SYSTEM_SERVICE_EXCEPTION Blue Screen


BugCheck 3B, {c0000005, fffff80f6db40b62, ffff95004121f040, 0}

*** WARNING: Unable to verify timestamp for bdfwfpf.sys
*** ERROR: Module load completed but symbols could not be loaded for bdfwfpf.sys
Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+2aa )

Followup:     MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80f6db40b62, Address of the instruction which caused the bugcheck
Arg3: ffff95004121f040, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.15063.296 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  HP

SYSTEM_PRODUCT_NAME:  HP Pavilion Gaming Notebook

SYSTEM_SKU:  W6X44EA#AB8

SYSTEM_VERSION:  Type1ProductConfigId

BIOS_VENDOR:  Insyde

BIOS_VERSION:  F.83

BIOS_DATE:  03/29/2017

BASEBOARD_MANUFACTURER:  HP

BASEBOARD_PRODUCT:  816B

BASEBOARD_VERSION:  91.1E

DUMP_TYPE:  2

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80f6db40b62

BUGCHECK_P3: ffff95004121f040

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+2aa
fffff80f`6db40b62 4183795003      cmp     dword ptr [r9+50h],3

CONTEXT:  ffff95004121f040 -- (.cxr 0xffff95004121f040)
rax=ffffb90317a12b01 rbx=ffff95004121fbc8 rcx=ffff950038e22100
rdx=0000000000001001 rsi=ffff95004121fb98 rdi=ffffb90317a12be0
rip=fffff80f6db40b62 rsp=ffff95004121fa40 rbp=ffff95004121fac9
 r8=fffff80f6db9da80  r9=0000000000000000 r10=00000000000176a4
r11=0000000000000014 r12=0000000000000000 r13=0000000000000004
r14=ffff95004121fe90 r15=fffff80f6db9d000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
NETIO!StreamInvokeCalloutAndNormalizeAction+0x2aa:
fffff80f`6db40b62 4183795003      cmp     dword ptr [r9+50h],3 ds:002b:00000000`00000050=????????
Resetting default scope

CPU_COUNT: 8

CPU_MHZ: a20

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 5e

CPU_STEPPING: 3

CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: 88'00000000 (cache) 88'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  vsserv.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-19UVO8A

ANALYSIS_SESSION_TIME:  05-24-2017 20:20:06.0779

ANALYSIS_VERSION: 10.0.15063.137 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80f6db40236 to fffff80f6db40b62

STACK_TEXT:  
ffff9500`4121fa40 fffff80f`6db40236 : ffff9500`4121fe90 ffffb903`17a12be0 00000000`00000000 ffff9500`4121fe90 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x2aa
ffff9500`4121fb20 fffff80f`6db3f994 : ffffb903`066a0014 fffff80f`6ea12390 ffffb903`00000001 ffffb903`173101a0 : NETIO!StreamProcessCallout+0x422
ffff9500`4121fc50 fffff80f`6db3f1d7 : 00000000`00000014 ffffb903`173101a0 ffffb903`168c8d90 ffff9500`41220320 : NETIO!ProcessCallout+0x5a4
ffff9500`4121fdd0 fffff80f`6db3d206 : 00000000`00000005 ffff9500`41220010 00000000`00000000 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x497
ffff9500`4121ff10 fffff80f`6db8228b : ffffb903`06d14ac0 fffff80f`6db326d5 000509cd`010f782c 000507d3`010f782c : NETIO!KfdClassify+0x316
ffff9500`412202d0 fffff80f`6db81ce4 : 00000000`00000000 ffff9500`41220471 00000000`00000194 00000000`00000000 : NETIO!StreamInternalClassify+0x107
ffff9500`412203f0 fffff80f`6db7f2a5 : 00000000`00000014 ffffb903`168c8be0 00000000`00000000 ffffb903`0ed3ade0 : NETIO!StreamInject+0x23c
ffff9500`412204c0 fffff80f`6e414ddd : ffffb903`168c8be0 00000000`00000145 00000000`00000000 ffffb903`00000011 : NETIO!FwppStreamInject+0x135
ffff9500`41220550 fffff80f`6ff42af1 : ffffb903`04565940 00000000`00000011 ffffb903`0ed3ade0 fffff803`6acead44 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
ffff9500`412205b0 ffffb903`04565940 : 00000000`00000011 ffffb903`0ed3ade0 fffff803`6acead44 fffff803`00000145 : bdfwfpf+0x2af1
ffff9500`412205b8 00000000`00000011 : ffffb903`0ed3ade0 fffff803`6acead44 fffff803`00000145 fffff803`00000014 : 0xffffb903`04565940
ffff9500`412205c0 ffffb903`0ed3ade0 : fffff803`6acead44 fffff803`00000145 fffff803`00000014 ffffb903`00000011 : 0x11
ffff9500`412205c8 fffff803`6acead44 : fffff803`00000145 fffff803`00000014 ffffb903`00000011 ffffb903`0ed3ade0 : 0xffffb903`0ed3ade0
ffff9500`412205d0 fffff80f`6ff4c738 : ffffb903`04d04b80 ffffb903`10c3e740 ffffb903`0630c710 fffff803`6af1564c : nt!MmMapLockedPagesSpecifyCache+0xd4
ffff9500`41220690 ffffb903`04d04b80 : ffffb903`10c3e740 ffffb903`0630c710 fffff803`6af1564c 00000000`00000000 : bdfwfpf+0xc738
ffff9500`41220698 ffffb903`10c3e740 : ffffb903`0630c710 fffff803`6af1564c 00000000`00000000 ffffb903`04565958 : 0xffffb903`04d04b80
ffff9500`412206a0 ffffb903`0630c710 : fffff803`6af1564c 00000000`00000000 ffffb903`04565958 00000000`00000000 : 0xffffb903`10c3e740
ffff9500`412206a8 fffff803`6af1564c : 00000000`00000000 ffffb903`04565958 00000000`00000000 ffffb903`04565958 : 0xffffb903`0630c710
ffff9500`412206b0 fffff803`6b0f3aaf : ffffb903`11fa27b0 ffff9500`41220b00 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x2bc
ffff9500`412207a0 fffff803`6b0f3371 : ffffb903`00000000 ffffb903`11fa2704 00000000`00000000 ffff9500`41220b00 : nt!IopSynchronousServiceTail+0x1af
ffff9500`41220860 fffff803`6b0f2cb6 : b9031214`06d0c045 00000000`0000100c 00000000`00000000 00000196`512b4fb0 : nt!IopXxxControlFile+0x6a1
ffff9500`412209a0 fffff803`6ae0d213 : 00000000`746c6644 ffff9500`41220a00 00000000`00000000 ffffcb8e`237697c0 : nt!NtDeviceIoControlFile+0x56
ffff9500`41220a10 00007ffb`a7765494 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000000e`e42ff598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a7765494


THREAD_SHA1_HASH_MOD_FUNC:  c178a170e043e4f275100fdeb5536895b5d337a5

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  20de1dd3fac9dc67f53dffbc437d708160f3d06d

THREAD_SHA1_HASH_MOD:  70602829a7c26d9936d0283a1850cc5bc04a4038

FOLLOWUP_IP: 
NETIO!StreamInvokeCalloutAndNormalizeAction+2aa
fffff80f`6db40b62 4183795003      cmp     dword ptr [r9+50h],3

FAULT_INSTR_CODE:  50798341

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  NETIO!StreamInvokeCalloutAndNormalizeAction+2aa

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.15058.0

STACK_COMMAND:  .cxr 0xffff95004121f040 ; kb

BUCKET_ID_FUNC_OFFSET:  2aa

FAILURE_BUCKET_ID:  0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction

BUCKET_ID:  0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction

PRIMARY_PROBLEM_CLASS:  0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction

TARGET_TIME:  2017-05-23T00:38:43.000Z

OSBUILD:  15063

OSSERVICEPACK:  296

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2017-04-28 02:52:30

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.15063.296

ANALYSIS_SESSION_ELAPSED_TIME:  407

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_netio!streaminvokecalloutandnormalizeaction

FAILURE_ID_HASH:  {5c8d1e60-d80c-cb2d-a65a-8d02e5eeeffd}

Followup:     MachineOwner

052317-30390-01.dmp

Comments



  • On 16.06.2017 at 6:19 PM, alp07 said:



    BugCheck 3B, {c0000005, fffff80f6db40b62, ffff95004121f040, 0}

    *** WARNING: Unable to verify timestamp for bdfwfpf.sys
    *** ERROR: Module load completed but symbols could not be loaded for bdfwfpf.sys
    Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+2aa )

    Followup:     MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80f6db40b62, Address of the instruction which caused the bugcheck
    Arg3: ffff95004121f040, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.

    Debugging Details:
    ------------------


    DUMP_CLASS: 1

    DUMP_QUALIFIER: 400

    BUILD_VERSION_STRING:  10.0.15063.296 (WinBuild.160101.0800)

    SYSTEM_MANUFACTURER:  HP

    SYSTEM_PRODUCT_NAME:  HP Pavilion Gaming Notebook

    SYSTEM_SKU:  W6X44EA#AB8

    SYSTEM_VERSION:  Type1ProductConfigId

    BIOS_VENDOR:  Insyde

    BIOS_VERSION:  F.83

    BIOS_DATE:  03/29/2017

    BASEBOARD_MANUFACTURER:  HP

    BASEBOARD_PRODUCT:  816B

    BASEBOARD_VERSION:  91.1E

    DUMP_TYPE:  2

    DUMP_FILE_ATTRIBUTES: 0x8
      Kernel Generated Triage Dump

    BUGCHECK_P1: c0000005

    BUGCHECK_P2: fffff80f6db40b62

    BUGCHECK_P3: ffff95004121f040

    BUGCHECK_P4: 0

    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

    FAULTING_IP: 
    NETIO!StreamInvokeCalloutAndNormalizeAction+2aa
    fffff80f`6db40b62 4183795003      cmp     dword ptr [r9+50h],3

    CONTEXT:  ffff95004121f040 -- (.cxr 0xffff95004121f040)
    rax=ffffb90317a12b01 rbx=ffff95004121fbc8 rcx=ffff950038e22100
    rdx=0000000000001001 rsi=ffff95004121fb98 rdi=ffffb90317a12be0
    rip=fffff80f6db40b62 rsp=ffff95004121fa40 rbp=ffff95004121fac9
     r8=fffff80f6db9da80  r9=0000000000000000 r10=00000000000176a4
    r11=0000000000000014 r12=0000000000000000 r13=0000000000000004
    r14=ffff95004121fe90 r15=fffff80f6db9d000
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    NETIO!StreamInvokeCalloutAndNormalizeAction+0x2aa:
    fffff80f`6db40b62 4183795003      cmp     dword ptr [r9+50h],3 ds:002b:00000000`00000050=????????
    Resetting default scope

    CPU_COUNT: 8

    CPU_MHZ: a20

    CPU_VENDOR:  GenuineIntel

    CPU_FAMILY: 6

    CPU_MODEL: 5e

    CPU_STEPPING: 3

    CPU_MICROCODE: 6,5e,3,0 (F,M,S,R)  SIG: 88'00000000 (cache) 88'00000000 (init)

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

    BUGCHECK_STR:  0x3B

    PROCESS_NAME:  vsserv.exe

    CURRENT_IRQL:  0

    ANALYSIS_SESSION_HOST:  DESKTOP-19UVO8A

    ANALYSIS_SESSION_TIME:  05-24-2017 20:20:06.0779

    ANALYSIS_VERSION: 10.0.15063.137 amd64fre

    LAST_CONTROL_TRANSFER:  from fffff80f6db40236 to fffff80f6db40b62

    STACK_TEXT:  
    ffff9500`4121fa40 fffff80f`6db40236 : ffff9500`4121fe90 ffffb903`17a12be0 00000000`00000000 ffff9500`4121fe90 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x2aa
    ffff9500`4121fb20 fffff80f`6db3f994 : ffffb903`066a0014 fffff80f`6ea12390 ffffb903`00000001 ffffb903`173101a0 : NETIO!StreamProcessCallout+0x422
    ffff9500`4121fc50 fffff80f`6db3f1d7 : 00000000`00000014 ffffb903`173101a0 ffffb903`168c8d90 ffff9500`41220320 : NETIO!ProcessCallout+0x5a4
    ffff9500`4121fdd0 fffff80f`6db3d206 : 00000000`00000005 ffff9500`41220010 00000000`00000000 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x497
    ffff9500`4121ff10 fffff80f`6db8228b : ffffb903`06d14ac0 fffff80f`6db326d5 000509cd`010f782c 000507d3`010f782c : NETIO!KfdClassify+0x316
    ffff9500`412202d0 fffff80f`6db81ce4 : 00000000`00000000 ffff9500`41220471 00000000`00000194 00000000`00000000 : NETIO!StreamInternalClassify+0x107
    ffff9500`412203f0 fffff80f`6db7f2a5 : 00000000`00000014 ffffb903`168c8be0 00000000`00000000 ffffb903`0ed3ade0 : NETIO!StreamInject+0x23c
    ffff9500`412204c0 fffff80f`6e414ddd : ffffb903`168c8be0 00000000`00000145 00000000`00000000 ffffb903`00000011 : NETIO!FwppStreamInject+0x135
    ffff9500`41220550 fffff80f`6ff42af1 : ffffb903`04565940 00000000`00000011 ffffb903`0ed3ade0 fffff803`6acead44 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
    ffff9500`412205b0 ffffb903`04565940 : 00000000`00000011 ffffb903`0ed3ade0 fffff803`6acead44 fffff803`00000145 : bdfwfpf+0x2af1
    ffff9500`412205b8 00000000`00000011 : ffffb903`0ed3ade0 fffff803`6acead44 fffff803`00000145 fffff803`00000014 : 0xffffb903`04565940
    ffff9500`412205c0 ffffb903`0ed3ade0 : fffff803`6acead44 fffff803`00000145 fffff803`00000014 ffffb903`00000011 : 0x11
    ffff9500`412205c8 fffff803`6acead44 : fffff803`00000145 fffff803`00000014 ffffb903`00000011 ffffb903`0ed3ade0 : 0xffffb903`0ed3ade0
    ffff9500`412205d0 fffff80f`6ff4c738 : ffffb903`04d04b80 ffffb903`10c3e740 ffffb903`0630c710 fffff803`6af1564c : nt!MmMapLockedPagesSpecifyCache+0xd4
    ffff9500`41220690 ffffb903`04d04b80 : ffffb903`10c3e740 ffffb903`0630c710 fffff803`6af1564c 00000000`00000000 : bdfwfpf+0xc738
    ffff9500`41220698 ffffb903`10c3e740 : ffffb903`0630c710 fffff803`6af1564c 00000000`00000000 ffffb903`04565958 : 0xffffb903`04d04b80
    ffff9500`412206a0 ffffb903`0630c710 : fffff803`6af1564c 00000000`00000000 ffffb903`04565958 00000000`00000000 : 0xffffb903`10c3e740
    ffff9500`412206a8 fffff803`6af1564c : 00000000`00000000 ffffb903`04565958 00000000`00000000 ffffb903`04565958 : 0xffffb903`0630c710
    ffff9500`412206b0 fffff803`6b0f3aaf : ffffb903`11fa27b0 ffff9500`41220b00 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x2bc
    ffff9500`412207a0 fffff803`6b0f3371 : ffffb903`00000000 ffffb903`11fa2704 00000000`00000000 ffff9500`41220b00 : nt!IopSynchronousServiceTail+0x1af
    ffff9500`41220860 fffff803`6b0f2cb6 : b9031214`06d0c045 00000000`0000100c 00000000`00000000 00000196`512b4fb0 : nt!IopXxxControlFile+0x6a1
    ffff9500`412209a0 fffff803`6ae0d213 : 00000000`746c6644 ffff9500`41220a00 00000000`00000000 ffffcb8e`237697c0 : nt!NtDeviceIoControlFile+0x56
    ffff9500`41220a10 00007ffb`a7765494 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    0000000e`e42ff598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a7765494


    THREAD_SHA1_HASH_MOD_FUNC:  c178a170e043e4f275100fdeb5536895b5d337a5

    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  20de1dd3fac9dc67f53dffbc437d708160f3d06d

    THREAD_SHA1_HASH_MOD:  70602829a7c26d9936d0283a1850cc5bc04a4038

    FOLLOWUP_IP: 
    NETIO!StreamInvokeCalloutAndNormalizeAction+2aa
    fffff80f`6db40b62 4183795003      cmp     dword ptr [r9+50h],3

    FAULT_INSTR_CODE:  50798341

    SYMBOL_STACK_INDEX:  0

    SYMBOL_NAME:  NETIO!StreamInvokeCalloutAndNormalizeAction+2aa

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: NETIO

    IMAGE_NAME:  NETIO.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP:  0

    IMAGE_VERSION:  10.0.15058.0

    STACK_COMMAND:  .cxr 0xffff95004121f040 ; kb

    BUCKET_ID_FUNC_OFFSET:  2aa

    FAILURE_BUCKET_ID:  0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction

    BUCKET_ID:  0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction

    PRIMARY_PROBLEM_CLASS:  0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction

    TARGET_TIME:  2017-05-23T00:38:43.000Z

    OSBUILD:  15063

    OSSERVICEPACK:  296

    SERVICEPACK_NUMBER: 0

    OS_REVISION: 0

    SUITE_MASK:  784

    PRODUCT_TYPE:  1

    OSPLATFORM_TYPE:  x64

    OSNAME:  Windows 10

    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

    OS_LOCALE:  

    USER_LCID:  0

    OSBUILD_TIMESTAMP:  2017-04-28 02:52:30

    BUILDDATESTAMP_STR:  160101.0800

    BUILDLAB_STR:  WinBuild

    BUILDOSVER_STR:  10.0.15063.296

    ANALYSIS_SESSION_ELAPSED_TIME:  407

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:0x3b_netio!streaminvokecalloutandnormalizeaction

    FAILURE_ID_HASH:  {5c8d1e60-d80c-cb2d-a65a-8d02e5eeeffd}

    Followup:     MachineOwner


    /applications/core/interface/file/attachment.php?id=16472" data-fileid="16472" rel="">052317-30390-01.dmp



    /index.php?/profile/201429-sorin-g/&do=hovercard" data-mentionid="201429" href="<___base_url___>/index.php?/profile/201429-sorin-g/" rel="">@Sorin G.


  • The bdfwfpf.sys from the bitdefender software is corrupted try this link it might help you. default_happy.png


     


    http://www.tomshardware.com/forum/id-2953772/system-service-exception-blue-screen.html