Entendendo um log de despejo de memória do Driver Verifier?

0

Eu tenho experimentado recentemente BSODs que afirmam um erro genérico de memória. Eu corri o memtest por um dia e nenhum erro foi detectado. Eu removi e reutilizei todos os módulos de RAM.

Eu notei que o BSOD estava ocorrendo quando meu HDD externo acordou, mas eu o desconectei e as BSODs continuam, então não acho que seja isso.

Eu tenho executado o Driver Verifier e abaixo está o extrato do log dump de memória, no entanto, não tenho a menor idéia do que estou vendo! Alguém pode ajudar por favor?

Obrigado.

Microsoft (R) Windows Debugger Version 10.0.17061.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump2717-18265-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 16299 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff803'a440a000 PsLoadedModuleList = 0xfffff803'a476bff0
Debug session time: Wed Dec 27 17:09:43.487 2017 (UTC + 0:00)
System Uptime: 1 days 4:26:54.314
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {61941, ffff80018b1c9174, 9, fffff200ba4b4fb0}

*** WARNING: Unable to verify checksum for win32k.sys
Probably caused by : ACPI.sys ( ACPI!ACPIMapNamedTable+40 )

Followup:     MachineOwner
---------

nt!KeBugCheckEx:
fffff803'a456e0e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff200'ba4b4dd0=000000000000001a
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffff80018b1c9174
Arg3: 0000000000000009
Arg4: fffff200ba4b4fb0

Debugging Details:
------------------


KEY_VALUES_STRING: 1


TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.16299.125 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  Packard Bell

SYSTEM_PRODUCT_NAME:  IPOWER I9820 UK

SYSTEM_SKU:                        

SYSTEM_VERSION:          

BIOS_VENDOR:  AMI

BIOS_VERSION:  R01-A0  

BIOS_DATE:  11/14/2008

BASEBOARD_MANUFACTURER:  Packard Bell

BASEBOARD_PRODUCT:  TBGM01

BASEBOARD_VERSION:                        

DUMP_TYPE:  2

BUGCHECK_P1: 61941

BUGCHECK_P2: ffff80018b1c9174

BUGCHECK_P3: 9

BUGCHECK_P4: fffff200ba4b4fb0

BUGCHECK_STR:  0x1a_61941

CPU_COUNT: 8

CPU_MHZ: a6a

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 1a

CPU_STEPPING: 4

CPU_MICROCODE: 6,1a,4,0 (F,M,S,R)  SIG: 12'00000000 (cache) 12'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  sppsvc.exe

CURRENT_IRQL:  1

ANALYSIS_SESSION_HOST:  DESKTOP-2OGO4OA

ANALYSIS_SESSION_TIME:  12-27-2017 17:54:44.0001

ANALYSIS_VERSION: 10.0.17061.1000 amd64fre

TRAP_FRAME:  fffff200ba4b4fb0 -- (.trap 0xfffff200ba4b4fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff80018b1c9170 rbx=0000000000000000 rcx=2584e33bd19e0000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803a4cdf83b rsp=fffff200ba4b5140 rbp=0000000000000000
 r8=0000007ffffffff8  r9=ffffedc000c58e48 r10=ffffed8000000000
r11=0000007ffffffff8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
hal!HalpAcpiCheckAndMapTable+0x6f:
fffff803'a4cdf83b 44397804        cmp     dword ptr [rax+4],r15d ds:ffff8001'8b1c9174=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff803a45a2c54 to fffff803a456e0e0

STACK_TEXT:  
fffff200'ba4b4dc8 fffff803'a45a2c54 : 00000000'0000001a 00000000'00061941 ffff8001'8b1c9174 00000000'00000009 : nt!KeBugCheckEx
fffff200'ba4b4dd0 fffff803'a4577c72 : 00000000'00000024 00000000'00000001 ffff980f'22d6dbc0 fffff803'a4462f01 : nt!MmAccessFault+0x129fc4
fffff200'ba4b4fb0 fffff803'a4cdf83b : 00000000'bf790430 00000000'00000000 00000000'00000024 ffff8001'8b1c8430 : nt!KiPageFault+0x132
fffff200'ba4b5140 fffff803'a4cdf711 : 00006c00'00012170 00000000'00000000 fffff7cd'00002018 00000000'00000008 : hal!HalpAcpiCheckAndMapTable+0x6f
fffff200'ba4b5190 fffff803'a4cdfd00 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : hal!HalpAcpiGetTableFromBios+0xf1
fffff200'ba4b5220 fffff803'a4cdfc21 : 00000000'00000000 00000000'4d44534d 00000000'00000000 00000000'00000000 : hal!HalpAcpiGetTableWork+0x9c
fffff200'ba4b5270 fffff803'a4cdfbd3 : 00000000'00000000 fffff200'ba4b5c00 ffffd809'bf951570 fffff803'a4498252 : hal!HalpAcpiGetTable+0x41
fffff200'ba4b52a0 fffff80d'affcdd50 : 00000000'00000000 fffff803'a4760600 00000000'00000000 fffff803'a4581f90 : hal!HalAcpiGetTableDispatch+0x13
fffff200'ba4b52d0 fffff80d'affcdcea : ffffd809'bf951570 fffff200'ba4b5cc0 ffffd809'bf951570 00000000'00000001 : ACPI!ACPIMapNamedTable+0x40
fffff200'ba4b5340 fffff803'a495db95 : fffff200'ba4b5405 ffffd809'bf951570 ffffd809'54465241 00007ff8'00000000 : ACPI!ACPIEnumMapTableHandler+0x2a
fffff200'ba4b5380 fffff803'a48ff5bf : 00000000'0000004c 00000218'f6760490 00000000'00000000 00000000'00000000 : nt!ExpGetSystemFirmwareTableInformation+0xe5
fffff200'ba4b53d0 fffff803'a48fe7bb : 00000048'187ff001 00000218'f6720f00 00007ff8'c95ea040 00000218'f75cf530 : nt!ExpQuerySystemInformation+0xcef
fffff200'ba4b5c00 fffff803'a4579553 : ffff980f'227ea700 ffff980f'2223c080 ffff980f'227ea700 00000218'f6753a40 : nt!NtQuerySystemInformation+0x2b
fffff200'ba4b5c40 00007ff8'e4d40504 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : nt!KiSystemServiceCopyEnd+0x13
00000048'187fe018 00000000'00000000 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : 0x00007ff8'e4d40504


THREAD_SHA1_HASH_MOD_FUNC:  b48308fd840db6067324c5362bc4506c3b891f66

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  97ec8116137c053ba9ca33c2acd88c389a013ca2

THREAD_SHA1_HASH_MOD:  ff9c57ee49a00762cd005a8fc73f8f404f31397b

FOLLOWUP_IP: 
ACPI!ACPIMapNamedTable+40
fffff80d'affcdd50 488bf0          mov     rsi,rax

FAULT_INSTR_CODE:  48f08b48

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  ACPI!ACPIMapNamedTable+40

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ACPI

IMAGE_NAME:  ACPI.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.16299.15

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  0x1a_61941_VRF_ACPI!ACPIMapNamedTable

BUCKET_ID:  0x1a_61941_VRF_ACPI!ACPIMapNamedTable

PRIMARY_PROBLEM_CLASS:  0x1a_61941_VRF_ACPI!ACPIMapNamedTable

TARGET_TIME:  2017-12-27T17:09:43.000Z

OSBUILD:  16299

OSSERVICEPACK:  125

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2017-12-07 21:55:32

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.16299.125

ANALYSIS_SESSION_ELAPSED_TIME:  1a30

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_61941_vrf_acpi!acpimapnamedtable

FAILURE_ID_HASH:  {7208df97-6b2f-fd7c-6c99-09434eab7f83}

Followup:     MachineOwner
---------
    
por Steve_B 27.12.2017 / 18:32

0 respostas