|
Компьютерный форум OSzone.net » Сфера Microsoft » Устранение критических ошибок Windows » BSOD - Постоянно разные коды BSOD |
|
BSOD - Постоянно разные коды BSOD
|
Сообщения: 53407 |
Профиль | Отправить PM | Цитировать
Внимание! Все возможные решения уже перечислены в данном сообщении, и других вам никто не предложит. Модераторы и эксперты сообщества оказывают в этой теме только моральную и психологическую поддержку.
BSOD с разными кодами на случайных драйверах зачастую свидетельствуют о неполадках в аппаратном обеспечении, обычно это:
BIOS
Прочее железо
|
|
Отправлено: 14:07, 06-07-2008 |
Ветеран Сообщения: 4419
|
Профиль | Отправить PM | Цитировать Цитата nikitos435:
|
|
Отправлено: 08:21, 07-02-2023 | #2711 |
Для отключения данного рекламного блока вам необходимо зарегистрироваться или войти с учетной записью социальной сети. Если же вы забыли свой пароль на форуме, то воспользуйтесь данной ссылкой для восстановления пароля. |
Ветеран Сообщения: 534
|
Профиль | Отправить PM | Цитировать Цитата NickM:
|
|
Отправлено: 08:32, 07-02-2023 | #2712 |
Старожил Сообщения: 457
|
Профиль | Отправить PM | Цитировать Цитата nikitos435:
|
|
------- Отправлено: 14:07, 08-02-2023 | #2713 |
Старожил Сообщения: 457
|
Профиль | Отправить PM | Цитировать Знаете как ?
|
------- Отправлено: 14:22, 08-02-2023 | #2714 |
Ветеран Сообщения: 534
|
Профиль | Отправить PM | Цитировать Цитата Forgiven1:
Параллельно обновил драйвера с оф. сайта. Все кроме чипсета установились. Касса была подключена по ЮСБ спереди, подключил напрямую в разъем на мат. плате. Тестируем, думаю, что помогли действия. |
|
Отправлено: 06:47, 09-02-2023 | #2715 |
Пользователь Сообщения: 56
|
Профиль | Отправить PM | Цитировать Цитата sputnikk:
У меня BlueScreenView вываливается с ошибкой: http://forum.oszone.net/attachment.p...1&d=1676365242 |
|
Отправлено: 12:00, 14-02-2023 | #2716 |
Пользователь Сообщения: 56
|
Профиль | Отправить PM | Цитировать Цитата NickM:
А почему вы думаете, что проблема связана с файлом подкачки? Цитата Kirill_S:
Но в целом диск не вызывает подозрений. Все остальное работает. Синий экран возникает только при попытке сохранения файла. После синего экрана и перезагрузки ПК повторное сохранение срабатывает и дальше все прекрасно работает. В папку с дампами в облаке добавил еще два дампа.... Помогите пожалуйста разобраться. |
||
Отправлено: 12:04, 14-02-2023 | #2717 |
Ветеран Сообщения: 4419
|
Профиль | Отправить PM | Цитировать Цитата esitapov70:
Накопитель "Хитачи" у Вас чуть-чуть подуставший + некоторые из-за "мифов" переносят/ либо отключают файл подкачки на твердотельных накопителях - поэтому и спросил. Повторюсь: Цитата NickM:
Скрытый текст
Loading Dump File [D:\1\MEMORY_2023-01-30.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols Deferred symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*%systemdrive%\symbols*http://msdl.microsoft.com/download/symbols;symsrv*symsrv.dll*c:\symbols* http://msdl.microsoft.com/download/symbols Executable search path is: Windows 10 Kernel Version 17763 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 17763.1.amd64fre.rs5_release.180914-1434 Machine Name: Kernel base = 0xfffff807`52e16000 PsLoadedModuleList = 0xfffff807`5322f430 Debug session time: Mon Jan 30 10:19:45.953 2023 (UTC + 5:00) System Uptime: 2 days 23:48:34.823 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`031fa018). Type ".hh dbgerr001" for details Loading unloaded module list ................... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {ffffffffc0000005, fffff80eaa782ba5, 1, c0000225} Probably caused by : memory_corruption Followup: memory_corruption --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80eaa782ba5, The address that the exception occurred at Arg3: 0000000000000001, Parameter 0 of the exception Arg4: 00000000c0000225, Parameter 1 of the exception Debugging Details: ------------------ DUMP_CLASS: 1 DUMP_QUALIFIER: 401 BUILD_VERSION_STRING: 17763.1.amd64fre.rs5_release.180914-1434 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: G41M-ES2L BIOS_VENDOR: Award Software International, Inc. BIOS_VERSION: F6 BIOS_DATE: 11/04/2009 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: G41M-ES2L BASEBOARD_VERSION: x.x DUMP_TYPE: 1 BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff80eaa782ba5 BUGCHECK_P3: 1 BUGCHECK_P4: c0000225 WRITE_ADDRESS: 00000000c0000225 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: Wof!WofAcquireFileSystemRundown+1 fffff80e`aa782ba5 3000 xor byte ptr [rax],al EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: 00000000c0000225 BUGCHECK_STR: 0x1E_c0000005_W CPU_COUNT: 2 CPU_MHZ: a8c CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 17 CPU_STEPPING: a CPU_MICROCODE: 6,17,a,0 (F,M,S,R) SIG: A0C'00000000 (cache) A0C'00000000 (init) DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: avp.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: NICKMPC ANALYSIS_SESSION_TIME: 02-14-2023 14:30:40.0514 ANALYSIS_VERSION: 10.0.10586.567 amd64fre TRAP_FRAME: 0000000000001000 -- (.trap 0x1000) Unable to read trap frame at 00000000`00001000 LAST_CONTROL_TRANSFER: from fffff807530188d9 to fffff80752fceea0 STACK_TEXT: ffffee0f`d8bbeb58 fffff807`530188d9 : 00000000`0000001e ffffffff`c0000005 fffff80e`aa782ba5 00000000`00000001 : nt!KeBugCheckEx ffffee0f`d8bbeb60 fffff807`52fe2902 : 00000000`00000000 ffffee0f`d8bbf3f0 00000000`00001000 00000000`c0000225 : nt!KiDispatchException+0x180d89 ffffee0f`d8bbf210 fffff807`52fde4e8 : ffff8684`19600340 ffffee0f`d8bbf868 00000000`00000003 00000000`00002970 : nt!KiExceptionDispatch+0xc2 ffffee0f`d8bbf3f0 fffff80e`aa782ba5 : ffffee0f`d8bbf610 fffff80e`aa7818fd ffffbc0b`fffeee60 ffffbc0c`09140b28 : nt!KiPageFault+0x428 ffffee0f`d8bbf580 ffffee0f`d8bbf610 : fffff80e`aa7818fd ffffbc0b`fffeee60 ffffbc0c`09140b28 00000000`00000002 : Wof!WofAcquireFileSystemRundown+0x1 ffffee0f`d8bbf588 fffff80e`aa7818fd : ffffbc0b`fffeee60 ffffbc0c`09140b28 00000000`00000002 ffffee0f`d8bbf6a0 : 0xffffee0f`d8bbf610 ffffee0f`d8bbf590 fffff80e`a98dfca2 : ffffbc0c`09140b28 ffffee0f`d8bbf6e0 ffffee0f`00000001 00000000`00000000 : Wof!WofPreReadCallback+0x6d ffffee0f`d8bbf650 fffff80e`a98d7389 : ffffee0f`d8bbf890 ffffee0f`d8bbfc00 00000000`00000003 fffff80e`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x4d2 ffffee0f`d8bbf760 fffff80e`a98d6f6c : ffffbc0c`0b29d3b0 ffffee0f`d8bc0000 ffffee0f`d8bba000 ffffee0f`d8bbf890 : FLTMGR!FltpPerformPreCallbacks+0x79 ffffee0f`d8bbf7b0 fffff80e`a98d66f0 : ffffbc0c`091af010 00000000`00060043 ffffbc0c`091af010 ffffee0f`d8bbf8a0 : FLTMGR!FltpPassThroughInternal+0x8c ffffee0f`d8bbf7e0 fffff80e`a98d612e : ffff8684`19ec07a0 00000000`00000000 ffff9c80`030479c0 00000000`00000000 : FLTMGR!FltpPassThrough+0x510 ffffee0f`d8bbf870 fffff807`52e43029 : ffffbc0c`091af010 fffff807`52e2232f ffffbc0c`05dff350 00000000`00000000 : FLTMGR!FltpDispatch+0x9e ffffee0f`d8bbf8d0 fffff807`52e22218 : ffffbc0b`ffed1cd0 ffffbc0c`091af010 ffffbc0c`0b29d3e0 ffffbc0c`0b29d4a0 : nt!IofCallDriver+0x59 ffffee0f`d8bbf910 fffff807`52f395a9 : ffffbc0c`0b29d390 ffffbc0c`0b29d3b0 ffffbc0c`0b29d3f0 ffffbc0c`0b29d3e0 : nt!IoPageReadEx+0x188 ffffee0f`d8bbf960 fffff807`52e53b3d : 00000000`00000003 ffffee0f`d8bbf9f0 ffffee0f`d8bbfb58 ffff9a4d`00001dc0 : nt!MiIssueHardFaultIo+0xc1 ffffee0f`d8bbf9b0 fffff807`52e6ad5f : ffff8000`00000000 00000000`c0033333 00000000`7701a835 00000000`00000000 : nt!MiIssueHardFault+0x3ed ffffee0f`d8bbfa60 fffff807`52fde403 : ffffbc0c`06f9c080 00000000`04981820 ffffee0f`d8bbfc80 ffffbc0c`0b2f7b60 : nt!MmAccessFault+0x32f ffffee0f`d8bbfc00 00000000`7701a835 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x343 00000000`0693cc10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7701a835 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff80752e17071-fffff80752e17072 2 bytes - nt!MmFreeIndependentPages+61 [ 80 f6:00 9a ] fffff80752e1707f - nt!MmFreeIndependentPages+6f (+0x0e) [ fa:9c ] fffff80752e1a568-fffff80752e1a569 2 bytes - nt!MiFlushDirtyBitsToPfn+78 (+0x34e9) [ 80 f6:00 9a ] fffff80752e1a5eb-fffff80752e1a5ec 2 bytes - nt!MiFlushDirtyBitsToPfn+fb (+0x83) [ 80 f6:00 9a ] fffff80752e1a683 - nt!MiFlushDirtyBitsToPfn+193 (+0x98) [ fa:9c ] fffff80752e1d9f6-fffff80752e1d9f7 2 bytes - nt!MiLockStealSystemVm+32 (+0x3373) [ 80 f6:00 9a ] fffff80752e1da27-fffff80752e1da28 2 bytes - nt!MiLockStealSystemVm+63 (+0x31) [ ff f6:7f 9a ] fffff80752e1dac1 - nt!MiLockStealSystemVm+fd (+0x9a) [ fa:9c ] fffff80752e204a3-fffff80752e204a4 2 bytes - nt!MiTranslatePageForCopy+83 (+0x29e2) [ 80 f6:00 9a ] fffff80752e205e9 - nt!MiTranslatePageForCopy+1c9 (+0x146) [ fa:9c ] fffff80752e2060c - nt!MiTranslatePageForCopy+1ec (+0x23) [ fa:9c ] fffff80752e206a9 - nt!MiTranslatePageForCopy+289 (+0x9d) [ fa:9c ] fffff80752e206d3 - nt!MiTranslatePageForCopy+2b3 (+0x2a) [ fa:9c ] fffff80752e20712-fffff80752e20713 2 bytes - nt!MiTranslatePageForCopy+2f2 (+0x3f) [ ff f6:7f 9a ] fffff80752e207fe-fffff80752e207ff 2 bytes - nt!MiSynchronizeSystemVa+a6 (+0xec) [ 80 f6:00 9a ] fffff80752e20911-fffff80752e20912 2 bytes - nt!MiSynchronizeSystemVa+1b9 (+0x113) [ 80 f6:00 9a ] fffff80752e209f8-fffff80752e209f9 2 bytes - nt!MiPrefetchVirtualMemory+c8 (+0xe7) [ 80 f6:00 9a ] fffff80752e20a02-fffff80752e20a03 2 bytes - nt!MiPrefetchVirtualMemory+d2 (+0x0a) [ ff f6:7f 9a ] fffff80752e20bc8-fffff80752e20bc9 2 bytes - nt!MiPrefetchVirtualMemory+298 (+0x1c6) [ 80 f6:00 9a ] fffff80752e20bd9-fffff80752e20bda 2 bytes - nt!MiPrefetchVirtualMemory+2a9 (+0x11) [ ff f6:7f 9a ] fffff80752e2296b - nt!MiWaitForInPageComplete+8b (+0x1d92) [ fa:9c ] fffff80752e22b2f - nt!MiWaitForInPageComplete+24f (+0x1c4) [ fa:9c ] fffff80752e22c97 - nt!MiWaitForInPageComplete+3b7 (+0x168) [ fa:9c ] fffff80752e29d9c - nt!MiMakeSystemCachePteValid+44 (+0x7105) [ fa:9c ] fffff80752e29dc9-fffff80752e29dca 2 bytes - nt!MiMakeSystemCachePteValid+71 (+0x2d) [ 80 f6:00 9a ] fffff80752e2a639-fffff80752e2a63a 2 bytes - nt!MmProtectPool+a5 (+0x870) [ 80 f6:00 9a ] fffff80752e2a688-fffff80752e2a689 2 bytes - nt!MmProtectPool+f4 (+0x4f) [ 80 f6:00 9a ] fffff80752e2a6f5 - nt!MmProtectPool+161 (+0x6d) [ fa:9c ] fffff80752e2a725-fffff80752e2a726 2 bytes - nt!MmProtectPool+191 (+0x30) [ 80 f6:00 9a ] fffff80752e2a753 - nt!MmProtectPool+1bf (+0x2e) [ fa:9c ] fffff80752e2a83c-fffff80752e2a83d 2 bytes - nt!MmProtectPool+2a8 (+0xe9) [ 80 f6:00 9a ] fffff80752e2a8da - nt!MmProtectPool+346 (+0x9e) [ fa:9c ] fffff80752e2aa6b-fffff80752e2aa6c 2 bytes - nt!MiSetImageProtection+1b (+0x191) [ 80 f6:00 9a ] fffff80752e307a6 - nt!MiIdentifyPfn+36 (+0x5d3b) [ fa:9c ] fffff80752e30b0c-fffff80752e30b0d 2 bytes - nt!MiIdentifyPfn+39c (+0x366) [ 80 f6:00 9a ] fffff80752e30be1 - nt!MiIdentifyPfn+471 (+0xd5) [ fa:9c ] fffff80752e30c95-fffff80752e30c96 2 bytes - nt!MiIdentifyPfn+525 (+0xb4) [ 80 f6:00 9a ] fffff80752e30d92-fffff80752e30d93 2 bytes - nt!MiIdentifyPfn+622 (+0xfd) [ ff f6:7f 9a ] fffff80752e30ebb-fffff80752e30ebc 2 bytes - nt!MiIdentifyPfn+74b (+0x129) [ ff f6:7f 9a ] fffff80752e31055-fffff80752e31056 2 bytes - nt!MiIdentifyPfn+8e5 (+0x19a) [ 80 f6:00 9a ] fffff80752e3118d - nt!MiIsPfn+1d (+0x138) [ fa:9c ] fffff80752e4a813 - nt!IopCompleteRequest+fb3 (+0x19686) [ 48:88 ] fffff80752e4ac13 - nt!IofCompleteRequest+3 (+0x400) [ 28:68 ] fffff80752e520a4-fffff80752e520a9 6 bytes - nt!KiInSwapProcesses+14 (+0x7491) [ 68 df be 7d fb f6:a0 49 93 26 4d 9a ] fffff80752e52e4c - nt!MiReferenceInPageFile+74 (+0xda8) [ fa:9c ] fffff80752e53204 - nt!MiUnlockMdlWritePages+54 (+0x3b8) [ fa:9c ] fffff80752e5334f - nt!MiUnlockMdlWritePages+19f (+0x14b) [ fa:9c ] fffff80752e5349e - nt!MiWriteCompletePfn+6e (+0x14f) [ fa:9c ] fffff80752e5387b - nt!MiIssueHardFault+12b (+0x3dd) [ fa:9c ] fffff80752e5395c-fffff80752e5395d 2 bytes - nt!MiIssueHardFault+20c (+0xe1) [ 80 f6:00 9a ] WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output. fffff80753161d0e-fffff80753161d10 3 bytes - nt!ExFreePoolWithTag+10ae [ 40 fb f6:00 4d 9a ] fffff80753161d19-fffff80753161d1d 5 bytes - nt!ExFreePoolWithTag+10b9 (+0x0b) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff80753161d29-fffff80753161d2d 5 bytes - nt!ExFreePoolWithTag+10c9 (+0x10) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff80753161dbe-fffff80753161dbf 2 bytes - nt!ExFreePoolWithTag+115e (+0x95) [ 80 f6:00 9a ] fffff80753162813 - nt!ExDeferredFreePool+73 (+0xa55) [ 33:b0 ] fffff80753162c13 - nt!ExAllocatePoolWithTag+2c03 (+0x400) [ 74:37 ] fffff807531b6813 - nt!_xmm+1e483 [ 00:80 ] fffff807531f2813 - nt!_xmm+5a483 (+0x3c000) [ 00:80 ] fffff8075320e813 - nt!_xmm+76483 (+0x1c000) [ 00:80 ] fffff8075320ec13 - nt!_xmm+76883 (+0x400) [ 50:10 ] fffff80753306813 - nt!Ports <PERF> (nt+0x4f0813) [ 00:80 ] fffff80753342813 - nt!Ports <PERF> (nt+0x52c813) (+0x3c000) [ 00:80 ] fffff80753353788-fffff8075335378a 3 bytes - nt!_guard_check_icall_fptr [ 30 ae f8:50 8d fd ] fffff80753353790-fffff80753353792 3 bytes - nt!_guard_dispatch_icall_fptr (+0x08) [ 70 b1 fc:a0 8d fd ] fffff80753382005-fffff80753382009 5 bytes - nt!MiConvertHiberPhasePte+15 [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff80753382014-fffff80753382018 5 bytes - nt!MiConvertHiberPhasePte+24 (+0x0f) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff80753383fa1-fffff80753383fa5 5 bytes - nt!MiUpdateUserMappings+9 (+0x1f8d) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff80753383fcc-fffff80753383fd0 5 bytes - nt!MiUpdateUserMappings+34 (+0x2b) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff80753388abb-fffff80753388abc 2 bytes - nt!MmInitializeProcessor+47 (+0x4aef) [ 80 f6:00 9a ] fffff807533922e3 - nt!MiMarkNonPagedHiberPhasePte+83 (+0x9828) [ fa:9c ] fffff8075339239e - nt!MmMarkHiberPhase+76 (+0xbb) [ fa:9c ] fffff807533923ab - nt!MmMarkHiberPhase+83 (+0x0d) [ fa:9c ] fffff80753396813 - nt!CmpCheckKeyOwnerForPca+43 [ 02:80 ] fffff80753396c13 - nt!FsRtlpPrepareExtraCreateParametersForCreate+47 (+0x400) [ 48:0a ] fffff807533c02a6 - nt!MmChangeImageProtection+166 (+0x29693) [ fa:9c ] fffff807533c0b64-fffff807533c0b65 2 bytes - nt!MiUnloadSystemImage+6e0 (+0x8be) [ 80 f6:00 9a ] fffff807533d2813 - nt!EtwpUpdateFilterData+8ab (+0x11caf) [ cc:8c ] fffff807533d2c13 - nt!EtwpQueueNotification+5f (+0x400) [ 0f:cc ] fffff807533db489 - nt!PfpPfnPrioRequest+a9 (+0x8876) [ fa:9c ] fffff807533db4c8 - nt!PfpPfnPrioRequest+e8 (+0x3f) [ fa:9c ] fffff807533f5d14 - nt!MiRelocateImagePfn+94 (+0x1a84c) [ fa:9c ] fffff807533f5d20-fffff807533f5d21 2 bytes - nt!MiRelocateImagePfn+a0 (+0x0c) [ 80 f6:00 9a ] fffff807533f5d3b-fffff807533f5d3c 2 bytes - nt!MiRelocateImagePfn+bb (+0x1b) [ ff f6:7f 9a ] fffff807533f5d73-fffff807533f5d74 2 bytes - nt!MiRelocateImagePfn+f3 (+0x38) [ 80 f6:00 9a ] fffff807533f6345-fffff807533f6349 5 bytes - nt!MmHardFaultBytesRequired+55 (+0x5d2) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff807533f634f-fffff807533f6353 5 bytes - nt!MmHardFaultBytesRequired+5f (+0x0a) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff807533f7be7-fffff807533f7beb 5 bytes - nt!MmProtectVirtualMemory+307 (+0x1898) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff807533f7c01-fffff807533f7c05 5 bytes - nt!MmProtectVirtualMemory+321 (+0x1a) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff807533f7c3b-fffff807533f7c3f 5 bytes - nt!MmProtectVirtualMemory+35b (+0x3a) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff807533f9e9b-fffff807533f9e9f 5 bytes - nt!MiPfPrepareSequentialReadList+23b (+0x2260) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff807533f9eb1-fffff807533f9eb5 5 bytes - nt!MiPfPrepareSequentialReadList+251 (+0x16) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff807533fa12f-fffff807533fa133 5 bytes - nt!MiPfPrepareSequentialReadList+4cf (+0x27e) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff807533fa20b - nt!MiPfPrepareSequentialReadList+5ab (+0xdc) [ fa:9c ] fffff807533fa79c-fffff807533fa7a0 5 bytes - nt!MiPfPrepareReadList+1dc (+0x591) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff807533fa7a6-fffff807533fa7aa 5 bytes - nt!MiPfPrepareReadList+1e6 (+0x0a) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff807533fa94e - nt!MiPfPrepareReadList+38e (+0x1a8) [ fa:9c ] fffff807533faa48-fffff807533faa4c 5 bytes - nt!MiPfPrepareReadList+488 (+0xfa) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff807533faa52-fffff807533faa56 5 bytes - nt!MiPfPrepareReadList+492 (+0x0a) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff807533faff1 - nt!MiProcessCrcList+e1 (+0x59f) [ fa:9c ] fffff807533fb004-fffff807533fb005 2 bytes - nt!MiProcessCrcList+f4 (+0x13) [ 80 f6:00 9a ] fffff807533fb00e-fffff807533fb00f 2 bytes - nt!MiProcessCrcList+fe (+0x0a) [ ff f6:7f 9a ] fffff807533fb0cc-fffff807533fb0cd 2 bytes - nt!MiProcessCrcList+1bc (+0xbe) [ 80 f6:00 9a ] fffff807533fb0d6-fffff807533fb0d7 2 bytes - nt!MiProcessCrcList+1c6 (+0x0a) [ ff f6:7f 9a ] fffff807533fb102 - nt!MiProcessCrcList+1f2 (+0x2c) [ fa:9c ] fffff807533fb41f-fffff807533fb420 2 bytes - nt!MiProcessCrcList+50f (+0x31d) [ 80 f6:00 9a ] fffff8075340521f - nt!MiCreateImageFileMap+12b (+0x9e00) [ fa:9c ] fffff8075340816f-fffff80753408173 5 bytes - nt!MiParseImageSectionHeaders+36f (+0x2f50) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff80753408181-fffff80753408185 5 bytes - nt!MiParseImageSectionHeaders+381 (+0x12) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff80753408d25-fffff80753408d26 2 bytes - nt!MiPrefetchDriverPages+45 (+0xba4) [ 80 f6:00 9a ] fffff80753408d2c-fffff80753408d30 5 bytes - nt!MiPrefetchDriverPages+4c (+0x07) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff80753408d36-fffff80753408d3a 5 bytes - nt!MiPrefetchDriverPages+56 (+0x0a) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff80753408fc8-fffff80753408fcc 5 bytes - nt!MiChargeSegmentCommit+a8 (+0x292) [ d0 be 7d fb f6:40 93 26 4d 9a ] fffff80753408fd2-fffff80753408fd6 5 bytes - nt!MiChargeSegmentCommit+b2 (+0x0a) [ d7 be 7d fb f6:47 93 26 4d 9a ] fffff8075342e813 - nt!CmpWalkOneLevel+5a3 (+0x25841) [ 49:88 ] fffff8075342ec13 - nt!CmpFindSubKeyInRoot+d7 (+0x400) [ 00:41 ] fffff807534417c0 - nt!MiValidateImagePfn+3c (+0x12bad) [ fa:9c ] fffff8075344180b-fffff8075344180c 2 bytes - nt!MiValidateImagePfn+87 (+0x4b) [ 80 f6:00 9a ] fffff8075346a813 - nt!NtSetInformationThread+11d3 (+0x29008) [ ed:ac ] fffff8075346ac13 - nt!NtSetInformationThread+15d3 (+0x400) [ e8:e9 ] fffff80753476bde - nt!MiMapLockedPagesInUserSpace+1ca (+0xbfcb) [ fa:9c ] fffff8075348aa25-fffff8075348aa26 2 bytes - nt!MiFreeInitializationCode+41 (+0x13e47) [ 80 f6:00 9a ] fffff8075348ab94 - nt!MiFreeInitializationCode+1b0 (+0x16f) [ fa:9c ] WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output. 7608 errors : !nt (fffff80752e17071-fffff80753706813) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_LARGE TARGET_TIME: 2023-01-30T05:19:45.000Z OSBUILD: 17763 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 180914-1434 BUILDLAB_STR: rs5_release BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434 ANALYSIS_SESSION_ELAPSED_TIME: 2655 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption --------- |
||
Отправлено: 12:38, 14-02-2023 | #2718 |
Пользователь Сообщения: 56
|
Профиль | Отправить PM | Цитировать Цитата NickM:
Цитата NickM:
У меня WinDbg вот что выдает - там совсем другое: windbg
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\Erin_works\СанТехКом\55. Задания\2023-01-30. 08-00. Синий экран\MEMORY_2023-01-30.DMP] Kernel Bitmap Dump File: Only kernel address space is available Symbol search path is: *** Invalid *** Executable search path is: *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe - Windows 8 Kernel Version 17763 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 17763.1.amd64fre.rs5_release.180914-1434 Machine Name: Kernel base = 0xfffff807`52e16000 PsLoadedModuleList = 0xfffff807`5322f430 Debug session time: Mon Jan 30 08:19:45.953 2023 (UTC + 3:00) System Uptime: 2 days 23:48:34.823 *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe - Loading Kernel Symbols ............................................................... ................................................................ ................................................................ Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`031fa018). Type ".hh dbgerr001" for details Loading unloaded module list ................... ************* Symbol Loading Error Summary ************** Module name Error ntkrnlmp The system cannot find the file specified You can troubleshoot most symbol related issues by turning on symbol loading diagnostics (!sym noisy) and repeating the command that caused symbols to be loaded. You should also verify that your symbol search path (.sympath) is correct. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1E, {ffffffffc0000005, fffff80eaa782ba5, 1, c0000225} *** ERROR: Module load completed but symbols could not be loaded for Wof.sys *** ERROR: Symbol file could not be found. Defaulted to export symbols for FLTMGR.SYS - ***** Kernel symbols are WRONG. Please fix symbols to do analysis. Probably caused by : Wof.sys ( Wof+2ba5 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80eaa782ba5, The address that the exception occurred at Arg3: 0000000000000001, Parameter 0 of the exception Arg4: 00000000c0000225, Parameter 1 of the exception Debugging Details: ------------------ ***** Kernel symbols are WRONG. Please fix symbols to do analysis. ADDITIONAL_DEBUG_TEXT: You can run '.symfix; .reload' to try to fix the symbol path and load symbols. MODULE_NAME: Wof FAULTING_MODULE: fffff80752e16000 nt DEBUG_FLR_IMAGE_TIMESTAMP: 7d65a03b WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart unable to get nt!MmSpecialPoolEnd unable to get nt!MmPagedPoolEnd unable to get nt!MmNonPagedPoolStart unable to get nt!MmSizeOfNonPagedPoolInBytes 00000000c0000225 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: Wof+2ba5 fffff80e`aa782ba5 3000 xor byte ptr [rax],al EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: 00000000c0000225 BUGCHECK_STR: 0x1E_c0000005_W DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre LAST_CONTROL_TRANSFER: from fffff807530188d9 to fffff80752fceea0 STACK_TEXT: ffffee0f`d8bbeb58 fffff807`530188d9 : 00000000`0000001e ffffffff`c0000005 fffff80e`aa782ba5 00000000`00000001 : nt!KeBugCheckEx ffffee0f`d8bbeb60 fffff807`52fe2902 : 00000000`00000000 ffffee0f`d8bbf3f0 00000000`00001000 00000000`c0000225 : nt!memset+0x34ad9 ffffee0f`d8bbf210 fffff807`52fde4e8 : ffff8684`19600340 ffffee0f`d8bbf868 00000000`00000003 00000000`00002970 : nt!setjmpex+0x8892 ffffee0f`d8bbf3f0 fffff80e`aa782ba5 : ffffee0f`d8bbf610 fffff80e`aa7818fd ffffbc0b`fffeee60 ffffbc0c`09140b28 : nt!setjmpex+0x4478 ffffee0f`d8bbf580 ffffee0f`d8bbf610 : fffff80e`aa7818fd ffffbc0b`fffeee60 ffffbc0c`09140b28 00000000`00000002 : Wof+0x2ba5 ffffee0f`d8bbf588 fffff80e`aa7818fd : ffffbc0b`fffeee60 ffffbc0c`09140b28 00000000`00000002 ffffee0f`d8bbf6a0 : 0xffffee0f`d8bbf610 ffffee0f`d8bbf590 fffff80e`a98dfca2 : ffffbc0c`09140b28 ffffee0f`d8bbf6e0 ffffee0f`00000001 00000000`00000000 : Wof+0x18fd ffffee0f`d8bbf650 fffff80e`a98d7389 : ffffee0f`d8bbf890 ffffee0f`d8bbfc00 00000000`00000003 fffff80e`00000000 : FLTMGR!FltAllocatePoolAlignedWithTag+0xaa2 ffffee0f`d8bbf760 fffff80e`a98d6f6c : ffffbc0c`0b29d3b0 ffffee0f`d8bc0000 ffffee0f`d8bba000 ffffee0f`d8bbf890 : FLTMGR!FltDecodeParameters+0x1e9 ffffee0f`d8bbf7b0 fffff80e`a98d66f0 : ffffbc0c`091af010 00000000`00060043 ffffbc0c`091af010 ffffee0f`d8bbf8a0 : FLTMGR!FltFreeCallbackData+0x137c ffffee0f`d8bbf7e0 fffff80e`a98d612e : ffff8684`19ec07a0 00000000`00000000 ffff9c80`030479c0 00000000`00000000 : FLTMGR!FltFreeCallbackData+0xb00 ffffee0f`d8bbf870 fffff807`52e43029 : ffffbc0c`091af010 fffff807`52e2232f ffffbc0c`05dff350 00000000`00000000 : FLTMGR!FltFreeCallbackData+0x53e ffffee0f`d8bbf8d0 fffff807`52e22218 : ffffbc0b`ffed1cd0 ffffbc0c`091af010 ffffbc0c`0b29d3e0 ffffbc0c`0b29d4a0 : nt!IofCallDriver+0x59 ffffee0f`d8bbf910 fffff807`52f395a9 : ffffbc0c`0b29d390 ffffbc0c`0b29d3b0 ffffbc0c`0b29d3f0 ffffbc0c`0b29d3e0 : nt!IoSynchronousPageWrite+0x1e8 ffffee0f`d8bbf960 fffff807`52e53b3d : 00000000`00000003 ffffee0f`d8bbf9f0 ffffee0f`d8bbfb58 ffff9a4d`00001dc0 : nt!FsRtlValidateReparsePointBuffer+0x449 ffffee0f`d8bbf9b0 fffff807`52e6ad5f : ffff8000`00000000 00000000`c0033333 00000000`7701a835 00000000`00000000 : nt!IoGetBaseFileSystemDeviceObject+0xded ffffee0f`d8bbfa60 fffff807`52fde403 : ffffbc0c`06f9c080 00000000`04981820 ffffee0f`d8bbfc80 ffffbc0c`0b2f7b60 : nt!MmProbeAndLockPages+0x3d4f ffffee0f`d8bbfc00 00000000`7701a835 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!setjmpex+0x4393 00000000`0693cc10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7701a835 STACK_COMMAND: kb FOLLOWUP_IP: Wof+2ba5 fffff80e`aa782ba5 3000 xor byte ptr [rax],al SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: Wof+2ba5 FOLLOWUP_NAME: MachineOwner IMAGE_NAME: Wof.sys BUCKET_ID: WRONG_SYMBOLS FAILURE_BUCKET_ID: WRONG_SYMBOLS ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:wrong_symbols FAILURE_ID_HASH: {70b057e8-2462-896f-28e7-ac72d4d365f8} Followup: MachineOwner --------- |
||
Отправлено: 12:51, 14-02-2023 | #2719 |
Ветеран Сообщения: 4419
|
Профиль | Отправить PM | Цитировать |
Отправлено: 13:00, 14-02-2023 | #2720 |
Участник сейчас на форуме | Участник вне форума | Автор темы | Сообщение прикреплено |
| |||||
Название темы | Автор | Информация о форуме | Ответов | Последнее сообщение | |
Постоянно случается BSoD | vanezzzzz@vk | Непонятные проблемы с Железом | 11 | 25-09-2012 16:28 | |
Ошибка - Постоянно BSOD | Golden D. | Microsoft Windows 2000/XP | 1 | 02-09-2011 08:38 | |
Компьютер постоянно виснет,вылезает окно смерти,ошибки разные. | Fr4nt | Материнские платы и память | 16 | 15-03-2010 10:18 | |
Частые BSOD'ы и всегда разные. WinXP x64 | SlavonBG | Непонятные проблемы с Железом | 10 | 11-11-2009 13:25 | |
постоянно один BSOD | mamlas | Лечение систем от вредоносных программ | 24 | 14-06-2009 10:08 |
|