murovoz
Newbie | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору Здравствуйте! Прошу помощи, в определении возможных причин появления BSOD! Блок питания заменен на новый, оперативка заменена, периодичность появления разная, 1 день, две недели. Microsoft (R) Windows Debugger Version 10.0.16299.91 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 16299 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 16299.15.amd64fre.rs3_release.170928-1534 Machine Name: Kernel base = 0xfffff803`13e97000 PsLoadedModuleList = 0xfffff803`141f8fb0 Debug session time: Sat Feb 17 21:39:15.967 2018 (UTC + 3:00) System Uptime: 0 days 2:00:40.702 Loading Kernel Symbols .................................................. ............. .Page 87b91 not present in the dump file. Type ".hh dbgerr004" for details .................................................. ............. ............Page 2599 not present in the dump file. Type ".hh dbgerr004" for details .......................................... Loading User Symbols PEB is paged out (Peb.Ldr = 000000f3`80e3c018). Type ".hh dbgerr001" for details Loading unloaded module list .......................................... ************************************************** ***************************** * * * Bugcheck Analysis * * * ************************************************** ***************************** Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff8033d489c80, 10, fffff8033d489c80, 2} *** ERROR: Module load completed but symbols could not be loaded for WdFilter.sys Probably caused by : WdFilter.sys ( WdFilter+289a9 ) Followup: MachineOwner --------- 0: kd> !analyze -v ************************************************** ***************************** * * * Bugcheck Analysis * * * ************************************************** ***************************** PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8033d489c80, memory referenced. Arg2: 0000000000000010, value 0 = read operation, 1 = write operation. Arg3: fffff8033d489c80, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: GA-78LMT-S2P BIOS_VENDOR: Award Software International, Inc. BIOS_VERSION: F2 BIOS_DATE: 03/20/2012 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: GA-78LMT-S2P BASEBOARD_VERSION: x.x DUMP_TYPE: 1 BUGCHECK_P1: fffff8033d489c80 BUGCHECK_P2: 10 BUGCHECK_P3: fffff8033d489c80 BUGCHECK_P4: 2 READ_ADDRESS: fffff8033d489c80 FAULTING_IP: +0 fffff803`3d489c80 ?? ??? MM_INTERNAL_CODE: 2 CPU_COUNT: 2 CPU_MHZ: e20 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 10 CPU_MODEL: 6 CPU_STEPPING: 3 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: audiodg.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: SAXA-ÏÊ ANALYSIS_SESSION_TIME: 02-18-2018 11:36:40.0051 ANALYSIS_VERSION: 10.0.16299.91 amd64fre TRAP_FRAME: ffff880135ff6190 -- (.trap 0xffff880135ff6190) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffd502c12213d0 rbx=0000000000000000 rcx=ffffd502c1221d18 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8033d489c80 rsp=ffff880135ff6328 rbp=0000000000000000 r8=ffff880135ff6338 r9=7fffd502c1221dd8 r10=7ffffffffffffffc r11=ffff880135ff63a0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc fffff803`3d489c80 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8031403a640 to fffff80313ffb0e0 FAILED_INSTRUCTION_ADDRESS: +0 fffff803`3d489c80 ?? ??? STACK_TEXT: ffff8801`35ff5f08 fffff803`1403a640 : 00000000`00000050 fffff803`3d489c80 00000000`00000010 ffff8801`35ff6190 : nt!KeBugCheckEx ffff8801`35ff5f10 fffff803`13f06777 : 00000000`00000010 fffff803`3d489c80 ffff8801`35ff6190 ffff8801`35ff60b0 : nt!MiSystemFault+0x116a20 ffff8801`35ff5fb0 fffff803`14004c72 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0xae7 ffff8801`35ff6190 fffff803`3d489c80 : fffff803`14398f42 00000000`d2a9e4fe fffff803`00000000 00000000`00000000 : nt!KiPageFault+0x132 ffff8801`35ff6328 fffff803`14398f42 : 00000000`d2a9e4fe fffff803`00000000 00000000`00000000 00000000`bffd5ee3 : 0xfffff803`3d489c80 ffff8801`35ff6330 fffff803`14395dd8 : ffffd502`c123c138 00000000`00000000 ffffd502`00000009 ffff8801`35ff66f0 : nt!CmpPerformCompleteKcbCacheLookup+0x192 ffff8801`35ff6410 fffff803`14392cb0 : fffff803`0000001c ffff8801`35ff6900 ffff8801`35ff6878 ffffd502`c8b32520 : nt!CmpDoParseKey+0x438 ffff8801`35ff6800 fffff803`14399987 : 00000000`00000000 ffff8801`00000001 00000000`00000000 fffff803`13f3a400 : nt!CmpParseKey+0x270 ffff8801`35ff69e0 fffff803`14391060 : ffffad02`80d52400 ffff8801`35ff6c38 ffff8801`00000240 ffffad02`7c564d10 : nt!ObpLookupObjectName+0x5b7 ffff8801`35ff6ba0 fffff803`14390ced : 00007400`00000001 ffffad02`7c564d10 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1e0 ffff8801`35ff6ce0 fffff803`143e957e : 00000000`008cddd3 00000801`00000000 00020019`00000000 00000000`00020019 : nt!CmOpenKey+0x29d ffff8801`35ff6ef0 fffff803`14006553 : 00000000`00000000 ffff8801`35ff6f90 00000000`00000000 00000000`00000000 : nt!NtOpenKey+0x12 ffff8801`35ff6f30 fffff803`13ffe370 : fffff80b`79fe89a9 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 ffff8801`35ff70c8 fffff80b`79fe89a9 : 00000000`00000000 00000000`00000001 00000000`00000000 fffff803`13f38bdf : nt!KiServiceLinkage ffff8801`35ff70d0 fffff80b`79fe8c4d : 00000000`00000000 ffffffff`80005054 00000000`00000000 00000000`00000000 : WdFilter+0x289a9 ffff8801`35ff71b0 fffff80b`79fe8703 : 00000000`00000000 00000000`003fed15 ffff8801`35ff7278 ffff8801`35ff7348 : WdFilter+0x28c4d ffff8801`35ff7240 fffff803`143987e7 : ffff8801`35ff7560 00000000`00000000 00000000`00000000 00000000`00000001 : WdFilter+0x28703 ffff8801`35ff7340 fffff803`14392c59 : 00000000`0000001a ffff8801`35ff7560 ffff8801`35ff74d8 00000000`00000001 : nt!CmpCallCallBacksEx+0x207 ffff8801`35ff7460 fffff803`14399987 : 00000000`00000001 fffff803`00000000 00000000`00000000 00000000`00000001 : nt!CmpParseKey+0x219 ffff8801`35ff7640 fffff803`14391060 : ffffad02`7e92fb00 ffff8801`35ff7898 fffff803`00000040 ffffad02`7c564d10 : nt!ObpLookupObjectName+0x5b7 ffff8801`35ff7800 fffff803`14338e35 : 00000000`00000001 000000f3`80dbce68 000000f3`80dbce48 00000000`0002001b : nt!ObOpenObjectByNameEx+0x1e0 ffff8801`35ff7940 fffff803`143389ca : 00000000`00000000 ffffd348`00125267 000000f3`80dbce40 000000f3`80dbce58 : nt!CmCreateKey+0x455 ffff8801`35ff7b80 fffff803`14006553 : ffffd502`c7ff1de0 fffff803`1439e67b 00000000`00000000 00000000`00000000 : nt!NtCreateKey+0x2e ffff8801`35ff7bd0 00007ffb`677401e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 000000f3`80dbcdf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`677401e4 THREAD_SHA1_HASH_MOD_FUNC: 56ae482925dc490c30e0129a72d6d9897bab27f9 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0475b77d5cedfa00e08a48fc84d1eeee9e0f67b7 THREAD_SHA1_HASH_MOD: 00dab92292d0be71c52ad365851240397087b04f FOLLOWUP_IP: WdFilter+289a9 fffff80b`79fe89a9 488b4d6f mov rcx,qword ptr [rbp+6Fh] FAULT_INSTR_CODE: 6f4d8b48 SYMBOL_STACK_INDEX: e SYMBOL_NAME: WdFilter+289a9 FOLLOWUP_NAME: MachineOwner MODULE_NAME: WdFilter IMAGE_NAME: WdFilter.sys DEBUG_FLR_IMAGE_TIMESTAMP: f621a95 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 289a9 FAILURE_BUCKET_ID: AV_INVALID_BAD_IP_WdFilter!unknown_function BUCKET_ID: AV_INVALID_BAD_IP_WdFilter!unknown_function PRIMARY_PROBLEM_CLASS: AV_INVALID_BAD_IP_WdFilter!unknown_function TARGET_TIME: 2018-02-17T18:39:15.000Z OSBUILD: 16299 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2017-10-25 06:06:03 BUILDDATESTAMP_STR: 170928-1534 BUILDLAB_STR: rs3_release BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534 ANALYSIS_SESSION_ELAPSED_TIME: 186d ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_invalid_bad_ip_wdfilter!unknown_function FAILURE_ID_HASH: {c5f0f5fd-1d73-e7c1-90b0-55020cd1b55b} Followup: MachineOwner --------- |