Been getting BSOD for a few days now. First it was a security failure in the kernel, and from debugging I updated all my network drivers. Now it's a new error but I can't seem to trace the problem.
Should note that it only seems to happen when going idle, even if a game is running/download happening, as soon as a user stops inputting for a period of time (seems to be ~5-10 mins, random) it crashes.
Will note that I have no lock/disable screen set to see if that helped, it didn't.
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\061815-31640-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred srv*C:\Windows\Symbols*http://msdl.microsoft.com/download/symbols Symbol search path is: srv*C:\Windows\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 8 Kernel Version 9600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 9600.17736.amd64fre.winblue_r9.150322-1500 Machine Name: Kernel base = 0xfffff801`47417000 PsLoadedModuleList = 0xfffff801`476f0850 Debug session time: Thu Jun 18 18:32:43.194 2015 (UTC + 1:00) System Uptime: 0 days 0:44:41.935 Loading Kernel Symbols . Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. .............................................................. ................................................................ ................................... Loading User Symbols Loading unloaded module list ........... ERROR: FindPlugIns 8007007b ERROR: Some plugins may not be available [8007007b] ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck D1, {ffffcf80e689afb8, 2, 0, fffff800ae6f346a} Probably caused by : NETIO.SYS ( NETIO!NsiGetAllParametersEx+1f8 ) Followup: MachineOwner --------- 3: kd> !analyze -v ERROR: FindPlugIns 8007007b ERROR: Some plugins may not be available [8007007b] ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffcf80e689afb8, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff800ae6f346a, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8014777a138 unable to get nt!MmNonPagedPoolStart unable to get nt!MmSizeOfNonPagedPoolInBytes ffffcf80e689afb8 CURRENT_IRQL: 2 FAULTING_IP: ndis!ndisNsiGetAllInterfaceInformation+5f0 fffff800`ae6f346a 498b8e98050000 mov rcx,qword ptr [r14+598h] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: AV PROCESS_NAME: svchost.exe ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre TRAP_FRAME: ffffd0011bad6260 -- (.trap 0xffffd0011bad6260) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000005 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800ae6f346a rsp=ffffd0011bad63f0 rbp=ffffd0011bad6489 r8=0000000000000007 r9=fffff800af788054 r10=0000000000000000 r11=ffffd0011bad67f0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc ndis!ndisNsiGetAllInterfaceInformation+0x5f0: fffff800`ae6f346a 498b8e98050000 mov rcx,qword ptr [r14+598h] ds:00000000`00000598=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff801475737e9 to fffff80147567ca0 STACK_TEXT: ffffd001`1bad6118 fffff801`475737e9 : 00000000`0000000a ffffcf80`e689afb8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffd001`1bad6120 fffff801`4757203a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffd001`1bad6260 fffff800`ae6f346a : 00000000`00000002 ffffcf80`e2d5ea20 00000000`00000000 00000000`00020019 : nt!KiPageFault+0x23a ffffd001`1bad63f0 fffff800`ae6079d3 : ffffd001`1bad6550 ffffcf82`042b2d02 00000000`00000000 00000000`00000002 : ndis!ndisNsiGetAllInterfaceInformation+0x5f0 ffffd001`1bad64f0 fffff800`af781677 : 00000000`00000068 ffffcf80`e2c8cf40 00000000`00000000 ffffcf82`04066ed8 : NETIO!NsiGetAllParametersEx+0x1f8 ffffd001`1bad6600 fffff800`af781c20 : 00000000`00000000 ffffcf82`04066f70 ffffcf82`04066ea0 ffffe000`595d6fe0 : nsiproxy!NsippGetAllParameters+0x1d7 ffffd001`1bad67f0 fffff801`47a90911 : ffffcf82`04066ea0 00000000`00000002 ffffe000`4f434f20 fffff801`476ba701 : nsiproxy!NsippDispatch+0x90 ffffd001`1bad6830 fffff801`4783c77f : 00000000`00000000 ffffd001`1bad6b80 ffffcf82`04066ea0 ffffe000`595d6f40 : nt!IovCallDriver+0x3cd ffffd001`1bad6880 fffff801`4783bd22 : ffffd001`1bad6a38 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xa4f ffffd001`1bad6a20 fffff801`475734b3 : ffffe000`56329880 00000000`001f0003 00000059`9003f158 00000000`00000001 : nt!NtDeviceIoControlFile+0x56 ffffd001`1bad6a90 00007ffd`e00d123a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000059`9003f1d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e00d123a STACK_COMMAND: kb FOLLOWUP_IP: NETIO!NsiGetAllParametersEx+1f8 fffff800`ae6079d3 8bf0 mov esi,eax SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: NETIO!NsiGetAllParametersEx+1f8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 540ebbe6 IMAGE_VERSION: 6.3.9600.17337 BUCKET_ID_FUNC_OFFSET: 1f8 FAILURE_BUCKET_ID: AV_VRF_NETIO!NsiGetAllParametersEx BUCKET_ID: AV_VRF_NETIO!NsiGetAllParametersEx ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_vrf_netio!nsigetallparametersex FAILURE_ID_HASH: {2596b6b1-3fc1-13a2-350a-ea744fd9c45f} Followup: MachineOwner ---------
Dump files (Minidump): http://1drv.ms/1Bm6LSK
- Edited by Darkmantle90 13 hours 29 minutes ago Added more information