Could someone possibly help me with this mini dump? I started receiving this a couple months ago after getting a new SSD. I RMA'd the SSD (Crucial M4) thinking it was causing it. I received a new one today and still received the same blue screen. The blue screen is random. It happens randomly at idle, while browsing the web, and playing games. I ran memtest with no errors as well. I've set the BIOS to defaults and still have blue screens, etc. I've tried the latest Intel network driver and the network driver from the ASUS cd and both give me the errors.
I called ASUS and they gave me some bs about if it posts and boots then it isn't the motherboard. I don't buy that obviously because I know things can somewhat work, but still be faulty. Right now I'm at the point of RMA'ing the motherboard which they have sent me, but I figured I would seek assistance from the great member base of this forum and see if someone can shed a little more light on it.
I did have to take some colons out here and there since the forum said I had too many smileys or something, but I don't think that will affect the outcome of what you are looking at.
ASUS P8P67 Pro 3.0
Intel 2500k
G.Skill 8GB ram
Corsair TX750 PSU
Thank you for any help you can provide,
Jared
I called ASUS and they gave me some bs about if it posts and boots then it isn't the motherboard. I don't buy that obviously because I know things can somewhat work, but still be faulty. Right now I'm at the point of RMA'ing the motherboard which they have sent me, but I figured I would seek assistance from the great member base of this forum and see if someone can shed a little more light on it.
I did have to take some colons out here and there since the forum said I had too many smileys or something, but I don't think that will affect the outcome of what you are looking at.
ASUS P8P67 Pro 3.0
Intel 2500k
G.Skill 8GB ram
Corsair TX750 PSU
Thank you for any help you can provide,
Jared
BugCheck 1000007E, {ffffffffc0000005, fffff880015237ba, fffff880031bd708, fffff880031bcf60}
*** WARNING: Unable to verify timestamp for epfwwfp.sys
*** ERROR: Module load completed but symbols could not be loaded for epfwwfp.sys
TRIAGER: Could not open triage file : C Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\modclass.ini, error 2
Probably caused by : NETIO.SYS ( NETIO!NetioCompleteCloneNetBufferListChain+9a )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880015237ba, The address that the exception occurred at
Arg3: fffff880031bd708, Exception Record Address
Arg4: fffff880031bcf60, Context Record Address
Debugging Details:
------------------
TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
NETIO!NetioCompleteCloneNetBufferListChain+9a
fffff880`015237ba 488b01 mov rax,qword ptr [rcx]
EXCEPTION_RECORD: fffff880031bd708 -- (.exr 0xfffff880031bd708)
ExceptionAddress: fffff880015237ba (NETIO!NetioCompleteCloneNetBufferListChain+0x000000000000009a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: fffff880031bcf60 -- (.cxr 0xfffff880031bcf60)
rax=fffffa8008a863b0 rbx=fffffa8006e36160 rcx=0000000000000000
rdx=0000000000001000 rsi=00000000fffffe0d rdi=fffff880031bd900
rip=fffff880015237ba rsp=fffff880031bd940 rbp=fffffa800807e000
r8=fffff78000000320 r9=0000000000000002 r10=fffff88002f65e80
r11=fffffa800808a5e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
NETIO!NetioCompleteCloneNetBufferListChain+0x9a:
fffff880`015237ba 488b01 mov rax,qword ptr [rcx] ds:002b:00000000`00000000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c6100
GetUlongFromAddress: unable to read from fffff800030c61c0
0000000000000000 Nonpaged pool
FOLLOWUP_IP:
NETIO!NetioCompleteCloneNetBufferListChain+9a
fffff880`015237ba 488b01 mov rax,qword ptr [rcx]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff88001515336 to fffff880015237ba
STACK_TEXT:
fffff880`031bd940 fffff880`01515336 : 00000000`00000000 fffffa80`06e36030 00000000`00000000 fffff880`031bd900 : NETIO!NetioCompleteCloneNetBufferListChain+0x9a
fffff880`031bd9b0 fffff880`01897256 : fffffa80`06e36030 fffffa80`0a218c90 fffffa80`0a218c90 fffffa80`06e36100 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`031bd9e0 fffff880`04607018 : fffff880`0460c7e0 fffffa80`06e36160 00000000`00000000 00000000`00000000 : fwpkclnt!FwpsDereferenceNetBufferList0+0xaa
fffff880`031bda30 fffff880`0460c7e0 : fffffa80`06e36160 00000000`00000000 00000000`00000000 fffff880`0460c7e0 : epfwwfp+0x7018
fffff880`031bda38 fffffa80`06e36160 : 00000000`00000000 00000000`00000000 fffff880`0460c7e0 fffff880`0460705a : epfwwfp+0xc7e0
fffff880`031bda40 00000000`00000000 : 00000000`00000000 fffff880`0460c7e0 fffff880`0460705a 00000000`00000000 : 0xfffffa80`06e36160
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: NETIO!NetioCompleteCloneNetBufferListChain+9a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
STACK_COMMAND: .cxr 0xfffff880031bcf60 ; kb
FAILURE_BUCKET_ID: X64_0x7E_NETIO!NetioCompleteCloneNetBufferListChain+9a
BUCKET_ID: X64_0x7E_NETIO!NetioCompleteCloneNetBufferListChain+9a
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1 ffffffffc0000005, The exception code that was not handled
Arg2 fffff880015237ba, The address that the exception occurred at
Arg3 fffff880031bd708, Exception Record Address
Arg4 fffff880031bcf60, Context Record Address
Debugging Details:
------------------
TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
NETIO!NetioCompleteCloneNetBufferListChain+9a
fffff880`015237ba 488b01 mov rax,qword ptr
EXCEPTION_RECORD: fffff880031bd708 -- (.exr 0xfffff880031bd708)
ExceptionAddress: fffff880015237ba (NETIO!NetioCompleteCloneNetBufferListChain+0x000000000000009a)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: fffff880031bcf60 -- (.cxr 0xfffff880031bcf60)
rax=fffffa8008a863b0 rbx=fffffa8006e36160 rcx=0000000000000000
rdx=0000000000001000 rsi=00000000fffffe0d rdi=fffff880031bd900
rip=fffff880015237ba rsp=fffff880031bd940 rbp=fffffa800807e000
r8=fffff78000000320 r9=0000000000000002 r10=fffff88002f65e80
r11=fffffa800808a5e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
NETIO!NetioCompleteCloneNetBufferListChain+0x9a:
fffff880`015237ba 488b01 mov rax,qword ptr ds: 002b:00000000`00000000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
READ_ADDRESS: 0000000000000000 Nonpaged pool
FOLLOWUP_IP:
NETIO!NetioCompleteCloneNetBufferListChain+9a
fffff880`015237ba 488b01 mov rax,qword ptr
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff88001515336 to fffff880015237ba
STACK_TEXT:
fffff880`031bd940 fffff880`01515336 : 00000000`00000000 fffffa80`06e36030 00000000`00000000 fffff880`031bd900 : NETIO!NetioCompleteCloneNetBufferListChain+0x9a
fffff880`031bd9b0 fffff880`01897256 : fffffa80`06e36030 fffffa80`0a218c90 fffffa80`0a218c90 fffffa80`06e36100 : NETIO!NetioDereferenceNetBufferList+0x86
fffff880`031bd9e0 fffff880`04607018 : fffff880`0460c7e0 fffffa80`06e36160 00000000`00000000 00000000`00000000 : fwpkclnt!FwpsDereferenceNetBufferList0+0xaa
fffff880`031bda30 fffff880`0460c7e0 : fffffa80`06e36160 00000000`00000000 00000000`00000000 fffff880`0460c7e0 : epfwwfp+0x7018
fffff880`031bda38 fffffa80`06e36160 : 00000000`00000000 00000000`00000000 fffff880`0460c7e0 fffff880`0460705a : epfwwfp+0xc7e0
fffff880`031bda40 00000000`00000000 : 00000000`00000000 fffff880`0460c7e0 fffff880`0460705a 00000000`00000000 : 0xfffffa80`06e36160
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: NETIO!NetioCompleteCloneNetBufferListChain+9a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME : NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
STACK_COMMAND : .cxr 0xfffff880031bcf60 ; kb
FAILURE_BUCKET_ID : X64_0x7E_NETIO!NetioCompleteCloneNetBufferListChain+9a
BUCKET_ID: X64_0x7E_NETIO!NetioCompleteCloneNetBufferListChain+9a
Followup: MachineOwner
---------
Last edited: