Windows 7 BSOD NETIO.sys
Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7600.2.0.0.256.1
Locale ID: 3081
Additional information about the problem:
BCCode: d1
BCP1: 00000003
BCP2: 00000002
BCP3: 00000000
BCP4: 89BC9543
OS Version: 6_1_7600
Service Pack: 0_0
Product: 256_1
Files that help describe the problem:
C:\Windows\Minidump\080410-18328-01.dmp
C:\Users\Longman\AppData\Local\Temp\WER-37687-0.sysdata.xml
dmp file here:
http://www.megaupload.com/?d=LCRV8TPG
this has only happened once but i have recreated the same scenario many times now but nothing has happened, still i would like to know what caused it. the most i know it was netio.sys.
help would be very much appreciated
August 3rd, 2010 8:18pm
In the future, I'd recommend posting to Skydrive
(http://cid-8f63f3f375a57b50.office.live.com/self.aspx/.Public/PublicFile.txt).
That way, people will not need to wait to download the files.
This error typically occurs with drivers that are out of date, but is
also known to be caused by Antivirus software. I would recommend
ensuring that all of the drivers/BIOS/firmware are up to the latest
versions, particularly concentrating on anything network/chipset
related. In addition, you may want to try disabling Antivirus
temporarily to see if the error recurs. If the problem seems to be tied
to the A/V software, then you can uninstall the software and install MSE
(it is free and it works),
http://www.microsoft.com/security_essentials/
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {3, 2, 0, 89bc9543}
Probably caused by : NETIO.SYS (
NETIO!IsFlowContextTableAcceptingContexts+18 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
*
*
* Bugcheck Analysis
*
*
*
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address
at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000003, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 89bc9543, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82d79700
Unable to read MiSystemVaType memory at 82d590c0
00000003
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!IsFlowContextTableAcceptingContexts+18
89bc9543 8a4004 mov al,byte ptr [eax+4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: 80e48288 -- (.trap 0xffffffff80e48288)
ErrCode = 00000000
eax=ffffffff ebx=85185358 ecx=ffffffff edx=00000000 esi=80e48350
edi=00000000
eip=89bc9543 esp=80e482fc ebp=80e482fc iopl=0 nv up ei ng nz na
po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
efl=00010282
NETIO!IsFlowContextTableAcceptingContexts+0x18:
89bc9543 8a4004 mov al,byte ptr [eax+4]
ds:0023:00000003=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 89bc9543 to 82c52b7b
STACK_TEXT:
80e48288 89bc9543 badb0d00 00000000 89bb3a67 nt!KiTrap0E+0x2cf
80e482fc 89bb3901 ffffffff 00000001 8769de50
NETIO!IsFlowContextTableAcceptingContexts+0x18
80e4831c 89bb2895 000227a1 00000000 00000032
NETIO!WfpFindAndRefFlowContext+0x5d
80e48368 89bb3334 00000032 80e4866c 859dcc88 NETIO!ProcessCallout+0x70
80e483dc 89bb225c 00000032 80e4866c 859dcc88 NETIO!ArbitrateAndEnforce+0xae
80e484ec 89c88678 00000032 80e4866c 859dcc88 NETIO!KfdClassify+0x1c7
80e4851c 89c36ef5 80e4866c 859dcc88 84db4718 tcpip!WfpAleClassify+0x3a
80e48688 89c363a7 85185358 00000020 89cea408
tcpip!WfpAlepReauthorizeOutboundConnection+0x888
80e48728 89c8b23d 00000032 00000017 00000006
tcpip!WfpAleReauthorizeOutboundConnection+0x101
80e488e0 89c87a49 01185358 00000017 85185358
tcpip!WfpAleReauthorizeConnection+0x2ac
80e48980 89c5f2c2 85185358 00000017 85185358
tcpip!TlShimOptionalReauthorizeConnection+0x188
80e489e0 89c7a987 85185490 00000029 00000017
tcpip!ProcessAleForTcpFastPath+0x7d
80e48a40 89c81264 00000029 87409140 85a025f0
tcpip!IppInspectLocalDatagramsOut+0x161
80e48b08 89ccd8c2 00000000 89afa007 89cf6fa0
tcpip!IppSendDatagramsCommon+0x5a8
80e48b9c 89cbc1e4 89cf6fa0 89afa007 84db4718
tcpip!IppInspectInjectTlSend+0x133
80e48bfc 89cbd274 84f11900 80e48c44 89cbd35f
tcpip!WfpReinjectTunnelPacketTL+0xb1
80e48c08 89cbd35f 84f11938 80e48c90 8544c218
tcpip!WfpReinjectTunnelPacket+0x14
80e48c44 89cbd3a4 00000001 85204860 00000001
tcpip!WfpDiscoverPhysicalNexthopInterfaceComplete+0xdb
80e48c58 89cd2f94 85204860 00000005 80e48c90
tcpip!IppInspectNeighborDiscoveryComplete+0x25
80e48cb4 89c27d68 8544c218 85a2287c 80e48ce8
tcpip!IppNotifyNeighborChangeAtPassive+0xab
80e48cc4 89bb3c1e 8544c218 85a21170 8599e1a0
tcpip!IppCompartmentNotificationWorker+0x11
80e48ce8 82e06f96 8599e1a0 85a2287c 85a21170
NETIO!NetiopIoWorkItemRoutine+0x2f
80e48d00 82c75083 85a21170 00000000 84cbb798 nt!IopProcessWorkItem+0x2d
80e48d50 82e01d6e 00000001 a3360820 00000000 nt!ExpWorkerThread+0x10d
80e48d90 82ca3159 82c74f76 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!IsFlowContextTableAcceptingContexts+18
89bc9543 8a4004 mov al,byte ptr [eax+4]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: NETIO!IsFlowContextTableAcceptingContexts+18
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf63
FAILURE_BUCKET_ID: 0xD1_NETIO!IsFlowContextTableAcceptingContexts+18
BUCKET_ID: 0xD1_NETIO!IsFlowContextTableAcceptingContexts+18
Followup: MachineOwner
---------
0: kd> lmvm NETIO
start end module name
89bb0000 89bee000 NETIO (pdb symbols)
c:\symbols\netio.pdb\7F1011FAA7384AA9A72A0165AC1B90962\netio.pdb
Loaded symbol image file: NETIO.SYS
Mapped memory image file: c:\symbols\NETIO.SYS\4A5BBF633e000\NETIO.SYS
Image path: \SystemRoot\system32\drivers\NETIO.SYS
Image name: NETIO.SYS
Timestamp: Mon Jul 13 17:12:35 2009 (4A5BBF63)
CheckSum: 000420A0
ImageSize: 0003E000
File version: 6.1.7600.16385
Product version: 6.1.7600.16385
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: netio.sys
OriginalFilename: netio.sys
ProductVersion: 6.1.7600.16385
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
FileDescription: Network I/O Subsystem
LegalCopyright: © Microsoft Corporation. All rights reserved.
-- Mike Burr
Free Windows Admin Tool Kit Click here and download it now
August 4th, 2010 12:47am
Does it happen too when you remove Online Armor Firewall? The netio.sys is a generic network driver from MS.
Also update dvd43llh.sys (Mon Feb 07 19:16:49 2005 ) and PxHelp20.sys which belong to a SlySoft tool."A programmer is just a tool which converts caffeine into code" CLIP- Stellvertreter http://www.winvistaside.de/
August 4th, 2010 1:41am
nope got the BSOD while watching a avi and downloading, so i thought it would be network related but drivers are up to date.
thanks for the help though guys. sorry about the upload first time post.
Free Windows Admin Tool Kit Click here and download it now
August 4th, 2010 4:13am
nope got the BSOD while watching a avi and downloading,
So, Online Armor was the cause?"A programmer is just a tool which converts caffeine into code" CLIP- Stellvertreter http://www.winvistaside.de/
August 4th, 2010 5:06pm
Also you may consider temporary disabling the antivirus and check the result.Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
August 5th, 2010 11:08am