Help! This is affecting me daily
On Mon 2010-03-29 17:32:48 your computer crashed
This was likely caused by the following module: netio.sys
Bugcheck code: 0xA (0xFFFFFA7FFFFFFFE0, 0x2, 0x1, 0xFFFFF80002CFE35F)
Error: IRQL_NOT_LESS_OR_EQUAL
Dump file: C:\Windows\Minidump\032910-14383-01.dmp
file path: C:\Windows\system32\drivers\netio.sys
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: Network I/O Subsystem
The crash took place in a standard Microsoft module. Your system configuration may be incorrect, possibly the culprit is in another driver on your system which cannot be identified at this time.
On Sat 2010-03-27 13:14:52 your computer crashed
This was likely caused by the following module: ntoskrnl.exe
Bugcheck code: 0xA (0xFFFFFAD505CF1F90, 0x2, 0x0, 0xFFFFF80002D2CA8F)
Error: IRQL_NOT_LESS_OR_EQUAL
Dump file: C:\Windows\Minidump\032710-14913-01.dmp
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft® Windows® Operating System
company: Microsoft Corporation
description: NT Kernel & System
The crash took place in a standard Microsoft module. Your system configuration may be incorrect, possibly the culprit is in another driver on your system which cannot be identified at this time.
I have installed the latest drivers, at least I thought so (for my broadcom card) but wonder if I should uninstall the entire network device and reinstall. But am a bit worried about potentially losing all network functionality
please can someone help,this is driving me bonkers. The only causes I have seen (maybe) are related to unplugging the network plug out of my router box in the wall (its Telia), Internet Explorer 64 bit and/or Vuze are the apps running, along with TrueCrypt.
Both of these were caused by memory corruption.
Download memtestx86 and run for at least 5 passes.
also if you are overclocking stop
If you have a raid update its driver
Let us know if you need help
Ken
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\New folder (3)\032910-14383-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*F:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c67000 PsLoadedModuleList = 0xfffff800`02ea4e50
Debug session time: Mon Mar 29 13:31:18.684 2010 (GMT-4)
System Uptime: 0 days 0:40:15.808
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa7fffffffe0, 2, 1, fffff80002cfe35f}
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa7fffffffe0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002cfe35f, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0f0e0
fffffa7fffffffe0
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReplenishPageSlist+100
fffff800`02cfe35f f00fba6b1000 lock bts dword ptr [rbx+10h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff8800aa8b6c0 -- (.trap 0xfffff8800aa8b6c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffffffff rbx=0000000000000000 rcx=fdffffffffffffff
rdx=0000000000000041 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cfe35f rsp=fffff8800aa8b850 rbp=fffffa8005400cf8
r8=fffff80002f11400 r9=fffffa8005400000 r10=fffffa8005400d18
r11=fffff8800aa8b8a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReplenishPageSlist+0x100:
fffff800`02cfe35f f00fba6b1000 lock bts dword ptr [rbx+10h],0 ds:9b01:00000000`00000010=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cd8469 to fffff80002cd8f00
STACK_TEXT:
fffff880`0aa8b578 fffff800`02cd8469 : 00000000`0000000a fffffa7f`ffffffe0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0aa8b580 fffff800`02cd70e0 : fffffa80`08bee468 fffffa7f`ffffffd0 fffff800`02e66880 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0aa8b6c0 fffff800`02cfe35f : 00000000`00000000 fffff880`0aa8b890 fffff880`0aa8b898 fffff880`0aa8b8a8 : nt!KiPageFault+0x260
fffff880`0aa8b850 fffff800`02cfe88f : fffff800`02f11400 00000000`00000053 fffffa80`03b06790 fffffa7f`ffffffd0 : nt!MiReplenishPageSlist+0x100
fffff880`0aa8b8b0 fffff800`02cf6a97 : 00000000`00000002 fffff880`00000002 fffffa80`08e49ec8 00000000`00000002 : nt!MiRemoveAnyPage+0x24f
fffff880`0aa8b9d0 fffff800`02cf31a6 : 00000000`00000001 00000000`086d9000 fffff880`0aa8bc20 fffff680`000436c8 : nt!MiResolveDemandZeroFault+0x577
fffff880`0aa8bac0 fffff800`02cd6fee : 00000000`00000001 00000000`00000000 00000000`033ef701 fffffa80`09bec120 : nt!MmAccessFault+0x5c6
fffff880`0aa8bc20 000007fe`fece1060 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`033ef888 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fece1060
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReplenishPageSlist+100
fffff800`02cfe35f f00fba6b1000 lock bts dword ptr [rbx+10h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiReplenishPageSlist+100
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReplenishPageSlist+100
BUCKET_ID: X64_0xA_nt!MiReplenishPageSlist+100
Followup: MachineOwner
---------