Új hozzászólás Aktív témák

  • Alcsi69

    senior tag

    Sziasztok!

    Megint elkezdtem kapni bsodokat, leginkább ntoskrnl.exe illetve ntkrnlmp.exe "okozták" vagy ezekkel van összefüggésben.
    A legutóbbi (mai) minidump fájlt megnézve, azt írja hogy PROCESS_NAME: MSIAfterburner... Szóval lehetséges hogy az afterburner nem tetszik a cuccnak és miatta kapok bsodokat? :(
    Itt a teljes minidump analízis (látom nagyon undin néz ki így beszúrva, de nem tudom hogy tudnám máshogy :( ):
    Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
    Online Crash Dump Analysis Service
    See http://www.osronline.com for more information
    Windows 8 Kernel Version 17134 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 17134.1.amd64fre.rs4_release.180410-1804
    Machine Name:
    Kernel base = 0xfffff800`76013000 PsLoadedModuleList = 0xfffff800`763c1290
    Debug session time: Tue Oct 23 04:30:00.368 2018 (UTC - 4:00)
    System Uptime: 0 days 10:58:36.053
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c000001d, Exception code that caused the bugcheck
    Arg2: fffff8007614f2c0, Address of the instruction which caused the bugcheck
    Arg3: ffffca8469596af0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.

    Debugging Details:
    ------------------

    TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

    EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.

    FAULTING_IP:
    nt!ExpFindCurrentThread+0
    fffff800`7614f2c0 4053 push rbx

    CONTEXT: ffffca8469596af0 -- (.cxr 0xffffca8469596af0)
    rax=0000000000000000 rbx=0000000000000006 rcx=ffffa3036604cf90
    rdx=ffffa3036500e080 rsi=ffffa3036604cf90 rdi=ffffa3036500e080
    rip=fffff8007614f2c0 rsp=ffffca84695974e8 rbp=0000000000000001
    r8=ffffca8469597520 r9=0000000000000000 r10=ffffa3036604cff0
    r11=000000000000006c r12=ffffa3036500e080 r13=0000000000000000
    r14=00000000025af700 r15=0000000000000000
    iopl=0 nv up di pl zr na po nc
    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010046
    nt!ExpFindCurrentThread:
    fffff800`7614f2c0 4053 push rbx
    Resetting default scope

    DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

    BUGCHECK_STR: 0x3B

    PROCESS_NAME: MSIAfterburner

    CURRENT_IRQL: 0

    LAST_CONTROL_TRANSFER: from fffff8007614f14c to fffff8007614f2c0

    STACK_TEXT:
    ffffca84`695974e8 fffff800`7614f14c : ffffca84`695975b8 00000000`0000001b 00000000`00000000 00000000`00000000 : nt!ExpFindCurrentThread
    ffffca84`695974f0 fffff800`7604614d : ffffa303`6604cf02 ffffa303`6604cf90 ffffa303`6500e080 fffff800`7615e350 : nt!ExpBoostIoAfterAcquire+0xfc
    ffffca84`69597570 fffff800`760453ef : 00000000`00000000 00000000`00000000 ffffa303`65673d20 fffff800`7604a137 : nt!ExpAcquireResourceExclusiveLite+0x35d
    ffffca84`69597600 ffff8f00`6e1b7859 : ffffa303`65673d20 ffff8f00`6e1c1a1a 00000000`003bb950 ffff8f00`6e190502 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3f
    ffffca84`69597640 ffff8f00`6da2891a : ffff8f4f`83be5a20 00000000`00000000 00000000`00000001 00000000`0000000d : win32kbase!EnterCrit+0x49
    ffffca84`69597690 ffff8f00`6da28530 : ffff8f4f`83be0000 ffff8f4f`83be0000 00000000`00000001 ffff8f00`00000000 : win32kfull!xxxRealSleepThread+0x33a
    ffffca84`695977a0 ffff8f00`6da29f39 : ffffca84`69597a80 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxSleepThread2+0xa0
    ffffca84`695977f0 ffff8f00`6da28ebc : ffffca84`695979a8 ffffca84`6959c240 00000000`00000000 00000000`0009fda0 : win32kfull!xxxRealInternalGetMessage+0xef9
    ffffca84`69597960 fffff800`761ccb43 : ffffa303`6500e080 00000000`77875290 00000000`00000020 ffffa303`66bf42d0 : win32kfull!NtUserGetMessage+0x8c
    ffffca84`69597a00 00000000`7787f384 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0009e5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7787f384


    FOLLOWUP_IP:
    win32kbase!EnterCrit+49
    ffff8f00`6e1b7859 4885c0 test rax,rax

    SYMBOL_STACK_INDEX: 4

    SYMBOL_NAME: win32kbase!EnterCrit+49

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: win32kbase

    IMAGE_NAME: win32kbase.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 0

    STACK_COMMAND: .cxr 0xffffca8469596af0 ; kb

    FAILURE_BUCKET_ID: X64_0x3B_win32kbase!EnterCrit+49

    BUCKET_ID: X64_0x3B_win32kbase!EnterCrit+49

    Followup: MachineOwner
    ---------

    [ Szerkesztve ]

Új hozzászólás Aktív témák