Dzień dobry.
Od jakiegoś czasu regularnie pojawia się u mnie bluescreen o kodzie KMODE_EXCEPTION_NOT_HANDLED - zawsze kilka minut po uruchomieniu systemu w danym dniu, aczkolwiek niecodziennie. Podaję treść pliku minidump i proszę o pomoc w rozwiązaniu problemu.
Pozdrawiam
Od jakiegoś czasu regularnie pojawia się u mnie bluescreen o kodzie KMODE_EXCEPTION_NOT_HANDLED - zawsze kilka minut po uruchomieniu systemu w danym dniu, aczkolwiek niecodziennie. Podaję treść pliku minidump i proszę o pomoc w rozwiązaniu problemu.
Pozdrawiam
Spoiler:
Microsoft (R) Windows Debugger Version 10.0.18972.1001 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\091519-42078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0x81c74000 PsLoadedModuleList = 0x81f2c778
Debug session time: Sun Sep 15 17:52:45.177 2019 (UTC + 2:00)
System Uptime: 0 days 22:52:10.105
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
...................
For analysis of this file, run !analyze -v
eax=bd53b7d8 ebx=00000000 ecx=81df60cf edx=81df5f86 esi=00000000 edi=00000000
eip=81dda988 esp=bd53b27c ebp=bd53b294 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000246
nt!KeBugCheckEx:
81dda988 55 push ebp
Loading Dump File [C:\WINDOWS\Minidump\091519-42078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Can't set dump file contexts
MachineInfo::SetContext failed - Thread: 04FD65D0 Handle: 1 Id: 1 - Error == 0x8000FFFF
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0x81c74000 PsLoadedModuleList = 0x81f2c778
Debug session time: Sun Sep 15 17:52:45.177 2019 (UTC + 2:00)
System Uptime: 0 days 22:52:10.105
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
...................
eax=bd53b7d8 ebx=00000000 ecx=81df60cf edx=81df5f86 esi=00000000 edi=00000000
eip=81dda988 esp=bd53b27c ebp=bd53b294 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000246
nt!KeBugCheckEx:
81dda988 55 push ebp
||1:0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 81d071c0, The address that the exception occurred at
Arg3: 00000000, Parameter 0 of the exception
Arg4: 656c696a, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 19
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on PAWEŁ-KOMPUTER
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 24
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: ffffffff81d071c0
BUGCHECK_P3: 0
BUGCHECK_P4: 656c696a
READ_ADDRESS: 81f6a190: Unable to get MiVisibleState
Unable to get MmSystemRangeStart
Unable to get NonPagedPoolStart
Unable to get PagedPoolStart
81f17d68: Unable to get Flags value from nt!KdVersionBlock
81f17d68: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
656c696a
EXCEPTION_PARAMETER2: 656c696a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
TRAP_FRAME: bd53b8b4 -- (.trap 0xffffffffbd53b8b4)
ErrCode = 00000000
eax=656c6946 ebx=b7cfd180 ecx=9c3fa208 edx=bd53b990 esi=00000000 edi=b7cfd184
eip=81d071c0 esp=bd53b928 ebp=bd53b928 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
nt!IoGetBaseFileSystemDeviceObject+0x26:
81d071c0 8b4024 mov eax,dword ptr [eax+24h] ds:0023:656c696a=????????
Resetting default scope
STACK_TEXT:
bd53b278 81e7c8ae 0000001e c0000005 81d071c0 nt!KeBugCheckEx
bd53b294 81df5f72 bd53b7d8 81f782f0 bd53b390 nt!KiFatalExceptionHandler+0x1a
bd53b2b8 81df5f44 bd53b7d8 81f782f0 bd53b390 nt!ExecuteHandler2+0x26
bd53b380 81cadce1 bd53b7d8 bd53b390 00010037 nt!ExecuteHandler+0x24
bd53b7bc 81deebdd bd53b7d8 00000000 bd53b8b4 nt!KiDispatchException+0x1a1
bd53b828 81df34be 00000000 00000000 00000000 nt!KiDispatchTrapException+0x51
bd53b828 81d071c0 00000000 00000000 00000000 nt!KiTrap0E+0x382
bd53b928 827e0d6d 9c3fa208 9c3fa208 bd53b9f4 nt!IoGetBaseFileSystemDeviceObject+0x26
bd53b938 8203996b 9c3fa208 00000400 96cfd000 FLTMGR!FltMgrFsRtlGetFileNameInformation+0xf
bd53b9f4 82013459 81f78c40 8dd8a040 c484b1c0 nt!EtwpEnumerateAddressSpace+0x16b
bd53bc20 81fab6a0 8dd8a040 c484b1c0 00000000 nt!EtwTraceProcess+0x79
bd53bc38 81fe85c5 c767ab08 8dd8a1d0 8dd8a040 nt!PspExitProcess+0x4a
bd53bcc8 82042a5c 00000000 00000000 00000000 nt!PspExitThread+0x431
bd53bcdc 81cbd2fe 8dd8a1d0 bd53bd0c bd53bd18 nt!MiArbitraryCodeBlocked
bd53bd3c 81ded394 00000001 00000000 bd53bd54 nt!KiDeliverApc+0x31e
bd53bd3c 76fa1610 00000001 00000000 bd53bd54 nt!KiServiceExit+0x76
WARNING: Frame IP not in any known module. Following frames may be wrong.
05cffea4 00000000 00000000 00000000 00000000 0x76fa1610
SYMBOL_NAME: nt!IoGetBaseFileSystemDeviceObject+26
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
IMAGE_VERSION: 10.0.18362.356
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 26
FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!IoGetBaseFileSystemDeviceObject
OSPLATFORM_TYPE: x86
OSNAME: Windows 10
FAILURE_ID_HASH: {78026907-4378-4c5e-b2c3-58a9db801ed9}
Followup: MachineOwner
---------