Witam serdecznie,
od jakiegoś czasu mam problem z blue screenem. Mianowicie gdy włączam komputer po jakis 2-5min od wczytania systemu pojawia mi się blue screen po czym restartuje się komputer. Dzieje się tak 2-4 razy pod rząd i później komputer normalnie już działa. Poniżej zamieszczam zrzut mojego blue screena.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, fffff80003090c3f}
Unable to load image \SystemRoot\System32\Drivers\NISx64\1501000.012\SYMNETS.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for SYMNETS.SYS
*** ERROR: Module load completed but symbols could not be loaded for SYMNETS.SYS
Probably caused by : NETIO.SYS ( NETIO!WfpExpireEntryLru+17 )
Followup: MachineOwner
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003090c3f, address which referenced memory
Debugging Details:
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bf100
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+4f
fffff800`03090c3f 488713 xchg rdx,qword ptr [rbx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: NIS.exe
TRAP_FRAME: fffff8800b44bf30 – (.trap 0xfffff8800b44bf30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800d0f5060 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8800b44c130 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003090c3f rsp=fffff8800b44c0c0 rbp=0000000000000008
r8=fffff8800b44c130 r9=fffff88001d89cc0 r10=0000000000000000
r11=0000000000000040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f:
fffff80003090c3f 488713 xchg rdx,qword ptr [rbx] ds:00000000
00000000=???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003087169 to fffff80003087bc0
STACK_TEXT:
fffff8800b44bde8 fffff800
03087169 : 000000000000000a 00000000
00000000 0000000000000002 00000000
00000001 : nt!KeBugCheckEx
fffff8800b44bdf0 fffff800
03085de0 : 0000000000000010 fffff880
0b44c120 0000000000000003 00000000
00000000 : nt!KiBugCheckDispatch+0x69
fffff8800b44bf30 fffff800
03090c3f : 0000000000000003 00000000
00000002 0000000000000003 00000000
00000002 : nt!KiPageFault+0x260
fffff8800b44c0c0 fffff880
01a2b9a7 : 0000000000000008 fffff880
0b44c3a0 000000000000dff1 fffffa80
0d8bb068 : nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x4f
fffff8800b44c110 fffff880
01ce505d : fffffa800db6b270 fffffa80
0d6c51c0 fffff8800b44c3a0 00000000
0000dff1 : NETIO!WfpExpireEntryLru+0x17
fffff8800b44c160 fffff880
01cac787 : 0000000000000004 fffff8a0
09530030 fffff8800b44c3d0 fffffa80
00000001 : tcpip!WfpAleCloseRemoteEndpointConnection+0x2d
fffff8800b44c190 fffff880
01d24e2b : fffffa800db6b270 fffffa80
06ed2caa 0000000000000001 fffffa80
0db6b270 : tcpip! ?? ::FNODOBFM::`string’+0x20f72
fffff8800b44c2e0 fffff880
01d251b2 : 0000f1df00000000 fffffa80
06ed2be0 fffffa8006f77980 00000000
00000001 : tcpip!WfpAleHandleSendCompletion+0xeb
fffff8800b44c400 fffff880
01d2f682 : 0000000000000000 00000000
00000001 0000000000000000 fffffa80
06f84cd8 : tcpip!WfpAlepAuthorizeSendCompletion+0x32
fffff8800b44c450 fffff880
01605af2 : fffffa800000c916 fffff800
0000f1df fffffa800cb5f710 00000000
00000001 : tcpip!WfpAleCompleteOperation+0x162
fffff8800b44c4f0 fffff880
0e82242b : 0000000000000000 00000000
00000000 fffffa800e172c90 00000000
00000030 : fwpkclnt!FwpsCompleteOperation0+0x1e
fffff8800b44c520 00000000
00000000 : 0000000000000000 fffffa80
0e172c90 0000000000000030 00000000
0000c916 : SYMNETS+0x1e42b
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!WfpExpireEntryLru+17
fffff880`01a2b9a7 488b4310 mov rax,qword ptr [rbx+10h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!WfpExpireEntryLru+17
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 5034f6a0
FAILURE_BUCKET_ID: X64_0xA_NETIO!WfpExpireEntryLru+17
BUCKET_ID: X64_0xA_NETIO!WfpExpireEntryLru+17
Followup: MachineOwner