Windows 10: Windows 10 Randomly Crashes. NETIO!StreamProcessCallout

Discus and support Windows 10 Randomly Crashes. NETIO!StreamProcessCallout in Windows 10 BSOD Crashes and Debugging to solve the problem; Hi Windows 10 Pro 64-bit fully updated. 24GB RAM For the last few months my PC has randomly crashed. Sometimes it will be fine for days, other... Discussion in 'Windows 10 BSOD Crashes and Debugging' started by TomT, Aug 10, 2016.

  1. TomT Win User

    Windows 10 Randomly Crashes. NETIO!StreamProcessCallout


    Hi

    Windows 10 Pro 64-bit fully updated.
    24GB RAM

    For the last few months my PC has randomly crashed. Sometimes it will be fine for days, other times it goes a couple of times in a day or so.

    The PC just stops and freezes. I have dual screens, one goes black, the other is just frozen. If I leave it long enough it does reboot and reload windows.

    At first I thought it was related to Chrome and the number of tabs I had open.. but I've had the issue with one or two tabs open or with 7 -8 open. It does always seem to happen as I open a new tab.

    When it happens I end up with a 2.2GB Memory.dmp file. Last night I ran a windows mem test and that came back clear.

    The issue has just happened again, attached is the Bugcheck Analysis.

    Code: DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000000000000b0, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff800937c0d83, address which referenced memory[/quote] Code: TRAP_FRAME: ffffd0017ae6e580 -- (.trap 0xffffd0017ae6e580) .trap 0xffffd0017ae6e580 NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff800938138e0 rdx=0000000000001001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800937c0d83 rsp=ffffd0017ae6e710 rbp=ffffd0017ae6e801 r8=ffffe00094887f30 r9=0000000000000000 r10=fffff800938138e0 r11=ffffe0009499c3e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc NETIO!StreamProcessCallout+0x793: fffff800`937c0d83 4883b8b000000000 cmp qword ptr [rax+0B0h],0 ds:00000000`000000b0=???????????????? .trap Resetting default scope[/quote] Can anyone help me with this ?

    Attachment 95487

    Thanks

    :)
     
  2. Djdoggy99 Win User

    Blue screen NETIO.sys, ndis.sys, tcpip.sys

    So i have a custom built pc with Windows 10 on it and last night I download and installed windows setup on a USB for my friend and after that I played overwatch and ark and my pc was fine I then turned pc off and in the morning went to turn it and and it
    keeps blue screening randomly it sometimes happens when I turn it on and it starts loding windows and the main time is when I go to load a program or do anything it will crash the main message it says is Netio. Sys,ndis. Sys,trip. Sys is say above that that
    no less or more something like that

    Specs:

    Asrock 980de3/u3s3

    Gtx 980 Windforce

    Amd 6300

    16gb of ddr3 ram
     
    Djdoggy99, Aug 10, 2016
    #2
  3. SYSTEM_SERVICE_EXCEPTION netio.sys

    Thanks for your patience. Here is the full primary analysis report from the last crash.

    Thanks a lot

    C

     
    ChristianET0891, Aug 10, 2016
    #3
  4. axe0 New Member

    Windows 10 Randomly Crashes. NETIO!StreamProcessCallout

  5. TomT Win User
    Attached is a zip file will all my logs.
    Hope someone can advise on this.

    Thanks
     
  6. axe0 New Member
    I assume the 2x8GB sticks are not the same as the 2x4GB sticks so I would recommend to remove either of them.

    I also assume you've used the kernel dump for analysis? My stack trace is slightly different than yours.
    I would suggest to check Dell for driver updates.

    My analysis:
    Code: ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000000000000b0, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff800937c0d83, address which referenced memory Debugging Details: ------------------ DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10586.545.amd64fre.th2_release.160802-1857 SYSTEM_MANUFACTURER: Dell Inc. SYSTEM_PRODUCT_NAME: XPS 8500 SYSTEM_SKU: To be filled by O.E.M. BIOS_VENDOR: Dell Inc. BIOS_VERSION: A12 BIOS_DATE: 08/28/2013 BASEBOARD_MANUFACTURER: Dell Inc. BASEBOARD_PRODUCT: 0NW73C BASEBOARD_VERSION: A00 DUMP_TYPE: 2 BUGCHECK_P1: b0 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff800937c0d83 READ_ADDRESS: fffff802f458a520: Unable to get MiVisibleState 00000000000000b0 CURRENT_IRQL: 2 FAULTING_IP: NETIO!StreamProcessCallout+793 fffff800`937c0d83 4883b8b000000000 cmp qword ptr [rax+0B0h],0 CPU_COUNT: 8 CPU_MHZ: d40 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3a CPU_STEPPING: 9 CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-FO9QHGA ANALYSIS_SESSION_TIME: 08-11-2016 18:23:55.0657 ANALYSIS_VERSION: 10.0.10586.567 amd64fre TRAP_FRAME: ffffd0017ae6e580 -- (.trap 0xffffd0017ae6e580) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff800938138e0 rdx=0000000000001001 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800937c0d83 rsp=ffffd0017ae6e710 rbp=ffffd0017ae6e801 r8=ffffe00094887f30 r9=0000000000000000 r10=fffff800938138e0 r11=ffffe0009499c3e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc NETIO!StreamProcessCallout+0x793: fffff800`937c0d83 4883b8b000000000 cmp qword ptr [rax+0B0h],0 ds:00000000`000000b0=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff802f435a4e9 to fffff802f434f940 STACK_TEXT: ffffd001`7ae6e438 fffff802`f435a4e9 : 00000000`0000000a 00000000`000000b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffd001`7ae6e440 fffff802`f4358cc7 : ffffd001`7ae6e880 fffff802`f4343441 ffffd001`7ae6e80f fffff802`f4343441 : nt!KiBugCheckDispatch+0x69 ffffd001`7ae6e580 fffff800`937c0d83 : ffffe000`3ce85010 ffffe000`9499c3e0 ffffd001`7ae6eb30 ffffd001`7ae6eb30 : nt!KiPageFault+0x247 ffffd001`7ae6e710 fffff800`937bf1ca : ffffe000`3d650014 fffff800`9801f0d4 ffffd001`00000001 ffffd001`7ae6f1f8 : NETIO!StreamProcessCallout+0x793 ffffd001`7ae6e850 fffff800`937be060 : ffffe000`3c8d0014 ffffd001`7ae6f1f8 ffffd001`7ae6f230 ffffd001`7ae6f0b0 : NETIO!ProcessCallout+0x6ba ffffd001`7ae6e9c0 fffff800`937bcc0f : be99740f`856d66c6 ffffd001`7ae6ecb0 00000000`00000000 ffffe000`4440f3b0 : NETIO!ArbitrateAndEnforce+0x4a0 ffffd001`7ae6ebb0 fffff800`937ba3c0 : 00000000`00000000 ffffd001`7ae6f648 ffffd001`7ae6f180 fffff800`937d792b : NETIO!KfdClassify+0x32f ffffd001`7ae6f000 fffff800`937ba021 : 00000000`00000000 ffffe000`4440f030 ffffd001`7ae6f648 fffff800`938df569 : NETIO!StreamClassify+0x268 ffffd001`7ae6f1a0 fffff800`937b93ec : 00000000`00000000 00000000`00000000 ffffe000`945e44d0 fffff800`937c61dd : NETIO!StreamCommonInspect+0x24d ffffd001`7ae6f540 fffff800`938a1b46 : ffffe000`43898300 ffffe000`945e4400 ffffe000`95ff8010 00000000`00000000 : NETIO!WfpStreamInspectReceive+0x15c ffffd001`7ae6f5d0 fffff800`938a03ff : 00000000`00000001 ffffe000`43898030 00000000`00000000 ffffd001`7c08c3da : tcpip!TcpTcbFastDatagram+0x1056 ffffd001`7ae6f800 fffff800`9389f7cb : ffffd001`00000000 ffff9ba8`00000000 ffffd001`00000001 ffffe000`3f98f430 : tcpip!TcpTcbReceive+0x39f ffffd001`7ae6fa50 fffff800`9389f215 : 00000000`00000000 00000000`00328c96 ffffd001`7c08c3e2 0000002c`6954e8ff : tcpip!TcpMatchReceive+0x1fb ffffd001`7ae6fd00 fffff800`9389dfb3 : ffffe000`3f98f430 ffffd001`7ae6f3fd ffffd001`7ae65000 ffffe000`7ffffff1 : tcpip!TcpPreValidatedReceive+0x385 ffffd001`7ae6fdf0 fffff800`9389db20 : ffffd001`000000a8 ffffd001`00000012 ffffe719`70664b3f ffffe000`00000001 : tcpip!IppDeliverListToProtocol+0x73 ffffd001`7ae6feb0 fffff800`9389d1d8 : 00000000`00000001 ffffd001`7ae6ff98 00000000`00000000 ffffd001`7ae6ffb9 : tcpip!IppProcessDeliverList+0x60 ffffd001`7ae6ff20 fffff800`9389e5b8 : fffff800`93a0c000 ffffe000`3d7e0130 00000000`00000003 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388 ffffd001`7ae70020 fffff800`938def9f : ffffe000`44da2870 ffffe000`43898380 ffffd001`7ae70201 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338 ffffd001`7ae70140 fffff800`938de5fe : 00000000`00010002 ffffd001`00000003 fffff800`938cc760 ffffd001`43898301 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f ffffd001`7ae70220 fffff802`f4273115 : 00000000`00000002 ffffe000`3f806040 fffff800`938de530 ffffd001`7ae703d0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce ffffd001`7ae70350 fffff800`938cc8e6 : ffffe000`3f8eb950 00000000`00000000 ffffe000`3f8eb8f0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85 ffffd001`7ae703a0 fffff800`93692d97 : ffffe000`43938b20 ffffd001`7ae70490 ffffe000`00000003 00000000`00000003 : tcpip!FlReceiveNetBufferListChain+0xb6 ffffd001`7ae70420 fffff800`93692558 : ffffe000`43938b20 ffffe000`43898380 ffffe000`00000000 00000000`00000003 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7 ffffd001`7ae704d0 fffff800`9369eef5 : ffffe000`435ed1a0 ffffe000`00000001 ffffe000`435ed1a0 00000000`00000003 : ndis!ndisMTopReceiveNetBufferLists+0x318 ffffd001`7ae705d0 fffff800`93693d73 : 00000000`0012a0a4 ffffd001`7ae70720 00000000`00000000 ffffe000`4440f030 : ndis!ndisCallReceiveHandler+0x85 ffffd001`7ae70620 fffff800`96c03d3a : ffffe000`4382e000 00000000`00000000 ffffe000`00000000 ffffe000`43898260 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3 ffffd001`7ae707a0 ffffe000`4382e000 : 00000000`00000000 ffffe000`00000000 ffffe000`43898260 00000000`00000001 : rt640x64+0x13d3a ffffd001`7ae707a8 00000000`00000000 : ffffe000`00000000 ffffe000`43898260 00000000`00000001 ffffe000`ffffffff : 0xffffe000`4382e000 STACK_COMMAND: kb THREAD_SHA1_HASH_MOD_FUNC: dbdaaf4878318e0b0ce56877f32ddee67a9562d9 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: daec8dc92c7b16c295f46ab8168c832b19d56bfc THREAD_SHA1_HASH_MOD: 42fd817fb6d92fefe97e6cc8bd8dff432f1019b7 FOLLOWUP_IP: NETIO!StreamProcessCallout+793 fffff800`937c0d83 4883b8b000000000 cmp qword ptr [rax+0B0h],0 FAULT_INSTR_CODE: b0b88348 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: NETIO!StreamProcessCallout+793 FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 5632d715 IMAGE_VERSION: 10.0.10586.0 BUCKET_ID_FUNC_OFFSET: 793 FAILURE_BUCKET_ID: AV_NETIO!StreamProcessCallout BUCKET_ID: AV_NETIO!StreamProcessCallout PRIMARY_PROBLEM_CLASS: AV_NETIO!StreamProcessCallout TARGET_TIME: 2016-08-11T12:38:38.000Z OSBUILD: 10586 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2016-08-03 11:15:01 BUILDDATESTAMP_STR: 160802-1857 BUILDLAB_STR: th2_release BUILDOSVER_STR: 10.0.10586.545.amd64fre.th2_release.160802-1857 ANALYSIS_SESSION_ELAPSED_TIME: 8eee ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_netio!streamprocesscallout FAILURE_ID_HASH: {fb6ed777-1b72-9796-cc6e-f136919e0f6f} Followup: MachineOwner --------- [SMBIOS Data Tables v2.7] [DMI Version - 0] [2.0 Calling Convention - No] [Table Size - 2342 bytes] [BIOS Information (Type 0) - Length 24 - Handle 0001h] Vendor Dell Inc. BIOS Version A12 BIOS Starting Address Segment f000 BIOS Release Date 08/28/2013 BIOS ROM Size 400000 BIOS Characteristics 07: - PCI Supported 11: - Upgradeable FLASH BIOS 12: - BIOS Shadowing Supported 15: - CD-Boot Supported 16: - Selectable Boot Supported 17: - BIOS ROM Socketed 19: - EDD Supported 23: - 1.2MB Floppy Supported 24: - 720KB Floppy Supported 25: - 2.88MB Floppy Supported 26: - Print Screen Device Supported 27: - Keyboard Services Supported 28: - Serial Services Supported 29: - Printer Services Supported 48: - System Vendor Reserved 49: - System Vendor Reserved 52: - System Vendor Reserved BIOS Characteristic Extensions 00: - ACPI Supported 01: - USB Legacy Supported 08: - BIOS Boot Specification Supported 10: - Specification Reserved 11: - Specification Reserved BIOS Major Revision 4 BIOS Minor Revision 6 EC Firmware Major Revision 255 EC Firmware Minor Revision 255 [System Information (Type 1) - Length 27 - Handle 0002h] Manufacturer Dell Inc. Product Name XPS 8500 Version Serial Number C832J5J UUID 00000000-0000-0000-0000-000000000000 Wakeup Type Power Switch SKUNumber To be filled by O.E.M. Family To be filled by O.E.M. [BaseBoard Information (Type 2) - Length 15 - Handle 0003h] Manufacturer Dell Inc. Product 0NW73C Version A00 Serial Number ..CN722002AV00HK. Asset Tag Feature Flags 09h -1471331696: - (null) -1471331648: - (null) Location To be filled by O.E.M. Chassis Handle 0004h Board Type 0ah - Processor/Memory Module Number of Child Handles 0 [System Enclosure (Type 3) - Length 22 - Handle 0004h] Manufacturer Dell Inc. Chassis Type Desktop Version Serial Number Asset Tag Number [String Not Specified] Bootup State Safe Power Supply State Safe Thermal State Safe Security Status None OEM Defined 0 Height 0U Number of Power Cords 1 Number of Contained Elements 0 Contained Element Size 0 [OEM Strings (Type 11) - Length 5 - Handle 001ch] Number of Strings 15 1 Dell System 2 5[0000] 3 3[3.4] 4 4[0001] 5 13[D03M] 6 6[D0, D4, D8, DA, DE] 7 7[] 8 8[] 9 9[] 10 1[0545] 11 10[A12] 12 12[] 13 14[0] 14 14[0] 15 [Cache Information (Type 7) - Length 19 - Handle 0026h] Socket Designation L1-Cache Cache Configuration 0080h - WT Enabled Int NonSocketed L1 Maximum Cache Size 0100h - 256K Installed Size 0100h - 256K Supported SRAM Type 0001h - Other Current SRAM Type 0001h - Other Cache Speed 0ns Error Correction Type None System Cache Type Unified Associativity 8-way Set-Associative [Cache Information (Type 7) - Length 19 - Handle 0028h] Socket Designation L2-Cache Cache Configuration 0081h - WT Enabled Int NonSocketed L2 Maximum Cache Size 0400h - 1024K Installed Size 0400h - 1024K Supported SRAM Type 0001h - Other Current SRAM Type 0001h - Other Cache Speed 0ns Error Correction Type None System Cache Type Unified Associativity 8-way Set-Associative [Cache Information (Type 7) - Length 19 - Handle 0029h] Socket Designation L3-Cache Cache Configuration 0102h - WB Disabled Int NonSocketed L3 Maximum Cache Size 2000h - 8192K Installed Size 2000h - 8192K Supported SRAM Type 0001h - Other Current SRAM Type 0001h - Other Cache Speed 0ns Error Correction Type None System Cache Type Unified Associativity 16-way Set-Associative [Physical Memory Array (Type 16) - Length 23 - Handle 002ah] Location 03h - SystemBoard/Motherboard Use 03h - System Memory Memory Error Correction 03h - None Maximum Capacity 33554432KB Memory Error Inf Handle [Not Provided] Number of Memory Devices 4 [Processor Information (Type 4) - Length 42 - Handle 002bh] Socket Designation CPU 1 Processor Type Central Processor Processor Family 06h - Intel486 Processor Processor Manufacturer Intel Processor ID a9060300fffbebbf Processor Version Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz Processor Voltage 8fh - 1.5V External Clock 100MHz Max Speed 3400MHz Current Speed 3400MHz Status Enabled Populated Processor Upgrade Specification Reserved L1 Cache Handle 0026h L2 Cache Handle 0028h L3 Cache Handle 0029h Serial Number [String Not Specified] Asset Tag Number Part Number Fill By OEM [Memory Device (Type 17) - Length 34 - Handle 002ch] Physical Memory Array Handle 002ah Memory Error Info Handle [Not Provided] Total Width 64 bits Data Width 64 bits Size 8192MB Form Factor 09h - DIMM Device Set [None] Device Locator DIMM3 Bank Locator [String Not Specified] Memory Type 18h - Specification Reserved Type Detail 0080h - Synchronous Speed 1600MHz Manufacturer 0000 Serial Number Asset Tag Number Part Number [Memory Device Mapped Address (Type 20) - Length 35 - Handle 002dh] Starting Address 00000000h Ending Address 007fffffh Memory Device Handle 002ch Mem Array Mapped Adr Handle 0034h Partition Row Position 01 Interleave Position 01 Interleave Data Depth 02 [Memory Device (Type 17) - Length 34 - Handle 002eh] Physical Memory Array Handle 002ah Memory Error Info Handle [Not Provided] Total Width 64 bits Data Width 64 bits Size 4096MB Form Factor 09h - DIMM Device Set [None] Device Locator DIMM1 Bank Locator [String Not Specified] Memory Type 18h - Specification Reserved Type Detail 0080h - Synchronous Speed 1600MHz Manufacturer Hynix/Hyundai Serial Number Asset Tag Number Part Number HMT351U6CFR8C-PB [Memory Device Mapped Address (Type 20) - Length 35 - Handle 002fh] Starting Address 01000000h Ending Address 013fffffh Memory Device Handle 002eh Mem Array Mapped Adr Handle 0034h Partition Row Position 01 Interleave Position 01 Interleave Data Depth 02 [Memory Device (Type 17) - Length 34 - Handle 0030h] Physical Memory Array Handle 002ah Memory Error Info Handle [Not Provided] Total Width 64 bits Data Width 64 bits Size 8192MB Form Factor 09h - DIMM Device Set [None] Device Locator DIMM4 Bank Locator [String Not Specified] Memory Type 18h - Specification Reserved Type Detail 0080h - Synchronous Speed 1600MHz Manufacturer 0000 Serial Number Asset Tag Number Part Number [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0031h] Starting Address 00800000h Ending Address 00ffffffh Memory Device Handle 0030h Mem Array Mapped Adr Handle 0034h Partition Row Position 01 Interleave Position 02 Interleave Data Depth 02 [Memory Device (Type 17) - Length 34 - Handle 0032h] Physical Memory Array Handle 002ah Memory Error Info Handle [Not Provided] Total Width 64 bits Data Width 64 bits Size 4096MB Form Factor 09h - DIMM Device Set [None] Device Locator DIMM2 Bank Locator [String Not Specified] Memory Type 18h - Specification Reserved Type Detail 0080h - Synchronous Speed 1600MHz Manufacturer Hynix/Hyundai Serial Number Asset Tag Number Part Number HMT351U6CFR8C-PB [Memory Device Mapped Address (Type 20) - Length 35 - Handle 0033h] Starting Address 01400000h Ending Address 017fffffh Memory Device Handle 0032h Mem Array Mapped Adr Handle 0034h Partition Row Position 01 Interleave Position 02 Interleave Data Depth 02 [Memory Array Mapped Address (Type 19) - Length 31 - Handle 0034h] Starting Address 00000000h Ending Address 017fffffh Memory Array Handle 002ah Partition Width 04 Machine ID Information [From Smbios 2.7, DMIVersion 0, Size=2342] BiosMajorRelease = 4 BiosMinorRelease = 6 BiosVendor = Dell Inc. BiosVersion = A12 BiosReleaseDate = 08/28/2013 SystemManufacturer = Dell Inc. SystemProductName = XPS 8500 SystemFamily = To be filled by O.E.M. SystemVersion = SystemSKU = To be filled by O.E.M. BaseBoardManufacturer = Dell Inc. BaseBoardProduct = 0NW73C BaseBoardVersion = A00 CPUID: "Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz" MaxSpeed: 3400 CurrentSpeed: 3392 GetPointerFromAddress: unable to read from fffff802f458b200 THREAD ffffe0003f806040 Cid 0004.0130 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 0 Not impersonating GetUlongFromAddress: unable to read from fffff802f44dafa8 Owning Process ffffe0003c88e040 Image: System Attached Process N/A Image: N/A fffff78000000000: Unable to get shared data Wait Start TickCount 1220772 Context Switch Count 1150951 IdealProcessor: 0 ReadMemory error: Cannot get nt!KeMaximumIncrement value. UserTime 00:00:00.000 KernelTime 00:00:00.000 Win32 Start Address ndis!ndisReceiveWorkerThread (0xfffff800936b0e40) Stack Init ffffd0017ae70c90 Current ffffd0017ae707c0 Base ffffd0017ae71000 Limit ffffd0017ae6b000 Call 0 Priority 8 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5 Child-SP RetAddr : Args to Child : Call Site ffffd001`7ae6e438 fffff802`f435a4e9 : 00000000`0000000a 00000000`000000b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffd001`7ae6e440 fffff802`f4358cc7 : ffffd001`7ae6e880 fffff802`f4343441 ffffd001`7ae6e80f fffff802`f4343441 : nt!KiBugCheckDispatch+0x69 ffffd001`7ae6e580 fffff800`937c0d83 : ffffe000`3ce85010 ffffe000`9499c3e0 ffffd001`7ae6eb30 ffffd001`7ae6eb30 : nt!KiPageFault+0x247 (TrapFrame @ ffffd001`7ae6e580) ffffd001`7ae6e710 fffff800`937bf1ca : ffffe000`3d650014 fffff800`9801f0d4 ffffd001`00000001 ffffd001`7ae6f1f8 : NETIO!StreamProcessCallout+0x793 ffffd001`7ae6e850 fffff800`937be060 : ffffe000`3c8d0014 ffffd001`7ae6f1f8 ffffd001`7ae6f230 ffffd001`7ae6f0b0 : NETIO!ProcessCallout+0x6ba ffffd001`7ae6e9c0 fffff800`937bcc0f : be99740f`856d66c6 ffffd001`7ae6ecb0 00000000`00000000 ffffe000`4440f3b0 : NETIO!ArbitrateAndEnforce+0x4a0 ffffd001`7ae6ebb0 fffff800`937ba3c0 : 00000000`00000000 ffffd001`7ae6f648 ffffd001`7ae6f180 fffff800`937d792b : NETIO!KfdClassify+0x32f ffffd001`7ae6f000 fffff800`937ba021 : 00000000`00000000 ffffe000`4440f030 ffffd001`7ae6f648 fffff800`938df569 : NETIO!StreamClassify+0x268 ffffd001`7ae6f1a0 fffff800`937b93ec : 00000000`00000000 00000000`00000000 ffffe000`945e44d0 fffff800`937c61dd : NETIO!StreamCommonInspect+0x24d ffffd001`7ae6f540 fffff800`938a1b46 : ffffe000`43898300 ffffe000`945e4400 ffffe000`95ff8010 00000000`00000000 : NETIO!WfpStreamInspectReceive+0x15c ffffd001`7ae6f5d0 fffff800`938a03ff : 00000000`00000001 ffffe000`43898030 00000000`00000000 ffffd001`7c08c3da : tcpip!TcpTcbFastDatagram+0x1056 ffffd001`7ae6f800 fffff800`9389f7cb : ffffd001`00000000 ffff9ba8`00000000 ffffd001`00000001 ffffe000`3f98f430 : tcpip!TcpTcbReceive+0x39f ffffd001`7ae6fa50 fffff800`9389f215 : 00000000`00000000 00000000`00328c96 ffffd001`7c08c3e2 0000002c`6954e8ff : tcpip!TcpMatchReceive+0x1fb ffffd001`7ae6fd00 fffff800`9389dfb3 : ffffe000`3f98f430 ffffd001`7ae6f3fd ffffd001`7ae65000 ffffe000`7ffffff1 : tcpip!TcpPreValidatedReceive+0x385 ffffd001`7ae6fdf0 fffff800`9389db20 : ffffd001`000000a8 ffffd001`00000012 ffffe719`70664b3f ffffe000`00000001 : tcpip!IppDeliverListToProtocol+0x73 ffffd001`7ae6feb0 fffff800`9389d1d8 : 00000000`00000001 ffffd001`7ae6ff98 00000000`00000000 ffffd001`7ae6ffb9 : tcpip!IppProcessDeliverList+0x60 ffffd001`7ae6ff20 fffff800`9389e5b8 : fffff800`93a0c000 ffffe000`3d7e0130 00000000`00000003 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x388 ffffd001`7ae70020 fffff800`938def9f : ffffe000`44da2870 ffffe000`43898380 ffffd001`7ae70201 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x338 ffffd001`7ae70140 fffff800`938de5fe : 00000000`00010002 ffffd001`00000003 fffff800`938cc760 ffffd001`43898301 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x25f ffffd001`7ae70220 fffff802`f4273115 : 00000000`00000002 ffffe000`3f806040 fffff800`938de530 ffffd001`7ae703d0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xce ffffd001`7ae70350 fffff800`938cc8e6 : ffffe000`3f8eb950 00000000`00000000 ffffe000`3f8eb8f0 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x85 ffffd001`7ae703a0 fffff800`93692d97 : ffffe000`43938b20 ffffd001`7ae70490 ffffe000`00000003 00000000`00000003 : tcpip!FlReceiveNetBufferListChain+0xb6 ffffd001`7ae70420 fffff800`93692558 : ffffe000`43938b20 ffffe000`43898380 ffffe000`00000000 00000000`00000003 : ndis!ndisMIndicateNetBufferListsToOpen+0x3c7 ffffd001`7ae704d0 fffff800`9369eef5 : ffffe000`435ed1a0 ffffe000`00000001 ffffe000`435ed1a0 00000000`00000003 : ndis!ndisMTopReceiveNetBufferLists+0x318 ffffd001`7ae705d0 fffff800`93693d73 : 00000000`0012a0a4 ffffd001`7ae70720 00000000`00000000 ffffe000`4440f030 : ndis!ndisCallReceiveHandler+0x85 ffffd001`7ae70620 fffff800`96c03d3a : ffffe000`4382e000 00000000`00000000 ffffe000`00000000 ffffe000`43898260 : ndis!NdisMIndicateReceiveNetBufferLists+0x3a3 ffffd001`7ae707a0 ffffe000`4382e000 : 00000000`00000000 ffffe000`00000000 ffffe000`43898260 00000000`00000001 : rt640x64+0x13d3a ffffd001`7ae707a8 00000000`00000000 : ffffe000`00000000 ffffe000`43898260 00000000`00000001 ffffe000`ffffffff : 0xffffe000`4382e000 Bugcheck code 000000D1 Arguments 00000000`000000b0 00000000`00000002 00000000`00000000 fffff800`937c0d83 Debug session time: Thu Aug 11 14:38:38.832 2016 (UTC + 2:00) System Uptime: 0 days 5:17:54.573 0: kd> lmvm rt640x64 Browse full module list start end module name fffff800`96bf0000 fffff800`96c84000 rt640x64 T (no symbols) Loaded symbol image file: rt640x64.sys Image path: \SystemRoot\System32\drivers\rt640x64.sys Image name: rt640x64.sys Browse all global symbols functions data Timestamp: Wed Oct 07 17:03:55 2015 (5615345B) CheckSum: 0009543E ImageSize: 00094000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4[/quote]
     
  7. TomT Win User
    Thanks for the reply and the analysis..
    Can you advise what it means ?

    I've completed several memory tests and all have completed without issue.
    Windows is advising all my drivers are upto date. I'm reluctant to install a 3rd party application to manage the driver installation.

    Thanks
     
  8. axe0 New Member

    Windows 10 Randomly Crashes. NETIO!StreamProcessCallout

    I'm not telling you to install a program for driver installation *Wink
    I'm suggesting to check Dell for driver updates, I never suggest to install a program for driver management.

    I can tell what it means, if you're more specific in what you want to know. There are multiple different parts and I do not know what you do know and what not.
     
    axe0, Apr 5, 2018
    #8
Thema:

Windows 10 Randomly Crashes. NETIO!StreamProcessCallout

Loading...
  1. Windows 10 Randomly Crashes. NETIO!StreamProcessCallout - Similar Threads - Randomly Crashes NETIO

  2. Netios replacing by mDSN ?

    in Windows 10 Gaming
    Netios replacing by mDSN ?: I have a customer which is using Netbios and its complain that need to be stoped, I was looking into the internet and found that Microsoft its replacing Netbios for mDNS, do you have this article ? If not able to Disable Netbios, is there any diferent replace solution ?...
  3. Netios replacing by mDSN ?

    in Windows 10 Software and Apps
    Netios replacing by mDSN ?: I have a customer which is using Netbios and its complain that need to be stoped, I was looking into the internet and found that Microsoft its replacing Netbios for mDNS, do you have this article ? If not able to Disable Netbios, is there any diferent replace solution ?...
  4. Netios replacing by mDSN ?

    in Windows 10 Customization
    Netios replacing by mDSN ?: I have a customer which is using Netbios and its complain that need to be stoped, I was looking into the internet and found that Microsoft its replacing Netbios for mDNS, do you have this article ? If not able to Disable Netbios, is there any diferent replace solution ?...
  5. Random Crashes Windows 10

    in Windows 10 Gaming
    Random Crashes Windows 10: Hello everybody, I would like to submit to you the following problem that I have been experiencing for about 2 months regarding my system. My PC Crashes suddenly, especially after it crashes for the first time during the day, it doesn't happen again during the day if left on....
  6. Random Windows 10 crashes

    in Windows 10 BSOD Crashes and Debugging
    Random Windows 10 crashes: Over the last 6 months I've had multiple random system crashes. The system freezes completely, no sound and stuck on the last received frame. Sometimes the system won't blue screen for over 10 minutes and I have to do a hard-reboot. Resulting in no error recordingThere seems...
  7. Windows 10 randomly crashing.

    in Windows 10 Ask Insider
    Windows 10 randomly crashing.: Random times when I’m using my computer it will randomly give me a blue screen error. There’s no rhyme or reason to it, whether I’m downloading files or playing Minecraft, after 10 seconds or 10 hours, it will give me a blue screen eventually. I have completely wiped my PC,...
  8. Netio Blue screen crashes

    in Windows 10 BSOD Crashes and Debugging
    Netio Blue screen crashes: I installed windows 10 build 1903 last week. I was having a serious 100% hard drive usage problem and it seemed to clear up after the upgrade. But now I am having daily Netio blue screen crashes. From the logs they appear to be from bugchecks. I downloaded Windows WDK...
  9. Windows 10 crashing randomly

    in Windows 10 BSOD Crashes and Debugging
    Windows 10 crashing randomly: I have had quite the problem with Windows 10 crashing randomly on me. Here's my system's info: MB: ASUS Z10PE-D8 WS RAM: two Kingston 16GB, 2133 MHz sticks CPU: i7-930 2.8GHz LGA 1366 GPU: EVGA GeForce GTX 1080 System drive: Samsung 850 EVO - 500gig The system...
  10. Windows 10 randomly crashing

    in Windows 10 Performance & Maintenance
    Windows 10 randomly crashing: Hi. First off if I'm posting this in the wrong section, I'm sorry, but I'm in a bit of a rush. Windows 10 has been crashing on me constantly and it's even worse since it's not a blue screen, so I don't have a code to go off of or anything. After doing more research I've...