NETIO.SYS蓝屏问题

匿名
2024-03-01T11:54:03+00:00

6: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * *******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000009, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8010ed9009d, address which referenced memory

Debugging Details:
------------------

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1124

    Key  : Analysis.Elapsed.mSec
    Value: 4955

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5480

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 127

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_NETIO!CmRegUtilUcValueGetFullBuffer

    Key  : Failure.Hash
    Value: {a382ffb4-3138-b303-0926-0bd418cdbdba}

BUGCHECK_CODE:  d1

BUGCHECK_P1: 9

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8010ed9009d

FILE_IN_CAB:  030124-12671-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

READ_ADDRESS: fffff8010cf1c470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000009 

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffaf00258a4d20 -- (.trap 0xffffaf00258a4d20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffaf00258a5770 rbx=0000000000000000 rcx=fffff8010ed90007
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8010ed9009d rsp=ffffaf00258a4eb0 rbp=ffffaf00258a4ef0
 r8=fffff8010ed00000  r9=ffff8d8fbd4fdf68 r10=ffffaf00258a5770
r11=597ba027fed9d7b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
NETIO!CmRegUtilUcValueGetFullBuffer+0x12d:
fffff801`0ed9009d 837b0403        cmp     dword ptr [rbx+4],3 ds:00000000`00000004=????????
Resetting default scope

STACK_TEXT:  
ffffaf00`258a4bd8 fffff801`0c62c5e9     : 00000000`0000000a 00000000`00000009 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaf00`258a4be0 fffff801`0c627b34     : 00000000`00200001 fffff801`0c43c355 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaf00`258a4d20 fffff801`0ed9009d     : ffffe700`8695d180 00000000`00000008 fffff801`0cf4b0d0 fffff801`0eb73940 : nt!KiPageFault+0x474
ffffaf00`258a4eb0 fffff801`0ed0806d     : 00000000`00000005 ffffaf00`258a54e0 ffff8d8f`a875baa0 ffff2ed4`00000001 : NETIO!CmRegUtilUcValueGetFullBuffer+0x12d
ffffaf00`258a4f00 fffff801`0ed051d5     : ffff8d8f`b5bb8010 fffff801`0c40e93d ffff8d8f`ac9a2000 ffffaf00`258a5830 : NETIO!KfdClassify+0xcbd
ffffaf00`258a52b0 fffff801`0ed04dd8     : 00000000`00002702 fffff801`0ee34f54 00000000`00002702 ffffaf00`258a5590 : NETIO!StreamClassify+0x279
ffffaf00`258a5450 fffff801`0ed04a47     : ffffaf00`258a5ba0 fffff801`00000001 00000000`00000054 00000000`00000000 : NETIO!StreamCommonInspect+0x2ac
ffffaf00`258a5840 fffff801`0ee29511     : ffff8d8f`ba811a00 ffff8d8f`ba811ce0 ffffaf00`258a59c0 ffff8d8f`ba811ab0 : NETIO!WfpStreamInspectReceive+0x157
ffffaf00`258a58c0 fffff801`0ee279ee     : ffff8d8f`ad763200 fffff801`255da772 00000000`00000000 00000000`00000000 : tcpip!TcpTcbFastDatagram+0x1351
ffffaf00`258a5ac0 fffff801`0ee23e19     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8d8f`ac9d5148 : tcpip!TcpTcbReceive+0x29e
ffffaf00`258a5c60 fffff801`0ee22f36     : 00000000`5981e2a9 00000000`00000010 ffff8d8f`b1305080 ffff8d8f`ac9d5148 : tcpip!TcpMatchReceive+0x519
ffffaf00`258a5e30 fffff801`0ee1f966     : ffff8d8f`a83ff480 ffff8d8f`b1036078 00000000`00000001 ffff8d8f`b9ee3130 : tcpip!TcpReceive+0x486
ffffaf00`258a5f40 fffff801`0ee47f46     : fffff801`0efd5400 00000000`00000000 00000000`00000014 ffff8d8f`ac9d53d8 : tcpip!TcpNlClientReceiveDatagrams+0x16
ffffaf00`258a5f70 fffff801`0ee47d39     : 00000000`00000000 ffff8d8f`00000006 ffff8d8f`ac9d5000 ffffaf00`258a60c0 : tcpip!IppProcessDeliverList+0xb6
ffffaf00`258a6060 fffff801`0ee46a02     : fffff801`0f0049d0 ffff8d8f`ac8308a0 ffff8d8f`ac9d5000 ffffaf00`258a61a0 : tcpip!IppReceiveHeaderBatch+0x3a9
ffffaf00`258a6150 fffff801`0ee9b6c6     : ffff8d8f`b64dfe50 ffff8d8f`c19cd160 ffffaf00`258a6201 00000000`00000000 : tcpip!IppReceivePackets+0x502
ffffaf00`258a6280 fffff801`0ee66a1b     : ffff8d8f`b64dfe50 ffff8d8f`c19cd160 ffff8d8f`a4010380 ffff8d8f`a4010100 : tcpip!IpFlcReceivePreValidatedPackets+0x11c6
ffffaf00`258a6410 fffff801`0c4eb8aa     : 00000000`00000006 fffff801`0ee668d0 ffff8d8f`b6f500b4 00000000`00000002 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x14b
ffffaf00`258a6560 fffff801`0c4eb81d     : fffff801`0ee668d0 ffffaf00`258a66a8 ffff8d8f`a7effd90 ffffaf00`258a6c00 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
ffffaf00`258a65d0 fffff801`0ee67d30     : 00000000`00000000 fffff801`0c485de8 00000000`0000000c ffffaf00`258a66e9 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffaf00`258a6610 fffff801`0eb826e1     : 00000000`00000001 00000000`00000000 00000000`00000005 ffff8d8f`bed18920 : tcpip!FlReceiveNetBufferListChain+0x530
ffffaf00`258a68f0 fffff801`0eb820fa     : ffff8d8f`b6e1fb20 fffff801`0eba0801 ffff8d8f`00000000 ffff8d8f`00000005 : ndis!ndisMIndicateNetBufferListsToOpen+0x141
ffffaf00`258a69d0 fffff801`0eba6298     : ffff8d8f`ad32f1a0 00000000`00000000 fffffff0`00000000 ffff8d8f`ad32f1a0 : ndis!ndisMTopReceiveNetBufferLists+0x24a
ffffaf00`258a6ab0 fffff801`0eba873b     : 00000000`00000000 00000000`00000000 ffff8d8f`c19cd160 fffff801`0eb732ed : ndis!ndisInvokeNextReceiveHandler+0x54
ffffaf00`258a6b10 fffff801`09851279     : ffff8d8f`00000000 00000000`00000000 ffff8d8f`00000000 fffff801`00000005 : ndis!NdisFIndicateReceiveNetBufferLists+0x340bb
ffffaf00`258a6bc0 fffff801`0eba6225     : 00000000`00000001 ffff8d8f`b6eeb028 00000000`00000000 00000000`00000005 : nwifi!Pt6Receive+0x159
ffffaf00`258a6c80 fffff801`0eba5c93     : 00000000`00005db8 ffffaf00`258a6da0 00000000`00000000 fffff801`0c4ebaa5 : ndis!ndisCallReceiveHandler+0xb9
ffffaf00`258a6cd0 fffff801`0ebac70a     : ffffaf00`258a6db8 ffffaf00`00000000 00000000`00011505 ffffaf00`258a6e98 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
ffffaf00`258a6d20 fffff801`0eba631f     : ffff8d8f`c17df940 fffff801`00000000 ffffaf00`00000005 ffffe700`00000000 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
ffffaf00`258a6dc0 fffff801`0eba873b     : 00000000`00000000 00000000`00000000 ffff8d8f`c17df940 00000011`00000011 : ndis!ndisInvokeNextReceiveHandler+0xdb
ffffaf00`258a6e20 fffff801`24755ffb     : ffff8d8f`b6edeb00 00000000`00000000 00000000`00000000 fffff801`00000005 : ndis!NdisFIndicateReceiveNetBufferLists+0x340bb
ffffaf00`258a6ed0 fffff801`0eba6225     : ffff8d8f`b6eddb30 fffff801`24755f20 ffff8d8f`b6eeb010 ffffaf00`258a7108 : vwififlt!FilterReceiveNetBufferLists+0xdb
ffffaf00`258a6f30 fffff801`0eba5c93     : 00000000`00006068 ffffaf00`258a7050 00000000`00000000 fffff801`0c4ebaa5 : ndis!ndisCallReceiveHandler+0xb9
ffffaf00`258a6f80 fffff801`0ebac70a     : ffffaf00`258a7068 00000000`00000000 ffffaf00`258a70c0 ffffaf00`258a7110 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
ffffaf00`258a6fd0 fffff801`0eba631f     : ffff8d8f`c17df940 fffff801`00000000 00000000`00000005 00000000`00000000 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
ffffaf00`258a7070 fffff801`0eba873b     : 00000000`00000000 00000000`00000000 ffff8d8f`c17df940 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb
ffffaf00`258a70d0 fffff801`0f1b12dc     : ffff8d8f`b6edc000 ffffaf00`258a71e1 00000000`00000000 00000000`00000005 : ndis!NdisFIndicateReceiveNetBufferLists+0x340bb
ffffaf00`258a7180 fffff801`0eba6225     : 00000000`00000005 ffff8d8f`c17df940 ffff8d8f`c17df940 00000000`00000001 : wfplwfs!LwfLowerRecvNetBufferLists+0x14c
ffffaf00`258a7240 fffff801`0eba5c93     : 00000000`00006378 ffffaf00`258a7360 00000000`00000000 fffff801`0c4ebaa5 : ndis!ndisCallReceiveHandler+0xb9
ffffaf00`258a7290 fffff801`0ebac70a     : ffffaf00`258a7378 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallNextDatapathHandler<2,void * __ptr64 & __ptr64,void (__cdecl*& __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 & __ptr64,_NET_BUFFER_LIST * __ptr64 & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64,unsigned long & __ptr64>+0x3f
ffffaf00`258a72e0 fffff801`0eba631f     : ffff8d8f`c17df940 00000000`00000000 ffff8d8f`00000005 00000000`00000000 : ndis!ndisExpandDataPathStack<2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)>+0xae
ffffaf00`258a7380 fffff801`0eb83766     : 00000000`0004f30a 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb
ffffaf00`258a73e0 fffff801`255dc94d     : ffff8d8f`a50ea002 ffff8d8f`ad2b8ab0 ffffaf00`258a7570 00000000`00000005 : ndis!NdisMIndicateReceiveNetBufferLists+0x116
ffffaf00`258a7470 fffff801`255dbf9e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : wdiwifi!CPort::IndicateFrames+0xad
ffffaf00`258a75b0 fffff801`255db417     : 00000000`00000000 ffffaf00`258a7748 fffff801`256bf040 ffffc28b`4d600000 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x41e
ffffaf00`258a76e0 fffff801`255db268     : ffff8d8f`c17df940 ffff8d8f`00000003 00000000`0000000a ffff2ed4`16a8052a : wdiwifi!CRxMgr::RxInOrderDataInd+0x127
ffffaf00`258a7790 fffff801`3178bd0e     : ffff8d8f`ad57d8c0 ffff8d8f`ad497270 00000000`00000001 ffff8d8f`ac7de040 : wdiwifi!AdapterRxInorderDataInd+0x88
ffffaf00`258a77e0 ffff8d8f`ad57d8c0     : ffff8d8f`ad497270 00000000`00000001 ffff8d8f`ac7de040 ffffaf00`258a7828 : Netwtw12+0x4bd0e
ffffaf00`258a77e8 ffff8d8f`ad497270     : 00000000`00000001 ffff8d8f`ac7de040 ffffaf00`258a7828 ffffaf00`258a7820 : 0xffff8d8f`ad57d8c0
ffffaf00`258a77f0 00000000`00000001     : ffff8d8f`ac7de040 ffffaf00`258a7828 ffffaf00`258a7820 00000000`00000004 : 0xffff8d8f`ad497270
ffffaf00`258a77f8 ffff8d8f`ac7de040     : ffffaf00`258a7828 ffffaf00`258a7820 00000000`00000004 00000000`00000002 : 0x1
ffffaf00`258a7800 ffffaf00`258a7828     : ffffaf00`258a7820 00000000`00000004 00000000`00000002 00000000`00000000 : 0xffff8d8f`ac7de040
ffffaf00`258a7808 ffffaf00`258a7820     : 00000000`00000004 00000000`00000002 00000000`00000000 fffffffe`ffffffff : 0xffffaf00`258a7828
ffffaf00`258a7810 00000000`00000004     : 00000000`00000002 00000000`00000000 fffffffe`ffffffff ffff4b55`f205ac89 : 0xffffaf00`258a7820
ffffaf00`258a7818 00000000`00000002     : 00000000`00000000 fffffffe`ffffffff ffff4b55`f205ac89 ffff8d8f`b6f50040 : 0x4
ffffaf00`258a7820 00000000`00000000     : fffffffe`ffffffff ffff4b55`f205ac89 ffff8d8f`b6f50040 00000000`00000009 : 0x2

SYMBOL_NAME:  NETIO!CmRegUtilUcValueGetFullBuffer+12d

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.22621.3155

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  12d

FAILURE_BUCKET_ID:  AV_NETIO!CmRegUtilUcValueGetFullBuffer

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a382ffb4-3138-b303-0926-0bd418cdbdba}

Followup:     MachineOwner
---------
Windows 家庭版 | Windows 11 | 设备和驱动程序

锁定的问题。 此问题已从 Microsoft 支持社区迁移。 你可投票决定它是否有用,但不能添加评论或回复,也不能关注问题。

0 个注释 无注释
{count} 票

2 个答案

排序依据: 非常有帮助
  1. 匿名
    2024-03-02T06:31:43+00:00

    您好,欢迎询问微软社区

    感谢您的反馈,根据您提供的日志,您遇到的是 DRIVER_IRQL_NOT_LESS_OR_EQUAL的蓝屏问题。

    这个蓝屏报错通常是由于驱动问题导致的。进一步分析,出现问题的模块为NETIO.SYS,这是一个因此,问题范围缩小到网络设备的驱动程序。因此,请您到您的网络设备的官网,下载并更新驱动。

    另外,有时部分网络软件也会在系统中创建一些虚拟的网络设备,如果您近期有安装过相关软件,请将其卸载看看问题是否会消失。

    希望以上信息能够帮助到您。如果需要进一步的协助,如果需要进一步的协助,您可以通过下列步骤获得小容量的dmp文件,这有助于您分享这个相关的DMP信息: 点按窗口+R输入sysdm.cpl进入系统属性,点按高级选项卡找到启动和故障修复,点按设置写入调试信息中,选择小内存存储下面的目录会变成%SystemRoot%\Minidump您可以记住这个位置,如果您再次遇到蓝屏,您可以重启电脑后将这个位置输入资源管理器,您可以看到文件夹下创建的.DMP文件,将这个文件上传到网盘并提供链接给我们,我们将在分析后为您提供进一步建议。

    Lugoo Bei|微软社区支持专员

    5 个人认为此答案很有帮助。
    0 个注释 无注释
  2. 匿名
    2024-07-22T18:56:11+00:00

    这个文件在 路径 C:\Windows\System32\drivers\NETIO.SYS
    结合更新时间,可以百分百确定
    是下列驱动

    此下载将安装适用于英特尔® Wi-Fi 7/Wi-Fi 6E/Wi-Fi 6 和英特尔® 9000 系列无线适配器的 Windows® 10 和 Windows 11* Wi-Fi 包驱动程序 23.60.1 版本:
    23.60.1.2发行日期:
    2024年6月25日大小:
    43.42 MB

    或者是

    安装英特尔®无线Bluetooth®版本 23.60.0 驱动程序版本因安装的无线适配器而异。版本:
    23.60.0.1发行日期:
    2024年6月25日大小:
    56.85 MB
    即英特尔的驱动。

    6 个人认为此答案很有帮助。
    0 个注释 无注释