BSOD STOP 0x0000007F...

Wszelkie problemy komputerowe, których nie można jednoznacznie sklasyfikować do wybranego działu
PeJo

Użytkownik
Posty: 2
Rejestracja: 22 lut 2010, 14:05

BSOD STOP 0x0000007F...

Post22 lut 2010, 15:28

Witam wszystkich.
Proszę o pomoc...od kilku dni pojawia mi się BSOD STOP 0x0000007F (0x00000008, 0x805D3130, 0x00000000, 0x00000000)
Wymieniłem pamięci ale nic to nie dało, zrzuty dump na dysk przeanalizowałem programem Debugging Tools for Windows ale nic z tego nie rozumiem. Oto wynik analizy mini-zrzutu :

Kod: Zaznacz cały

[i]Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\DMP\vista\Mini022210-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6002.18082.x86fre.vistasp2_gdr.090803-2339
Machine Name:
Kernel base = 0x83002000 PsLoadedModuleList = 0x83119c70
Debug session time: Fri Feb 19 10:47:42.464 2010 (GMT+1)
System Uptime: 0 days 0:04:30.104
Loading Kernel Symbols
...............................................................
.............................................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007F, {8, 805cf130, 0, 0}

Unable to load image \SystemRoot\System32\drivers\tcpip.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for tcpip.sys
*** ERROR: Module load completed but symbols could not be loaded for tcpip.sys
Unable to load image \SystemRoot\system32\DRIVERS\nm3.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nm3.sys
*** ERROR: Module load completed but symbols could not be loaded for nm3.sys
Unable to load image \SystemRoot\system32\DRIVERS\VMNetSrv.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for VMNetSrv.sys
*** ERROR: Module load completed but symbols could not be loaded for VMNetSrv.sys
Probably caused by : NETIO.SYS ( NETIO!KfdAleFindFlowContextTable+2 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 805cf130
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


BUGCHECK_STR:  0x7f_8

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 88f4416d to 88f440bf

STACK_TEXT: 
8b07bffc 88f4416d 0000002e 00000000 8b07c018 NETIO!KfdAleFindFlowContextTable+0x2
8b07c01c 88f44244 0000002e 00000000 8b07c03c NETIO!KfdAleGetTableFromHandle+0x3b
8b07c040 88f44314 0000002e 00000000 00000018 NETIO!WfpFindAndRefFlowContext+0x2d
8b07c084 88f4144b 00000018 8b07c304 8b07c1bc NETIO!ProcessCallout+0x6a
8b07c0b4 88f414ab 00000018 86d7c2e0 8b07c304 NETIO!ProcessFastCalloutClassify+0x2c
8b07c194 8905c9ba 00000018 8b07c304 8b07c1bc NETIO!KfdClassify+0xd8
WARNING: Stack unwind information not available. Following frames may be wrong.
8b07c324 89058bed 00000011 01000005 00004300 tcpip+0x569ba
8b07c380 8907a85b 870d41c0 865abb10 865abb10 tcpip+0x52bed
8b07c3ec 8907bfdf 8b07c4a4 00000011 00000002 tcpip+0x7485b
8b07c49c 8907bbc0 870d41c0 8b07c75c 00000011 tcpip+0x75fdf
8b07c768 8907c300 00000011 00000002 00004400 tcpip+0x75bc0
8b07c7bc 8907c572 870d41c0 00000002 00000011 tcpip+0x76300
8b07c840 8907cbfd 85f28830 870c8ce0 86d14120 tcpip+0x76572
8b07c888 890780de 85f28830 870c8ce0 00000000 tcpip+0x76bfd
8b07c8d4 8907812b 85f28830 00f25000 8b07c910 tcpip+0x720de
8b07c8e4 8907791b 8b07c8f8 c000023e 00000000 tcpip+0x7212b
8b07c910 89077348 890cf048 8b07c964 c000023e tcpip+0x7191b
8b07c930 89077798 890cecd0 00000011 8b07c964 tcpip+0x71348
8b07c988 89078fb0 890cecd0 00000011 00000000 tcpip+0x71798
8b07ca18 890754b8 869742f0 00000000 830e5801 tcpip+0x72fb0
8b07ca94 89074dc9 869e9888 86fb4090 00000000 tcpip+0x6f4b8
8b07cabc 88ed60b0 869e9888 86fb4090 00000000 tcpip+0x6edc9
8b07caf0 88ec8bef 009e8008 86fb4090 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0xab
8b07cc7c 88e0957f 865810e8 869e8008 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x7c
8b07cc98 88e34ccd 865810e8 86fb4090 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2c
8b07ccb4 88e34ca4 869fd2c8 86fb4090 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x20
8b07ccd0 8e89fdf1 869fd2c8 86fb4090 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x1b
8b07cd44 88edb2ba 869e9c00 86fb4090 00000000 nm3+0x4df1
8b07cd90 88fb3888 025810e8 8b07cdac 00000001 ndis!ndisMIndicatePacketsToNetBufferLists+0xe9
00000000 00000000 00000000 00000000 00000000 VMNetSrv+0x3888


STACK_COMMAND:  kb

FOLLOWUP_IP:
NETIO!KfdAleFindFlowContextTable+2
88f440bf 55              push    ebp

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  NETIO!KfdAleFindFlowContextTable+2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  49e0209d

FAILURE_BUCKET_ID:  0x7f_8_NETIO!KfdAleFindFlowContextTable+2

BUCKET_ID:  0x7f_8_NETIO!KfdAleFindFlowContextTable+2

Followup: MachineOwner
---------[/i]

[b]a to pełnego zrzutu:[/b]

[i]Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\DMP\vista\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6002.18082.x86fre.vistasp2_gdr.090803-2339
Machine Name:
Kernel base = 0x8301e000 PsLoadedModuleList = 0x83135c70
Debug session time: Mon Feb 22 07:34:28.748 2010 (GMT+1)
System Uptime: 0 days 0:09:53.473
WARNING: Process directory table base DCC521C0 doesn't match CR3 00122000
WARNING: Process directory table base DCC521C0 doesn't match CR3 00122000
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 7ffda00c).  Type ".hh dbgerr001" for details
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 805d3130, 0, 0}

*** ERROR: Module load completed but symbols could not be loaded for VMNetSrv.sys
PEB is paged out (Peb.Ldr = 7ffda00c).  Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 7ffda00c).  Type ".hh dbgerr001" for details
Probably caused by : NETIO.SYS ( NETIO!KfdAleFindFlowContextTable+2 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 805d3130
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------

PEB is paged out (Peb.Ldr = 7ffda00c).  Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 7ffda00c).  Type ".hh dbgerr001" for details

BUGCHECK_STR:  0x7f_8

TSS:  00000028 -- (.tss 0x28)
eax=b78ec018 ebx=b78ec274 ecx=892daaf8 edx=00000000 esi=b78ec03c edi=8c971324
eip=8c94b0bf esp=b78ec000 ebp=b78ec01c iopl=0         nv up ei pl zr na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010246
NETIO!KfdAleFindFlowContextTable+0x2:
8c94b0bf 55              push    ebp
Resetting default scope

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 8c94b16d to 8c94b0bf

STACK_TEXT: 
b78ebffc 8c94b16d 000070d3 00000000 b78ec018 NETIO!KfdAleFindFlowContextTable+0x2
b78ec01c 8c94b244 000070d3 00000000 b78ec03c NETIO!KfdAleGetTableFromHandle+0x3b
b78ec040 8c94b314 000070d3 00000000 00000018 NETIO!WfpFindAndRefFlowContext+0x2d
b78ec084 8c94844b 00000018 b78ec304 b78ec1bc NETIO!ProcessCallout+0x6a
b78ec0b4 8c9484ab 00000018 892e0338 b78ec304 NETIO!ProcessFastCalloutClassify+0x2c
b78ec194 8ca619ba 00000018 b78ec304 b78ec1bc NETIO!KfdClassify+0xd8
b78ec324 8ca5dbed 00000011 01000005 00004300 tcpip!WFPDatagramDataShimV4+0x2c0
b78ec380 8ca7f85b 86affa28 8645d800 8645d800 tcpip!WfpDatagramDataIndicate+0x67
b78ec3ec 8ca80fdf b78ec4a4 00000011 00000002 tcpip!ProcessALEForTransportPacket+0x25d
b78ec49c 8ca80bc0 86affa28 b78ec75c 00000011 tcpip!ProcessAleForNonTcpIn+0xa1
b78ec768 8ca81300 00000011 00000002 00004400 tcpip!WfpProcessInTransportStackIndication+0x436
b78ec7bc 8ca81572 86affa28 00000002 00000011 tcpip!InetInspectReceiveDatagram+0xce
b78ec840 8ca81bfd 86a4a8d8 8676da28 89228020 tcpip!UdpBeginMessageIndication+0x33
b78ec888 8ca7d0de 86a4a8d8 8676da28 00000000 tcpip!UdpDeliverDatagrams+0x108
b78ec8d4 8ca7d12b 86a4a8d8 00a42000 b78ec910 tcpip!UdpReceiveDatagrams+0x112
b78ec8e4 8ca7c91b b78ec8f8 c000023e 00000000 tcpip!UdpNlClientReceiveDatagrams+0x12
b78ec910 8ca7c348 8cad4048 b78ec964 c000023e tcpip!IppDeliverListToProtocol+0x49
b78ec930 8ca7c798 8cad3cd0 00000011 b78ec964 tcpip!IppProcessDeliverList+0x2a
b78ec988 8ca7dfb0 8cad3cd0 00000011 00000000 tcpip!IppReceiveHeaderBatch+0x1eb
b78eca18 8ca7a4b8 886ff778 00000000 83101801 tcpip!IpFlcReceivePackets+0xbe1
b78eca94 8ca79dc9 887012e8 867ab188 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x6e3
b78ecabc 8c8dd0b0 887012e8 867ab188 00000000 tcpip!FlReceiveNetBufferListChain+0x104
b78ecaf0 8c8cfbef 00702b38 867ab188 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0xab
b78ecc7c 8c81057f 87f5c0e8 88702b38 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x7c
b78ecc98 8c83bccd 87f5c0e8 867ab188 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2c
b78eccb4 8c83bca4 88701ad8 867ab188 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x20
b78eccd0 92cb2df1 88701ad8 867ab188 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x1b
b78ecd44 8c8e22ba 887020e8 867ab188 00000000 nm3!NetmonReceiveNetBufferLists+0x1bf
b78ecd90 92007888 02f5c0e8 b78ecdac 00000001 ndis!ndisMIndicatePacketsToNetBufferLists+0xe9
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 00000000 00000000 00000000 VMNetSrv+0x3888


STACK_COMMAND:  .tss 0x28 ; kb

FOLLOWUP_IP:
NETIO!KfdAleFindFlowContextTable+2
8c94b0bf 55              push    ebp

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  NETIO!KfdAleFindFlowContextTable+2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  49e0209d

FAILURE_BUCKET_ID:  0x7f_8_NETIO!KfdAleFindFlowContextTable+2

BUCKET_ID:  0x7f_8_NETIO!KfdAleFindFlowContextTable+2

Followup: MachineOwner
---------[/i]

Proszę o pomoc.
Pozdrawiam, PeJo.
Ostatnio zmieniony 22 lut 2010, 15:28 przez XMan, łącznie zmieniany 1 raz.
Powód: poprawiłem pisownię - Code.

Awatar użytkownika
cosik_ktosik

Administrator
Posty: 21416
Rejestracja: 13 lis 2008, 01:17
Lokalizacja: Szczecin
Kontaktowanie:

BSOD STOP 0x0000007F...

Post22 lut 2010, 16:01

Skoro problem leży w svchost.exe, więc najpierw radzę sprawdzić komputer pod kątem wirusów
http://forum.hotfix.pl/bezpieczenstwo/nowy-regulamin-dzialu-bezpieczenstwo-t1887.html

Podaj to co napisano w tym temacie.
Hotfix
Pozdrawiam, cosik_ktosik :)

PeJo

Użytkownik
Posty: 2
Rejestracja: 22 lut 2010, 14:05

BSOD STOP 0x0000007F...

Post24 lut 2010, 15:48

Sprawdziłem aktualnym antywirem ale nic podejrzanego nie wykrył. Nie wiem co dalej robić, nawet nie mogę przywrócić systemu bo zaraz wyskakuje BSOD. Wyłączyłem k.sieciową i też nic, ale w trybie awaryjnym działa

-- 24 lut 2010, 15:48 --

a może jakimś narzędziem diagnostycznym go potraktować



  • Reklama

Wróć do „Problemy”



Kto jest online

Użytkownicy przeglądający to forum: Obecnie na forum nie ma żadnego zarejestrowanego użytkownika i 218 gości