Ferrari
Newbie | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору Windows 11 Компьютер был перезагружен после критической ошибки. Код ошибки: 0x000000d1 (0x0000000000000008, 0x0000000000000002, 0x0000000000000000, 0xfffff803334f24f9). Дамп памяти сохранен в: C:\WINDOWS\Minidump\020125-17453-01.dmp. Код отчета: 1868d101-9f80-4b3f-9325-82b007271c91. Вот такая ошибка выскакивает время от времени. Без понятия что и как , прошу помощи у знающих людей! ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 42 Microsoft (R) Windows Debugger Version 10.0.27725.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\schor\Desktop\020125-17453-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 26100 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Kernel base = 0xfffff803`9fa00000 PsLoadedModuleList = 0xfffff803`a08f47b0 Debug session time: Sat Feb 1 13:30:22.232 2025 (UTC + 1:00) System Uptime: 0 days 21:18:49.082 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ................ Loading User Symbols Loading unloaded module list ................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff803`9feb8460 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaa01`93b1b6a0=000000000000000a 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000008, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff803334f24f9, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1390 Key : Analysis.Elapsed.mSec Value: 2430 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 328 Key : Analysis.Init.Elapsed.mSec Value: 8577 Key : Analysis.Memory.CommitPeak.Mb Value: 90 Key : Analysis.Version.DbgEng Value: 10.0.27725.1000 Key : Analysis.Version.Description Value: 10.2408.27.01 amd64fre Key : Analysis.Version.Ext Value: 1.2408.27.1 Key : Bugcheck.Code.LegacyAPI Value: 0xd1 Key : Bugcheck.Code.TargetModel Value: 0xd1 Key : Dump.Attributes.AsUlong Value: 21808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_NETIO!CalloutStreamDataInit Key : Failure.Hash Value: {feacaefb-f5a0-338a-7345-95e6dcab80ac} Key : Hypervisor.Enlightenments.ValueHex Value: 7497cf94 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 1 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 0 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 38408431 Key : Hypervisor.Flags.ValueHex Value: 24a10ef Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 3f7 BUGCHECK_CODE: d1 BUGCHECK_P1: 8 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff803334f24f9 FILE_IN_CAB: 020125-17453-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x21808 Kernel Generated Triage Dump FAULTING_THREAD: ffffd20dca3a0200 READ_ADDRESS: fffff803a09c34b0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000008 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffffaa0193b1b7e0 -- (.trap 0xffffaa0193b1b7e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffaa0193b1ba20 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff803334f24f9 rsp=ffffaa0193b1b970 rbp=ffffd20ded966410 r8=ffffaa0193b1ba20 r9=ffffaa0193b1ba50 r10=ffffd20ddc5c0010 r11=fffff8033354f000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc NETIO!CalloutStreamDataInit+0x2d: fffff803`334f24f9 488b5808 mov rbx,qword ptr [rax+8] ds:00000000`00000008=???????????????? Resetting default scope STACK_TEXT: ffffaa01`93b1b698 fffff803`a008cde9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffaa01`93b1b6a0 fffff803`a00880a8 : 00000000`00000000 fffff803`34ad5447 ffffd20d`cec5e220 ffffd20d`cec5e220 : nt!KiBugCheckDispatch+0x69 ffffaa01`93b1b7e0 fffff803`334f24f9 : 00000000`00000002 ffffd20d`d53b87c0 00000000`00000000 ffffaa01`93b1bc60 : nt!KiPageFault+0x468 ffffaa01`93b1b970 fffff803`33524c00 : ffffd20d`d53b8770 ffffd20d`d53b8770 ffffaa01`93b1bc60 ffffd20d`ed6588e0 : NETIO!CalloutStreamDataInit+0x2d ffffaa01`93b1b9a0 fffff803`33521e2b : 00000000`00000000 ffffd20d`d53b8700 ffffd20d`d53b8770 ffffaa01`93b1be78 : NETIO!StreamInvokeCalloutAndNormalizeAction+0x74 ffffaa01`93b1ba90 fffff803`33522279 : ffffd20d`dc5c0010 ffffaa01`93b1bc60 ffffd20d`d53b8770 ffffaa01`8df25d00 : NETIO!StreamCalloutProcessData+0x5f ffffaa01`93b1bb20 fffff803`33500d85 : ffffaa01`8df25d00 ffffaa01`93b1bc60 ffffd20d`d53b8770 ffffd20d`d53b8701 : NETIO!StreamCalloutProcessingLoop+0x175 ffffaa01`93b1bbc0 fffff803`334c310a : 00000000`00000014 fffff803`34ae8630 ffffaa01`00000000 ffffaa01`8df25fc0 : NETIO!StreamProcessCallout+0x609 ffffaa01`93b1bcf0 fffff803`334c1ec0 : 0a3b7d44`206e0014 ffffaa01`8df25fc0 ffffd20d`df65b8c0 ffffaa01`8df25d00 : NETIO!ProcessCallout+0x2ea ffffaa01`93b1bdc0 fffff803`33519616 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!ArbitrateAndEnforce+0x1e0 ffffaa01`93b1bf00 fffff803`a0079bae : 00000000`00000000 00000000`00000401 000000a2`79f4bbe8 00000000`00000000 : NETIO!ArbitrateAndEnforceCallout+0x46 ffffaa01`93b1bf60 fffff803`a0079b6b : ffffd20d`ca3a0200 fffff803`335195d0 00000000`00000004 fffff803`9fc96b55 : nt!KxSwitchKernelStackCallout+0x2e ffffaa01`8df256b0 fffff803`9fc96b55 : ffffaa01`8df25781 ffffaa01`93b1c000 ffffd20d`ca3a0200 ffffd20d`00000001 : nt!KiSwitchKernelStackContinue ffffaa01`8df256d0 fffff803`9fc9663c : fffff803`335195d0 ffffaa01`8df25a30 00000000`00000002 ffffd20d`00000004 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x1d5 ffffaa01`8df257e0 fffff803`9fc96389 : ffffaa01`8df25a30 fffff803`335195d0 00000000`00000002 ffffaa01`8df25d00 : nt!KiExpandKernelStackAndCalloutSwitchStack+0x17c ffffaa01`8df25850 fffff803`9fc9633d : fffff803`335195d0 ffffaa01`8df25a30 ffffd20d`c89e6a80 ffffaa01`8df25fc0 : nt!KeExpandKernelStackAndCalloutInternal+0x39 ffffaa01`8df258c0 fffff803`334f50ee : 00000000`00000000 ffffaa01`8df25d50 00000000`00000001 ffffaa01`8df25fe0 : nt!KeExpandKernelStackAndCalloutEx+0x1d ffffaa01`8df25900 fffff803`334ea562 : 00000000`00000000 fffff803`3354f000 00000000`00000014 ffffd20d`ca27faa0 : NETIO!NetioExpandKernelStackAndCallout+0x7e ffffaa01`8df25950 fffff803`33524994 : 00000001`00010006 ffffd20d`d468bac0 ffffd20d`d4689600 ffffd20d`df65b8c0 : NETIO!KfdClassify+0x622 ffffaa01`8df25c60 fffff803`3351eccd : ffffd20d`db785c90 ffffaa01`8df25ed0 ffffaa01`8df263f0 ffffd20d`dc5c0010 : NETIO!StreamInternalClassify+0x168 ffffaa01`8df25dd0 fffff803`334cf82e : ffffd20d`e645a501 ffffaa01`8df26268 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x43d ffffaa01`8df25f60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!StreamCommonInspect+0x29a SYMBOL_NAME: NETIO!CalloutStreamDataInit+2d MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS IMAGE_VERSION: 10.0.26100.3037 STACK_COMMAND: .process /r /p 0xffffd20dc84c3040; .thread 0xffffd20dca3a0200 ; kb BUCKET_ID_FUNC_OFFSET: 2d FAILURE_BUCKET_ID: AV_NETIO!CalloutStreamDataInit OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {feacaefb-f5a0-338a-7345-95e6dcab80ac} Followup: MachineOwner ---------
1. Эта тема про Server 2003, а у вас Windows 11 2. Портянки принято скрывать под тег /more/ | Всего записей: 16 | Зарегистр. 23-12-2005 | Отправлено: 23:54 01-02-2025 | Исправлено: KLASS, 08:16 03-02-2025 |
|