My Minidump output is as follows: Can someone please help. I dont know what to do next. I managed to reach till the minidump file after 5 days of searching online. My computer crashes for no reason even when I am doing nothing. Would appreciate if someone with technical skills can help me read the minidump file and help understand the best resolution to the same.
Thanks in Advance
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\061715-43015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.17736.amd64fre.winblue_r9.150322-1500
Machine Name:
Kernel base = 0xfffff800`2f875000 PsLoadedModuleList = 0xfffff800`2fb4e850
Debug session time: Wed Jun 17 10:24:56.887 2015 (UTC - 4:00)
System Uptime: 0 days 11:51:36.652
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
............................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 1200, 0, ffffe0003e7193c8}
*** WARNING: Unable to verify timestamp for aswStm.sys
*** ERROR: Module load completed but symbols could not be loaded for aswStm.sys
GetPointerFromAddress: unable to read from fffff8002fbd8138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+20d7f )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: ffffe0003e7193c8, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: ffffe0003e7193c8
FREED_POOL_TAG: Mdl
BUGCHECK_STR: 0xc2_7_Mdl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
LAST_CONTROL_TRANSFER: from fffff8002fb19ff2 to fffff8002f9c5ca0
STACK_TEXT:
ffffd000`23094508 fffff800`2fb19ff2 : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00000000 : nt!KeBugCheckEx
ffffd000`23094510 fffff800`1802f91f : 00000000`00000000 00000000`00000002 ffffe000`42b612f0 fffff800`00000000 : nt!ExAllocatePoolWithTag+0x1102
ffffd000`23094600 fffff800`1859c824 : 00000000`00000000 00000000`00000000 ffffe000`42b61330 00000000`00000000 : NETIO!NetioFreeMdl+0x20d7f
ffffd000`23094650 fffff800`180018c1 : ffffe000`400f1030 ffffd000`00000001 00000000`00000000 fffff800`1801a7b0 : tcpip!FlpReturnNetBufferListChain+0x87094
ffffd000`230946a0 fffff800`18724792 : ffffe000`400f1030 ffffe000`400f1030 00000000`00000000 ffffe000`3ff5ae20 : NETIO!NetioDereferenceNetBufferList+0xc1
ffffd000`23094720 fffff800`1872530d : ffffe000`400f1030 ffffd000`230947c0 ffffd000`23094830 ffffe000`3aa21170 : fwpkclnt!FwppDereferenceNetioNetBufferList+0x46
ffffd000`23094770 fffff800`18725466 : ffffe000`400f1030 00000000`00000000 ffffe000`3ffb24a0 ffffd000`23094800 : fwpkclnt!FwpsDereferenceNetBufferList0+0x25
ffffd000`230947a0 fffff800`1bdb7728 : ffffe000`3f5b6f00 00000000`00000000 ffffd000`230948e0 fffff800`1bdc2e15 : fwpkclnt!FwpsFreeCloneNetBufferList0+0x106
ffffd000`230947e0 ffffe000`3f5b6f00 : 00000000`00000000 ffffd000`230948e0 fffff800`1bdc2e15 00000000`00000000 : aswStm+0x7728
ffffd000`230947e8 00000000`00000000 : ffffd000`230948e0 fffff800`1bdc2e15 00000000`00000000 fffff800`1bdb72cf : 0xffffe000`3f5b6f00
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioFreeMdl+20d7f
fffff800`1802f91f 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: NETIO!NetioFreeMdl+20d7f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 540ebbe6
IMAGE_VERSION: 6.3.9600.17337
BUCKET_ID_FUNC_OFFSET: 20d7f
FAILURE_BUCKET_ID: 0xc2_7_Mdl__NETIO!NetioFreeMdl
BUCKET_ID: 0xc2_7_Mdl__NETIO!NetioFreeMdl
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc2_7_mdl__netio!netiofreemdl
FAILURE_ID_HASH: {f2c46e80-d936-89a0-13f9-f9b302dc640b}
Followup: MachineOwner
---------
2: kd> lmvm NETIO
start end module name
fffff800`18000000 fffff800`18078000 NETIO (pdb symbols) c:\windows\symbol_cache\netio.pdb\1A13EC2D01DC4013A4E57B7EB995FD8F2\netio.pdb
Loaded symbol image file: NETIO.SYS
Mapped memory image file: c:\windows\symbol_cache\NETIO.SYS\540EBBE678000\NETIO.SYS
Image path: \SystemRoot\system32\drivers\NETIO.SYS
Image name: NETIO.SYS
Timestamp: Tue Sep 09 04:35:50 2014 (540EBBE6)
CheckSum: 0007D1B9
ImageSize: 00078000
File version: 6.3.9600.17337
Product version: 6.3.9600.17337
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: netio.sys
OriginalFilename: netio.sys
ProductVersion: 6.3.9600.17337
FileVersion: 6.3.9600.17337 (winblue_r3.140908-1537)
FileDescription: Network I/O Subsystem
LegalCopyright: © Microsoft Corporation. All rights reserved.
Thanks in Advance
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\061715-43015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.17736.amd64fre.winblue_r9.150322-1500
Machine Name:
Kernel base = 0xfffff800`2f875000 PsLoadedModuleList = 0xfffff800`2fb4e850
Debug session time: Wed Jun 17 10:24:56.887 2015 (UTC - 4:00)
System Uptime: 0 days 11:51:36.652
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
............................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {7, 1200, 0, ffffe0003e7193c8}
*** WARNING: Unable to verify timestamp for aswStm.sys
*** ERROR: Module load completed but symbols could not be loaded for aswStm.sys
GetPointerFromAddress: unable to read from fffff8002fbd8138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
Probably caused by : NETIO.SYS ( NETIO!NetioFreeMdl+20d7f )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001200, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: ffffe0003e7193c8, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: ffffe0003e7193c8
FREED_POOL_TAG: Mdl
BUGCHECK_STR: 0xc2_7_Mdl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
LAST_CONTROL_TRANSFER: from fffff8002fb19ff2 to fffff8002f9c5ca0
STACK_TEXT:
ffffd000`23094508 fffff800`2fb19ff2 : 00000000`000000c2 00000000`00000007 00000000`00001200 00000000`00000000 : nt!KeBugCheckEx
ffffd000`23094510 fffff800`1802f91f : 00000000`00000000 00000000`00000002 ffffe000`42b612f0 fffff800`00000000 : nt!ExAllocatePoolWithTag+0x1102
ffffd000`23094600 fffff800`1859c824 : 00000000`00000000 00000000`00000000 ffffe000`42b61330 00000000`00000000 : NETIO!NetioFreeMdl+0x20d7f
ffffd000`23094650 fffff800`180018c1 : ffffe000`400f1030 ffffd000`00000001 00000000`00000000 fffff800`1801a7b0 : tcpip!FlpReturnNetBufferListChain+0x87094
ffffd000`230946a0 fffff800`18724792 : ffffe000`400f1030 ffffe000`400f1030 00000000`00000000 ffffe000`3ff5ae20 : NETIO!NetioDereferenceNetBufferList+0xc1
ffffd000`23094720 fffff800`1872530d : ffffe000`400f1030 ffffd000`230947c0 ffffd000`23094830 ffffe000`3aa21170 : fwpkclnt!FwppDereferenceNetioNetBufferList+0x46
ffffd000`23094770 fffff800`18725466 : ffffe000`400f1030 00000000`00000000 ffffe000`3ffb24a0 ffffd000`23094800 : fwpkclnt!FwpsDereferenceNetBufferList0+0x25
ffffd000`230947a0 fffff800`1bdb7728 : ffffe000`3f5b6f00 00000000`00000000 ffffd000`230948e0 fffff800`1bdc2e15 : fwpkclnt!FwpsFreeCloneNetBufferList0+0x106
ffffd000`230947e0 ffffe000`3f5b6f00 : 00000000`00000000 ffffd000`230948e0 fffff800`1bdc2e15 00000000`00000000 : aswStm+0x7728
ffffd000`230947e8 00000000`00000000 : ffffd000`230948e0 fffff800`1bdc2e15 00000000`00000000 fffff800`1bdb72cf : 0xffffe000`3f5b6f00
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NetioFreeMdl+20d7f
fffff800`1802f91f 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: NETIO!NetioFreeMdl+20d7f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 540ebbe6
IMAGE_VERSION: 6.3.9600.17337
BUCKET_ID_FUNC_OFFSET: 20d7f
FAILURE_BUCKET_ID: 0xc2_7_Mdl__NETIO!NetioFreeMdl
BUCKET_ID: 0xc2_7_Mdl__NETIO!NetioFreeMdl
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc2_7_mdl__netio!netiofreemdl
FAILURE_ID_HASH: {f2c46e80-d936-89a0-13f9-f9b302dc640b}
Followup: MachineOwner
---------
2: kd> lmvm NETIO
start end module name
fffff800`18000000 fffff800`18078000 NETIO (pdb symbols) c:\windows\symbol_cache\netio.pdb\1A13EC2D01DC4013A4E57B7EB995FD8F2\netio.pdb
Loaded symbol image file: NETIO.SYS
Mapped memory image file: c:\windows\symbol_cache\NETIO.SYS\540EBBE678000\NETIO.SYS
Image path: \SystemRoot\system32\drivers\NETIO.SYS
Image name: NETIO.SYS
Timestamp: Tue Sep 09 04:35:50 2014 (540EBBE6)
CheckSum: 0007D1B9
ImageSize: 00078000
File version: 6.3.9600.17337
Product version: 6.3.9600.17337
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: netio.sys
OriginalFilename: netio.sys
ProductVersion: 6.3.9600.17337
FileVersion: 6.3.9600.17337 (winblue_r3.140908-1537)
FileDescription: Network I/O Subsystem
LegalCopyright: © Microsoft Corporation. All rights reserved.