Od dłuższego czasu borykam się z problemem Blue Screena, następuje on po około 3 dobach gdy komputer chodzi bez wyłączania. Gdy go wyłączałem i zostawiałem jedynie na cały dzień nie ma problemu. Nie spisałem dokładnie numerów błędu jedynie wiem, że napewno dotyczy NETIO.SYS. Poczytałem trochę, niby wina antywirusa ja używam Avasta home, niby wina sterowników wszystkie najnowsze i nadal to samo.
Wstawiam SMART z dysku:
Kod: Zaznacz cały
HD Tune: WDC WD3200AAKS-00B3A0 Health
ID Current Worst ThresholdData Status
(01) Raw Read Error Rate 200 200 51 0 Ok
(03) Spin Up Time 153 152 21 3341 Ok
(04) Start/Stop Count 100 100 0 831 Ok
(05) Reallocated Sector Count 200 200 140 0 Ok
(07) Seek Error Rate 200 200 0 0 Ok
(09) Power On Hours Count 72 72 0 20597 Ok
(0A) Spin Retry Count 100 100 0 0 Ok
(0B) Calibration Retry Count 100 100 0 0 Ok
(0C) Power Cycle Count 100 100 0 803 Ok
(C0) Power Off Retract Count 200 200 0 59 Ok
(C1) Load Cycle Count 200 200 0 831 Ok
(C2) Temperature 112 104 0 31 Ok
(C4) Reallocated Event Count 200 200 0 0 Ok
(C5) Current Pending Sector 200 200 0 0 Ok
(C6) Offline Uncorrectable 200 200 0 0 Ok
(C7) Ultra DMA CRC Error Count 200 200 0 0 Ok
(C8) Write Error Rate 200 200 0 0 Ok
Power On Time : 20597
Health Status : Ok
Windbg
Kod: Zaznacz cały
*
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28, 2, 0, fffffa6000cefecd}
Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000028, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffffa6000cefecd, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003082080
0000000000000028
CURRENT_IRQL: 2
FAULTING_IP:
NETIO!RtlCopyBufferToMdl+1d
fffffa60`00cefecd 448b5228 mov r10d,dword ptr [rdx+28h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffffa600d92d770 -- (.trap 0xfffffa600d92d770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa600d92d990 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa6000cefecd rsp=fffffa600d92d900 rbp=fffffa600d92da20
r8=00000000ffffffbc r9=0000000000000044 r10=0000000000000000
r11=fffffa80089994b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
NETIO!RtlCopyBufferToMdl+0x1d:
fffffa60`00cefecd 448b5228 mov r10d,dword ptr [rdx+28h] ds:e1e0:00000000`00000028=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002eb522e to fffff80002eb5490
STACK_TEXT:
fffffa60`0d92d628 fffff800`02eb522e : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffa60`0d92d630 fffff800`02eb410b : 00000000`00000000 fffffa80`0930e860 fffffa80`0930e860 00000000`00000044 : nt!KiBugCheckDispatch+0x6e
fffffa60`0d92d770 fffffa60`00cefecd : 00000000`00000000 e2b402ef`00000000 00000000`00000000 ffff0000`00000000 : nt!KiPageFault+0x20b
fffffa60`0d92d900 fffffa60`01092e80 : 00000000`00000010 00000000`00000010 fffffa80`045b15f0 fffffa60`0106a5e3 : NETIO!RtlCopyBufferToMdl+0x1d
fffffa60`0d92d960 fffffa60`0106201c : fffffa80`089994b0 fffffa80`045b15f0 00000000`00000011 00000000`7b59d1f8 : tcpip! ?? ::FNODOBFM::`string'+0x1550f
fffffa60`0d92d9d0 fffffa60`010656d2 : fffffa80`04c48b70 00000000`00000011 fffffa80`00000001 fffffa60`0d92dc20 : tcpip!TcpTcbCarefulDatagram+0x3fc
fffffa60`0d92db80 fffffa60`0105f959 : fffffa80`04c48b70 fffffa80`04627100 fffffa80`04baf000 00000000`00000000 : tcpip!TcpTcbReceive+0x512
fffffa60`0d92dd30 fffffa60`0105f3b4 : fffffa60`0cefde6c fffffa80`04baf000 00000000`00000001 fffffa80`039586b0 : tcpip!TcpMatchReceive+0x1b9
fffffa60`0d92de30 fffffa60`0104fffd : fffffa80`04c402db fffffa60`00000000 fffffa60`0d9289dd fffffa80`04baf000 : tcpip!TcpPreValidatedReceive+0x2e4
fffffa60`0d92ded0 fffffa60`010500a9 : 00000000`00000000 00000000`00000000 fffffa80`04d7ce24 00000000`00000000 : tcpip!IppDeliverListToProtocol+0x4d
fffffa60`0d92df90 fffffa60`0104f6b3 : fffffa60`011426d0 fffffa80`04c6a550 00000000`00000000 fffffa60`0d92e050 : tcpip!IppProcessDeliverList+0x59
fffffa60`0d92e000 fffffa60`0104ea0c : fffffa60`011413e8 fffffa80`04baf000 fffffa80`04c6a550 fffffa60`0cefde5c : tcpip!IppReceiveHeaderBatch+0x223
fffffa60`0d92e0e0 fffffa60`0104dff4 : fffffa80`04965aa0 00000000`00000000 fffffa80`0656a000 00000000`00000001 : tcpip!IpFlcReceivePackets+0x8dc
fffffa60`0d92e2e0 fffffa60`010b2fcc : fffffa60`0d92e460 fffffa80`04463d10 fffffa80`0656a010 fffffa80`05ac9c00 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x264
fffffa60`0d92e3c0 fffffa60`00fb30bc : 00000000`00000103 fffffa60`033d7657 fffffa80`0656e900 fffffa80`0631b1a0 : tcpip! ?? ::FNODOBFM::`string'+0x3d836
fffffa60`0d92e410 fffffa60`00f7ba5c : fffffa80`0656e9b0 00000000`00000000 fffffa80`049c4310 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xac
fffffa60`0d92e460 fffffa60`00e185c4 : fffffa80`0631b1a0 fffffa60`0d92ea20 fffffa80`049c4bf0 00000000`00000001 : ndis!ndisMDispatchReceiveNetBufferLists+0x36c
fffffa60`0d92e8e0 fffffa60`00fb38a6 : 00000000`00000001 fffff800`00000000 fffffa80`092c6770 fffffa60`0d92ea28 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffffa60`0d92e920 fffffa60`00d6cdf9 : 00000000`0000003c fffffa80`049c4bf0 00000000`00000001 00000000`045a0000 : ndis!ndisMIndicatePacketsToNetBufferLists+0x106
fffffa60`0d92e9c0 fffffa60`00f8fce7 : 00000000`00000001 00000000`00000000 fffffa80`048cccb0 fffff6fb`40000110 : tunmp!TunWrite+0x1c1
fffffa60`0d92ea10 fffff800`03119993 : 00000000`00000001 00000000`00000000 fffffa80`05866640 fffffa80`08b0f4f0 : ndis!ndisDummyIrpHandler+0xb7
fffffa60`0d92ea50 fffff800`0311fe4f : fffffa80`08b0f608 fffffa60`0d92eca0 fffffa80`05866640 fffffa60`0d92eca0 : nt!IopSynchronousServiceTail+0x123
fffffa60`0d92eab0 fffff800`02eb4f33 : ffffffff`ffffff01 00000000`00000000 00000000`00000000 00000000`045a0dc0 : nt!NtWriteFile+0x7ee
fffffa60`0d92ebb0 00000000`77386efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`10e5f1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77386efa
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!RtlCopyBufferToMdl+1d
fffffa60`00cefecd 448b5228 mov r10d,dword ptr [rdx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: NETIO!RtlCopyBufferToMdl+1d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 49e02e06
FAILURE_BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
BUCKET_ID: X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
Followup: MachineOwner
-- 05 lut 2012, 17:18 --
Wstawiłem poprawnie zdebugowany dump. Proszę kogoś o pomoc, gdyż męczę się z tym od około 2 lat
