NETIO.SYS blue screen
Hi, I've a Windows Server 2008 SP2 Enterprise Edition member of a cluster, this node experiences a blue screen shortly after boot, I've inspected the memory.dmp file with windebug and this is the output: <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:1; mso-generic-font-family:roman; mso-font-format:other; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-520092929 1073786111 9 0 415 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; font-size:10.0pt; mso-ansi-font-size:10.0pt; mso-bidi-font-size:10.0pt;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 2.0cm 2.0cm 2.0cm; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> 5: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: 0000000080050031 Arg3: 00000000000006f8 Arg4: fffff80001e87125 Debugging Details: ------------------ BUGCHECK_STR: 0x7f_8 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from fffff80001e651ee to fffff80001e65450 STACK_TEXT: fffffa60`01cbaa68 fffff800`01e651ee : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx fffffa60`01cbaa70 fffff800`01e63a38 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x6e fffffa60`01cbabb0 fffff800`01e87125 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb8 fffffa60`01cd6f70 fffff800`01e8769f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SepMandatoryIntegrityCheck+0x15 fffffa60`01cd7010 fffff800`01e3817b : fffffa80`331e9350 fffffa80`30d567c8 00000000`00000001 00000000`00000000 : nt!SeAccessCheck+0xaf fffffa60`01cd7100 fffffa60`00a0ac6e : 00000000`00000000 fffffa60`00a0b37b fffffa80`331c2de0 fffffa80`331dc010 : nt!SeAccessCheckFromState+0xf3 fffffa60`01cd7800 fffffa60`00a0b447 : 00000000`00000000 00000000`00000001 00000000`00000002 00000000`00001383 : NETIO!MatchValues+0x14e fffffa60`01cd7880 fffffa60`00a0b4fb : fffffa80`31a54220 fffffa80`331d2590 00000000`00000000 fffffa80`31a54220 : NETIO!FilterMatch+0x77 fffffa60`01cd78c0 fffffa60`00a0c4e5 : 00000000`00000000 00000000`00000002 fffffa60`01cd7e30 fffffa60`01cd8270 : NETIO!IndexListClassify+0x4b fffffa60`01cd7920 fffffa60`01278cd7 : 00000000`00000032 fffffa60`01cd7db0 00000000`00000000 fffffa80`32be2e40 : NETIO!KfdClassify+0xa35 fffffa60`01cd7c80 fffffa60`012792fe : fffffa60`01cd8790 00000000`00000003 fffffa60`0132bbc2 fffffa80`30c79320 : tcpip!WfpAleClassify+0x47 fffffa60`01cd7cc0 fffffa60`012799dc : 00000000`00000001 00000000`00000000 fffffa80`32b90080 fffffa80`30c79320 : tcpip!WfpAlepAuthorizeSend+0x5ce fffffa60`01cd8190 fffffa60`01278987 : 00000000`00000000 00000000`00000000 00000000`0000003a 00000000`00000000 : tcpip!WfpAleAuthorizeSend+0x2ac fffffa60`01cd83d0 fffffa60`012706f8 : 00000000`00000000 00000000`0000003a fffffa80`32be2e40 00000000`00000000 : tcpip!WfpAleConnectAcceptIndicate+0xd7 fffffa60`01cd84c0 fffffa60`012716ae : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!ProcessALEForTransportPacket+0x538 fffffa60`01cd8680 fffffa60`01273574 : 00000000`00000000 fffffa60`011d292d fffffa80`32150087 fffffa80`32b90000 : tcpip!WfpProcessOutTransportStackIndication+0x30e fffffa60`01cd8930 fffffa60`0127a826 : fffffa80`32be2e40 fffffa60`01221afa 00000000`00000000 fffffa80`32b87970 : tcpip!IppSendDatagramsCommon+0x494 fffffa60`01cd8d50 fffffa60`01221790 : 00000000`00000002 fffffa80`32b90080 fffffa80`32b90000 00000000`00000000 : tcpip!IppSendDatagrams+0x26 fffffa60`01cd8d90 fffffa60`01309b50 : 00000000`00000001 fffffa80`32b88d30 00000000`00000000 fffffa80`32b90080 : tcpip!IppSendDirect+0x110 fffffa60`01cd8ec0 fffffa60`0124d9fc : fffffa80`32b88d30 fffffa80`32b90080 fffffa80`32a46620 fffffa80`32b87870 : tcpip!Ipv6pSendNeighborSolicitation+0x130 fffffa60`01cd8f70 fffffa60`0124cf1c : fffffa80`32a46620 00060000`0d000000 00000000`00000000 00000000`00000000 : tcpip!IppSendNeighborSolicitation+0x8c fffffa60`01cd8fe0 fffffa60`01270e25 : 00000000`00000000 fffffa80`32a46620 00000000`00000000 fffffa60`01cd9500 : tcpip!IppResolveNeighbor+0x1ec fffffa60`01cd9040 fffffa60`012743f8 : 00000000`00000000 fffffa80`333779b0 00000000`00000001 fffffa60`01267165 : tcpip!IppDispatchSendPacketHelper+0x575 fffffa60`01cd9140 fffffa60`0127385a : 00000000`00000000 fffffa60`00000006 fffffa80`00000028 fffffa80`00000000 : tcpip!IppPacketizeDatagrams+0x2e8 fffffa60`01cd9270 fffffa60`0125b32e : fffffa60`01cd9b50 fffffa60`0126b82d 00000000`00000000 fffffa60`01cd9950 : tcpip!IppSendDatagramsCommon+0x77b fffffa60`01cd9690 fffffa60`01323975 : 00000000`00000000 fffffa60`012651f2 00000000`00000020 fffffa80`0000000e : tcpip!IpNlpSendDatagrams+0x3e fffffa60`01cd96d0 fffffa60`012b6afb : fffffa60`013453e8 fffffa80`32ab15f0 fffffa80`32ab1738 00000000`00000000 : tcpip!IppSlowSendDatagram+0x45 fffffa60`01cd97d0 fffffa60`0126c1f8 : fffffa80`32ab15f0 fffffa80`32b1b901 00000000`00000000 fffffa80`333778b0 : tcpip! ?? ::FNODOBFM::`string'+0x3e89b fffffa60`01cd9b10 fffffa60`0127b8ab : fffffa80`32ab15f0 00000000`00000f0d 00000000`00000005 fffffa60`01260000 : tcpip!TcpTcbHeaderSend+0x428 fffffa60`01cd9ca0 fffffa60`01253aed : fffffa80`30cd0f00 fffffa80`00000005 fffffa60`01cd9ef0 fffffa80`30d3c270 : tcpip!TcpFlushDelay+0x20b fffffa60`01cd9d60 fffffa60`01253b99 : 00000000`00000000 fffffa80`33224ab0 00000000`00000000 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4d fffffa60`01cd9e20 fffffa60`012531bb : fffffa60`013466d0 fffffa80`32b90080 00000000`00000000 fffffa60`01cd9ee0 : tcpip!IppProcessDeliverList+0x59 fffffa60`01cd9e90 fffffa60`0125250c : 00000000`00000030 fffffa80`30d3c270 fffffa80`32b90080 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x22b fffffa60`01cd9f80 fffffa60`01251af4 : fffffa80`32b88d30 00000000`00000000 fffffa80`32b85601 fffffa80`00000001 : tcpip!IpFlcReceivePackets+0x8dc fffffa60`01cda180 fffffa60`01261d03 : fffffa80`32b85610 fffffa60`01cda2b8 fffffa80`32b85610 fffffa60`00970001 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x264 fffffa60`01cda260 fffffa60`009a90bc : fffffa80`32b86010 fffffa80`339f1d30 fffffa60`01cda400 fffffa80`313071a0 : tcpip!FlReceiveNetBufferListChain+0xd3 fffffa60`01cda2b0 fffffa60`009718c9 : fffffa60`01cda410 00000000`00000000 fffffa80`32a0f010 00000000`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0xac fffffa60`01cda300 fffffa60`0080e5c4 : fffffa80`313071a0 fffffa60`01cda898 00000000`00000001 00000000`00000001 : NDIS!ndisMDispatchReceiveNetBufferLists+0x1d9 fffffa60`01cda780 fffffa60`009a98a6 : fffffa60`00000001 fffffa60`00000103 fffffa80`339f1d30 fffffa60`01cda8a0 : NDIS!ndisMTopReceiveNetBufferLists+0x24 fffffa60`01cda7c0 fffffa60`04c69905 : fffffa80`33782ac0 fffffa80`33a2c830 00000000`00000001 00000000`0000006a : NDIS!ndisMIndicatePacketsToNetBufferLists+0x106 fffffa60`01cda860 fffffa60`04c6f99f : fffffa80`32a10520 fffffa80`33a2c830 fffffa80`32a10520 fffffa80`338bfb10 : netft!MaReceivePacket+0x65 fffffa60`01cda890 fffffa60`04c707aa : 00000000`00000000 00000000`00000000 fffffa80`33911938 00000000`00000001 : netft!TaReceivePacket+0x143 fffffa60`01cda8d0 fffffa60`053490a8 : 00000000`00000000 fffffa80`33988530 fffffa80`33988501 00000000`00000001 : netft!NetftReceiveDatagramHandler+0x106 fffffa60`01cda910 fffffa60`01243ee4 : fffffa80`33826800 fffffa80`32d72620 fffffa80`32d72470 fffffa80`32d72620 : afd!WskProTLEVENTReceiveMessages+0xb8 fffffa60`01cda970 fffffa60`012439fb : fffffa80`30d30000 fffffa80`338268e0 fffffa60`00000000 fffffa80`32282aac : tcpip!UdpDeliverDatagrams+0x164 fffffa60`01cdaad0 fffffa60`01253aed : fffffa80`32a2b080 fffffa60`00a070c2 00000001`32a10002 fffffa80`30d3be80 : tcpip!UdpReceiveDatagrams+0x1bb fffffa60`01cdaba0 fffffa60`01253b99 : 00000000`00000000 fffffa80`32a12680 00000000`00000000 fffffa60`00971abd : tcpip!IppDeliverListToProtocol+0x4d fffffa60`01cdac60 fffffa60`012531bb : fffffa60`0134c050 fffffa60`0134c050 00000000`00000011 fffffa60`01cdad20 : tcpip!IppProcessDeliverList+0x59 fffffa60`01cdacd0 fffffa60`0125250c : fffffa80`30d02a80 00000000`00000020 fffffa80`32a2b080 fffffa80`30d3c000 : tcpip!IppReceiveHeaderBatch+0x22b fffffa60`01cdadc0 fffffa60`01251af4 : fffffa80`32940420 00000000`00000000 fffffa80`32a12601 fffffa80`00000002 : tcpip!IpFlcReceivePackets+0x8dc fffffa60`01cdafc0 fffffa60`01261d03 : fffffa80`32a12680 fffffa60`01cdb0f8 fffffa80`32a12680 fffffa60`00970000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x264 fffffa60`01cdb0a0 fffffa60`009a90bc : fffffa80`32a17aa0 fffffa80`32b11490 fffffa60`01cdb200 fffffa80`313bf1a0 : tcpip!FlReceiveNetBufferListChain+0xd3 fffffa60`01cdb0f0 fffffa60`009718c9 : fffffa60`01cdb250 00000000`00000000 fffffa80`32a12a50 00000000`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0xac fffffa60`01cdb140 fffffa60`008066f7 : fffffa80`313bf1a0 00000000`00000002 fffffa60`01cdb760 fffffa60`05205ce7 : NDIS!ndisMDispatchReceiveNetBufferLists+0x1d9 fffffa60`01cdb5c0 fffffa60`0520456b : fffffa60`00000000 00000000`00000000 fffffa60`01cdb648 00000000`00000000 : NDIS!NdisMIndicateReceiveNetBufferLists+0x67 fffffa60`01cdb600 fffffa60`052069c0 : 00000000`00000000 00000000`0000ffff fffffa60`00000000 fffffa60`00000001 : vmswitch!VmsMpNicPvtPacketForward+0x27b fffffa60`01cdb6a0 fffffa60`0520499b : 00000000`00000000 fffffa60`01cdb900 fffffa80`336abbc0 fffffa60`01cdb910 : vmswitch!VmsRouterPvtRoutePackets+0x200 fffffa60`01cdb8a0 fffffa60`009a90bc : 00000000`00000002 fffffa60`01cdcc60 fffffa80`31562600 fffff800`01e92304 : vmswitch!VmsPtNicReceiveNetBufferLists+0x27b fffffa60`01cdbae0 fffffa60`00971a5c : fffffa80`31562670 00000000`00000000 fffffa80`328c3a50 00000000`00000000 : NDIS!ndisMIndicateNetBufferListsToOpen+0xac fffffa60`01cdbb30 fffffa60`008066f7 : fffffa80`312d11a0 fffffa80`336abbc0 fffffa80`00000000 fffffa80`32189000 : NDIS!ndisMDispatchReceiveNetBufferLists+0x36c fffffa60`01cdbfb0 fffffa60`050e1750 : fffffa80`336abbc0 fffffa80`32189000 fffffa80`3386c03f 00000000`00000000 : NDIS!NdisMIndicateReceiveNetBufferLists+0x67 fffffa60`01cdbff0 fffffa60`050e1368 : 00000000`00000000 fffffa80`32194b08 fffffa80`3386c000 fffffa60`00000000 : basp+0x11750 fffffa60`01cdc570 fffffa60`009a90bc : fffffa80`3270ea00 fffffa80`3129a1a0 fffffa80`32b11490 fffffa80`3270eaa0 : basp+0x11368 fffffa60`01cdc5c0 fffffa60`00971a5c : fffffa80`3270eaa0 00000000`00000000 fffffa80`3258b4a0 00000000`00000000 : NDIS!ndisMIndicateNetBufferListsToOpen+0xac fffffa60`01cdc610 fffffa60`008066f7 : fffffa80`3129a1a0 fffffa60`011da0cf fffffa60`01cdcbc0 fffffa80`30a90300 : NDIS!ndisMDispatchReceiveNetBufferLists+0x36c fffffa60`01cdca90 fffffa60`011da3a8 : 00000000`00000000 fffffa80`32b11490 fffffa80`32157010 fffff800`01e5dc7f : NDIS!NdisMIndicateReceiveNetBufferLists+0x67 fffffa60`01cdcad0 fffffa60`011da451 : fffffa80`32157010 00000000`00000000 fffffa80`32157458 fffffa60`01cdcb90 : bxnd60a+0xb3a8 fffffa60`01cdcb20 fffffa60`0101059b : fffffa80`30acb010 fffffa80`32159000 00000000`00000000 00000000`00000000 : bxnd60a+0xb451 fffffa60`01cdcb70 fffffa60`01010826 : fffffa80`30acb010 fffffa60`01cdcc88 fffffa80`30c93d58 fffffa60`01283ba3 : bxvbda+0x659b fffffa60`01cdcbd0 fffffa60`01016778 : fffffa80`30acb648 00000000`00000000 fffffa80`30ace698 00000000`00000005 : bxvbda+0x6826 fffffa60`01cdcc50 fffffa60`01016b49 : fffffa80`30acb010 00000000`00010000 00000000`00010000 fffffa80`30c93c28 : bxvbda+0xc778 fffffa60`01cdccb0 fffffa60`01016d63 : fffffa80`30acb010 00000000`00000000 00000000`00000000 00000001`23d6b39a : bxvbda+0xcb49 fffffa60`01cdcce0 fffff800`01e69667 : fffffa80`30acea58 fffffa60`01cb8580 00000000`01cafdb4 fffffa80`30c93c28 : bxvbda+0xcd63 fffffa60`01cdcd10 fffff800`01e698e2 : fffffa60`01016cb4 fffffa60`01cb5180 00000000`00000000 fffffa60`01cbed40 : nt!KiRetireDpcList+0x117 fffffa60`01cdcd80 fffff800`02036860 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62 STACK_COMMAND: kb FOLLOWUP_IP: NETIO!MatchValues+14e fffffa60`00a0ac6e 84c0 test al,al SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: NETIO!MatchValues+14e FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 49e02e06 FAILURE_BUCKET_ID: X64_0x7f_8_NETIO!MatchValues+14e BUCKET_ID: X64_0x7f_8_NETIO!MatchValues+14e Followup: MachineOwner --------- any ideas?
June 1st, 2010 3:24pm

I've analyzed the memory.dmp on my laptop that has Windows 7 x86, maybe the answer to your qustions?
Free Windows Admin Tool Kit Click here and download it now
June 1st, 2010 5:19pm

Hello, I have the same problem with the netio.sys. I have a win2008 sbs server with SP2 and had 4 Bluescreens in 2 months. This is my crash dump: 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffffa60010833b4, address which referenced memory Debugging Details: ------------------ USER_LCID_STR: DEU OS_SKU: 9 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c88080 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: tcpip! ?? ::FNODOBFM::`string'+5824 fffffa60`010833b4 488b01 mov rax,qword ptr [rcx] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff80002b41550 -- (.trap 0xfffff80002b41550) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa800caa8010 rbx=0000000000000000 rcx=0000000000000000 rdx=fffffa800caa8011 rsi=0000000000000000 rdi=0000000000000000 rip=fffffa60010833b4 rsp=fffff80002b416e0 rbp=fffffa800647f870 r8=fffffa800caa8010 r9=00000000013430a0 r10=fffff80001bd5580 r11=fffffa8006250340 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc tcpip! ?? ::FNODOBFM::`string'+0x5824: fffffa60`010833b4 488b01 mov rax,qword ptr [rcx] ds:5870:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80001abb22e to fffff80001abb490 STACK_TEXT: fffff800`02b41408 fffff800`01abb22e : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`02b41410 fffff800`01aba10b : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`0647f870 : nt!KiBugCheckDispatch+0x6e fffff800`02b41550 fffffa60`010833b4 : fffffa80`066539e0 00000000`00000001 fffffa80`06495870 fffffa60`206c644d : nt!KiPageFault+0x20b fffff800`02b416e0 fffffa60`00a10f18 : fffffa80`0647f870 00000000`01147050 00000000`00000000 fffff800`01a2b151 : tcpip! ?? ::FNODOBFM::`string'+0x5824 fffff800`02b41730 fffffa60`00a0ea3d : 00000000`00000000 00000000`00000000 fffffa80`06c727d0 00000000`00000002 : NETIO!NetioDereferenceNetBufferList+0x78 fffff800`02b41760 fffffa60`0103ed96 : fffff800`02b41850 fffffa80`0b6a1d00 00000000`00000000 00000000`00000001 : NETIO!NetioDereferenceNetBufferListChain+0x28d fffff800`02b41820 fffffa60`01029824 : fffffa80`06c727d0 fffffa80`0c551c30 fffffa80`05bd6010 fffffa80`05bd44e0 : tcpip!IppCompleteAndFreePacketList+0xb6 fffff800`02b41850 fffffa60`01031c70 : 00000000`00000000 fffffa80`05bd6010 fffffa80`05bd44e0 fffffa60`01147050 : tcpip!IppCleanupMfe+0x44 fffff800`02b41880 fffffa60`010772bd : fffffa80`05bd44e0 fffffa60`0114b558 fffff800`02b41928 fffffa80`05bd6010 : tcpip!IppDereferenceMfe+0x20 fffff800`02b418b0 fffffa60`0107713a : fffff800`02b41ad8 00000000`00000000 fffffa80`05bd6028 fffff800`02b41ad8 : tcpip!IppMfeSetTimeOut+0x10d fffff800`02b419d0 fffffa60`010773ea : fffffa80`0a72c500 fffff800`02b41ad8 00000000`00000000 fffff800`02b41cd0 : tcpip!IppCompartmentSetTimeout+0x9a fffff800`02b41a40 fffff800`01abf3fd : fffff800`00000002 fffff800`01bd4e80 fffff800`01bd4cf0 00000000`00000002 : tcpip!IppTimeout+0x5a fffff800`02b41a70 fffff800`01abe818 : fffff800`02b41cd0 fffffa60`02e6a702 fffff800`02b41cc8 00000000`00000001 : nt!KiTimerListExpire+0x30d fffff800`02b41ca0 fffff800`01abefaf : 002555b1`b0642875 00000000`00000000 00000000`00000001 fffff800`01bd7a80 : nt!KiTimerExpiration+0x1d8 fffff800`02b41d10 fffff800`01abf8d2 : fffff800`01bd4680 fffff800`01bd4680 00000000`00000000 fffff800`01bd9b80 : nt!KiRetireDpcList+0x1df fffff800`02b41d80 fffff800`01c8c860 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62 fffff800`02b41db0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4 STACK_COMMAND: kb FOLLOWUP_IP: NETIO!NetioDereferenceNetBufferList+78 fffffa60`00a10f18 4885ff test rdi,rdi SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+78 FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 49e02e06 FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+78 BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+78 Followup: MachineOwner --------- What shall I do? Thanx for your help. Regards, lukas
July 5th, 2011 11:07am

Hello, it seems that my post from yesterday wasn't saved correctly. So I try it once again. I have a SBS 2008 SP2 Server an the KB Stop error message in Windows Server 2008, in Windows Vista, or in Windows Vista SP1: "0x000000D1" doesn't fit for me because of SP2. This is the output of my crash dump: 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffffa60010833b4, address which referenced memory Debugging Details: ------------------ USER_LCID_STR: DEU OS_SKU: 9 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c88080 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: tcpip! ?? ::FNODOBFM::`string'+5824 fffffa60`010833b4 488b01 mov rax,qword ptr [rcx] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMP BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff80002b41550 -- (.trap 0xfffff80002b41550) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa800caa8010 rbx=0000000000000000 rcx=0000000000000000 rdx=fffffa800caa8011 rsi=0000000000000000 rdi=0000000000000000 rip=fffffa60010833b4 rsp=fffff80002b416e0 rbp=fffffa800647f870 r8=fffffa800caa8010 r9=00000000013430a0 r10=fffff80001bd5580 r11=fffffa8006250340 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc tcpip! ?? ::FNODOBFM::`string'+0x5824: fffffa60`010833b4 488b01 mov rax,qword ptr [rcx] ds:5870:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80001abb22e to fffff80001abb490 STACK_TEXT: fffff800`02b41408 fffff800`01abb22e : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff800`02b41410 fffff800`01aba10b : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`0647f870 : nt!KiBugCheckDispatch+0x6e fffff800`02b41550 fffffa60`010833b4 : fffffa80`066539e0 00000000`00000001 fffffa80`06495870 fffffa60`206c644d : nt!KiPageFault+0x20b fffff800`02b416e0 fffffa60`00a10f18 : fffffa80`0647f870 00000000`01147050 00000000`00000000 fffff800`01a2b151 : tcpip! ?? ::FNODOBFM::`string'+0x5824 fffff800`02b41730 fffffa60`00a0ea3d : 00000000`00000000 00000000`00000000 fffffa80`06c727d0 00000000`00000002 : NETIO!NetioDereferenceNetBufferList+0x78 fffff800`02b41760 fffffa60`0103ed96 : fffff800`02b41850 fffffa80`0b6a1d00 00000000`00000000 00000000`00000001 : NETIO!NetioDereferenceNetBufferListChain+0x28d fffff800`02b41820 fffffa60`01029824 : fffffa80`06c727d0 fffffa80`0c551c30 fffffa80`05bd6010 fffffa80`05bd44e0 : tcpip!IppCompleteAndFreePacketList+0xb6 fffff800`02b41850 fffffa60`01031c70 : 00000000`00000000 fffffa80`05bd6010 fffffa80`05bd44e0 fffffa60`01147050 : tcpip!IppCleanupMfe+0x44 fffff800`02b41880 fffffa60`010772bd : fffffa80`05bd44e0 fffffa60`0114b558 fffff800`02b41928 fffffa80`05bd6010 : tcpip!IppDereferenceMfe+0x20 fffff800`02b418b0 fffffa60`0107713a : fffff800`02b41ad8 00000000`00000000 fffffa80`05bd6028 fffff800`02b41ad8 : tcpip!IppMfeSetTimeOut+0x10d fffff800`02b419d0 fffffa60`010773ea : fffffa80`0a72c500 fffff800`02b41ad8 00000000`00000000 fffff800`02b41cd0 : tcpip!IppCompartmentSetTimeout+0x9a fffff800`02b41a40 fffff800`01abf3fd : fffff800`00000002 fffff800`01bd4e80 fffff800`01bd4cf0 00000000`00000002 : tcpip!IppTimeout+0x5a fffff800`02b41a70 fffff800`01abe818 : fffff800`02b41cd0 fffffa60`02e6a702 fffff800`02b41cc8 00000000`00000001 : nt!KiTimerListExpire+0x30d fffff800`02b41ca0 fffff800`01abefaf : 002555b1`b0642875 00000000`00000000 00000000`00000001 fffff800`01bd7a80 : nt!KiTimerExpiration+0x1d8 fffff800`02b41d10 fffff800`01abf8d2 : fffff800`01bd4680 fffff800`01bd4680 00000000`00000000 fffff800`01bd9b80 : nt!KiRetireDpcList+0x1df fffff800`02b41d80 fffff800`01c8c860 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x62 fffff800`02b41db0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!zzz_AsmCodeRange_End+0x4 STACK_COMMAND: kb FOLLOWUP_IP: NETIO!NetioDereferenceNetBufferList+78 fffffa60`00a10f18 4885ff test rdi,rdi SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: NETIO!NetioDereferenceNetBufferList+78 FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 49e02e06 FAILURE_BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+78 BUCKET_ID: X64_0xD1_NETIO!NetioDereferenceNetBufferList+78 Followup: MachineOwner --------- Any idea what this NetioDereferenceNetBufferList+78 means? Thanx for your help. Regards lukas
Free Windows Admin Tool Kit Click here and download it now
July 6th, 2011 5:12am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics