询问者
系统频繁蓝屏

问题
-
您好,
最近系统频繁蓝屏,以下是DEBUG 日志,能否帮我看一下是什么原因造成的么?谢谢。
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Deferred SRV*d:\Symbols*http://msdl.microsoft.com/download/symbols
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Users\Administrator\Desktop\nina\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Deferred SRV*d:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;SRV*d:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff804`04200000 PsLoadedModuleList = 0xfffff804`04648170
Debug session time: Wed Dec 11 16:22:58.313 2019 (UTC + 8:00)
System Uptime: 0 days 7:08:57.594
Loading Kernel Symbols
.......................................Page 200413c27 too large to be in the dump file.
Page 200413c26 too large to be in the dump file.
........................
................................................................
.........................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000090`4d727018). Type ".hh dbgerr001" for details
Loading unloaded module list
......
For analysis of this file, run !analyze -v
4: kd> !analyze -v
ERROR: FindPlugIns 8007007b
ERROR: Some plugins may not be available [8007007b]
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff804087df42b, Address of the instruction which caused the bugcheck
Arg3: ffffd0816a36d930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
DBGHELP: Timeout to store: d:\Symbols*http://msdl.microsoft.com/download/symbols
DBGHELP: Timeout to store: d:\Symbols*http://msdl.microsoft.com/download/symbols
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Dell Inc.
SYSTEM_PRODUCT_NAME: OptiPlex 7040
SYSTEM_SKU: 06B9
BIOS_VENDOR: Dell Inc.
BIOS_VERSION: 1.9.2
BIOS_DATE: 05/24/2018
BASEBOARD_MANUFACTURER: Dell Inc.
BASEBOARD_PRODUCT: 0JCTF8
BASEBOARD_VERSION: A00
DUMP_TYPE: 1
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff804087df42b
BUGCHECK_P3: ffffd0816a36d930
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
tcpip!Ipv4EnumerateAllPaths+34b
fffff804`087df42b 8b08 mov ecx,dword ptr [rax]
CONTEXT: ffffd0816a36d930 -- (.cxr 0xffffd0816a36d930)
rax=ffefba0d19b272a0 rbx=ffffba0d1ceb9040 rcx=0000000000000001
rdx=ffffba0d193c5010 rsi=ffffba0d16fc9d70 rdi=ffffba0d16fc98e0
rip=fffff804087df42b rsp=ffffb80d001f70d0 rbp=ffffb80d001f71d0
r8=000000000000034e r9=ffffba0d239e6088 r10=00000000000000d7
r11=00000000000000cf r12=000000000000011a r13=ffffb80d001f7430
r14=ffffba0d193c5010 r15=ffffba0d19b271e0
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050283
tcpip!Ipv4EnumerateAllPaths+0x34b:
fffff804`087df42b 8b08 mov ecx,dword ptr [rax] ds:002b:ffefba0d`19b272a0=????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 8
CPU_MHZ: d50
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: C6'00000000 (cache) C6'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: U170VLEW1IWVE0G
ANALYSIS_SESSION_TIME: 12-13-2019 13:55:13.0472
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: ffffd0816a36cff8
LAST_CONTROL_TRANSFER: from fffff8040873f02f to fffff804087df42b
STACK_TEXT:
ffffb80d`001f70d0 fffff804`0873f02f : 00000000`00000001 fffff804`0899a5f0 00000090`4e17f320 fffff804`0899c4e8 : tcpip!Ipv4EnumerateAllPaths+0x34b
ffffb80d`001f7300 fffff804`12222acd : ffffba0d`239e6000 ffffba0d`00000070 00000000`00000000 00000090`4e17f320 : NETIO!NsiEnumerateObjectsAllParametersEx+0x24f
ffffb80d`001f74e0 fffff804`122226a2 : 00000000`00000000 ffffba0d`1d6fd430 ffffba0d`1d6fd360 00000090`4e17f320 : nsiproxy!NsippEnumerateObjectsAllParameters+0x25d
ffffb80d`001f76d0 fffff804`04231f79 : 00000000`00000002 00000000`00000000 ffffba0d`1d01a750 ffffba0d`1989ed10 : nsiproxy!NsippDispatch+0x82
ffffb80d`001f7720 fffff804`047e95e5 : ffffba0d`1d6fd360 00000000`00000000 00000000`00000000 ffffba0d`1d01a750 : nt!IofCallDriver+0x59
ffffb80d`001f7760 fffff804`047e93f0 : 00000000`00000000 00000000`00040800 ffffba0d`1d01a750 ffffb80d`001f7a80 : nt!IopSynchronousServiceTail+0x1a5
ffffb80d`001f7800 fffff804`047e87c6 : 00000090`4e17f240 00000000`00000774 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffffb80d`001f7920 fffff804`043d2d15 : ffffba0d`1d138080 00000090`4e17f228 ffffb80d`001f79a8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffb80d`001f7990 00007ffc`fec1c1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000090`4e17f2b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`fec1c1a4
THREAD_SHA1_HASH_MOD_FUNC: b1cca67147e0bb697b92f52dbb6a6fdb4594ed4f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1c8cc1f9a154528b93c0426b1ae2e34b3ef57791
THREAD_SHA1_HASH_MOD: 93557ecf5cf6a7cf1865866c5b8912b319059ebe
FOLLOWUP_IP:
NETIO!NsiEnumerateObjectsAllParametersEx+24f
fffff804`0873f02f 89442464 mov dword ptr [rsp+64h],eax
FAULT_INSTR_CODE: 64244489
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: NETIO!NsiEnumerateObjectsAllParametersEx+24f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xffffd0816a36d930 ; kb
BUCKET_ID_FUNC_OFFSET: 24f
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_NETIO!NsiEnumerateObjectsAllParametersEx
BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_NETIO!NsiEnumerateObjectsAllParametersEx
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_STACKPTR_ERROR_NETIO!NsiEnumerateObjectsAllParametersEx
TARGET_TIME: 2019-12-11T08:22:58.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 07:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 21ec1e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_stackptr_error_netio!nsienumerateobjectsallparametersex
FAILURE_ID_HASH: {0d4a0022-4df4-4e44-1a44-b7a0ee3986ed}
Followup: MachineOwner
---------
4: kd> !analyze -v
ERROR: FindPlugIns 8007007b
ERROR: Some plugins may not be available [8007007b]
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff804087df42b, Address of the instruction which caused the bugcheck
Arg3: ffffd0816a36d930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Dell Inc.
SYSTEM_PRODUCT_NAME: OptiPlex 7040
SYSTEM_SKU: 06B9
BIOS_VENDOR: Dell Inc.
BIOS_VERSION: 1.9.2
BIOS_DATE: 05/24/2018
BASEBOARD_MANUFACTURER: Dell Inc.
BASEBOARD_PRODUCT: 0JCTF8
BASEBOARD_VERSION: A00
DUMP_TYPE: 1
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff804087df42b
BUGCHECK_P3: ffffd0816a36d930
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.
FAULTING_IP:
tcpip!Ipv4EnumerateAllPaths+34b
fffff804`087df42b 8b08 mov ecx,dword ptr [rax]
CONTEXT: ffffd0816a36d930 -- (.cxr 0xffffd0816a36d930)
rax=ffefba0d19b272a0 rbx=ffffba0d1ceb9040 rcx=0000000000000001
rdx=ffffba0d193c5010 rsi=ffffba0d16fc9d70 rdi=ffffba0d16fc98e0
rip=fffff804087df42b rsp=ffffb80d001f70d0 rbp=ffffb80d001f71d0
r8=000000000000034e r9=ffffba0d239e6088 r10=00000000000000d7
r11=00000000000000cf r12=000000000000011a r13=ffffb80d001f7430
r14=ffffba0d193c5010 r15=ffffba0d19b271e0
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050283
tcpip!Ipv4EnumerateAllPaths+0x34b:
fffff804`087df42b 8b08 mov ecx,dword ptr [rax] ds:002b:ffefba0d`19b272a0=????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: 8
CPU_MHZ: d50
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: C6'00000000 (cache) C6'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: U170VLEW1IWVE0G
ANALYSIS_SESSION_TIME: 12-13-2019 14:32:16.0622
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: ffffd0816a36cff8
LAST_CONTROL_TRANSFER: from fffff8040873f02f to fffff804087df42b
STACK_TEXT:
ffffb80d`001f70d0 fffff804`0873f02f : 00000000`00000001 fffff804`0899a5f0 00000090`4e17f320 fffff804`0899c4e8 : tcpip!Ipv4EnumerateAllPaths+0x34b
ffffb80d`001f7300 fffff804`12222acd : ffffba0d`239e6000 ffffba0d`00000070 00000000`00000000 00000090`4e17f320 : NETIO!NsiEnumerateObjectsAllParametersEx+0x24f
ffffb80d`001f74e0 fffff804`122226a2 : 00000000`00000000 ffffba0d`1d6fd430 ffffba0d`1d6fd360 00000090`4e17f320 : nsiproxy!NsippEnumerateObjectsAllParameters+0x25d
ffffb80d`001f76d0 fffff804`04231f79 : 00000000`00000002 00000000`00000000 ffffba0d`1d01a750 ffffba0d`1989ed10 : nsiproxy!NsippDispatch+0x82
ffffb80d`001f7720 fffff804`047e95e5 : ffffba0d`1d6fd360 00000000`00000000 00000000`00000000 ffffba0d`1d01a750 : nt!IofCallDriver+0x59
ffffb80d`001f7760 fffff804`047e93f0 : 00000000`00000000 00000000`00040800 ffffba0d`1d01a750 ffffb80d`001f7a80 : nt!IopSynchronousServiceTail+0x1a5
ffffb80d`001f7800 fffff804`047e87c6 : 00000090`4e17f240 00000000`00000774 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffffb80d`001f7920 fffff804`043d2d15 : ffffba0d`1d138080 00000090`4e17f228 ffffb80d`001f79a8 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffb80d`001f7990 00007ffc`fec1c1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000090`4e17f2b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`fec1c1a4
THREAD_SHA1_HASH_MOD_FUNC: b1cca67147e0bb697b92f52dbb6a6fdb4594ed4f
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1c8cc1f9a154528b93c0426b1ae2e34b3ef57791
THREAD_SHA1_HASH_MOD: 93557ecf5cf6a7cf1865866c5b8912b319059ebe
FOLLOWUP_IP:
NETIO!NsiEnumerateObjectsAllParametersEx+24f
fffff804`0873f02f 89442464 mov dword ptr [rsp+64h],eax
FAULT_INSTR_CODE: 64244489
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: NETIO!NsiEnumerateObjectsAllParametersEx+24f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xffffd0816a36d930 ; kb
BUCKET_ID_FUNC_OFFSET: 24f
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_NETIO!NsiEnumerateObjectsAllParametersEx
BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_NETIO!NsiEnumerateObjectsAllParametersEx
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_STACKPTR_ERROR_NETIO!NsiEnumerateObjectsAllParametersEx
TARGET_TIME: 2019-12-11T08:22:58.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 07:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 4238
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_stackptr_error_netio!nsienumerateobjectsallparametersex
FAILURE_ID_HASH: {0d4a0022-4df4-4e44-1a44-b7a0ee3986ed}
Followup: MachineOwner
---------
全部回复
-
驱动程序故障引发的关联系统服务运行错误导致蓝屏,比较有可能的是网络相关驱动程序。
Alexis Zhang
http://mvp.microsoft.com/zh-cn/mvp/Jie%20Zhang-4000545
推荐以 NNTP Bridge 桥接新闻组方式访问论坛。
本帖是回复帖,原帖作者是楼上的 "你的那片天空"
| 您好,
| 最近系统频繁蓝屏,以下是DEBUG 日志,能否帮我看一下是什么原因造成的么?谢谢。