BugCheck 3B,蓝屏求助

weixin_38056905 2016-10-18 07:22:57

BugCheck 3B, {c0000005, fffff80ff473dff8, ffff95801ee1f130, 0}

话说那个WinDbg载入蓝屏文件的速度也极慢是咋回事以前没那么慢的............

3B假设如果是硬件问题 一般有哪几个硬件范围?
...全文
967 4 打赏 收藏 转发到动态 举报
AI 作业
写回复
用AI写文章
4 条回复
切换为时间正序
请发表友善的回复…
发表回复
weixin_38090696 2016-10-19
  • 打赏
  • 举报
回复
对,多数情况不是硬件问题。
卡巴斯基只是问题的触因,不一定是根本原因。像之前说的,如果卡巴斯基检测到了厉害的病毒,或者卡巴斯基的防御模块与其它程序有冲突,都有可能引起蓝屏。

Alexis Zhang
http://mvp.microsoft.com/zh-cn/mvp/Jie%20Zhang-4000545
http://blogs.itecn.net/blogs/alexis
推荐以 NNTP Bridge 桥接新闻组方式访问论坛。
本帖是回复帖,原帖作者是楼上的 "神奇的兔子"
| 3B一般是软件兼容或者驱动问题导致的?和硬件关系不大?
| 确实有装卡巴.... .. 这个分析文件指向卡巴斯基导致的3B吗?
weixin_38062058 2016-10-18
  • 打赏
  • 举报
回复

Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [D:\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 14393 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 14393.321.amd64fre.rs1_release_inmarket.161004-2338
Machine Name:
Kernel base = 0xfffff800`05483000 PsLoadedModuleList = 0xfffff800`05787080
Debug session time: Tue Oct 18 14:51:03.270 2016 (UTC + 8:00)
System Uptime: 0 days 1:01:57.140
Loading Kernel Symbols
...............................................................
................................................................
................................................................
Loading User Symbols
.....
Loading unloaded module list
..........
Loading Wow64 Symbols
................................................................
................................................................
................................................................
........................................
*******************************************************************************
*                                                                            
*
*                        Bugcheck Analysis                                   
*
*                                                                            
*
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80ff473dff8, ffff95801ee1f130, 0}
CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
CompressedPageDataReader warning: failed to get _SM_PAGE_KEY symbol.
*** ERROR: Module load completed but symbols could not be loaded for klwtp.sys
"C:\Windows\System32\KERNELBASE.dll" was not found in the image list.
Debugger will attempt to load "C:\Windows\System32\KERNELBASE.dll" at given base 00000000`00000000.
Please provide the full image name, including the extension (i.e. kernel32.dll)
for more reliable results.Base address and size overrides can be given as
.reload <image.ext>=<base>,<size>.
Unable to add module at 00000000`00000000
Probably caused by : NETIO.SYS ( NETIO!StreamProcessCallout+28c )
Followup:     MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
*                                                                            
*
*                        Bugcheck Analysis                                   
*
*                                                                            
*
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80ff473dff8, Address of the instruction which caused the bugcheck
Arg3: ffff95801ee1f130, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------

DUMP_CLASS: 1
DUMP_QUALIFIER: 402
BUILD_VERSION_STRING:  14393.321.amd64fre.rs1_release_inmarket.161004-2338
SYSTEM_MANUFACTURER:  System manufacturer
SYSTEM_PRODUCT_NAME:  System Product Name
SYSTEM_SKU:  SKU
SYSTEM_VERSION:  System Version
BIOS_VENDOR:  American Megatrends Inc.
BIOS_VERSION:  3602
BIOS_DATE:  11/01/2012
BASEBOARD_MANUFACTURER:  ASUSTeK Computer INC.
BASEBOARD_PRODUCT:  P8P67
BASEBOARD_VERSION:  Rev 1.xx
DUMP_TYPE:  0
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80ff473dff8
BUGCHECK_P3: ffff95801ee1f130
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%p
FAULTING_IP:
NETIO!StreamProcessCallout+28c
fffff80f`f473dff8 483988b0000000  cmp     qword ptr [rax+0B0h],rcx
CONTEXT:  ffff95801ee1f130 -- (.cxr 0xffff95801ee1f130)
rax=0000000000000000 rbx=ffffd50468ff7be0 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff95801ee1fec0
rip=fffff80ff473dff8 rsp=ffff95801ee1fb40 rbp=ffff95801ee1fc31
 r8=fffff80ff4791ae0  r9=0000000000000000 r10=0000000000001390
r11=ffff95801ee1fb20 r12=0000000000000001 r13=ffffd50466961b01
r14=ffff95801ee20340 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
NETIO!StreamProcessCallout+0x28c:
fffff80f`f473dff8 483988b0000000  cmp     qword ptr [rax+0B0h],rcx ds:002b:00000000`000000b0=????????????????
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: d48
CPU_VENDOR:  GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 2a
CPU_STEPPING: 7
CPU_MICROCODE: 6,2a,7,0 (F,M,S,R)  SIG: 29'00000000 (cache) 29'00000000 (init)
DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
BUGCHECK_STR:  0x3B
PROCESS_NAME:  avp.exe
CURRENT_IRQL:  0
ANALYSIS_SESSION_HOST:  CV226-CXC378WWJ
ANALYSIS_SESSION_TIME:  10-18-2016 16:03:33.0664
ANALYSIS_VERSION: 10.0.14321.1024 x86fre
LAST_CONTROL_TRANSFER:  from fffff80ff473d8b7 to fffff80ff473dff8
STACK_TEXT: 
ffff9580`1ee1fb40 fffff80f`f473d8b7 : ffffd504`60ba0014 fffff80f`f57eb2b8 ffffd504`00000002 ffffd504`66961b90 : NETIO!StreamProcessCallout+0x28c
ffff9580`1ee1fc80 fffff80f`f473d02e : 00000000`00000014 ffffd504`66961b90 ffffd504`69348d90 ffff9580`1ee20340 : NETIO!ProcessCallout+0x6b7
ffff9580`1ee1fe00 fffff80f`f473b1c3 : bd39c8ef`dfcda310 ffff9580`1ee20040 00000000`00000000 000002cc`fffffd34 : NETIO!ArbitrateAndEnforce+0x4ee
ffff9580`1ee1ff40 fffff80f`f477bc65 : ffffd504`60ce6180 fffff80f`f4740a95 ffff9580`1ee20310 00000000`00000000 : NETIO!KfdClassify+0x303
ffff9580`1ee202f0 fffff80f`f477b708 : 00000000`00000000 ffff9580`1ee20491 00000000`00001390 00000000`00000000 : NETIO!StreamInternalClassify+0x109
ffff9580`1ee20410 fffff80f`f4778e25 : 00000000`00000014 ffffd504`69348be0 00000000`00000000 ffffd504`646963d0 : NETIO!StreamInject+0x214
ffff9580`1ee204e0 fffff80f`f4a7683d : ffffd504`69348be0 00000000`00000127 00000000`00000000 ffffd504`00000011 : NETIO!FwppStreamInject+0x135
ffff9580`1ee20570 fffff80f`f57e9c7a : ffffd504`62ac0490 ffff9580`1ee20641 ffffd504`640a8880 00000000`00000002 : fwpkclnt!FwpsStreamInjectAsync0+0xfd
ffff9580`1ee205d0 fffff80f`f57e575e : ffffd504`62ac0490 ffffd504`61a98f40 ffffd504`00001390 00000000`00000000 : klwtp+0x9c7a
ffff9580`1ee206a0 fffff80f`f57e5487 : ffffd504`6938dc60 ffffd504`647e6d60 ffffd504`6938dc60 00000000`00000001 : klwtp+0x575e
ffff9580`1ee20730 fffff80f`f57e1b52 : ffffd504`6938dc60 ffffd504`647e6d60 00000000`00000002 fffff800`000001c8 : klwtp+0x5487
ffff9580`1ee20780 fffff80f`f57e183f : ffffd504`61363320 ffffd504`6938dc60 ffffd504`647e6d60 ffffd504`5f54bc01 : klwtp+0x1b52
ffff9580`1ee207c0 fffff80f`f57e316b : ffffd504`61363320 ffffd504`6938dc60 00000000`00000000 ffffd504`6938dc60 : klwtp+0x183f
ffff9580`1ee207f0 fffff800`058e8280 : ffffd504`61363320 ffffd504`6938dc60 ffffd504`647e6d60 00000000`00000000 : klwtp+0x316b
ffff9580`1ee20820 fffff800`058e7164 : 00000000`00000000 ffffd504`647e6d04 00000000`00000000 ffff9580`1ee20b80 : nt!IopSynchronousServiceTail+0x1a0
ffff9580`1ee208e0 fffff800`058e6ae6 : ffffd504`00000001 00000000`00000000 00000000`00000001 00000000`24db0cb4 : nt!IopXxxControlFile+0x674
ffff9580`1ee20a20 fffff800`055d7f93 : ffff83c1`c00008c0 ffff83c1`e0e00000 ffff83c1`e0f07000 ffffd854`f70a4907 : nt!NtDeviceIoControlFile+0x56
ffff9580`1ee20a90 00000000`5951222c : 00000000`59511e67 00000023`76f5dc7c 00000000`00000023 00000000`0058e0fb : nt!KiSystemServiceCopyEnd+0x13
00000000`130ff008 00000000`59511e67 : 00000023`76f5dc7c 00000000`00000023 00000000`0058e0fb 00000000`131fe1c4 : wow64cpu!CpupSyscallStub+0xc
00000000`130ff010 00000000`5953bfa1 : 00000000`00000000 00000000`00000000 000020e6`9821d841 00000000`00000000 : wow64cpu!DeviceIoctlFileFault+0x31
00000000`130ff0c0 00000000`5952cbb0 : 00000000`00000000 00000000`130ff170 00000000`00000001 00000000`00000000 : wow64!Wow64KiUserCallbackDispatcher+0x4151
00000000`130ff140 00007ffc`858f8ebd : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : wow64!Wow64LdrpInitialize+0x120
00000000`130ff3f0 00007ffc`858f8d5e : 00000000`130ff4c0 00000000`00000000 00000000`00000000 00000000`00c17000 : ntdll!_LdrpInitialize+0x109
00000000`130ff470 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrInitializeThunk+0xe

THREAD_SHA1_HASH_MOD_FUNC:  ac66eece4094cdb43af4bb6201961b10b70254c8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  acb46b7f00f2367d768aa79bde739bd2bf82ce48
THREAD_SHA1_HASH_MOD:  2896100a8f51dbeb59dae219758c433202a005f7
FOLLOWUP_IP:
NETIO!StreamProcessCallout+28c
fffff80f`f473dff8 483988b0000000  cmp     qword ptr [rax+0B0h],rcx
FAULT_INSTR_CODE:  b0883948
SYMBOL_STACK_INDEX:  0
SYMBOL_NAME:  NETIO!StreamProcessCallout+28c
FOLLOWUP_NAME:  MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME:  NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP:  57899b40
STACK_COMMAND:  .cxr 0xffff95801ee1f130 ; kb
BUCKET_ID_FUNC_OFFSET:  28c
FAILURE_BUCKET_ID:  0x3B_NETIO!StreamProcessCallout
BUCKET_ID:  0x3B_NETIO!StreamProcessCallout
PRIMARY_PROBLEM_CLASS:  0x3B_NETIO!StreamProcessCallout
TARGET_TIME:  2016-10-18T06:51:03.000Z
OSBUILD:  14393
OSSERVICEPACK:  0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK:  272
PRODUCT_TYPE:  1
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE: 
USER_LCID:  0
OSBUILD_TIMESTAMP:  2016-10-05 17:17:53
BUILDDATESTAMP_STR:  161004-2338
BUILDLAB_STR:  rs1_release_inmarket
BUILDOSVER_STR:  10.0.14393.321.amd64fre.rs1_release_inmarket.161004-2338
ANALYSIS_SESSION_ELAPSED_TIME: 3247e
ANALYSIS_SOURCE:  KM
FAILURE_ID_HASH_STRING:  km:0x3b_netio!streamprocesscallout
FAILURE_ID_HASH:  {12d5d042-1527-3ed4-7567-edbc67fa5418}
Followup:     MachineOwner
---------
weixin_38071599 2016-10-18
  • 打赏
  • 举报
回复

3B一般是软件兼容或者驱动问题导致的?和硬件关系不大?
确实有装卡巴.... ..   这个分析文件指向卡巴斯基导致的3B吗?
weixin_38063296 2016-10-18
  • 打赏
  • 举报
回复
0x0000003B 错误表示一个从没有权限的代码传送至有权限的代码时遇到了例外的错误,一般是软件兼容性问题引起页面库占用过多,或者用户模式的显示驱动传送了不正确的代码。
你电脑上是不是安装了卡巴斯基?如果不是卡巴斯基检测到了恶意程序、就是卡巴斯基自身的运行有错误。

Alexis Zhang
http://mvp.microsoft.com/zh-cn/mvp/Jie%20Zhang-4000545
http://blogs.itecn.net/blogs/alexis
推荐以 NNTP Bridge 桥接新闻组方式访问论坛。
本帖是回复帖,原帖作者是楼上的 "神奇的兔子"
| BugCheck 3B, {c0000005, fffff80ff473dff8, ffff95801ee1f130, 0}
| 话说那个WinDbg载入蓝屏文件的速度也极慢是咋回事以前没那么慢的......

473

社区成员

发帖
与我相关
我的任务
社区描述
其他技术讨论专区
其他 技术论坛(原bbs)
社区管理员
  • 其他技术讨论专区社区
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告
暂无公告

试试用AI创作助手写篇文章吧