SYSTEM_SERVICE_EXCEPTION Blue Screen
BugCheck 3B, {c0000005, fffff80f6db40b62, ffff95004121f040, 0}
*** WARNING: Unable to verify timestamp for bdfwfpf.sys
*** ERROR: Module load completed but symbols could not be loaded for bdfwfpf.sys
Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+2aa )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80f6db40b62, Address of the instruction which caused the bugcheck
Arg3: ffff95004121f040, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.296 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: HP
SYSTEM_PRODUCT_NAME: HP Pavilion Gaming Notebook
SYSTEM_SKU: W6X44EA#AB8
SYSTEM_VERSION: Type1ProductConfigId
BIOS_VENDOR: Insyde
BIOS_VERSION: F.83
BIOS_DATE: 03/29/2017
BASEBOARD_MANUFACTURER: HP
BASEBOARD_PRODUCT: 816B
BASEBOARD_VERSION: 91.1E
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80f6db40b62
BUGCHECK_P3: ffff95004121f040
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+2aa
fffff80f`6db40b62 4183795003 cmp dword ptr [r9+50h],3
CONTEXT: ffff95004121f040 -- (.cxr 0xffff95004121f040)
rax=ffffb90317a12b01 rbx=ffff95004121fbc8 rcx=ffff950038e22100
rdx=0000000000001001 rsi=ffff95004121fb98 rdi=ffffb90317a12be0
rip=fffff80f6db40b62 rsp=ffff95004121fa40 rbp=ffff95004121fac9
r8=fffff80f6db9da80 r9=0000000000000000 r10=00000000000176a4
r11=0000000000000014 r12=0000000000000000 r13=0000000000000004
r14=ffff95004121fe90 r15=fffff80f6db9d000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
NETIO!StreamInvokeCalloutAndNormalizeAction+0x2aa:
fffff80f`6db40b62 4183795003 cmp dword ptr [r9+50h],3 ds:002b:00000000`00000050=????????
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: a20
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 88'00000000 (cache) 88'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: vsserv.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-19UVO8A
ANALYSIS_SESSION_TIME: 05-24-2017 20:20:06.0779
ANALYSIS_VERSION: 10.0.15063.137 amd64fre
LAST_CONTROL_TRANSFER: from fffff80f6db40236 to fffff80f6db40b62
STACK_TEXT:
ffff9500`4121fa40 fffff80f`6db40236 : ffff9500`4121fe90 ffffb903`17a12be0 00000000`00000000 ffff9500`4121fe90 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x2aa
ffff9500`4121fb20 fffff80f`6db3f994 : ffffb903`066a0014 fffff80f`6ea12390 ffffb903`00000001 ffffb903`173101a0 : NETIO!StreamProcessCallout+0x422
ffff9500`4121fc50 fffff80f`6db3f1d7 : 00000000`00000014 ffffb903`173101a0 ffffb903`168c8d90 ffff9500`41220320 : NETIO!ProcessCallout+0x5a4
ffff9500`4121fdd0 fffff80f`6db3d206 : 00000000`00000005 ffff9500`41220010 00000000`00000000 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x497
ffff9500`4121ff10 fffff80f`6db8228b : ffffb903`06d14ac0 fffff80f`6db326d5 000509cd`010f782c 000507d3`010f782c : NETIO!KfdClassify+0x316
ffff9500`412202d0 fffff80f`6db81ce4 : 00000000`00000000 ffff9500`41220471 00000000`00000194 00000000`00000000 : NETIO!StreamInternalClassify+0x107
ffff9500`412203f0 fffff80f`6db7f2a5 : 00000000`00000014 ffffb903`168c8be0 00000000`00000000 ffffb903`0ed3ade0 : NETIO!StreamInject+0x23c
ffff9500`412204c0 fffff80f`6e414ddd : ffffb903`168c8be0 00000000`00000145 00000000`00000000 ffffb903`00000011 : NETIO!FwppStreamInject+0x135
ffff9500`41220550 fffff80f`6ff42af1 : ffffb903`04565940 00000000`00000011 ffffb903`0ed3ade0 fffff803`6acead44 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
ffff9500`412205b0 ffffb903`04565940 : 00000000`00000011 ffffb903`0ed3ade0 fffff803`6acead44 fffff803`00000145 : bdfwfpf+0x2af1
ffff9500`412205b8 00000000`00000011 : ffffb903`0ed3ade0 fffff803`6acead44 fffff803`00000145 fffff803`00000014 : 0xffffb903`04565940
ffff9500`412205c0 ffffb903`0ed3ade0 : fffff803`6acead44 fffff803`00000145 fffff803`00000014 ffffb903`00000011 : 0x11
ffff9500`412205c8 fffff803`6acead44 : fffff803`00000145 fffff803`00000014 ffffb903`00000011 ffffb903`0ed3ade0 : 0xffffb903`0ed3ade0
ffff9500`412205d0 fffff80f`6ff4c738 : ffffb903`04d04b80 ffffb903`10c3e740 ffffb903`0630c710 fffff803`6af1564c : nt!MmMapLockedPagesSpecifyCache+0xd4
ffff9500`41220690 ffffb903`04d04b80 : ffffb903`10c3e740 ffffb903`0630c710 fffff803`6af1564c 00000000`00000000 : bdfwfpf+0xc738
ffff9500`41220698 ffffb903`10c3e740 : ffffb903`0630c710 fffff803`6af1564c 00000000`00000000 ffffb903`04565958 : 0xffffb903`04d04b80
ffff9500`412206a0 ffffb903`0630c710 : fffff803`6af1564c 00000000`00000000 ffffb903`04565958 00000000`00000000 : 0xffffb903`10c3e740
ffff9500`412206a8 fffff803`6af1564c : 00000000`00000000 ffffb903`04565958 00000000`00000000 ffffb903`04565958 : 0xffffb903`0630c710
ffff9500`412206b0 fffff803`6b0f3aaf : ffffb903`11fa27b0 ffff9500`41220b00 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x2bc
ffff9500`412207a0 fffff803`6b0f3371 : ffffb903`00000000 ffffb903`11fa2704 00000000`00000000 ffff9500`41220b00 : nt!IopSynchronousServiceTail+0x1af
ffff9500`41220860 fffff803`6b0f2cb6 : b9031214`06d0c045 00000000`0000100c 00000000`00000000 00000196`512b4fb0 : nt!IopXxxControlFile+0x6a1
ffff9500`412209a0 fffff803`6ae0d213 : 00000000`746c6644 ffff9500`41220a00 00000000`00000000 ffffcb8e`237697c0 : nt!NtDeviceIoControlFile+0x56
ffff9500`41220a10 00007ffb`a7765494 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000000e`e42ff598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a7765494
THREAD_SHA1_HASH_MOD_FUNC: c178a170e043e4f275100fdeb5536895b5d337a5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 20de1dd3fac9dc67f53dffbc437d708160f3d06d
THREAD_SHA1_HASH_MOD: 70602829a7c26d9936d0283a1850cc5bc04a4038
FOLLOWUP_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+2aa
fffff80f`6db40b62 4183795003 cmp dword ptr [r9+50h],3
FAULT_INSTR_CODE: 50798341
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+2aa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.15058.0
STACK_COMMAND: .cxr 0xffff95004121f040 ; kb
BUCKET_ID_FUNC_OFFSET: 2aa
FAILURE_BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
PRIMARY_PROBLEM_CLASS: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
TARGET_TIME: 2017-05-23T00:38:43.000Z
OSBUILD: 15063
OSSERVICEPACK: 296
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-04-28 02:52:30
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.296
ANALYSIS_SESSION_ELAPSED_TIME: 407
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_netio!streaminvokecalloutandnormalizeaction
FAILURE_ID_HASH: {5c8d1e60-d80c-cb2d-a65a-8d02e5eeeffd}
Followup: MachineOwner
Comments
-
On 16.06.2017 at 6:19 PM, alp07 said:
BugCheck 3B, {c0000005, fffff80f6db40b62, ffff95004121f040, 0}
*** WARNING: Unable to verify timestamp for bdfwfpf.sys
*** ERROR: Module load completed but symbols could not be loaded for bdfwfpf.sys
Probably caused by : NETIO.SYS ( NETIO!StreamInvokeCalloutAndNormalizeAction+2aa )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80f6db40b62, Address of the instruction which caused the bugcheck
Arg3: ffff95004121f040, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.15063.296 (WinBuild.160101.0800)
SYSTEM_MANUFACTURER: HP
SYSTEM_PRODUCT_NAME: HP Pavilion Gaming Notebook
SYSTEM_SKU: W6X44EA#AB8
SYSTEM_VERSION: Type1ProductConfigId
BIOS_VENDOR: Insyde
BIOS_VERSION: F.83
BIOS_DATE: 03/29/2017
BASEBOARD_MANUFACTURER: HP
BASEBOARD_PRODUCT: 816B
BASEBOARD_VERSION: 91.1E
DUMP_TYPE: 2
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80f6db40b62
BUGCHECK_P3: ffff95004121f040
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+2aa
fffff80f`6db40b62 4183795003 cmp dword ptr [r9+50h],3
CONTEXT: ffff95004121f040 -- (.cxr 0xffff95004121f040)
rax=ffffb90317a12b01 rbx=ffff95004121fbc8 rcx=ffff950038e22100
rdx=0000000000001001 rsi=ffff95004121fb98 rdi=ffffb90317a12be0
rip=fffff80f6db40b62 rsp=ffff95004121fa40 rbp=ffff95004121fac9
r8=fffff80f6db9da80 r9=0000000000000000 r10=00000000000176a4
r11=0000000000000014 r12=0000000000000000 r13=0000000000000004
r14=ffff95004121fe90 r15=fffff80f6db9d000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
NETIO!StreamInvokeCalloutAndNormalizeAction+0x2aa:
fffff80f`6db40b62 4183795003 cmp dword ptr [r9+50h],3 ds:002b:00000000`00000050=????????
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: a20
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 88'00000000 (cache) 88'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: vsserv.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-19UVO8A
ANALYSIS_SESSION_TIME: 05-24-2017 20:20:06.0779
ANALYSIS_VERSION: 10.0.15063.137 amd64fre
LAST_CONTROL_TRANSFER: from fffff80f6db40236 to fffff80f6db40b62
STACK_TEXT:
ffff9500`4121fa40 fffff80f`6db40236 : ffff9500`4121fe90 ffffb903`17a12be0 00000000`00000000 ffff9500`4121fe90 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x2aa
ffff9500`4121fb20 fffff80f`6db3f994 : ffffb903`066a0014 fffff80f`6ea12390 ffffb903`00000001 ffffb903`173101a0 : NETIO!StreamProcessCallout+0x422
ffff9500`4121fc50 fffff80f`6db3f1d7 : 00000000`00000014 ffffb903`173101a0 ffffb903`168c8d90 ffff9500`41220320 : NETIO!ProcessCallout+0x5a4
ffff9500`4121fdd0 fffff80f`6db3d206 : 00000000`00000005 ffff9500`41220010 00000000`00000000 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x497
ffff9500`4121ff10 fffff80f`6db8228b : ffffb903`06d14ac0 fffff80f`6db326d5 000509cd`010f782c 000507d3`010f782c : NETIO!KfdClassify+0x316
ffff9500`412202d0 fffff80f`6db81ce4 : 00000000`00000000 ffff9500`41220471 00000000`00000194 00000000`00000000 : NETIO!StreamInternalClassify+0x107
ffff9500`412203f0 fffff80f`6db7f2a5 : 00000000`00000014 ffffb903`168c8be0 00000000`00000000 ffffb903`0ed3ade0 : NETIO!StreamInject+0x23c
ffff9500`412204c0 fffff80f`6e414ddd : ffffb903`168c8be0 00000000`00000145 00000000`00000000 ffffb903`00000011 : NETIO!FwppStreamInject+0x135
ffff9500`41220550 fffff80f`6ff42af1 : ffffb903`04565940 00000000`00000011 ffffb903`0ed3ade0 fffff803`6acead44 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
ffff9500`412205b0 ffffb903`04565940 : 00000000`00000011 ffffb903`0ed3ade0 fffff803`6acead44 fffff803`00000145 : bdfwfpf+0x2af1
ffff9500`412205b8 00000000`00000011 : ffffb903`0ed3ade0 fffff803`6acead44 fffff803`00000145 fffff803`00000014 : 0xffffb903`04565940
ffff9500`412205c0 ffffb903`0ed3ade0 : fffff803`6acead44 fffff803`00000145 fffff803`00000014 ffffb903`00000011 : 0x11
ffff9500`412205c8 fffff803`6acead44 : fffff803`00000145 fffff803`00000014 ffffb903`00000011 ffffb903`0ed3ade0 : 0xffffb903`0ed3ade0
ffff9500`412205d0 fffff80f`6ff4c738 : ffffb903`04d04b80 ffffb903`10c3e740 ffffb903`0630c710 fffff803`6af1564c : nt!MmMapLockedPagesSpecifyCache+0xd4
ffff9500`41220690 ffffb903`04d04b80 : ffffb903`10c3e740 ffffb903`0630c710 fffff803`6af1564c 00000000`00000000 : bdfwfpf+0xc738
ffff9500`41220698 ffffb903`10c3e740 : ffffb903`0630c710 fffff803`6af1564c 00000000`00000000 ffffb903`04565958 : 0xffffb903`04d04b80
ffff9500`412206a0 ffffb903`0630c710 : fffff803`6af1564c 00000000`00000000 ffffb903`04565958 00000000`00000000 : 0xffffb903`10c3e740
ffff9500`412206a8 fffff803`6af1564c : 00000000`00000000 ffffb903`04565958 00000000`00000000 ffffb903`04565958 : 0xffffb903`0630c710
ffff9500`412206b0 fffff803`6b0f3aaf : ffffb903`11fa27b0 ffff9500`41220b00 00000000`00000000 00000000`00000000 : nt!ExAllocatePoolWithTag+0x2bc
ffff9500`412207a0 fffff803`6b0f3371 : ffffb903`00000000 ffffb903`11fa2704 00000000`00000000 ffff9500`41220b00 : nt!IopSynchronousServiceTail+0x1af
ffff9500`41220860 fffff803`6b0f2cb6 : b9031214`06d0c045 00000000`0000100c 00000000`00000000 00000196`512b4fb0 : nt!IopXxxControlFile+0x6a1
ffff9500`412209a0 fffff803`6ae0d213 : 00000000`746c6644 ffff9500`41220a00 00000000`00000000 ffffcb8e`237697c0 : nt!NtDeviceIoControlFile+0x56
ffff9500`41220a10 00007ffb`a7765494 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000000e`e42ff598 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a7765494
THREAD_SHA1_HASH_MOD_FUNC: c178a170e043e4f275100fdeb5536895b5d337a5
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 20de1dd3fac9dc67f53dffbc437d708160f3d06d
THREAD_SHA1_HASH_MOD: 70602829a7c26d9936d0283a1850cc5bc04a4038
FOLLOWUP_IP:
NETIO!StreamInvokeCalloutAndNormalizeAction+2aa
fffff80f`6db40b62 4183795003 cmp dword ptr [r9+50h],3
FAULT_INSTR_CODE: 50798341
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: NETIO!StreamInvokeCalloutAndNormalizeAction+2aa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.15058.0
STACK_COMMAND: .cxr 0xffff95004121f040 ; kb
BUCKET_ID_FUNC_OFFSET: 2aa
FAILURE_BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
BUCKET_ID: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
PRIMARY_PROBLEM_CLASS: 0x3B_NETIO!StreamInvokeCalloutAndNormalizeAction
TARGET_TIME: 2017-05-23T00:38:43.000Z
OSBUILD: 15063
OSSERVICEPACK: 296
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-04-28 02:52:30
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.15063.296
ANALYSIS_SESSION_ELAPSED_TIME: 407
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_netio!streaminvokecalloutandnormalizeaction
FAILURE_ID_HASH: {5c8d1e60-d80c-cb2d-a65a-8d02e5eeeffd}
Followup: MachineOwner0 -
The bdfwfpf.sys from the bitdefender software is corrupted try this link it might help you.
http://www.tomshardware.com/forum/id-2953772/system-service-exception-blue-screen.html0