找回密码
 立即注册
  • QQ空间
  • 回复
  • 收藏

求大神们帮忙啊 蓝屏故障代码 每个都不一样

********************************************************************************                                                                             **                        Bugcheck Analysis                                    **                                                                             ********************************************************************************BAD_POOL_CALLER (c2)The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.Arguments:Arg1: 0000000000000099, Attempt to free pool with invalid address  (or corruption in pool header)Arg2: 0000000000200000, Address being freedArg3: 0000000000000000, 0Arg4: 0000000000000000, 0Debugging Details:------------------KEY_VALUES_STRING: 1    Key  : Analysis.CPU.mSec    Value: 140    Key  : Analysis.Elapsed.mSec    Value: 9221    Key  : Analysis.IO.Other.Mb    Value: 3    Key  : Analysis.IO.Read.Mb    Value: 1    Key  : Analysis.IO.Write.Mb    Value: 5    Key  : Analysis.Init.CPU.mSec    Value: 46    Key  : Analysis.Init.Elapsed.mSec    Value: 88209    Key  : Analysis.Memory.CommitPeak.Mb    Value: 98    Key  : Analysis.Version.DbgEng    Value: 10.0.27793.1000    Key  : Analysis.Version.Description    Value: 10.2410.02.02 amd64fre    Key  : Analysis.Version.Ext    Value: 1.2410.2.2    Key  : Bugcheck.Code.LegacyAPI    Value: 0xc2    Key  : Bugcheck.Code.TargetModel    Value: 0xc2    Key  : Failure.Bucket    Value: 0xc2_99_fileinfo!FIPfInterfaceClose    Key  : Failure.Exception.IP.Address    Value: 0xfffff80627208081    Key  : Failure.Exception.IP.Module    Value: nt    Key  : Failure.Exception.IP.Offset    Value: 0x208081    Key  : Failure.Hash    Value: {d6f5dd36-f6c7-4c0e-5905-dc83f1ab7b56}    Key  : WER.OS.Branch    Value: ni_release    Key  : WER.OS.Version    Value: 10.0.22621.1BUGCHECK_CODE:  c2BUGCHECK_P1: 99BUGCHECK_P2: 200000BUGCHECK_P3: 0BUGCHECK_P4: 0FILE_IN_CAB:  040225-7203-01.dmpFAULTING_THREAD:  ffffa8096e737040BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT:  1PROCESS_NAME:  SystemSTACK_TEXT:  ffff830a`04e9a328 fffff806`27aaa03e     : 00000000`000000c2 00000000`00000099 00000000`00200000 00000000`00000000 : nt!KeBugCheckExffff830a`04e9a330 fffff806`27208081     : ffffa809`7b2c3c10 00000000`00000000 00000000`00000000 fffff806`276f087d : nt!ExFreePoolWithTag+0x7deffff830a`04e9a3c0 fffff806`276b8820     : ffffa809`855aa6f0 ffffa809`855aa6f0 ffffa809`7b2f9420 ffffa809`7b35a030 : nt!IopDeleteFileObjectExtension+0x125ffff830a`04e9a410 fffff806`276c460e     : ffffa809`6e7f57a0 ffffa809`855aa6c0 ffffa809`855aa6c0 ffff830a`04e9a5e9 : nt!IopDeleteFile+0x230ffff830a`04e9a490 fffff806`27266a97     : 00000000`00000000 00000000`00000000 ffff830a`04e9a5e9 ffffa809`855aa6f0 : nt!ObpRemoveObjectRoutine+0x7effff830a`04e9a4f0 fffff806`276c32b4     : 00000000`00000001 00000000`00000001 00000000`00000c0c 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0xc7ffff830a`04e9a530 fffff806`276c0c29     : 00000000`00000000 ffffcd87`3e400000 ffffffff`80000c0c ffffcd87`5460c7f0 : nt!ObpCloseHandle+0x2a4ffff830a`04e9a650 fffff806`2742a005     : ffffa809`6e737040 fffff806`272686e9 ffffcd87`3e400380 fffff806`272207ff : nt!NtClose+0x39ffff830a`04e9a680 fffff806`2741a4c0     : fffff806`2b84aa20 00000000`00000000 ffff830a`04e9aa40 ffffcd87`5460c820 : nt!KiSystemServiceCopyEnd+0x25ffff830a`04e9a818 fffff806`2b84aa20     : 00000000`00000000 ffff830a`04e9aa40 ffffcd87`5460c820 fffff806`276c4616 : nt!KiServiceLinkageffff830a`04e9a820 fffff806`2c3becd1     : ffff830a`04e9a8b0 ffffcd87`458a8990 00000000`00040246 fffff806`2731132c : FLTMGR!FltClose+0x10ffff830a`04e9a850 fffff806`277f1d0a     : ffff830a`04e9aa40 ffffcd87`50382840 ffffcd87`50381f38 00000000`00000000 : fileinfo!FIPfInterfaceClose+0x51ffff830a`04e9a890 fffff806`27733849     : ffffcd87`5037fdc0 ffff830a`0968f850 ffff830a`0968f850 00000000`00000060 : nt!PfpOpenHandleClose+0x4affff830a`04e9a8e0 fffff806`27732cbd     : ffff830a`0968f620 ffff830a`0968f620 ffffa809`00000002 00000000`00000050 : nt!PfSnCleanupPrefetchSectionInfo+0x45ffff830a`04e9a910 fffff806`272b8595     : ffffa809`6e737040 ffffa809`6e6e5a10 fffff806`27d49ac0 ffffa809`85e0ea90 : nt!PfSnSectionInfoCleanupWorkItem+0x7dffff830a`04e9a940 fffff806`2734cff7     : ffffa809`6e737040 00000000`000001c6 ffffa809`6e737040 fffff806`272b8440 : nt!ExpWorkerThread+0x155ffff830a`04e9ab30 fffff806`27419b44     : ffff8480`bf78c180 ffffa809`6e737040 fffff806`2734cfa0 00000001`00303963 : nt!PspSystemThreadStartup+0x57ffff830a`04e9ab80 00000000`00000000     : ffff830a`04e9b000 ffff830a`04e94000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34SYMBOL_NAME:  fileinfo!FIPfInterfaceClose+51MODULE_NAME: fileinfoIMAGE_NAME:  fileinfo.sysIMAGE_VERSION:  10.0.22621.1774STACK_COMMAND:  .process /r /p 0xffffa8096e6f7040; .thread 0xffffa8096e737040 ; kbBUCKET_ID_FUNC_OFFSET:  51FAILURE_BUCKET_ID:  0xc2_99_fileinfo!FIPfInterfaceCloseOS_VERSION:  10.0.22621.1BUILDLAB_STR:  ni_releaseOSPLATFORM_TYPE:  x64OSNAME:  Windows 10FAILURE_ID_HASH:  {d6f5dd36-f6c7-4c0e-5905-dc83f1ab7b56}Followup:     MachineOwner---------
回复

使用道具 举报

大神点评(6)

Octavionaft 楼主 昨天 10:38 显示全部楼层
这是第二个 EXCEPTION_ON_INVALID_STACK (1aa)This BugCheck indicates that exception dispatch crossed over into an invalidkernel stack.  This might indicate that the kernel stack pointer has becomecorrupted during exception dispatch or unwind (e.g. due to stack corruption ofa frame pointer), or that a driver is executing off of a stack that is not alegal kernel stack.Arguments:Arg1: ffffc983252bedc0, A pointer to the current stack.Arg2: 0000000000000003, A normal kernel thread stackArg3: ffffcd00527bc900, A pointer to the context record representing the context that wasbeing unwound (or dispatched for an exception) when the invalid stackwas encountered.Arg4: ffffc983252beb88, ExceptionRecord - Supplies an exception record representing the activeexception that was being dispatched.Debugging Details:------------------*** WARNING: Check Image - Checksum mismatch - Dump: 0x205d5b, File: 0x205dc7 - C:\ProgramData\Dbg\sym\BTHport.sys\945B5D29202000\BTHport.sysKEY_VALUES_STRING: 1    Key  : Analysis.CPU.mSec    Value: 375    Key  : Analysis.Elapsed.mSec    Value: 2342    Key  : Analysis.IO.Other.Mb    Value: 0    Key  : Analysis.IO.Read.Mb    Value: 1    Key  : Analysis.IO.Write.Mb    Value: 0    Key  : Analysis.Init.CPU.mSec    Value: 78    Key  : Analysis.Init.Elapsed.mSec    Value: 2080    Key  : Analysis.Memory.CommitPeak.Mb    Value: 91    Key  : Analysis.Version.DbgEng    Value: 10.0.27793.1000    Key  : Analysis.Version.Description    Value: 10.2410.02.02 amd64fre    Key  : Analysis.Version.Ext    Value: 1.2410.2.2    Key  : Bugcheck.Code.LegacyAPI    Value: 0x1aa    Key  : Bugcheck.Code.TargetModel    Value: 0x1aa    Key  : Failure.Bucket    Value: 0x1AA_nt!RtlpGetStackLimitsEx    Key  : Failure.Hash    Value: {a75f195a-d08e-20f7-b020-0d8ede2085b8}    Key  : Stack.Pointer    Value: PRCBException    Key  : WER.OS.Branch    Value: ni_release    Key  : WER.OS.Version    Value: 10.0.22621.1BUGCHECK_CODE:  1aaBUGCHECK_P1: ffffc983252bedc0BUGCHECK_P2: 3BUGCHECK_P3: ffffcd00527bc900BUGCHECK_P4: ffffc983252beb88FILE_IN_CAB:  032625-7328-01.dmpFAULTING_THREAD:  ffffa80ad194c080BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT:  1PROCESS_NAME:  audiodg.exeSTACK_TEXT:  ffffcd00`527bc608 fffff802`7fcc7b1c     : 00000000`000001aa ffffc983`252bedc0 00000000`00000003 ffffcd00`527bc900 : nt!KeBugCheckExffffcd00`527bc610 fffff802`7fa2e928     : ffffc983`252bec00 ffffc983`252beb88 00000000`00000000 00000000`00000001 : nt!RtlpGetStackLimitsEx+0x18141cffffcd00`527bc660 fffff802`7fb1726e     : ffffffff`ffffffff ffffc983`252bec30 ffffc983`252bec30 ffffcd00`527bc900 : nt!RtlDispatchException+0xe8ffffcd00`527bc8d0 fffff802`7fc15bf2     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1aeffffcd00`527bcfb0 fffff802`7fc15bc0     : fffff802`7fc2aa75 ffffcd00`52a74180 0000020a`b8402320 ffffcd00`52a74180 : nt!KxExceptionDispatchOnExceptionStack+0x12ffffc983`252bea48 fffff802`7fc2aa75     : ffffcd00`52a74180 0000020a`b8402320 ffffcd00`52a74180 0000020a`a6eac240 : nt!KiExceptionDispatchOnExceptionStackContinueffffc983`252bea50 fffff802`7fc25569     : ffffcd00`5279b180 fffff802`7fc1e507 ffffcd00`52a74180 00000000`00000000 : nt!KiExceptionDispatch+0x135ffffc983`252bec30 fffff802`7fa20293     : ffffcd00`52a74180 00000000`00000000 ffffa80a`b3b47040 00000000`00000000 : nt!KiStackFault+0x369ffffc983`252bedc0 fffff802`7fa21687     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0xad3ffffc983`252bef10 fffff802`7fab7c06     : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x137ffffc983`252befc0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeWaitForMultipleObjects+0x306SYMBOL_NAME:  nt!RtlpGetStackLimitsEx+18141cMODULE_NAME: ntIMAGE_NAME:  ntkrnlmp.exeIMAGE_VERSION:  10.0.22621.5037STACK_COMMAND:  .process /r /p 0xffffa80accfdf080; .thread 0xffffa80ad194c080 ; kbBUCKET_ID_FUNC_OFFSET:  18141cFAILURE_BUCKET_ID:  0x1AA_nt!RtlpGetStackLimitsExOS_VERSION:  10.0.22621.1BUILDLAB_STR:  ni_releaseOSPLATFORM_TYPE:  x64OSNAME:  Windows 10FAILURE_ID_HASH:  {a75f195a-d08e-20f7-b020-0d8ede2085b8}Followup:     MachineOwner---------
回复 支持 反对

使用道具 举报

Octavionaft 楼主 昨天 10:39 显示全部楼层
这是第三个!!!IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high.  This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: ffff810bc84f72b8, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000000, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff80145839a9d, address which referenced memoryDebugging Details:------------------KEY_VALUES_STRING: 1    Key  : Analysis.CPU.mSec    Value: 375    Key  : Analysis.Elapsed.mSec    Value: 2792    Key  : Analysis.IO.Other.Mb    Value: 1    Key  : Analysis.IO.Read.Mb    Value: 1    Key  : Analysis.IO.Write.Mb    Value: 7    Key  : Analysis.Init.CPU.mSec    Value: 109    Key  : Analysis.Init.Elapsed.mSec    Value: 29746    Key  : Analysis.Memory.CommitPeak.Mb    Value: 110    Key  : Analysis.Version.DbgEng    Value: 10.0.27793.1000    Key  : Analysis.Version.Description    Value: 10.2410.02.02 amd64fre    Key  : Analysis.Version.Ext    Value: 1.2410.2.2    Key  : Bugcheck.Code.LegacyAPI    Value: 0xa    Key  : Bugcheck.Code.TargetModel    Value: 0xa    Key  : Failure.Bucket    Value: AV_msrpc!LRPC_BASE_CCALL::DoSendReceive    Key  : Failure.Exception.IP.Address    Value: 0xfffff80145839a9d    Key  : Failure.Exception.IP.Module    Value: nt    Key  : Failure.Exception.IP.Offset    Value: 0x439a9d    Key  : Failure.Hash    Value: {5655ae20-2c48-8db3-2bce-2393a971d81a}    Key  : WER.OS.Branch    Value: ni_release    Key  : WER.OS.Version    Value: 10.0.22621.1BUGCHECK_CODE:  aBUGCHECK_P1: ffff810bc84f72b8BUGCHECK_P2: 2BUGCHECK_P3: 0BUGCHECK_P4: fffff80145839a9dFILE_IN_CAB:  033025-10156-01.dmpFAULTING_THREAD:  ffff810bdf595540READ_ADDRESS: fffff8014611c470: Unable to get MiVisibleStateUnable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEndunable to get nt!MmSpecialPagesInUse ffff810bc84f72b8 BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT:  1PROCESS_NAME:  SystemTRAP_FRAME:  ffffdd07001cdfc0 -- (.trap 0xffffdd07001cdfc0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000013 rbx=0000000000000000 rcx=ffff810bde4dc040rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000rip=fffff80145839a9d rsp=ffffdd07001ce150 rbp=ffffdd07001ce260 r8=000000000000e111  r9=0000000000000000 r10=ffff810bc84f7040r11=0000000000000000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0         nv up ei pl zr na po ncnt!KiComputeHeteroThreadQos+0x222ddd:fffff801`45839a9d 458b8278020000  mov     r8d,dword ptr [r10+278h] ds:ffff810b`c84f72b8=????????Resetting default scopeSTACK_TEXT:  ffffdd07`001ce150 fffff801`45691d2b     : ffffa580`48fdc180 fffff801`4581e507 ffffa580`48fdc180 00000000`00000000 : nt!KiComputeHeteroThreadQos+0x222dddffffdd07`001ce160 fffff801`45625f4e     : 00000000`00000000 00000000`492a72fc ffff810b`df595540 ffff810b`00000000 : nt!KiSetPriorityThread+0x2fbffffdd07`001ce380 fffff801`45625a74     : ffffe083`00000000 ffff810b`c86b82e8 fffff801`46149ac0 00000000`00000000 : nt!KeInsertPriQueue+0x34effffdd07`001ce400 fffff801`45bd1a7a     : 00000000`00000001 ffffe083`00000000 00000000`00000000 ffffe083`d38b2e60 : nt!ExQueueWorkItem+0x164ffffdd07`001ce460 fffff801`45b27f6f     : 00000000`00000001 00000000`00000000 ffffe083`d38b2e60 ffffe083`d38b2e68 : nt!ExpWnfStartKernelDispatcher+0x3effffdd07`001ce490 fffff801`45b25f26     : ffffe083`d38b2df0 00000000`00000000 ffffdd07`00000001 00000000`00000000 : nt!ExpWnfNotifyNameSubscribers+0x177ffffdd07`001ce500 fffff801`45b25c5e     : ffff810b`d5358180 00000000`03f90000 00000000`00000000 fffff801`456cbf05 : nt!ExpNtUpdateWnfStateData+0x2baffffdd07`001ce610 fffff801`4582a005     : ffff2753`3c1a0d6e 00000000`00000000 ffff810b`d8701fe0 fffff801`45698d5a : nt!NtUpdateWnfStateData+0x2effffdd07`001ce660 fffff801`4581a4c0     : fffff801`45aa3739 ffff810b`dbfa7080 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25ffffdd07`001ce868 fffff801`45aa3739     : ffff810b`dbfa7080 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiServiceLinkageffffdd07`001ce870 fffff801`45bd908c     : ffffe083`d3a7a200 00000000`00000000 fffff801`00000006 00000000`00008c24 : nt!PspChargeProcessWakeCounter+0x2b9ffffdd07`001ce930 fffff801`45aa50b9     : 00000000`00000000 ffff810b`dbfbf520 ffffe083`e25cdc40 00000000`00000000 : nt!PsChargeProcessWakeCounter+0x4cffffdd07`001ce980 fffff801`45aa4b3e     : ffffe083`e25cdc40 ffff810b`df595540 ffff810b`00000000 ffffdd07`001cec30 : nt!AlpcpCompleteDispatchMessage+0x189ffffdd07`001cea30 fffff801`45aa461f     : ffff810b`dc242bd0 ffff810b`dbfbf520 00000000`00000000 00000000`00000000 : nt!AlpcpDispatchNewMessage+0x1beffffdd07`001cea90 fffff801`45aa8a06     : ffff810b`e290901c ffffe083`e09fe000 ffffe083`d3bfc830 00000000`00000000 : nt!AlpcpSendMessage+0x4cfffffdd07`001cebb0 fffff801`45aa5e39     : ffff810b`dc071df0 fffff801`00220000 ffffe083`e09fe000 ffffe083`d3bfc830 : nt!AlpcpProcessSynchronousRequest+0x366ffffdd07`001cecd0 fffff801`4582a005     : ffff810b`df595540 ffffdd07`001cee80 ffffdd07`001cefb8 ffffdd07`001ceda8 : nt!NtAlpcSendWaitReceivePort+0x1d9ffffdd07`001ced90 fffff801`4581a4c0     : fffff801`47cdc12e ffffe083`e09fe000 ffffdd07`001cf7d0 ffffe083`d3bfc7c0 : nt!KiSystemServiceCopyEnd+0x25ffffdd07`001cef98 fffff801`47cdc12e     : ffffe083`e09fe000 ffffdd07`001cf7d0 ffffe083`d3bfc7c0 ffffe083`d3bfc938 : nt!KiServiceLinkageffffdd07`001cefa0 fffff801`47cdc042     : 00000000`00001000 ffffe083`d3bfc7c0 ffffdd07`001cf240 fffff801`47cc0000 : msrpc!LRPC_BASE_CCALL::DoSendReceive+0x72ffffdd07`001cf010 fffff801`47cdca2c     : 00000000`00000000 ffffdd07`001cf0b0 ffffdd07`001cf7d0 fffff801`48e09000 : msrpc!LRPC_BASE_CCALL::SendReceive+0x52ffffdd07`001cf040 fffff801`47cc2435     : ffffdd07`001cf300 ffffdd07`001cf7d0 fffff801`48e09000 00000000`00000000 : msrpc!NdrSendReceive+0x48ffffdd07`001cf070 fffff801`47cc2313     : 00000000`00000000 fffff801`48e09000 00000000`00000008 ffffdd07`001cf0a0 : msrpc!NdrpClientCall3+0xf5ffffdd07`001cf2c0 fffff801`48db2194     : fffff801`48e1f780 ffffa580`49274180 00000000`00000000 ffffe083`ce8d19b0 : msrpc!NdrClientCall3+0x93ffffdd07`001cf660 fffff801`48db1fcc     : fffff801`48e1f780 ffffdd07`001cf790 ffffdd07`001cf850 00000000`00000000 : NETIO!NsipNotifyUserMode+0xe8ffffdd07`001cf750 fffff801`48d1f8ff     : fffff801`48e1f780 fffff801`48ce9d10 ffff810b`d50bb8a0 00000000`00000000 : NETIO!NsiParameterChange+0x32cffffdd07`001cf810 fffff801`48c34e41     : ffff810b`df595540 ffffdd07`001cfa40 ffff810b`d50bb8a0 ffff810b`f8bc5490 : ndis!ndisNsiNotifyClientInterfaceChange+0xebffffdd07`001cf8b0 fffff801`48c35471     : ffff810b`df595540 ffff810b`c86e5a10 fffff801`46149ac0 ffff810b`f8bc54a0 : ndis!ndisNsiQueuedIfBlockRodChangeNotification+0x91ffffdd07`001cf910 fffff801`456b8595     : ffff810b`c86e5a10 ffff810b`00000000 ffff810b`00000000 fffff801`00000000 : ndis!ndisWorkItemHandler+0x11ffffdd07`001cf940 fffff801`4574cff7     : ffff810b`df595540 00000000`000001de ffff810b`df595540 fffff801`456b8440 : nt!ExpWorkerThread+0x155ffffdd07`001cfb30 fffff801`45819b44     : ffffa580`494c0180 ffff810b`df595540 fffff801`4574cfa0 00000000`00000000 : nt!PspSystemThreadStartup+0x57ffffdd07`001cfb80 00000000`00000000     : ffffdd07`001d0000 ffffdd07`001c9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34STACK_COMMAND:  .trap 0xffffdd07001cdfc0 ; kbSYMBOL_NAME:  msrpc!LRPC_BASE_CCALL::DoSendReceive+72MODULE_NAME: msrpcIMAGE_NAME:  msrpc.sysIMAGE_VERSION:  10.0.22621.1409BUCKET_ID_FUNC_OFFSET:  72FAILURE_BUCKET_ID:  AV_msrpc!LRPC_BASE_CCALL::DoSendReceiveOS_VERSION:  10.0.22621.1BUILDLAB_STR:  ni_releaseOSPLATFORM_TYPE:  x64OSNAME:  Windows 10FAILURE_ID_HASH:  {5655ae20-2c48-8db3-2bce-2393a971d81a}Followup:     MachineOwner---------
回复 支持 反对

使用道具 举报

Octavionaft 楼主 昨天 10:40 显示全部楼层
这是第四个 BAD_POOL_CALLER (c2)The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.Arguments:Arg1: 0000000000000099, Attempt to free pool with invalid address  (or corruption in pool header)Arg2: 0000000000200000, Address being freedArg3: 0000000000000000, 0Arg4: 0000000000000000, 0Debugging Details:------------------KEY_VALUES_STRING: 1    Key  : Analysis.CPU.mSec    Value: 453    Key  : Analysis.Elapsed.mSec    Value: 2438    Key  : Analysis.IO.Other.Mb    Value: 0    Key  : Analysis.IO.Read.Mb    Value: 1    Key  : Analysis.IO.Write.Mb    Value: 0    Key  : Analysis.Init.CPU.mSec    Value: 93    Key  : Analysis.Init.Elapsed.mSec    Value: 1626    Key  : Analysis.Memory.CommitPeak.Mb    Value: 97    Key  : Analysis.Version.DbgEng    Value: 10.0.27793.1000    Key  : Analysis.Version.Description    Value: 10.2410.02.02 amd64fre    Key  : Analysis.Version.Ext    Value: 1.2410.2.2    Key  : Bugcheck.Code.LegacyAPI    Value: 0xc2    Key  : Bugcheck.Code.TargetModel    Value: 0xc2    Key  : Failure.Bucket    Value: 0xc2_99_fileinfo!FIPfInterfaceClose    Key  : Failure.Exception.IP.Address    Value: 0xfffff80627208081    Key  : Failure.Exception.IP.Module    Value: nt    Key  : Failure.Exception.IP.Offset    Value: 0x208081    Key  : Failure.Hash    Value: {d6f5dd36-f6c7-4c0e-5905-dc83f1ab7b56}    Key  : WER.OS.Branch    Value: ni_release    Key  : WER.OS.Version    Value: 10.0.22621.1BUGCHECK_CODE:  c2BUGCHECK_P1: 99BUGCHECK_P2: 200000BUGCHECK_P3: 0BUGCHECK_P4: 0FILE_IN_CAB:  040225-7203-01.dmpFAULTING_THREAD:  ffffa8096e737040BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT:  1PROCESS_NAME:  SystemSTACK_TEXT:  ffff830a`04e9a328 fffff806`27aaa03e     : 00000000`000000c2 00000000`00000099 00000000`00200000 00000000`00000000 : nt!KeBugCheckExffff830a`04e9a330 fffff806`27208081     : ffffa809`7b2c3c10 00000000`00000000 00000000`00000000 fffff806`276f087d : nt!ExFreePoolWithTag+0x7deffff830a`04e9a3c0 fffff806`276b8820     : ffffa809`855aa6f0 ffffa809`855aa6f0 ffffa809`7b2f9420 ffffa809`7b35a030 : nt!IopDeleteFileObjectExtension+0x125ffff830a`04e9a410 fffff806`276c460e     : ffffa809`6e7f57a0 ffffa809`855aa6c0 ffffa809`855aa6c0 ffff830a`04e9a5e9 : nt!IopDeleteFile+0x230ffff830a`04e9a490 fffff806`27266a97     : 00000000`00000000 00000000`00000000 ffff830a`04e9a5e9 ffffa809`855aa6f0 : nt!ObpRemoveObjectRoutine+0x7effff830a`04e9a4f0 fffff806`276c32b4     : 00000000`00000001 00000000`00000001 00000000`00000c0c 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0xc7ffff830a`04e9a530 fffff806`276c0c29     : 00000000`00000000 ffffcd87`3e400000 ffffffff`80000c0c ffffcd87`5460c7f0 : nt!ObpCloseHandle+0x2a4ffff830a`04e9a650 fffff806`2742a005     : ffffa809`6e737040 fffff806`272686e9 ffffcd87`3e400380 fffff806`272207ff : nt!NtClose+0x39ffff830a`04e9a680 fffff806`2741a4c0     : fffff806`2b84aa20 00000000`00000000 ffff830a`04e9aa40 ffffcd87`5460c820 : nt!KiSystemServiceCopyEnd+0x25ffff830a`04e9a818 fffff806`2b84aa20     : 00000000`00000000 ffff830a`04e9aa40 ffffcd87`5460c820 fffff806`276c4616 : nt!KiServiceLinkageffff830a`04e9a820 fffff806`2c3becd1     : ffff830a`04e9a8b0 ffffcd87`458a8990 00000000`00040246 fffff806`2731132c : FLTMGR!FltClose+0x10ffff830a`04e9a850 fffff806`277f1d0a     : ffff830a`04e9aa40 ffffcd87`50382840 ffffcd87`50381f38 00000000`00000000 : fileinfo!FIPfInterfaceClose+0x51ffff830a`04e9a890 fffff806`27733849     : ffffcd87`5037fdc0 ffff830a`0968f850 ffff830a`0968f850 00000000`00000060 : nt!PfpOpenHandleClose+0x4affff830a`04e9a8e0 fffff806`27732cbd     : ffff830a`0968f620 ffff830a`0968f620 ffffa809`00000002 00000000`00000050 : nt!PfSnCleanupPrefetchSectionInfo+0x45ffff830a`04e9a910 fffff806`272b8595     : ffffa809`6e737040 ffffa809`6e6e5a10 fffff806`27d49ac0 ffffa809`85e0ea90 : nt!PfSnSectionInfoCleanupWorkItem+0x7dffff830a`04e9a940 fffff806`2734cff7     : ffffa809`6e737040 00000000`000001c6 ffffa809`6e737040 fffff806`272b8440 : nt!ExpWorkerThread+0x155ffff830a`04e9ab30 fffff806`27419b44     : ffff8480`bf78c180 ffffa809`6e737040 fffff806`2734cfa0 00000001`00303963 : nt!PspSystemThreadStartup+0x57ffff830a`04e9ab80 00000000`00000000     : ffff830a`04e9b000 ffff830a`04e94000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34SYMBOL_NAME:  fileinfo!FIPfInterfaceClose+51MODULE_NAME: fileinfoIMAGE_NAME:  fileinfo.sysIMAGE_VERSION:  10.0.22621.1774STACK_COMMAND:  .process /r /p 0xffffa8096e6f7040; .thread 0xffffa8096e737040 ; kbBUCKET_ID_FUNC_OFFSET:  51FAILURE_BUCKET_ID:  0xc2_99_fileinfo!FIPfInterfaceCloseOS_VERSION:  10.0.22621.1BUILDLAB_STR:  ni_releaseOSPLATFORM_TYPE:  x64OSNAME:  Windows 10FAILURE_ID_HASH:  {d6f5dd36-f6c7-4c0e-5905-dc83f1ab7b56}Followup:     MachineOwner---------
回复 支持 反对

使用道具 举报

Octavionaft 楼主 昨天 10:40 显示全部楼层
这是第五个 也是重装系统后的第二个FN_LIST_CORRUPT (4e)Typically caused by drivers passing bad memory descriptor lists (ie: callingMmUnlockPages twice with the same list, etc).  If a kernel debugger isavailable get the stack trace.Arguments:Arg1: 0000000000000099, A PTE or PFN is corruptArg2: 0000000000450945, page frame numberArg3: 0000000000000002, current page stateArg4: 1509460000450946, 0Debugging Details:------------------KEY_VALUES_STRING: 1    Key  : Analysis.CPU.mSec    Value: 500    Key  : Analysis.Elapsed.mSec    Value: 894    Key  : Analysis.IO.Other.Mb    Value: 0    Key  : Analysis.IO.Read.Mb    Value: 1    Key  : Analysis.IO.Write.Mb    Value: 0    Key  : Analysis.Init.CPU.mSec    Value: 46    Key  : Analysis.Init.Elapsed.mSec    Value: 1487    Key  : Analysis.Memory.CommitPeak.Mb    Value: 100    Key  : Analysis.Version.DbgEng    Value: 10.0.27793.1000    Key  : Analysis.Version.Description    Value: 10.2410.02.02 amd64fre    Key  : Analysis.Version.Ext    Value: 1.2410.2.2    Key  : Bugcheck.Code.LegacyAPI    Value: 0x4e    Key  : Bugcheck.Code.TargetModel    Value: 0x4e    Key  : Failure.Bucket    Value: 0x4E_99_win32kbase!SURFACE::bDeleteSurface    Key  : Failure.Hash    Value: {8423b2bf-deaa-c68d-36ce-593b8ff22da8}    Key  : WER.OS.Branch    Value: ni_release    Key  : WER.OS.Version    Value: 10.0.22621.1BUGCHECK_CODE:  4eBUGCHECK_P1: 99BUGCHECK_P2: 450945BUGCHECK_P3: 2BUGCHECK_P4: 1509460000450946FILE_IN_CAB:  040325-8093-01.dmpFAULTING_THREAD:  ffff800707f66080BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT:  1PROCESS_NAME:  uu.exeSTACK_TEXT:  ffffeb04`66f8ed98 fffff803`0a04a15f     : 00000000`0000004e 00000000`00000099 00000000`00450945 00000000`00000002 : nt!KeBugCheckExffffeb04`66f8eda0 fffff803`09e76e4e     : ffffeb04`66f8ef20 fffff803`09c5e60d ffffeb04`66f8eeb0 00000000`27619000 : nt!MiBadShareCount+0x4fffffeb04`66f8ede0 fffff803`09c5de28     : ffffee80`0013be80 ffffeb04`66f8f3e0 ffffee80`0013be78 ffffeb04`66f8f3e0 : nt!MiDeletePteRun+0x22f57effffeb04`66f8efd0 fffff803`09c8e0a9     : ffffeb04`66f8f3e0 ffffee80`0013be78 00000000`00000000 ffff8007`10629740 : nt!MiDeleteVaTail+0x48ffffeb04`66f8f000 fffff803`09c8e1ea     : ffffeb04`00000000 ffff8007`10629740 ffffeef7`00000000 ffffeb04`66f8f430 : nt!MiWalkPageTablesRecursively+0x4e9ffffeb04`66f8f090 fffff803`09c8e1ea     : ffffeb04`66f8f3e0 ffff8007`10629740 ffffeef7`00000000 ffffeb04`66f8f440 : nt!MiWalkPageTablesRecursively+0x62affffeb04`66f8f120 fffff803`09c8e1ea     : ffffeb04`66f8f3e0 ffff8007`10629740 ffffeef7`00000000 ffffeb04`66f8f450 : nt!MiWalkPageTablesRecursively+0x62affffeb04`66f8f1b0 fffff803`09c8dac1     : 00000000`00000000 ffff8007`10629740 ffffeb04`00000000 ffffeb04`66f8f460 : nt!MiWalkPageTablesRecursively+0x62affffeb04`66f8f240 fffff803`09c5eed2     : ffffeb04`66f8f3e0 ffff9289`00000001 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x371ffffeb04`66f8f340 fffff803`09c56f6e     : ffff8007`10629590 ffff8007`07f66080 ffffeb04`66f8f6e0 ffff8007`07f66780 : nt!MiDeletePagablePteRange+0x3c2ffffeb04`66f8f650 fffff803`0a0b5337     : 00000000`00000000 00000000`00000001 ffffeb04`66f8fa90 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x4effffeb04`66f8f6a0 fffff803`09d1897f     : 00000000`27530000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1b7ffffeb04`66f8f760 fffff803`0a1991ad     : 00000000`00000000 00000000`00000000 ffffeb04`66f8f8c0 00000000`00000000 : nt!MiFreeVadRange+0xa3ffffeb04`66f8f7c0 fffff803`0a198dc5     : ffffeb04`66f8fa90 00000000`00000001 00000000`00000000 ffff8006`ef010000 : nt!MmFreeVirtualMemory+0x3adffffeb04`66f8f900 fffff803`09e2a005     : ffff8007`07f66080 00000000`00000000 00000000`00000000 ffff2e40`78d183ec : nt!NtFreeVirtualMemory+0x95ffffeb04`66f8f960 fffff803`09e1a4c0     : ffffc6d4`232343d6 00000000`00000000 4bb46cbf`3b02a9f0 fffff803`411e7a20 : nt!KiSystemServiceCopyEnd+0x25ffffeb04`66f8faf8 ffffc6d4`232343d6     : 00000000`00000000 4bb46cbf`3b02a9f0 fffff803`411e7a20 00000000`67050fd5 : nt!KiServiceLinkageffffeb04`66f8fb00 ffffc6d4`2323155b     : fffff803`2aa766c0 00000000`00000000 00000000`00000000 00000000`00000001 : win32kbase!SURFACE::bDeleteSurface+0x1126ffffeb04`66f8fd30 ffffc6d4`23236acc     : 00000000`00000000 00000000`67050fd5 00000000`00000fd5 00000000`0113f000 : win32kbase!SURFREF::bDeleteSurface+0x17ffffeb04`66f8fd60 ffffc6d4`237bf1f2     : 00000000`00000016 00000000`00000000 ffff8007`07f66080 00000000`00000000 : win32kbase!NtGdiDeleteObjectApp+0x2ecffffeb04`66f8fdf0 fffff803`09e2a005     : 00000000`5bb11fa0 00000000`001f0001 00000000`00fbfda0 ffff8007`00000000 : win32k!NtGdiDeleteObjectApp+0x16ffffeb04`66f8fe20 00000000`773b1cf3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x2500000000`00fbcf98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773b1cf3SYMBOL_NAME:  win32kbase!SURFACE::bDeleteSurface+1126MODULE_NAME: win32kbaseIMAGE_NAME:  win32kbase.sysIMAGE_VERSION:  10.0.22621.4974STACK_COMMAND:  .cxr; .ecxr ; kbBUCKET_ID_FUNC_OFFSET:  1126FAILURE_BUCKET_ID:  0x4E_99_win32kbase!SURFACE::bDeleteSurfaceOS_VERSION:  10.0.22621.1BUILDLAB_STR:  ni_releaseOSPLATFORM_TYPE:  x64OSNAME:  Windows 10FAILURE_ID_HASH:  {8423b2bf-deaa-c68d-36ce-593b8ff22da8}Followup:     MachineOwner---------
回复 支持 反对

使用道具 举报

Octavionaft 楼主 昨天 10:41 显示全部楼层
这是最后一个 刚刚发生的!!PFN_LIST_CORRUPT (4e)Typically caused by drivers passing bad memory descriptor lists (ie: callingMmUnlockPages twice with the same list, etc).  If a kernel debugger isavailable get the stack trace.Arguments:Arg1: 0000000000000099, A PTE or PFN is corruptArg2: 0000000000450945, page frame numberArg3: 0000000000000002, current page stateArg4: 1509460000450946, 0Debugging Details:------------------KEY_VALUES_STRING: 1    Key  : Analysis.CPU.mSec    Value: 515    Key  : Analysis.Elapsed.mSec    Value: 881    Key  : Analysis.IO.Other.Mb    Value: 0    Key  : Analysis.IO.Read.Mb    Value: 1    Key  : Analysis.IO.Write.Mb    Value: 0    Key  : Analysis.Init.CPU.mSec    Value: 125    Key  : Analysis.Init.Elapsed.mSec    Value: 7860    Key  : Analysis.Memory.CommitPeak.Mb    Value: 100    Key  : Analysis.Version.DbgEng    Value: 10.0.27793.1000    Key  : Analysis.Version.Description    Value: 10.2410.02.02 amd64fre    Key  : Analysis.Version.Ext    Value: 1.2410.2.2    Key  : Bugcheck.Code.LegacyAPI    Value: 0x4e    Key  : Bugcheck.Code.TargetModel    Value: 0x4e    Key  : Failure.Bucket    Value: 0x4E_99_win32kbase!SURFACE::bDeleteSurface    Key  : Failure.Hash    Value: {8423b2bf-deaa-c68d-36ce-593b8ff22da8}    Key  : WER.OS.Branch    Value: ni_release    Key  : WER.OS.Version    Value: 10.0.22621.1BUGCHECK_CODE:  4eBUGCHECK_P1: 99BUGCHECK_P2: 450945BUGCHECK_P3: 2BUGCHECK_P4: 1509460000450946FILE_IN_CAB:  040325-8093-01.dmpFAULTING_THREAD:  ffff800707f66080BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT:  1PROCESS_NAME:  uu.exeSTACK_TEXT:  ffffeb04`66f8ed98 fffff803`0a04a15f     : 00000000`0000004e 00000000`00000099 00000000`00450945 00000000`00000002 : nt!KeBugCheckExffffeb04`66f8eda0 fffff803`09e76e4e     : ffffeb04`66f8ef20 fffff803`09c5e60d ffffeb04`66f8eeb0 00000000`27619000 : nt!MiBadShareCount+0x4fffffeb04`66f8ede0 fffff803`09c5de28     : ffffee80`0013be80 ffffeb04`66f8f3e0 ffffee80`0013be78 ffffeb04`66f8f3e0 : nt!MiDeletePteRun+0x22f57effffeb04`66f8efd0 fffff803`09c8e0a9     : ffffeb04`66f8f3e0 ffffee80`0013be78 00000000`00000000 ffff8007`10629740 : nt!MiDeleteVaTail+0x48ffffeb04`66f8f000 fffff803`09c8e1ea     : ffffeb04`00000000 ffff8007`10629740 ffffeef7`00000000 ffffeb04`66f8f430 : nt!MiWalkPageTablesRecursively+0x4e9ffffeb04`66f8f090 fffff803`09c8e1ea     : ffffeb04`66f8f3e0 ffff8007`10629740 ffffeef7`00000000 ffffeb04`66f8f440 : nt!MiWalkPageTablesRecursively+0x62affffeb04`66f8f120 fffff803`09c8e1ea     : ffffeb04`66f8f3e0 ffff8007`10629740 ffffeef7`00000000 ffffeb04`66f8f450 : nt!MiWalkPageTablesRecursively+0x62affffeb04`66f8f1b0 fffff803`09c8dac1     : 00000000`00000000 ffff8007`10629740 ffffeb04`00000000 ffffeb04`66f8f460 : nt!MiWalkPageTablesRecursively+0x62affffeb04`66f8f240 fffff803`09c5eed2     : ffffeb04`66f8f3e0 ffff9289`00000001 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x371ffffeb04`66f8f340 fffff803`09c56f6e     : ffff8007`10629590 ffff8007`07f66080 ffffeb04`66f8f6e0 ffff8007`07f66780 : nt!MiDeletePagablePteRange+0x3c2ffffeb04`66f8f650 fffff803`0a0b5337     : 00000000`00000000 00000000`00000001 ffffeb04`66f8fa90 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x4effffeb04`66f8f6a0 fffff803`09d1897f     : 00000000`27530000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1b7ffffeb04`66f8f760 fffff803`0a1991ad     : 00000000`00000000 00000000`00000000 ffffeb04`66f8f8c0 00000000`00000000 : nt!MiFreeVadRange+0xa3ffffeb04`66f8f7c0 fffff803`0a198dc5     : ffffeb04`66f8fa90 00000000`00000001 00000000`00000000 ffff8006`ef010000 : nt!MmFreeVirtualMemory+0x3adffffeb04`66f8f900 fffff803`09e2a005     : ffff8007`07f66080 00000000`00000000 00000000`00000000 ffff2e40`78d183ec : nt!NtFreeVirtualMemory+0x95ffffeb04`66f8f960 fffff803`09e1a4c0     : ffffc6d4`232343d6 00000000`00000000 4bb46cbf`3b02a9f0 fffff803`411e7a20 : nt!KiSystemServiceCopyEnd+0x25ffffeb04`66f8faf8 ffffc6d4`232343d6     : 00000000`00000000 4bb46cbf`3b02a9f0 fffff803`411e7a20 00000000`67050fd5 : nt!KiServiceLinkageffffeb04`66f8fb00 ffffc6d4`2323155b     : fffff803`2aa766c0 00000000`00000000 00000000`00000000 00000000`00000001 : win32kbase!SURFACE::bDeleteSurface+0x1126ffffeb04`66f8fd30 ffffc6d4`23236acc     : 00000000`00000000 00000000`67050fd5 00000000`00000fd5 00000000`0113f000 : win32kbase!SURFREF::bDeleteSurface+0x17ffffeb04`66f8fd60 ffffc6d4`237bf1f2     : 00000000`00000016 00000000`00000000 ffff8007`07f66080 00000000`00000000 : win32kbase!NtGdiDeleteObjectApp+0x2ecffffeb04`66f8fdf0 fffff803`09e2a005     : 00000000`5bb11fa0 00000000`001f0001 00000000`00fbfda0 ffff8007`00000000 : win32k!NtGdiDeleteObjectApp+0x16ffffeb04`66f8fe20 00000000`773b1cf3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x2500000000`00fbcf98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773b1cf3SYMBOL_NAME:  win32kbase!SURFACE::bDeleteSurface+1126MODULE_NAME: win32kbaseIMAGE_NAME:  win32kbase.sysIMAGE_VERSION:  10.0.22621.4974STACK_COMMAND:  .cxr; .ecxr ; kbBUCKET_ID_FUNC_OFFSET:  1126FAILURE_BUCKET_ID:  0x4E_99_win32kbase!SURFACE::bDeleteSurfaceOS_VERSION:  10.0.22621.1BUILDLAB_STR:  ni_releaseOSPLATFORM_TYPE:  x64OSNAME:  Windows 10FAILURE_ID_HASH:  {8423b2bf-deaa-c68d-36ce-593b8ff22da8}Followup:     MachineOwner---------
回复 支持 反对

使用道具 举报

Octavionaft 楼主 昨天 10:41 显示全部楼层
我感觉我想嘠~~~~~~~~~  各位ICU主任,头部大脑,教授大家,院士资深专家们,求诊断!!! 还有无的救?到底是哪个地方的问题,还是直接付之一炬,重开??? 谢谢各位大哥大姐了 跪求了~
回复 支持 反对

使用道具 举报

说点什么

您需要登录后才可以回帖 登录 | 立即注册
HOT • 推荐