Od jakiegoś czasu wyskakiwały mi niebieskie ekrany śmierci po załadowaniu Win 7, a konkretnie bezpośrednio przed załadowaniem pulpitu, ale dość losowo - czasem błąd wyskakiwał, a czasem nie.
Myślałem, że powodował to dodatkowy dysk SATA (dodatkowy - bez systemu, trzymałem tam instalki), ponieważ często się sam odłączał (jego partycje znikały z Mój komputer a obroty zwalniały do zera), na co pomagało na to uśpienie komputera, podociskanie kabelków i wznowienie komputera

Ale nie dalej jak 3 dni pracuję w ogóle bez tego dodatkowego dysku i już niebieskie ekrany wracają, złaknione mojego czasu. Tym razem błędy pokazują się nie losowo a zawsze, tak jak poprzednio przed załadowaniem pulpitu. Udało mi się dopiero po odłączeniu karty graficznej, którą kupiłem używaną, ale działała pół roku bez zarzutów, nie przegrzewana i głaskana. Oto kilka ostatnich minidumpów:
Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\012312-18985-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c55000 PsLoadedModuleList = 0xfffff800`02e9a670
Debug session time: Mon Jan 23 14:20:55.153 2012 (GMT+1)
System Uptime: 0 days 0:00:12.729
Loading Kernel Symbols
...............................................................
........................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80002cd4572}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80002cd4572
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002cd11e9 to fffff80002cd1c40
STACK_TEXT:
fffff880`031d9ce8 fffff800`02cd11e9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`031d9cf0 fffff800`02ccf6b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031d9e30 fffff800`02cd4572 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff800`009b0fb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0x32
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`02ccf6b2 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Kod: Zaznacz cały
Loading Dump File [C:\Windows\Minidump\011812-18501-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c0e000 PsLoadedModuleList = 0xfffff800`02e53670
Debug session time: Wed Jan 18 01:53:07.757 2012 (GMT+1)
System Uptime: 0 days 0:00:06.959
Loading Kernel Symbols
.....................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C0000221, {fffff8a000238ed0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!ExpSystemErrorHandler2+5ff )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Unknown bugcheck code (c0000221)
Unknown bugcheck description
Arguments:
Arg1: fffff8a000238ed0
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0xc0000221
ERROR_CODE: (NTSTATUS) 0xc0000221 - {Nieodpowiednia suma kontrolna obrazu} Obraz %hs jest prawdopodobnie uszkodzony. Suma kontrolna nag
EXCEPTION_CODE: (NTSTATUS) 0xc0000221 - {Nieodpowiednia suma kontrolna obrazu} Obraz %hs jest prawdopodobnie uszkodzony. Suma kontrolna nag
EXCEPTION_PARAMETER1: fffff8a000238ed0
EXCEPTION_PARAMETER2: 0000000000000000
EXCEPTION_PARAMETER3: 0000000000000000
EXCEPTION_PARAMETER4: 0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ed42df to fffff80002c8ac40
STACK_TEXT:
fffff880`009a91e8 fffff800`02ed42df : 00000000`0000004c 00000000`c0000221 fffff880`009a9288 fffffa80`049a0990 : nt!KeBugCheckEx
fffff880`009a91f0 fffff800`02cd774d : fffffa80`039cdd48 fffffa80`039cdb30 00000000`00000000 00000000`00000000 : nt!ExpSystemErrorHandler2+0x5ff
fffff880`009a9420 fffff800`030ba2a1 : 00000000`c0000221 00000000`00000001 00000000`00000001 00000000`00080000 : nt!ExpSystemErrorHandler+0xdd
fffff880`009a9460 fffff800`030ba6a6 : fffffa80`c0000221 00000000`00000001 fffffa80`00000001 00000000`00080000 : nt!ExpRaiseHardError+0xe1
fffff880`009a9790 fffff800`030bc066 : fffff880`c0000221 00000000`00000001 00000000`00000001 fffff880`009a9988 : nt!ExRaiseHardError+0x1d6
fffff880`009a9890 fffff800`030cf3af : 00000000`c0000221 00000000`08000000 fffff800`03155828 ffffffff`80000098 : nt!NtRaiseHardError+0x1e4
fffff880`009a9930 fffff800`030cf709 : 00000000`002a0028 00000000`00000000 00000000`00000001 fffff800`03185a30 : nt!PspLocateSystemDll+0xbf
fffff880`009a9a00 fffff800`031b931d : fffff800`008128d0 00000000`00000002 00000000`00000000 fffff800`02e00e80 : nt!PsLocateSystemDlls+0x69
fffff880`009a9a40 fffff800`031bc4ca : 00000000`00000000 00000000`00000010 ffffffff`8000002c fffff800`008128d0 : nt!IoInitSystem+0x85d
fffff880`009a9b40 fffff800`0310c979 : 00000000`00000000 fffffa80`039cd650 00000000`00000080 fffffa80`039cdb30 : nt!Phase1InitializationDiscard+0x129a
fffff880`009a9d10 fffff800`02f25fee : 00000000`00000000 00000000`00000080 00000000`00000000 fffff800`02c7c5d9 : nt!Phase1Initialization+0x9
fffff880`009a9d40 fffff800`02c7c5e6 : fffff800`02e00e80 fffffa80`039cd650 fffff800`02e0ecc0 ffffffff`ffffffff : nt!PspSystemThreadStartup+0x5a
fffff880`009a9d80 00000000`00000000 : fffff880`009aa000 fffff880`009a4000 fffff880`009a93f0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExpSystemErrorHandler2+5ff
fffff800`02ed42df cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExpSystemErrorHandler2+5ff
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0xc0000221_nt!ExpSystemErrorHandler2+5ff
BUCKET_ID: X64_0xc0000221_nt!ExpSystemErrorHandler2+5ff
Followup: MachineOwner
---------
Kod: Zaznacz cały
Loading Dump File [C:\Windows\Minidump\011112-27128-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c14000 PsLoadedModuleList = 0xfffff800`02e59670
Debug session time: Wed Jan 11 17:59:30.607 2012 (GMT+1)
System Uptime: 0 days 0:00:12.809
Loading Kernel Symbols
...............................................................
.................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {fffffa000512b4c0, 2, 0, fffff80002dc09bc}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+100 )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: fffffa000512b4c0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80002dc09bc, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+100
fffff800`02dc09bc 4c8b02 mov r8,qword ptr [rdx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
TRAP_FRAME: fffff880039995a0 -- (.trap 0xfffff880039995a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8005137740 rbx=0000000000000000 rcx=fffff80002e1b4c0
rdx=fffffa000512b4c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dc09bc rsp=fffff88003999730 rbp=0000000000000000
r8=fffffa000512b4c0 r9=fffffa80051070d0 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExDeferredFreePool+0x100:
fffff800`02dc09bc 4c8b02 mov r8,qword ptr [rdx] ds:5c00:fffffa00`0512b4c0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c901e9 to fffff80002c90c40
STACK_TEXT:
fffff880`03999458 fffff800`02c901e9 : 00000000`0000000a fffffa00`0512b4c0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03999460 fffff800`02c8ee60 : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`039995a0 fffff800`02dc09bc : fffffa80`03a2d010 00000000`00000001 fffff6fb`7ea00140 fffff6fd`40028af8 : nt!KiPageFault+0x260
fffff880`03999730 fffff800`02dc01a1 : fffff880`00000000 fffffa80`05014160 00000000`00000000 70436d4d`00000000 : nt!ExDeferredFreePool+0x100
fffff880`039997c0 fffff800`02dad90d : 00000000`00000000 fffffa80`039002b0 00000000`70436d4d fffffa80`05014170 : nt!ExFreePoolWithTag+0x411
fffff880`03999870 fffff800`02daddc1 : 00000000`00000080 00000000`00000020 00000000`00000000 00000000`0012ffff : nt!MiAllocateMdlPagesByLists+0x96d
fffff880`039999a0 fffff800`02dae6c9 : 00000000`00000001 fffffa80`04aa9000 00000000`00000133 00000000`00000001 : nt!MiAllocatePagesForMdl+0x451
fffff880`03999a90 fffff880`01ae6fd3 : fffffa80`04a68078 fffff880`01af4519 00000000`00000001 fffff880`0403e000 : nt!MmAllocatePagesForMdlEx+0x89
fffff880`03999ad0 fffff880`01af43da : fffffa80`04a68078 fffffa80`04a68078 fffff880`039983e0 fffffa80`04a68078 : rdyboost!ST_STORE<SMD_TRAITS>::StDmCurrentRegionSet+0x9b
fffff880`03999b30 fffff880`01af259e : fffffa80`04a68078 00000000`0000000d 00000000`0000000d 00000000`00000001 : rdyboost!ST_STORE<SMD_TRAITS>::StDmpSinglePageFindSpace+0x4a
fffff880`03999b60 fffff880`01af1773 : fffffa80`05107130 fffffa80`04f9ddf0 00000000`00000000 fffffa80`04a68078 : rdyboost!ST_STORE<SMD_TRAITS>::StDmpSinglePageAdd+0x2e
fffff880`03999c20 fffff880`01af162e : fffffa80`05107130 00000000`0000d000 00000000`00000080 fffffa80`04a68010 : rdyboost!ST_STORE<SMD_TRAITS>::StDmPageAdd+0xe3
fffff880`03999c80 fffff880`01af041a : fffffa80`05107130 00000000`00000080 00000000`00000080 fffffa80`04a68ee8 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x23a
fffff880`03999ce0 fffff800`02f2bfee : 00000000`00000000 fffff880`00000000 fffffa80`04a67b60 fffffa80`039cdb30 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x152
fffff880`03999d40 fffff800`02c825e6 : fffff880`03163180 fffffa80`04a67b60 fffff880`0316dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03999d80 00000000`00000000 : fffff880`0399a000 fffff880`03994000 fffff880`03999810 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+100
fffff800`02dc09bc 4c8b02 mov r8,qword ptr [rdx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ExDeferredFreePool+100
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+100
BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+100
Followup: Pool_corruption
---------
Ja tu widzę jakieś sterowniki Visty i zepsuty Pool, cokolwiek to jest.
Mam nadzieję, że ktoś mi powie, co się zbuntowało

Pzdr.