ffff8b0f`4a21fa40 fffff802`1c466dd5 : ffffe18f`6b977040 ffffe18f`6b977040 fffff802`1ff66eb0 00000000`00000000 : ndis!ndisReceiveWorkerThread+0x20612
ffff8b0f`4a21fb10 fffff802`1c5fb4f8 : ffffad81`ea920180 ffffe18f`6b977040 fffff802`1c466d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8b0f`4a21fb60 00000000`00000000 : ffff8b0f`4a220000 ffff8b0f`4a219000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME:  NETIO!StreamInvokeCalloutAndNormalizeAction+5c

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  5c

FAILURE_BUCKET_ID:  AV_NETIO!StreamInvokeCalloutAndNormalizeAction

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04}

Followup:     MachineOwner
---------
FadeMind commented 4 years ago

@zzebrum glad to hear that <3 I will contact ESET guys too. Thank you for your time.

ameshkov commented 4 years ago

The driver that's responsible seems to be Qcamain10x64, not sure what software it belongs to

FadeMind commented 4 years ago

@ameshkov aaaand now is clear for me that.

This is upstream old issue with Qualcomm Atheros WLAN Driver. I just now installed lastest blob from MS Catalog: 12.0.0.954 and will test this mess.

Qualcomm Atheros QCA9377 Wireless Network Adapter here.

See: https://www.google.com/search?q=Qcamain10x64+bsod+windows+10 Seems like driver cannot handle some packets and in end freak out here.

Devs release often new driver blob directly in Windows Catalog Lastest is here: https://www.catalog.update.microsoft.com/Search.aspx?q=12.0.0.954

Thanks so much for feedback. <3

20200831-1598898228-001