none
BugCheck 3B,蓝屏求助 RRS feed

  • 问题

  • BugCheck 3B, {c0000005, fffff80ff473dff8, ffff95801ee1f130, 0}

    话说那个WinDbg载入蓝屏文件的速度也极慢是咋回事以前没那么慢的............

    3B假设如果是硬件问题 一般有哪几个硬件范围?

    2016年10月18日 7:22

全部回复


  • Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
    Copyright (c) Microsoft Corporation. All rights reserved.

    Loading Dump File [D:\MEMORY.DMP]
    Kernel Bitmap Dump File: Full address space is available
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 14393 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 14393.321.amd64fre.rs1_release_inmarket.161004-2338
    Machine Name:
    Kernel base = 0xfffff800`05483000 PsLoadedModuleList = 0xfffff800`05787080
    Debug session time: Tue Oct 18 14:51:03.270 2016 (UTC + 8:00)
    System Uptime: 0 days 1:01:57.140
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    Loading User Symbols
    .....
    Loading unloaded module list
    ..........
    Loading Wow64 Symbols
    ................................................................
    ................................................................
    ................................................................
    ........................................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    Use !analyze -v to get detailed debugging information.
    BugCheck 3B, {c0000005, fffff80ff473dff8, ffff95801ee1f130, 0}
    CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
    CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
    CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
    CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
    CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
    CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
    CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
    CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
    *** ERROR: Module load completed but symbols could not be loaded for klwtp.sys
    "C:\Windows\System32\KERNELBASE.dll" was not found in the image list.
    Debugger will attempt to load "C:\Windows\System32\KERNELBASE.dll" at given base 00000000`00000000.
    Please provide the full image name, including the extension (i.e. kernel32.dll)
    for more reliable results.Base address and size overrides can be given as
    .reload <image.ext>=<base>,<size>.
    Unable to add module at 00000000`00000000
    Probably caused by : NETIO.SYS ( NETIO!StreamProcessCallout+28c )
    Followup:     MachineOwner
    ---------
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff80ff473dff8, Address of the instruction which caused the bugcheck
    Arg3: ffff95801ee1f130, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    Debugging Details:
    ------------------

    DUMP_CLASS: 1
    DUMP_QUALIFIER: 402
    BUILD_VERSION_STRING:  14393.321.amd64fre.rs1_release_inmarket.161004-2338
    SYSTEM_MANUFACTURER:  System manufacturer
    SYSTEM_PRODUCT_NAME:  System Product Name
    SYSTEM_SKU:  SKU
    SYSTEM_VERSION:  System Version
    BIOS_VENDOR:  American Megatrends Inc.
    BIOS_VERSION:  3602
    BIOS_DATE:  11/01/2012
    BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.
    BASEBOARD_PRODUCT:  P8P67
    BASEBOARD_VERSION:  Rev 1.xx
    DUMP_TYPE:  0
    BUGCHECK_P1: c0000005
    BUGCHECK_P2: fffff80ff473dff8
    BUGCHECK_P3: ffff95801ee1f130
    BUGCHECK_P4: 0
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%p
    FAULTING_IP:
    NETIO!StreamProcessCallout+28c
    fffff80f`f473dff8 483988b0000000  cmp     qword ptr [rax+0B0h],rcx
    CONTEXT:  ffff95801ee1f130 -- (.cxr 0xffff95801ee1f130)
    rax=0000000000000000 rbx=ffffd50468ff7be0 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=ffff95801ee1fec0
    rip=fffff80ff473dff8 rsp=ffff95801ee1fb40 rbp=ffff95801ee1fc31
     r8=fffff80ff4791ae0  r9=0000000000000000 r10=0000000000001390
    r11=ffff95801ee1fb20 r12=0000000000000001 r13=ffffd50466961b01
    r14=ffff95801ee20340 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
    NETIO!StreamProcessCallout+0x28c:
    fffff80f`f473dff8 483988b0000000  cmp     qword ptr [rax+0B0h],rcx ds:002b:00000000`000000b0=????????????????
    Resetting default scope
    CPU_COUNT: 8
    CPU_MHZ: d48
    CPU_VENDOR:  GenuineIntel
    CPU_FAMILY: 6
    CPU_MODEL: 2a
    CPU_STEPPING: 7
    CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 29'00000000 (cache) 29'00000000 (init)
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    BUGCHECK_STR:  0x3B
    PROCESS_NAME:  avp.exe
    CURRENT_IRQL:  0
    ANALYSIS_SESSION_HOST:  CV226-CXC378WWJ
    ANALYSIS_SESSION_TIME:  10-18-2016 16:03:33.0664
    ANALYSIS_VERSION: 10.0.14321.1024 x86fre
    LAST_CONTROL_TRANSFER:  from fffff80ff473d8b7 to fffff80ff473dff8
    STACK_TEXT: 
    ffff9580`1ee1fb40 fffff80f`f473d8b7 : ffffd504`60ba0014 fffff80f`f57eb2b8 ffffd504`00000002 ffffd504`66961b90 : NETIO!StreamProcessCallout+0x28c
    ffff9580`1ee1fc80 fffff80f`f473d02e : 00000000`00000014 ffffd504`66961b90 ffffd504`69348d90 ffff9580`1ee20340 : NETIO!ProcessCallout+0x6b7
    ffff9580`1ee1fe00 fffff80f`f473b1c3 : bd39c8ef`dfcda310 ffff9580`1ee20040 00000000`00000000 000002cc`fffffd34 : NETIO!ArbitrateAndEnforce+0x4ee
    ffff9580`1ee1ff40 fffff80f`f477bc65 : ffffd504`60ce6180 fffff80f`f4740a95 ffff9580`1ee20310 00000000`00000000 : NETIO!KfdClassify+0x303
    ffff9580`1ee202f0 fffff80f`f477b708 : 00000000`00000000 ffff9580`1ee20491 00000000`00001390 00000000`00000000 : NETIO!StreamInternalClassify+0x109
    ffff9580`1ee20410 fffff80f`f4778e25 : 00000000`00000014 ffffd504`69348be0 00000000`00000000 ffffd504`646963d0 : NETIO!StreamInject+0x214
    ffff9580`1ee204e0 fffff80f`f4a7683d : ffffd504`69348be0 00000000`00000127 00000000`00000000 ffffd504`00000011 : NETIO!FwppStreamInject+0x135
    ffff9580`1ee20570 fffff80f`f57e9c7a : ffffd504`62ac0490 ffff9580`1ee20641 ffffd504`640a8880 00000000`00000002 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
    ffff9580`1ee205d0 fffff80f`f57e575e : ffffd504`62ac0490 ffffd504`61a98f40 ffffd504`00001390 00000000`00000000 : klwtp+0x9c7a
    ffff9580`1ee206a0 fffff80f`f57e5487 : ffffd504`6938dc60 ffffd504`647e6d60 ffffd504`6938dc60 00000000`00000001 : klwtp+0x575e
    ffff9580`1ee20730 fffff80f`f57e1b52 : ffffd504`6938dc60 ffffd504`647e6d60 00000000`00000002 fffff800`000001c8 : klwtp+0x5487
    ffff9580`1ee20780 fffff80f`f57e183f : ffffd504`61363320 ffffd504`6938dc60 ffffd504`647e6d60 ffffd504`5f54bc01 : klwtp+0x1b52
    ffff9580`1ee207c0 fffff80f`f57e316b : ffffd504`61363320 ffffd504`6938dc60 00000000`00000000 ffffd504`6938dc60 : klwtp+0x183f
    ffff9580`1ee207f0 fffff800`058e8280 : ffffd504`61363320 ffffd504`6938dc60 ffffd504`647e6d60 00000000`00000000 : klwtp+0x316b
    ffff9580`1ee20820 fffff800`058e7164 : 00000000`00000000 ffffd504`647e6d04 00000000`00000000 ffff9580`1ee20b80 : nt!IopSynchronousServiceTail+0x1a0
    ffff9580`1ee208e0 fffff800`058e6ae6 : ffffd504`00000001 00000000`00000000 00000000`00000001 00000000`24db0cb4 : nt!IopXxxControlFile+0x674
    ffff9580`1ee20a20 fffff800`055d7f93 : ffff83c1`c00008c0 ffff83c1`e0e00000 ffff83c1`e0f07000 ffffd854`f70a4907 : nt!NtDeviceIoControlFile+0x56
    ffff9580`1ee20a90 00000000`5951222c : 00000000`59511e67 00000023`76f5dc7c 00000000`00000023 00000000`0058e0fb : nt!KiSystemServiceCopyEnd+0x13
    00000000`130ff008 00000000`59511e67 : 00000023`76f5dc7c 00000000`00000023 00000000`0058e0fb 00000000`131fe1c4 : wow64cpu!CpupSyscallStub+0xc
    00000000`130ff010 00000000`5953bfa1 : 00000000`00000000 00000000`00000000 000020e6`9821d841 00000000`00000000 : wow64cpu!DeviceIoctlFileFault+0x31
    00000000`130ff0c0 00000000`5952cbb0 : 00000000`00000000 00000000`130ff170 00000000`00000001 00000000`00000000 : wow64!Wow64KiUserCallbackDispatcher+0x4151
    00000000`130ff140 00007ffc`858f8ebd : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : wow64!Wow64LdrpInitialize+0x120
    00000000`130ff3f0 00007ffc`858f8d5e : 00000000`130ff4c0 00000000`00000000 00000000`00000000 00000000`00c17000 : ntdll!_LdrpInitialize+0x109
    00000000`130ff470 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrInitializeThunk+0xe

    THREAD_SHA1_HASH_MOD_FUNC:  ac66eece4094cdb43af4bb6201961b10b70254c8
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  acb46b7f00f2367d768aa79bde739bd2bf82ce48
    THREAD_SHA1_HASH_MOD:  2896100a8f51dbeb59dae219758c433202a005f7
    FOLLOWUP_IP:
    NETIO!StreamProcessCallout+28c
    fffff80f`f473dff8 483988b0000000  cmp     qword ptr [rax+0B0h],rcx
    FAULT_INSTR_CODE:  b0883948
    SYMBOL_STACK_INDEX:  0
    SYMBOL_NAME:  NETIO!StreamProcessCallout+28c
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: NETIO
    IMAGE_NAME:  NETIO.SYS
    DEBUG_FLR_IMAGE_TIMESTAMP:  57899b40
    STACK_COMMAND:  .cxr 0xffff95801ee1f130 ; kb
    BUCKET_ID_FUNC_OFFSET:  28c
    FAILURE_BUCKET_ID:  0x3B_NETIO!StreamProcessCallout
    BUCKET_ID:  0x3B_NETIO!StreamProcessCallout
    PRIMARY_PROBLEM_CLASS:  0x3B_NETIO!StreamProcessCallout
    TARGET_TIME:  2016-10-18T06:51:03.000Z
    OSBUILD:  14393
    OSSERVICEPACK:  0
    SERVICEPACK_NUMBER: 0
    OS_REVISION: 0
    SUITE_MASK:  272
    PRODUCT_TYPE:  1
    OSPLATFORM_TYPE:  x64
    OSNAME:  Windows 10
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    OS_LOCALE: 
    USER_LCID:  0
    OSBUILD_TIMESTAMP:  2016-10-05 17:17:53
    BUILDDATESTAMP_STR:  161004-2338
    BUILDLAB_STR:  rs1_release_inmarket
    BUILDOSVER_STR:  10.0.14393.321.amd64fre.rs1_release_inmarket.161004-2338
    ANALYSIS_SESSION_ELAPSED_TIME: 3247e
    ANALYSIS_SOURCE:  KM
    FAILURE_ID_HASH_STRING:  km:0x3b_netio!streamprocesscallout
    FAILURE_ID_HASH:  {12d5d042-1527-3ed4-7567-edbc67fa5418}
    Followup:     MachineOwner
    ---------
    2016年10月18日 8:27
  • 0x0000003B 错误表示一个从没有权限的代码传送至有权限的代码时遇到了例外的错误,一般是软件兼容性问题引起页面库占用过多,或者用户模式的显示驱动传送了不正确的代码。

    你电脑上是不是安装了卡巴斯基?如果不是卡巴斯基检测到了恶意程序、就是卡巴斯基自身的运行有错误。


    Alexis Zhang

    http://mvp.microsoft.com/zh-cn/mvp/Jie%20Zhang-4000545
    http://blogs.itecn.net/blogs/alexis

    推荐以 NNTP Bridge 桥接新闻组方式访问论坛。

    本帖是回复帖,原帖作者是楼上的 "神奇的兔子"

    | BugCheck 3B, {c0000005, fffff80ff473dff8, ffff95801ee1f130, 0}
    | 话说那个WinDbg载入蓝屏文件的速度也极慢是咋回事以前没那么慢的......

    2016年10月18日 13:09
    版主
  • 3B一般是软件兼容或者驱动问题导致的?和硬件关系不大?

    确实有装卡巴.... ..   这个分析文件指向卡巴斯基导致的3B吗?

    2016年10月18日 15:11
  • 对,多数情况不是硬件问题。

    卡巴斯基只是问题的触因,不一定是根本原因。像之前说的,如果卡巴斯基检测到了厉害的病毒,或者卡巴斯基的防御模块与其它程序有冲突,都有可能引起蓝屏。


    Alexis Zhang

    http://mvp.microsoft.com/zh-cn/mvp/Jie%20Zhang-4000545
    http://blogs.itecn.net/blogs/alexis

    推荐以 NNTP Bridge 桥接新闻组方式访问论坛。

    本帖是回复帖,原帖作者是楼上的 "神奇的兔子"

    | 3B一般是软件兼容或者驱动问题导致的?和硬件关系不大?
    | 确实有装卡巴.... .. 这个分析文件指向卡巴斯基导致的3B吗?

    2016年10月19日 14:02
    版主