Перейти из форума на сайт.

НовостиФайловые архивы
ПоискАктивные темыТоп лист
ПравилаКто в on-line?
Вход Забыли пароль? Первый раз на этом сайте? Регистрация
Компьютерный форум Ru.Board » Операционные системы » Microsoft Windows » BSOD Windows 10

Модерирует : KLASS, IFkO

 Версия для печати • ПодписатьсяДобавить в закладки
На первую страницук этому сообщениюк последнему сообщению

Открыть новую тему     Написать ответ в эту тему

murovoz

Newbie
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
Здравствуйте! Прошу помощи, в определении возможных причин появления BSOD!
Блок питания заменен на новый, оперативка заменена, периодичность появления разная, 1 день, две недели.
 
Microsoft (R) Windows Debugger Version 10.0.16299.91 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
 
 
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
 
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 16299 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff803`13e97000 PsLoadedModuleList = 0xfffff803`141f8fb0
Debug session time: Sat Feb 17 21:39:15.967 2018 (UTC + 3:00)
System Uptime: 0 days 2:00:40.702
Loading Kernel Symbols
.................................................. .............
.Page 87b91 not present in the dump file. Type ".hh dbgerr004" for details
.................................................. .............
............Page 2599 not present in the dump file. Type ".hh dbgerr004" for details
..........................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000f3`80e3c018). Type ".hh dbgerr001" for details
Loading unloaded module list
..........................................
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
 
Use !analyze -v to get detailed debugging information.
 
BugCheck 50, {fffff8033d489c80, 10, fffff8033d489c80, 2}
 
*** ERROR: Module load completed but symbols could not be loaded for WdFilter.sys
Probably caused by : WdFilter.sys ( WdFilter+289a9 )
 
Followup: MachineOwner
---------
 
0: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
 
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8033d489c80, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff8033d489c80, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
 
Debugging Details:
------------------
 
 
DUMP_CLASS: 1
 
DUMP_QUALIFIER: 401
 
BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534
 
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
 
SYSTEM_PRODUCT_NAME: GA-78LMT-S2P
 
BIOS_VENDOR: Award Software International, Inc.
 
BIOS_VERSION: F2
 
BIOS_DATE: 03/20/2012
 
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
 
BASEBOARD_PRODUCT: GA-78LMT-S2P
 
BASEBOARD_VERSION: x.x
 
DUMP_TYPE: 1
 
BUGCHECK_P1: fffff8033d489c80
 
BUGCHECK_P2: 10
 
BUGCHECK_P3: fffff8033d489c80
 
BUGCHECK_P4: 2
 
READ_ADDRESS: fffff8033d489c80
 
FAULTING_IP:
+0
fffff803`3d489c80 ?? ???
 
MM_INTERNAL_CODE: 2
 
CPU_COUNT: 2
 
CPU_MHZ: e20
 
CPU_VENDOR: AuthenticAMD
 
CPU_FAMILY: 10
 
CPU_MODEL: 6
 
CPU_STEPPING: 3
 
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
 
BUGCHECK_STR: AV
 
PROCESS_NAME: audiodg.exe
 
CURRENT_IRQL: 0
 
ANALYSIS_SESSION_HOST: SAXA-ÏÊ
 
ANALYSIS_SESSION_TIME: 02-18-2018 11:36:40.0051
 
ANALYSIS_VERSION: 10.0.16299.91 amd64fre
 
TRAP_FRAME: ffff880135ff6190 -- (.trap 0xffff880135ff6190)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd502c12213d0 rbx=0000000000000000 rcx=ffffd502c1221d18
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8033d489c80 rsp=ffff880135ff6328 rbp=0000000000000000
r8=ffff880135ff6338 r9=7fffd502c1221dd8 r10=7ffffffffffffffc
r11=ffff880135ff63a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
fffff803`3d489c80 ?? ???
Resetting default scope
 
LAST_CONTROL_TRANSFER: from fffff8031403a640 to fffff80313ffb0e0
 
FAILED_INSTRUCTION_ADDRESS:
+0
fffff803`3d489c80 ?? ???
 
STACK_TEXT:
ffff8801`35ff5f08 fffff803`1403a640 : 00000000`00000050 fffff803`3d489c80 00000000`00000010 ffff8801`35ff6190 : nt!KeBugCheckEx
ffff8801`35ff5f10 fffff803`13f06777 : 00000000`00000010 fffff803`3d489c80 ffff8801`35ff6190 ffff8801`35ff60b0 : nt!MiSystemFault+0x116a20
ffff8801`35ff5fb0 fffff803`14004c72 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0xae7
ffff8801`35ff6190 fffff803`3d489c80 : fffff803`14398f42 00000000`d2a9e4fe fffff803`00000000 00000000`00000000 : nt!KiPageFault+0x132
ffff8801`35ff6328 fffff803`14398f42 : 00000000`d2a9e4fe fffff803`00000000 00000000`00000000 00000000`bffd5ee3 : 0xfffff803`3d489c80
ffff8801`35ff6330 fffff803`14395dd8 : ffffd502`c123c138 00000000`00000000 ffffd502`00000009 ffff8801`35ff66f0 : nt!CmpPerformCompleteKcbCacheLookup+0x192
ffff8801`35ff6410 fffff803`14392cb0 : fffff803`0000001c ffff8801`35ff6900 ffff8801`35ff6878 ffffd502`c8b32520 : nt!CmpDoParseKey+0x438
ffff8801`35ff6800 fffff803`14399987 : 00000000`00000000 ffff8801`00000001 00000000`00000000 fffff803`13f3a400 : nt!CmpParseKey+0x270
ffff8801`35ff69e0 fffff803`14391060 : ffffad02`80d52400 ffff8801`35ff6c38 ffff8801`00000240 ffffad02`7c564d10 : nt!ObpLookupObjectName+0x5b7
ffff8801`35ff6ba0 fffff803`14390ced : 00007400`00000001 ffffad02`7c564d10 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1e0
ffff8801`35ff6ce0 fffff803`143e957e : 00000000`008cddd3 00000801`00000000 00020019`00000000 00000000`00020019 : nt!CmOpenKey+0x29d
ffff8801`35ff6ef0 fffff803`14006553 : 00000000`00000000 ffff8801`35ff6f90 00000000`00000000 00000000`00000000 : nt!NtOpenKey+0x12
ffff8801`35ff6f30 fffff803`13ffe370 : fffff80b`79fe89a9 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
ffff8801`35ff70c8 fffff80b`79fe89a9 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff803`13f38bdf : nt!KiServiceLinkage
ffff8801`35ff70d0 fffff80b`79fe8c4d : 00000000`00000000 ffffffff`80005054 00000000`00000000 00000000`00000000 : WdFilter+0x289a9
ffff8801`35ff71b0 fffff80b`79fe8703 : 00000000`00000000 00000000`003fed15 ffff8801`35ff7278 ffff8801`35ff7348 : WdFilter+0x28c4d
ffff8801`35ff7240 fffff803`143987e7 : ffff8801`35ff7560 00000000`00000000 00000000`00000000 00000000`00000001 : WdFilter+0x28703
ffff8801`35ff7340 fffff803`14392c59 : 00000000`0000001a ffff8801`35ff7560 ffff8801`35ff74d8 00000000`00000001 : nt!CmpCallCallBacksEx+0x207
ffff8801`35ff7460 fffff803`14399987 : 00000000`00000001 fffff803`00000000 00000000`00000000 00000000`00000001 : nt!CmpParseKey+0x219
ffff8801`35ff7640 fffff803`14391060 : ffffad02`7e92fb00 ffff8801`35ff7898 fffff803`00000040 ffffad02`7c564d10 : nt!ObpLookupObjectName+0x5b7
ffff8801`35ff7800 fffff803`14338e35 : 00000000`00000001 000000f3`80dbce68 000000f3`80dbce48 00000000`0002001b : nt!ObOpenObjectByNameEx+0x1e0
ffff8801`35ff7940 fffff803`143389ca : 00000000`00000000 ffffd348`00125267 000000f3`80dbce40 000000f3`80dbce58 : nt!CmCreateKey+0x455
ffff8801`35ff7b80 fffff803`14006553 : ffffd502`c7ff1de0 fffff803`1439e67b 00000000`00000000 00000000`00000000 : nt!NtCreateKey+0x2e
ffff8801`35ff7bd0 00007ffb`677401e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000f3`80dbcdf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`677401e4
 
 
THREAD_SHA1_HASH_MOD_FUNC: 56ae482925dc490c30e0129a72d6d9897bab27f9
 
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0475b77d5cedfa00e08a48fc84d1eeee9e0f67b7
 
THREAD_SHA1_HASH_MOD: 00dab92292d0be71c52ad365851240397087b04f
 
FOLLOWUP_IP:
WdFilter+289a9
fffff80b`79fe89a9 488b4d6f mov rcx,qword ptr [rbp+6Fh]
 
FAULT_INSTR_CODE: 6f4d8b48
 
SYMBOL_STACK_INDEX: e
 
SYMBOL_NAME: WdFilter+289a9
 
FOLLOWUP_NAME: MachineOwner
 
MODULE_NAME: WdFilter
 
IMAGE_NAME: WdFilter.sys
 
DEBUG_FLR_IMAGE_TIMESTAMP: f621a95
 
STACK_COMMAND: .thread ; .cxr ; kb
 
BUCKET_ID_FUNC_OFFSET: 289a9
 
FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_WdFilter!unknown_function
 
BUCKET_ID: AV_INVALID_BAD_IP_WdFilter!unknown_function
 
PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_WdFilter!unknown_function
 
TARGET_TIME: 2018-02-17T18:39:15.000Z
 
OSBUILD: 16299
 
OSSERVICEPACK: 0
 
SERVICEPACK_NUMBER: 0
 
OS_REVISION: 0
 
SUITE_MASK: 272
 
PRODUCT_TYPE: 1
 
OSPLATFORM_TYPE: x64
 
OSNAME: Windows 10
 
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
 
OS_LOCALE:
 
USER_LCID: 0
 
OSBUILD_TIMESTAMP: 2017-10-25 06:06:03
 
BUILDDATESTAMP_STR: 170928-1534
 
BUILDLAB_STR: rs3_release
 
BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534
 
ANALYSIS_SESSION_ELAPSED_TIME: 186d
 
ANALYSIS_SOURCE: KM
 
FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_wdfilter!unknown_function
 
FAILURE_ID_HASH: {c5f0f5fd-1d73-e7c1-90b0-55020cd1b55b}
 
Followup: MachineOwner
---------  

Всего записей: 1 | Зарегистр. 18-02-2018 | Отправлено: 13:02 18-02-2018
Открыть новую тему     Написать ответ в эту тему

На первую страницук этому сообщениюк последнему сообщению

Компьютерный форум Ru.Board » Операционные системы » Microsoft Windows » BSOD Windows 10


Реклама на форуме Ru.Board.

Powered by Ikonboard "v2.1.7b" © 2000 Ikonboard.com
Modified by Ru.B0ard
© Ru.B0ard 2000-2024

BitCoin: 1NGG1chHtUvrtEqjeerQCKDMUi6S6CG4iC

Рейтинг.ru