dymek3r pisze:Wymieniłem i dalej pokazuje ;o
I tak będzie pokazywało



dymek3r pisze:Wymieniłem i dalej pokazuje ;o
No właśnie tego nie zrobiłem, dalej sie zacina fifa. Jak zamknąłem ją to mi BSD wyskoczył ;/
djkamil09061991 pisze:Podaj odczyt danych SMART dysku z programu HD Tune, zakładka Health => instrukcja odczytu SMART.
Sprawdź pamięć programem Instrukcja obsługi programu Memtest86+ - Sprawdzanie pamięci RAM
Oraz możesz podać napięcia z biosa. Oraz temperatury sprawdz jakimś programem
Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\WINDOWS\Minidump\Mini112611-06.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sat Nov 26 22:16:41.218 2011 (GMT+1)
System Uptime: 0 days 2:05:22.962
Loading Kernel Symbols
...............................................................
..........................................
Loading User Symbols
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, bf844711, b6c1d308, 0}
Probably caused by : win32k.sys ( win32k!GreStretchBltInternal+47b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: bf844711, The address that the exception occurred at
Arg3: b6c1d308, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod "0x%08lx" odwo
FAULTING_IP:
win32k!GreStretchBltInternal+47b
bf844711 834df002 or dword ptr [ebp-10h],2
TRAP_FRAME: b6c1d308 -- (.trap 0xffffffffb6c1d308)
ErrCode = 00000002
eax=00000001 ebx=e14fa008 ecx=000fac45 edx=e1b22908 esi=e1b7e890 edi=e1b22908
eip=bf844711 esp=b6c1d37c ebp=36c1d498 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
win32k!GreStretchBltInternal+0x47b:
bf844711 834df002 or dword ptr [ebp-10h],2 ss:0010:36c1d488=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 6
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: explorer.exe
LAST_CONTROL_TRANSFER: from bf838457 to bf844711
STACK_TEXT:
b6c1d498 bf838457 020103ce 00000000 00000040 win32k!GreStretchBltInternal+0x47b
b6c1d4d4 bf83c004 020103ce 00000000 00000040 win32k!GreStretchBlt+0x30
b6c1d524 bf83c236 00000001 00000000 00000040 win32k!BltIcon+0xde
b6c1d57c bf83c0d4 020103ce 00000000 00000040 win32k!_DrawIconEx+0x207
b6c1d5d0 8054161c 020103ce 00000000 00000040 win32k!NtUserDrawIconEx+0xa9
b6c1d5d0 7c90e4f4 020103ce 00000000 00000040 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
00f1f770 00000000 00000000 00000000 00000000 0x7c90e4f4
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!GreStretchBltInternal+47b
bf844711 834df002 or dword ptr [ebp-10h],2
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: win32k!GreStretchBltInternal+47b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 48025f2a
FAILURE_BUCKET_ID: 0x8E_win32k!GreStretchBltInternal+47b
BUCKET_ID: 0x8E_win32k!GreStretchBltInternal+47b
Followup: MachineOwner
---------
No właśnie tego nie zrobiłem
Użytkownicy przeglądający to forum: Obecnie na forum nie ma żadnego zarejestrowanego użytkownika i 16 gości