war59312
New member
Hi,
Sadly having NETIO.sys DRIVER_IRQL_NOT_LESS_OR_EQUAL on my Win11 23H2 computer.
Any help would be greatly appreciated.
Uploaded the logs @ Blue Screen - Google Drive
Already tried System Restore, Removing June 2024 Security update (KB5039212). Updated and rolled back all network drivers.
Best,
Will
Edit: I still suspect it's my Marvell AQtion 10Gb Ethernet network driver at C:\Windows\System32\drivers\aqnic650.sys.
Hardware ID of PCI\VEN_1D6A&DEV_94C0&SUBSYS_87F51043
This is the port built into my motherboard (ProArt X670E-CREATOR WIFI) @ ProArt X670E-CREATOR WIFI - Tech Specs|Motherboards|ASUS USA
Right now running an old driver of 3.1.3.0 from July 5 2021.
Already tried latest of 3.1.8.0 (from Public Driver Downloads | QLogic Fibre Channel HBAs and FastLinQ Ethernet adapters and controllers - Marvell) and 3.1.7.0 so figured I'd try really old.
ATM uptime of 1 hour(s), 48 minute(s), 14 second(s). I've been bluescreening with 72 hours, so will see.
Sadly having NETIO.sys DRIVER_IRQL_NOT_LESS_OR_EQUAL on my Win11 23H2 computer.
Any help would be greatly appreciated.
Uploaded the logs @ Blue Screen - Google Drive
Already tried System Restore, Removing June 2024 Security update (KB5039212). Updated and rolled back all network drivers.
Code:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Primary dump contents written successfully
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*c:\symbols*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*c:\symbols*https://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 22621 MP (24 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Kernel base = 0xfffff801`4bc00000 PsLoadedModuleList = 0xfffff801`4c813130
Debug session time: Sat Jun 29 20:41:10.451 2024 (UTC - 4:00)
System Uptime: 2 days 2:44:19.093
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..............................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`4c017f80 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff688`0722c8c0=000000000000000a
20: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff801508ec4e4, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1687
Key : Analysis.Elapsed.mSec
Value: 1946
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 17795
Key : Analysis.Memory.CommitPeak.Mb
Value: 130
Key : Bugcheck.Code.KiBugCheckData
Value: 0xd1
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Bugcheck.Code.TargetModel
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 1800
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.LastLine
Value: Dumping physical memory to disk: 100%
Key : Dump.Attributes.ProgressPercentage
Value: 100
Key : Failure.Bucket
Value: AV_NETIO!StreamInvokeCalloutAndNormalizeAction
Key : Failure.Hash
Value: {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1497cf94
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 1
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 4853999
Key : Hypervisor.Flags.ValueHex
Value: 4a10ef
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : SecureKernel.HalpHvciEnabled
Value: 1
Key : WER.OS.Branch
Value: ni_release
Key : WER.OS.Version
Value: 10.0.22621.1
BUGCHECK_CODE: d1
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff801508ec4e4
FILE_IN_CAB: MEMORY.DMP
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1800
READ_ADDRESS: unable to get nt!PspSessionIdBitmap
0000000000000008
PROCESS_NAME: System
TRAP_FRAME: fffff6880722ca00 -- (.trap 0xfffff6880722ca00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff6880722cd08
rdx=ffff800e166dcb60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801508ec4e4 rsp=fffff6880722cb90 rbp=fffff6880722cc09
r8=ffff800e166dcb60 r9=0000000000000018 r10=ffff800e06d07cf0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c:
fffff801`508ec4e4 488b4808 mov rcx,qword ptr [rax+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
fffff688`0722c8b8 fffff801`4c02de29 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff688`0722c8c0 fffff801`4c029289 : 00000000`00040246 fffff801`4be3722b fffff801`528131a0 fffff801`00000000 : nt!KiBugCheckDispatch+0x69
fffff688`0722ca00 fffff801`508ec4e4 : fffff688`0722ccd0 ffff800e`166dcb60 fffff688`0722ccd0 ffff800e`166dcb60 : nt!KiPageFault+0x489
fffff688`0722cb90 fffff801`508ebd8b : ffff800e`166dcb60 ffff800e`166dcb60 ffff800e`06d07c01 00000000`00000000 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x5c
fffff688`0722cc60 fffff801`508e992b : ffff800d`e2900014 fffff801`4936a150 ffff800d`00000002 fffff688`0722d718 : NETIO!StreamProcessCallout+0x2c7
fffff688`0722cd90 fffff801`508e89dd : fffff688`07220014 fffff688`0722d718 fffff688`0722d740 fffff688`0722d440 : NETIO!ProcessCallout+0xa4b
fffff688`0722cf10 fffff801`508e76ee : 00000000`00000005 fffff688`0722d740 ffff800d`e27dbaa0 ffff800d`f400ff02 : NETIO!ArbitrateAndEnforce+0x59d
fffff688`0722d040 fffff801`5093c38e : 00000000`00000000 fffff801`52813038 00000000`00000000 fffff688`0722d9d0 : NETIO!KfdClassify+0x33e
fffff688`0722d3f0 fffff801`50910811 : 00000000`00000000 fffff688`0722d610 fffff801`4bc00000 00000000`00000000 : NETIO!StreamInternalClassify+0x106
fffff688`0722d510 fffff801`508e4dd8 : fffff688`0722dbb0 00000000`00000000 00000000`00001002 00000000`00000000 : NETIO!StreamClassify+0x2b8b5
fffff688`0722d6b0 fffff801`508e4a47 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000018 : NETIO!StreamCommonInspect+0x2ac
fffff688`0722daa0 fffff801`512a6d70 : fffff688`0722db00 ffff800e`01b60700 00000000`00000000 ffff800d`f565c7e0 : NETIO!WfpStreamInspectReceive+0x157
fffff688`0722db20 fffff801`512a6c54 : ffff800e`01b60770 ffff800d`f8586080 fffff688`0722dc68 ffff800e`01b60770 : tcpip!InetInspectReceive+0x80
fffff688`0722dbd0 fffff801`512c320f : 00000000`14b1d100 fffff688`0722de18 ffff800d`fda10b40 ffff800d`fda10b40 : tcpip!TcpInspectReceive+0x9c
fffff688`0722dc50 fffff801`512bc527 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000000b : tcpip!TcpTcbCarefulDatagram+0x20cf
fffff688`0722df60 fffff801`512b8d59 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTcbReceive+0x457
fffff688`0722e100 fffff801`512b7d4f : 00000000`0ae3282a ffff800d`e87c5e00 ffff800e`13ff8022 ffff800d`e88ad000 : tcpip!TcpMatchReceive+0x519
fffff688`0722e2d0 fffff801`5130f756 : ffff800d`e20f88d0 fffff801`512ebb01 00000000`00000001 ffff800e`0a8452c4 : tcpip!TcpReceive+0x35f
fffff688`0722e3e0 fffff801`512e8226 : 00000000`00000000 00000000`00000000 00000000`00000014 ffff800d`e88ad000 : tcpip!TcpNlClientReceiveDatagrams+0x16
fffff688`0722e410 fffff801`512e8019 : 00000000`00000000 ffff800d`00000006 ffff800d`e88ad000 fffff688`0722e560 : tcpip!IppProcessDeliverList+0xb6
fffff688`0722e500 fffff801`512e6ce2 : fffff801`514b39d0 ffff800d`e868e8a0 ffff800d`e88ad000 fffff688`0722e640 : tcpip!IppReceiveHeaderBatch+0x3a9
fffff688`0722e5f0 fffff801`5134b326 : ffff800e`09502550 ffff800d`e9b4c070 00000000`00000001 ffff800d`00000000 : tcpip!IppReceivePackets+0x502
fffff688`0722e720 fffff801`512feb8b : ffff800e`09502550 ffff800d`e9b4c070 fffff801`51300520 fffff688`0722eb00 : tcpip!IpFlcReceivePreValidatedPackets+0x11c6
fffff688`0722e8b0 fffff801`4be2934a : 00000000`00000014 fffff801`512fea40 ffff800d`e86190b4 00000000`00000002 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x14b
fffff688`0722ea00 fffff801`4be292bd : fffff801`512fea40 fffff688`0722eb48 ffff800d`e84ffc70 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
fffff688`0722ea70 fffff801`512ffea0 : ffff800d`e9b4c070 00000000`0000000e 00000000`00000000 00000000`000094f6 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff688`0722eab0 fffff801`509a26e1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0x530
fffff688`0722ed90 fffff801`509a20fa : ffff800d`f29aab60 00000000`00000801 00000001`00000000 ffff800d`00000001 : NDIS!ndisMIndicateNetBufferListsToOpen+0x141
fffff688`0722ee70 fffff801`509c65b5 : ffff800d`eb38f1a0 fffff801`00000000 00000000`00000000 ffff800d`eb38f1a0 : NDIS!ndisMTopReceiveNetBufferLists+0x24a
fffff688`0722ef50 fffff801`509c6023 : 00000000`00000000 fffff688`0722f040 fffff801`509a1eb0 00000000`00000000 : NDIS!ndisCallReceiveHandler+0xb9
fffff688`0722efa0 fffff801`509c63db : ffffe181`64f62180 ffff800d`e8619040 00000000`00000000 fffff801`4be3cbe7 : NDIS!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
fffff688`0722eff0 fffff801`509c6112 : ffff800d`eb38f1a0 fffff801`509a1eb0 ffff800d`eb38f1a0 fffff688`00000001 : NDIS!ndisIterativeDPInvokeHandlerOnTracker<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0x8b
fffff688`0722f060 fffff801`509c667a : ffff800e`13e11c50 00000000`00000000 00000000`00000001 ffff800d`e9b4c070 : NDIS!ndisInvokeIterativeDatapath<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xe2
fffff688`0722f0d0 fffff801`509a3766 : 00000000`00b260c6 00000000`00000001 00000000`00000000 ffff800d`e85baec0 : NDIS!ndisInvokeNextReceiveHandler+0xa6
fffff688`0722f130 fffff801`499855ab : ffffe181`64f62102 ffff800e`0be8fa10 fffff688`0722f279 fffff688`0722f340 : NDIS!NdisMIndicateReceiveNetBufferLists+0x116
fffff688`0722f1c0 fffff801`49991347 : ffff800e`0be8fa10 ffff800d`ebd45000 fffff688`0722f330 fffff688`0722f340 : aqnic650+0x155ab
fffff688`0722f200 fffff801`4998b401 : ffff800e`0f029090 fffff801`4a6c1200 fffff688`0722f340 fffff688`0722f330 : aqnic650+0x21347
fffff688`0722f2e0 fffff801`4998ac61 : 00000000`00000000 ffff800e`06ec9e60 00000000`00000009 00000000`00000000 : aqnic650+0x1b401
fffff688`0722f330 fffff801`509cc661 : ffff800e`0c457000 ffff800d`eb38f1a0 00000000`00000008 00000000`00000000 : aqnic650+0x1ac61
fffff688`0722f370 fffff801`509ccb1c : ffff800e`0c458868 00000000`0000000a 00000000`00000001 fffff801`474d3180 : NDIS!ndisMiniportDpc+0xf1
fffff688`0722f400 fffff801`509cc2f6 : ffff800d`e85baea0 ffff800d`e85baea0 fffff688`0722f509 fffff801`509c2e00 : NDIS!ndisQueuedMiniportDpcWorkItem+0x11c
fffff688`0722f4a0 fffff801`4bf6d8e7 : ffff800d`e8619040 ffff800d`e8619040 fffff801`509c2ef0 00000000`00000014 : NDIS!ndisReceiveWorkerThread+0x9406
fffff688`0722f570 fffff801`4c01d0f4 : ffffe181`64962180 ffff800d`e8619040 fffff801`4bf6d890 00000000`00000000 : nt!PspSystemThreadStartup+0x57
fffff688`0722f5c0 00000000`00000000 : fffff688`07230000 fffff688`07229000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+5c
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c
FAILURE_BUCKET_ID: AV_NETIO!StreamInvokeCalloutAndNormalizeAction
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c2ca2d1f-cfdc-88d5-c7bc-7693b8f0de04}
Followup: MachineOwner
---------
Best,
Will
Edit: I still suspect it's my Marvell AQtion 10Gb Ethernet network driver at C:\Windows\System32\drivers\aqnic650.sys.
Hardware ID of PCI\VEN_1D6A&DEV_94C0&SUBSYS_87F51043
This is the port built into my motherboard (ProArt X670E-CREATOR WIFI) @ ProArt X670E-CREATOR WIFI - Tech Specs|Motherboards|ASUS USA
Right now running an old driver of 3.1.3.0 from July 5 2021.
Already tried latest of 3.1.8.0 (from Public Driver Downloads | QLogic Fibre Channel HBAs and FastLinQ Ethernet adapters and controllers - Marvell) and 3.1.7.0 so figured I'd try really old.
ATM uptime of 1 hour(s), 48 minute(s), 14 second(s). I've been bluescreening with 72 hours, so will see.
Last edited:
My Computer
System One
-
- OS
- Windows 11 23H2
- Computer type
- PC/Desktop