Ciągle pojawiające się Bluescreeny

Wszelkie problemy komputerowe, których nie można jednoznacznie sklasyfikować do wybranego działu
gaw

Użytkownik
Posty: 4
Rejestracja: 11 cze 2011, 19:00

Ciągle pojawiające się Bluescreeny

Post11 cze 2011, 19:48

witam wszystkich użytkowników,
jestem na forum nowy :)

od jakiegoś czasu ciągle męczą mnie bluescreeny. zastanawiam się, jaki może być problem.
a więc zaczynamy:
Procesor: Intel Core 2 Duo E4600 @ 2,4GHz
Płyta główna: Gigabyte GA-P35-DS3L rev 2.0
Grafika: NVIDIA GeForce 9600 GSO 512
Ram: standardowo mam 2x2GB Corsair XMS2-6400 800Mhz, ale teraz wstawione jakis noname 1GB, żeby sprawdzić czy błędy powoduje pamięć - jednak BSOD mam nadal.
Dysk: Seagate 1TB
System: Vista Bussiness 64bity

HD Tune:

Kod: Zaznacz cały

HD Tune: ST31000528AS Health

ID                               Current  Worst    ThresholdData        Status   
(01) Raw Read Error Rate         116      99       6        103802959   Ok       
(03) Spin Up Time                96       95       0        0           Ok       
(04) Start/Stop Count            100      100      20       245         Ok       
(05) Reallocated Sector Count    100      100      36       0           Ok       
(07) Seek Error Rate             75       60       30       39550605    Ok       
(09) Power On Hours Count        99       99       0        1038        Ok       
(0A) Spin Retry Count            100      100      97       0           Ok       
(0C) Power Cycle Count           100      100      20       108         Ok       
(B7) (unknown attribute)         100      100      0        0           Ok       
(B8) (unknown attribute)         100      100      99       0           Ok       
(BB) (unknown attribute)         98       98       0        2           Ok       
(BC) (unknown attribute)         100      99       0        65539       Ok       
(BD) (unknown attribute)         100      100      0        0           Ok       
(BE) Airflow Temperature         63       53       45       622395429   Ok       
(C2) Temperature                 37       47       0        37          Ok       
(C3) Hardware ECC Recovered      49       31       0        103802959   Ok       
(C5) Current Pending Sector      100      100      0        0           Ok       
(C6) Offline Uncorrectable       100      100      0        0           Ok       
(C7) Ultra DMA CRC Error Count   200      200      0        0           Ok       
(F0) Head Flying Hours           100      253      0        1301        Ok       
(F1) (unknown attribute)         100      253      0        -616957524  Ok       
(F2) (unknown attribute)         100      253      0        -898343873  Ok       

Power On Time         : 1038
Health Status         : Ok


dump nr 1 z dzisiaj

Kod: Zaznacz cały


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini061111-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6002.18327.amd64fre.vistasp2_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`0220b000 PsLoadedModuleList = 0xfffff800`023cfdd0
Debug session time: Sat Jun 11 13:57:25.869 2011 (UTC + 2:00)
System Uptime: 0 days 0:06:27.740
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffffa800b000000, 0, fffff8000226f570, 2}


Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!ExAcquireResourceSharedLite+c0 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa800b000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8000226f570, If non-zero, the instruction address which referenced the bad memory
   address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002432080
 fffffa800b000000

FAULTING_IP:
nt!ExAcquireResourceSharedLite+c0
fffff800`0226f570 498b03          mov     rax,qword ptr [r11]

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  SearchIndexer.e

CURRENT_IRQL:  0

TRAP_FRAME:  fffffa600b9bcda0 -- (.trap 0xfffffa600b9bcda0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=4cc88b4d90909090 rbx=0000000000000000 rcx=fffffa8ff72549d0
rdx=fffffa800475b4e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000226f570 rsp=fffffa600b9bcf30 rbp=0000000000000001
 r8=fffffa80071549e0  r9=0000000000000000 r10=000000000000000b
r11=fffffa800b000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na po cy
nt!ExAcquireResourceSharedLite+0xc0:
fffff800`0226f570 498b03          mov     rax,qword ptr [r11] ds:fffffa80`0b000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800022c5a8a to fffff80002265490

STACK_TEXT: 
fffffa60`0b9bccb8 fffff800`022c5a8a : 00000000`00000050 fffffa80`0b000000 00000000`00000000 fffffa60`0b9bcda0 : nt!KeBugCheckEx
fffffa60`0b9bccc0 fffff800`02264019 : 00000000`00000000 fffffa60`005eca50 00000000`00000000 fffffa80`0475b4b0 : nt! ?? ::FNODOBFM::`string'+0x2c465
fffffa60`0b9bcda0 fffff800`0226f570 : ffffffff`ffb3b4c0 fffffa80`04177ca0 fffffa80`0618f700 fffffa80`04177ca0 : nt!KiPageFault+0x119
fffffa60`0b9bcf30 fffffa60`010ce940 : fffffa80`04177ca0 fffffa80`04177ca0 fffffa80`048b1780 fffffa60`0b9bd088 : nt!ExAcquireResourceSharedLite+0xc0
fffffa60`0b9bcf80 fffffa60`010cfd0f : fffff880`006d8c80 fffffa60`0b9bd328 fffffa80`00000400 00000000`00000001 : Ntfs!NtfsWriteLog+0x350
fffffa60`0b9bd1c0 fffffa60`010e37d1 : fffffa80`04177ca0 00000000`0404f000 fffff880`006d8c80 00000000`6d343308 : Ntfs!NtfsWriteFileSizes+0x34f
fffffa60`0b9bd320 fffffa60`010e33b7 : fffffa80`04177ca0 fffffa80`0475b180 fffffa80`04177ca0 00000000`00000050 : Ntfs!NtOfsSetLength+0xb1
fffffa60`0b9bd420 fffffa60`010e4454 : fffffa80`04177ca0 fffffa80`04c80001 00000000`6d3432b8 00000000`00000000 : Ntfs!NtOfsPutData+0x57
fffffa60`0b9bd560 fffffa60`010e42ae : fffffa80`04177ca0 00000000`00000001 fffffa80`04177d20 00000000`00000001 : Ntfs!NtfsWriteFcbUsnRecordToJournal+0xa4
fffffa60`0b9bd620 fffffa60`010c0378 : fffffa80`00000000 fffffa80`0475b180 fffff880`0c5eab50 fffffa80`049131c0 : Ntfs!NtfsWriteUsnJournalChanges+0x15e
fffffa60`0b9bd6a0 fffffa60`010c94a3 : fffffa80`04177ca0 fffff880`0c5eac80 fffff880`0c5eab50 fffffa80`0475b180 : Ntfs!NtfsCommonClose+0x6f8
fffffa60`0b9bd770 fffffa60`00a0fe91 : fffffa80`03e33400 fffffa80`048b1780 fffffa80`00000000 00000000`00000000 : Ntfs!NtfsFsdClose+0x2a3
fffffa60`0b9bd870 fffffa60`00a0e0dd : fffffa80`05f7dde0 fffffa80`06bd68c0 fffffa80`045c4e00 00000000`00000000 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x211
fffffa60`0b9bd8e0 fffffa60`00a0fe91 : fffffa80`048b1b20 fffffa80`04c80010 00000000`00000002 fffff800`0233fde2 : fltmgr!FltpDispatch+0xcd
fffffa60`0b9bd940 fffffa60`00a0e0dd : fffffa80`06bda750 fffffa80`04754090 fffffa80`06bd6800 00000000`000007ff : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x211
fffffa60`0b9bd9b0 fffff800`024cfa7e : fffffa80`049131c0 fffffa80`04754090 00000000`00000000 00000000`20707249 : fltmgr!FltpDispatch+0xcd
fffffa60`0b9bda10 fffff800`02269ed3 : 00000000`00000000 fffffa80`049131c0 fffffa80`04913190 00000000`74636553 : nt!IopDeleteFile+0x17e
fffffa60`0b9bdaa0 fffff800`024cfd9e : fffff880`0cf87660 fffffa80`00000001 fffffa80`05f53c10 00000000`00000000 : nt!ObfDereferenceObject+0x103
fffffa60`0b9bdb30 fffff800`024d0054 : fffff880`0b9fec10 fffff880`0b9fec00 00000000`00000001 00000000`00001198 : nt!ObpCloseHandleTableEntry+0xce
fffffa60`0b9bdbd0 fffff800`02264f33 : fffffa80`04c67bb0 fffffa60`0b9bdca0 00000000`022c5270 00000000`00000e58 : nt!ObpCloseHandle+0x94
fffffa60`0b9bdc20 00000000`77b86c8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0c2fe878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b86c8a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!ExAcquireResourceSharedLite+c0
fffff800`0226f570 498b03          mov     rax,qword ptr [r11]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!ExAcquireResourceSharedLite+c0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cb7275f

FAILURE_BUCKET_ID:  X64_0x50_nt!ExAcquireResourceSharedLite+c0

BUCKET_ID:  X64_0x50_nt!ExAcquireResourceSharedLite+c0

Followup: MachineOwner
---------




dump nr 2 z dzisiaj:

Kod: Zaznacz cały


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini061111-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6002.18327.amd64fre.vistasp2_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`0225e000 PsLoadedModuleList = 0xfffff800`02422dd0
Debug session time: Sat Jun 11 18:16:31.091 2011 (UTC + 2:00)
System Uptime: 0 days 2:00:41.332
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff8000236dbe0, fffffa60019166e8, fffffa60019160c0}

Probably caused by : memory_corruption ( nt!MiLogPageAccess+e0 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8000236dbe0, The address that the exception occurred at
Arg3: fffffa60019166e8, Exception Record Address
Arg4: fffffa60019160c0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:
nt!MiLogPageAccess+e0
fffff800`0236dbe0 410fba653814    bt      dword ptr [r13+38h],14h

EXCEPTION_RECORD:  fffffa60019166e8 -- (.exr 0xfffffa60019166e8)
ExceptionAddress: fffff8000236dbe0 (nt!MiLogPageAccess+0x00000000000000e0)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffffa60019160c0 -- (.cxr 0xfffffa60019160c0)
rax=0200000000000000 rbx=fffff88000e6f018 rcx=f88000e6f0180000
rdx=fffff6fcc0017c08 rsi=fffffa80040d49c0 rdi=fffffa8001245000
rip=fffff8000236dbe0 rsp=fffffa6001916920 rbp=000000000000005a
 r8=fffff80002423240  r9=0000000000000003 r10=0000000000000066
r11=fffff88009a2a000 r12=fffffa8001245ff8 r13=2c6c702e6b657a63
r14=0000000000000000 r15=fffff6fcc0017c08
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!MiLogPageAccess+0xe0:
fffff800`0236dbe0 410fba653814    bt      dword ptr [r13+38h],14h ds:002b:2c6c702e`6b657a9b=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002485080
 ffffffffffffffff

FOLLOWUP_IP:
nt!MiLogPageAccess+e0
fffff800`0236dbe0 410fba653814    bt      dword ptr [r13+38h],14h

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff80002355de3 to fffff8000236dbe0

STACK_TEXT: 
fffffa60`01916920 fffff800`02355de3 : 00000000`1fcbd000 41100000`15dc6921 00000003`00000000 00000000`73576d4d : nt!MiLogPageAccess+0xe0
fffffa60`01916980 fffff800`02379a71 : fffff800`02423240 00000000`00000003 fffffa60`01916bb0 fffffa60`01916be0 : nt!MiAgeWorkingSet+0x2d3
fffffa60`01916b40 fffff800`022612f0 : fffffa80`00000159 00000000`00000002 fffff800`0240e3a8 00000000`00000000 : nt!MiProcessWorkingSets+0x231
fffffa60`01916bb0 fffff800`022cc0d0 : fffffa80`00c8db00 00000000`00000001 00000000`00000004 00000000`00000008 : nt! ?? ::FNODOBFM::`string'+0x34af0
fffffa60`01916c10 fffff800`024c2f77 : fffffa80`00c8dbb0 00000000`00000080 00000000`00000000 00000000`00000001 : nt!KeBalanceSetManager+0x120
fffffa60`01916d50 fffff800`022f5636 : fffff800`023d1680 fffffa80`00c8dbb0 fffff800`023d6b80 00000000`00000000 : nt!PspSystemThreadStartup+0x57
fffffa60`01916d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiLogPageAccess+e0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4cb7275f

STACK_COMMAND:  .cxr 0xfffffa60019160c0 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x7E_nt!MiLogPageAccess+e0

BUCKET_ID:  X64_0x7E_nt!MiLogPageAccess+e0

Followup: MachineOwner
---------



pojawiaja się tez system_service_exception i bad pool header.

Na tych moich pamieciach Corsair wywala błędy, po zmianie na 1gb noname też się pojawiają.

Sigverif.exe pokazuje że, dsoftbus01.sys nie jest podpisany cyfrowo i zmieniony 26. marca 2011.

Druga sprawa, BSOD zaczely sie pojawiac mniej więcej po zaisntalowaniu sterowników do karty sieciowej WIFI (ten sagem dodawany do neostrady). Sterowniki ściągniete z sieci. Nie wiem nawet czy oficjalne.
Komputer był tez przedtem przewozony w aucie przez 300km więc, moze cos się ficzynie uszkodziło?

prosze o wszelkie rady i wskazówki.

Pozdrawiam

p.s. jesli potrzeba wiecej dumpow to mgoe wstawiac z wczoraj ( jest chyba z 6 )

-- 11 cze 2011, 19:24 --

wczoraj
1

Kod: Zaznacz cały

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini061011-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18538.amd64fre.vistasp1_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02057000 PsLoadedModuleList = 0xfffff800`0221cdb0
Debug session time: Fri Jun 10 00:28:33.674 2011 (UTC + 2:00)
System Uptime: 0 days 0:46:39.455
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff800020bd4bc, 0, ffffffffffffffff}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+292b7 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800020bd4bc, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:
nt!IoGetRelatedDeviceObject+c
fffff800`020bd4bc 488b4008        mov     rax,qword ptr [rax+8]

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002280080
 ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002085ec7 to fffff800020ac410

STACK_TEXT: 
fffffa60`0a8c69a8 fffff800`02085ec7 : 00000000`0000001e ffffffff`c0000005 fffff800`020bd4bc 00000000`00000000 : nt!KeBugCheckEx
fffffa60`0a8c69b0 fffff800`020ac269 : fffffa60`0a8c70e8 00000000`00000000 fffffa60`0a8c7190 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x292b7
fffffa60`0a8c6fb0 fffff800`020aae4d : 00000000`00000000 fffff800`023276b0 fffffa80`04714bf0 fffffa80`04714bf0 : nt!KiExceptionDispatch+0xa9
fffffa60`0a8c7190 fffff800`020bd4bc : fffff800`02327431 fffffa60`0a8c7408 00000000`00000000 fffffa80`040c13d0 : nt!KiGeneralProtectionFault+0xcd
fffffa60`0a8c7328 fffff800`02327431 : fffffa60`0a8c7408 00000000`00000000 fffffa80`040c13d0 00000000`00000000 : nt!IoGetRelatedDeviceObject+0xc
fffffa60`0a8c7330 fffff800`020946db : fffffa80`072699f0 fffffa60`0a8c7908 00000000`00000001 00000000`00000000 : nt!FsRtlAcquireFileExclusiveCommon+0x41
fffffa60`0a8c75d0 fffff800`022fa1b6 : fffffa60`0a8c7601 00000000`00000000 fffffa80`072699f0 fffffa60`00000000 : nt!CcZeroEndOfLastPage+0x5b
fffffa60`0a8c7640 fffff800`02459f23 : 00000000`00000000 00000000`0000000d fffff880`1011ad98 fffffa80`00000000 : nt!NtCreateSection+0x1ad
fffffa60`0a8c76d0 fffff800`0245c1c6 : 00000000`00000000 fffff880`1011ad98 fffff880`1011a000 fffffa60`00000060 : nt!PfpFileBuildReadSupport+0x163
fffffa60`0a8c77c0 fffff800`02485bb9 : fffff880`00000000 00000000`000004c1 00000000`00000045 00000000`00000000 : nt!PfpPrefetchFilesTrickle+0x126
fffffa60`0a8c78c0 fffff800`02485e72 : 00000000`00000000 fffffa60`0a8c7ca0 fffffa60`0a8c7a08 fffff880`1011a001 : nt!PfpPrefetchRequestPerform+0x2f9
fffffa60`0a8c7960 fffff800`024860d6 : fffffa60`0a8c7a08 fffffa80`07796901 fffffa80`097bb8d0 00000000`00000000 : nt!PfpPrefetchRequest+0x171
fffffa60`0a8c79d0 fffff800`02498808 : 00000000`00000000 00000000`00000004 00000000`00000000 00000000`0417ed01 : nt!PfSetSuperfetchInformation+0x1a5
fffffa60`0a8c7ab0 fffff800`020abeb3 : fffffa80`03c9d060 00000000`00000000 00000000`00000001 00000000`00008788 : nt!NtSetSystemInformation+0x8fb
fffffa60`0a8c7c20 00000000`77c0667a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0417f4d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c0667a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+292b7
fffff800`02085ec7 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+292b7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cb71b96

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!_??_::FNODOBFM::_string_+292b7

BUCKET_ID:  X64_0x1E_c0000005_nt!_??_::FNODOBFM::_string_+292b7

Followup: MachineOwner
---------



2

Kod: Zaznacz cały

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini061011-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18538.amd64fre.vistasp1_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02046000 PsLoadedModuleList = 0xfffff800`0220bdb0
Debug session time: Fri Jun 10 19:06:54.201 2011 (UTC + 2:00)
System Uptime: 0 days 1:49:38.233
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002095af6, fffffa600c0bd4c0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\n64i1639.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for n64i1639.sys
*** ERROR: Module load completed but symbols could not be loaded for n64i1639.sys
Probably caused by : n64i1639.sys ( n64i1639+22c70 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002095af6, Address of the instruction which caused the bugcheck
Arg3: fffffa600c0bd4c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:
nt!ExInterlockedRemoveHeadList+36
fffff800`02095af6 49894808        mov     qword ptr [r8+8],rcx

CONTEXT:  fffffa600c0bd4c0 -- (.cxr 0xfffffa600c0bd4c0)
rax=fffffa8005eeb980 rbx=fffffa8005f41e30 rcx=fffffa80053a7c88
rdx=fffffa80053a7c98 rsi=0000000000000042 rdi=fffffa800458e3b0
rip=fffff80002095af6 rsp=fffffa600c0bdd20 rbp=fffffa80053a7c00
 r8=2751f0f4fa792418  r9=0000000001070009 r10=0000000000000002
r11=fffffa80063b7670 r12=fffffa80053a7c88 r13=0000000000000000
r14=0000000000000000 r15=fffffa600c0bdf40
iopl=0         nv up di pl nz ac pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010012
nt!ExInterlockedRemoveHeadList+0x36:
fffff800`02095af6 49894808        mov     qword ptr [r8+8],rcx ds:002b:2751f0f4`fa792420=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  Skype.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffffa6002ca0c70 to fffff80002095af6

STACK_TEXT: 
fffffa60`0c0bdd20 fffffa60`02ca0c70 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExInterlockedRemoveHeadList+0x36
fffffa60`0c0bdd30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : n64i1639+0x22c70


FOLLOWUP_IP:
n64i1639+22c70
fffffa60`02ca0c70 ??              ???

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  n64i1639+22c70

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: n64i1639

IMAGE_NAME:  n64i1639.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4aa68a07

STACK_COMMAND:  .cxr 0xfffffa600c0bd4c0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_n64i1639+22c70

BUCKET_ID:  X64_0x3B_n64i1639+22c70

Followup: MachineOwner
---------



3

Kod: Zaznacz cały

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini061011-03.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18538.amd64fre.vistasp1_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02009000 PsLoadedModuleList = 0xfffff800`021cedb0
Debug session time: Fri Jun 10 20:47:53.282 2011 (UTC + 2:00)
System Uptime: 0 days 1:01:13.176
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904aa, fffffa60017f5388, fffffa60017f4d60, fffff800020655da}

Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireExclusiveScb+47 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904aa
Arg2: fffffa60017f5388
Arg3: fffffa60017f4d60
Arg4: fffff800020655da

Debugging Details:
------------------


EXCEPTION_RECORD:  fffffa60017f5388 -- (.exr 0xfffffa60017f5388)
ExceptionAddress: fffff800020655da (nt!KeWaitForSingleObject+0x000000000000014a)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: ffffffffffffffff
   Parameter[1]: 0000000000000000
Attempt to execute non-executable address 0000000000000000

CONTEXT:  fffffa60017f4d60 -- (.cxr 0xfffffa60017f4d60)
rax=fffff80002234440 rbx=000000088dae9955 rcx=fffffa60005ec7f0
rdx=0000000000000000 rsi=fffffa80036afca8 rdi=fffffa80036afbb0
rip=fffff800020655da rsp=fffffa60017f55c0 rbp=fa04ab850d395f88
 r8=fffffa80036afd38  r9=0000000000000000 r10=0000000000000000
r11=000000000000000c r12=0000000000000000 r13=fffffa60017f56c0
r14=fffffa60005ec180 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!KeWaitForSingleObject+0x14a:
fffff800`020655da 807d0002        cmp     byte ptr [rbp],2 ss:0018:fa04ab85`0d395f88=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  3

DEFAULT_BUCKET_ID:  NULL_DEREFERENCE

PROCESS_NAME:  System

CURRENT_IRQL:  c

ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

EXCEPTION_PARAMETER1:  ffffffffffffffff

EXCEPTION_PARAMETER2:  0000000000000000

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002232080
 0000000000000000

FOLLOWUP_IP:
Ntfs!NtfsAcquireExclusiveScb+47
fffffa60`01020967 84c0            test    al,al

FAULTING_IP:
nt!KeWaitForSingleObject+14a
fffff800`020655da 807d0002        cmp     byte ptr [rbp],2

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff80002075d2a to fffff800020655da

STACK_TEXT: 
fffffa60`017f55c0 fffff800`02075d2a : 00000000`000001e2 01cc2795`0000001b 00000000`00000000 00000000`00000000 : nt!KeWaitForSingleObject+0x14a
fffffa60`017f5650 fffffa60`01020967 : ffffffff`ffb3b4c0 00000000`00000000 00000000`00000000 fffff880`00fe6010 : nt!ExAcquireResourceExclusiveLite+0xca
fffffa60`017f56c0 fffffa60`010ce631 : fffffa80`072d6110 fffffa80`0592e760 fffff880`00fd89e0 fffffa80`058a5d00 : Ntfs!NtfsAcquireExclusiveScb+0x47
fffffa60`017f5700 fffffa60`010ced8b : fffffa80`058a5d00 fffffa80`0592e760 fffffa80`0592e760 fffffa80`04745180 : Ntfs!NtfsCommonFlushBuffers+0x591
fffffa60`017f57d0 fffffa60`00a04e17 : fffffa80`0592eb00 fffffa80`0592e760 fffffa80`058a5d00 fffffa60`017f57f8 : Ntfs!NtfsFsdFlushBuffers+0x10b
fffffa60`017f5840 fffffa60`00a040dd : fffffa80`04596880 fffffa80`06b07750 fffffa80`049d9000 00000000`00000000 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`017f58b0 fffffa60`00a04e17 : fffffa80`0592eb00 fffff800`0213c5fc fffffa80`05d87ca0 fffffa60`00a286fb : fltmgr!FltpDispatch+0xcd
fffffa60`017f5910 fffffa60`00a040dd : fffffa80`06d98a40 fffffa80`072d6110 fffffa80`06b07700 fffffa60`017f59d0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`017f5980 fffff800`022eaafc : 00000000`00000000 fffff800`02120de9 fffffa60`005f5d40 fffffa80`036afbb0 : fltmgr!FltpDispatch+0xcd
fffffa60`017f59e0 fffff800`022cf2c3 : fffffa80`0440a5b0 fffffa80`0440a5b0 fffffa80`072d6110 fffffa60`017f5b50 : nt!IopSynchronousServiceTail+0x13c
fffffa60`017f5a40 fffff800`0205deb3 : fffffa80`036afbb0 fffffa80`036afbb0 fffffa80`06b07750 fffffa80`072d6110 : nt!NtFlushBuffersFile+0x193
fffffa60`017f5ad0 fffff800`0205e3c0 : fffff800`022d2efb 00000000`00000000 fffffa60`005ec180 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffffa60`017f5c68 fffff800`022d2efb : 00000000`00000000 fffffa60`005ec180 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffffa60`017f5c70 fffff800`022d2609 : 00000000`00000001 fffffa80`049d76e8 fffffa80`049d76e0 fffffa80`036afbb0 : nt!CmpFileFlush+0x3f
fffffa60`017f5cc0 fffff800`0206b056 : fffff800`022d25e0 fffff800`0219b801 fffffa80`00000000 00000000`00000001 : nt!CmpLazyFlushWorker+0x29
fffffa60`017f5cf0 fffff800`02280403 : fffff800`02206220 9f67b233`e49d6043 fffffa80`036afbb0 00000000`00000080 : nt!ExpWorkerThread+0x11a
fffffa60`017f5d50 fffff800`02098576 : fffffa60`005ec180 fffffa80`036afbb0 fffffa60`005f5d40 00000000`00000001 : nt!PspSystemThreadStartup+0x57
fffffa60`017f5d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  Ntfs!NtfsAcquireExclusiveScb+47

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  479190d1

STACK_COMMAND:  .cxr 0xfffffa60017f4d60 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireExclusiveScb+47

BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireExclusiveScb+47

Followup: MachineOwner
---------



4

Kod: Zaznacz cały

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini061011-04.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18538.amd64fre.vistasp1_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02017000 PsLoadedModuleList = 0xfffff800`021dcdb0
Debug session time: Fri Jun 10 21:20:54.409 2011 (UTC + 2:00)
System Uptime: 0 days 0:31:27.330
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3D, {0, 0, 0, fffffa6002d223ca}

Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_Core_GetIoRequestFromObject+3e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: 0000000000000000
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: fffffa6002d223ca

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  4

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

BUGCHECK_STR:  0x3D

PROCESS_NAME:  plugin-containe

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffffa6001722ae8 -- (.exr 0xfffffa6001722ae8)
ExceptionAddress: fffffa6002d223ca (USBPORT!USBPORT_Core_GetIoRequestFromObject+0x000000000000003e)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffffa6001722b90 -- (.trap 0xfffffa6001722b90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=336364542f4e6554 rbx=0000000000000000 rcx=fffffa8004590398
rdx=fffffa8006deb602 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa6002d223ca rsp=fffffa6001722d20 rbp=fffffa8006deb600
 r8=000000004f444648  r9=5000e4807c000000 r10=5000e4807ccc0052
r11=00000000000007ff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
USBPORT!USBPORT_Core_GetIoRequestFromObject+0x3e:
fffffa60`02d223ca 48396820        cmp     qword ptr [rax+20h],rbp ds:33636454`2f4e6574=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000206c1ae to fffff8000206c410

STACK_TEXT: 
fffffa60`01721b18 fffff800`0206c1ae : 00000000`0000003d 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffffa60`01721b20 fffff800`0206cfe8 : fffffa80`00000002 fffff800`0253d5a0 00000006`45e40f43 fffffa60`0cf93000 : nt!KiBugCheckDispatch+0x6e
fffffa60`01721c60 fffff800`0207f6dd : 00000000`00000000 fffff800`02017000 fffffa60`0cf99000 fffff800`0221af20 : nt!KiInterruptHandler+0x28
fffffa60`01721c90 fffff800`02086d1f : fffffa60`00000001 00000000`00000001 fffff800`00000000 fffffa60`0cf98c20 : nt!RtlpExecuteHandlerForException+0xd
fffffa60`01721cc0 fffff800`02043df3 : fffffa60`01722ae8 fffffa60`017224c0 00000000`00000000 fffffa60`01722b90 : nt!RtlDispatchException+0x22f
fffffa60`017223b0 fffff800`0206c269 : fffffa60`01722ae8 fffffa80`045903a8 fffffa60`01722b90 fffffa80`04590398 : nt!KiDispatchException+0xc3
fffffa60`017229b0 fffff800`0206ae4d : fffffa80`06f85440 00000000`00000001 00000000`00000002 fffff800`02531cb6 : nt!KiExceptionDispatch+0xa9
fffffa60`01722b90 fffffa60`02d223ca : 00000000`00000000 00000000`00000000 fffffa80`0738bc40 fffffa80`0736f950 : nt!KiGeneralProtectionFault+0xcd
fffffa60`01722d20 fffffa60`02d1eb45 : fffffa80`060971a0 fffffa80`06097050 fffffa80`0736f950 fffffa80`06097050 : USBPORT!USBPORT_Core_GetIoRequestFromObject+0x3e
fffffa60`01722d50 fffffa60`02d1f420 : fffffa80`46616d64 fffffa80`06deb600 fffff800`32466d64 fffffa80`00000000 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x675
fffffa60`01722e30 fffffa60`02d1c872 : fffffa80`39585043 fffffa80`060971a0 fffffa80`06098088 fffffa80`060971a0 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x514
fffffa60`01722ea0 fffffa60`02d0918b : fffffa80`31636f49 fffffa80`06098088 fffffa60`0cf98c02 fffffa80`060971a0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0x13a
fffffa60`01722ef0 fffff800`020759d7 : fffffa80`060980a0 fffffa60`34776478 fffffa60`0cf98ca0 fffffa60`005ef580 : USBPORT!USBPORT_Xdpc_Worker+0x26f
fffffa60`01722f40 fffff800`0206f8e5 : fffffa60`02d08f1c fffffa60`005ec180 fffffa60`0cf98ca0 fffffa80`03ac3900 : nt!KiRetireDpcList+0x117
fffffa60`01722fb0 fffff800`0206f6f7 : fffffa80`0000040e fffffa60`0cf98bf0 00000000`00000000 00000006`4ad1bba5 : nt!KyRetireDpcList+0x5
fffffa60`0cf98be0 fffff800`020b2db3 : 00000000`0d5a5700 fffff800`0206d5df 00000000`01010101 00000000`00000000 : nt!KiDispatchInterruptContinue
fffffa60`0cf98c10 fffff800`0206d5df : 00000000`01010101 00000000`00000000 00000000`00000000 fffffa80`04aded40 : nt!KiDpcInterruptBypass+0x13
fffffa60`0cf98c20 00000000`6e3d870a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0x20f
00000000`1261e1a4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6e3d870a


STACK_COMMAND:  kb

FOLLOWUP_IP:
USBPORT!USBPORT_Core_GetIoRequestFromObject+3e
fffffa60`02d223ca 48396820        cmp     qword ptr [rax+20h],rbp

SYMBOL_STACK_INDEX:  8

SYMBOL_NAME:  USBPORT!USBPORT_Core_GetIoRequestFromObject+3e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBPORT

IMAGE_NAME:  USBPORT.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  479199d8

FAILURE_BUCKET_ID:  X64_0x3D_USBPORT!USBPORT_Core_GetIoRequestFromObject+3e

BUCKET_ID:  X64_0x3D_USBPORT!USBPORT_Core_GetIoRequestFromObject+3e

Followup: MachineOwner
---------



5

Kod: Zaznacz cały

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini061011-05.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18538.amd64fre.vistasp1_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02013000 PsLoadedModuleList = 0xfffff800`021d8db0
Debug session time: Fri Jun 10 22:22:38.925 2011 (UTC + 2:00)
System Uptime: 0 days 1:01:02.941
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffffa60023f7880, fffffa600b9232d0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+1ed880 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffffa60023f7880, Address of the instruction which caused the bugcheck
Arg3: fffffa600b9232d0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:
nvlddmkm+1ed880
fffffa60`023f7880 ??              ???

CONTEXT:  fffffa600b9232d0 -- (.cxr 0xfffffa600b9232d0)
rax=0000000000000001 rbx=76b251547157537a rcx=fffffa80070ff950
rdx=000000001e000001 rsi=0000000000000002 rdi=fffffa8006201110
rip=fffffa60023f7880 rsp=fffffa600b923b30 rbp=0000000000000000
 r8=fffffa600b923c20  r9=0000000010000000 r10=0000000000000000
r11=fffffa600b923bf8 r12=fffffa80073bf010 r13=0000000000000000
r14=0000000000000000 r15=0000000000000002
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nvlddmkm+0x1ed880:
fffffa60`023f7880 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  5

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 000000ff60020b48 to fffffa60023f7880

STACK_TEXT: 
fffffa60`0b923b30 000000ff`60020b48 : fffffa60`022ace6a fffffa80`083f2678 fffffa80`073bf010 fffffa60`0b923c20 : nvlddmkm+0x1ed880
fffffa60`0b923b38 fffffa60`022ace6a : fffffa80`083f2678 fffffa80`073bf010 fffffa60`0b923c20 fffffa60`0264993c : 0xff`60020b48
fffffa60`0b923b40 fffffa80`083f2678 : fffffa80`073bf010 fffffa60`0b923c20 fffffa60`0264993c 000000ff`60020b00 : nvlddmkm+0xa2e6a
fffffa60`0b923b48 fffffa80`073bf010 : fffffa60`0b923c20 fffffa60`0264993c 000000ff`60020b00 fffffa60`022ace6a : 0xfffffa80`083f2678
fffffa60`0b923b50 fffffa60`0b923c20 : fffffa60`0264993c 000000ff`60020b00 fffffa60`022ace6a 00000000`00000001 : 0xfffffa80`073bf010
fffffa60`0b923b58 fffffa60`0264993c : 000000ff`60020b00 fffffa60`022ace6a 00000000`00000001 fffffa60`022ac88e : 0xfffffa60`0b923c20
fffffa60`0b923b60 000000ff`60020b00 : fffffa60`022ace6a 00000000`00000001 fffffa60`022ac88e fffffa60`0b923d50 : nvlddmkm+0x43f93c
fffffa60`0b923b68 fffffa60`022ace6a : 00000000`00000001 fffffa60`022ac88e fffffa60`0b923d50 fffffa80`061ed000 : 0xff`60020b00
fffffa60`0b923b70 00000000`00000001 : fffffa60`022ac88e fffffa60`0b923d50 fffffa80`061ed000 fffffa80`073bf010 : nvlddmkm+0xa2e6a
fffffa60`0b923b78 fffffa60`022ac88e : fffffa60`0b923d50 fffffa80`061ed000 fffffa80`073bf010 fffffa60`0234acdf : 0x1
fffffa60`0b923b80 fffffa60`0b923d50 : fffffa80`061ed000 fffffa80`073bf010 fffffa60`0234acdf 00000001`083f2678 : nvlddmkm+0xa288e
fffffa60`0b923b88 fffffa80`061ed000 : fffffa80`073bf010 fffffa60`0234acdf 00000001`083f2678 fffffa60`02386d7d : 0xfffffa60`0b923d50
fffffa60`0b923b90 fffffa80`073bf010 : fffffa60`0234acdf 00000001`083f2678 fffffa60`02386d7d 00000000`00000000 : 0xfffffa80`061ed000
fffffa60`0b923b98 fffffa60`0234acdf : 00000001`083f2678 fffffa60`02386d7d 00000000`00000000 00000000`00000400 : 0xfffffa80`073bf010
fffffa60`0b923ba0 00000001`083f2678 : fffffa60`02386d7d 00000000`00000000 00000000`00000400 fffffa80`073bf010 : nvlddmkm+0x140cdf
fffffa60`0b923ba8 fffffa60`02386d7d : 00000000`00000000 00000000`00000400 fffffa80`073bf010 00000000`00000000 : 0x1`083f2678
fffffa60`0b923bb0 00000000`00000000 : 00000000`00000400 fffffa80`073bf010 00000000`00000000 00000000`00000000 : nvlddmkm+0x17cd7d


FOLLOWUP_IP:
nvlddmkm+1ed880
fffffa60`023f7880 ??              ???

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nvlddmkm+1ed880

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a2fc3d4

STACK_COMMAND:  .cxr 0xfffffa600b9232d0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nvlddmkm+1ed880

BUCKET_ID:  X64_0x3B_nvlddmkm+1ed880

Followup: MachineOwner
---------



6

Kod: Zaznacz cały

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini061011-06.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18538.amd64fre.vistasp1_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02050000 PsLoadedModuleList = 0xfffff800`02215db0
Debug session time: Fri Jun 10 22:40:03.498 2011 (UTC + 2:00)
System Uptime: 0 days 0:04:43.187
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904aa, fffffa600c2e2e48, fffffa600c2e2820, fffff800022a080b}

Probably caused by : Ntfs.sys ( Ntfs!NtfsPrefetchFile+7a2 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904aa
Arg2: fffffa600c2e2e48
Arg3: fffffa600c2e2820
Arg4: fffff800022a080b

Debugging Details:
------------------


EXCEPTION_RECORD:  fffffa600c2e2e48 -- (.exr 0xfffffa600c2e2e48)
ExceptionAddress: fffff800022a080b (nt!MiPfPrepareReadList+0x000000000000005b)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffffa600c2e2820 -- (.cxr 0xfffffa600c2e2820)
rax=fffffa80072a09a0 rbx=0000000000000000 rcx=724370796c4a6b4a
rdx=0000000000000690 rsi=fffff8800e9f8c00 rdi=0000000000000000
rip=fffff800022a080b rsp=fffffa600c2e3080 rbp=fffffa80047e45d0
 r8=0000000000000801  r9=000000006c526d4d r10=0000000000000001
r11=0000000000000002 r12=ffffffe00439e838 r13=fffffa8007f44aa0
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!MiPfPrepareReadList+0x5b:
fffff800`022a080b 4c8b39          mov     r15,qword ptr [rcx] ds:002b:72437079`6c4a6b4a=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  6

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002279080
 ffffffffffffffff

FOLLOWUP_IP:
Ntfs!NtfsPrefetchFile+7a2
fffffa60`011344b2 443be3          cmp     r12d,ebx

FAULTING_IP:
nt!MiPfPrepareReadList+5b
fffff800`022a080b 4c8b39          mov     r15,qword ptr [rcx]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff800022a04a9 to fffff800022a080b

STACK_TEXT: 
fffffa60`0c2e3080 fffff800`022a04a9 : fffffa80`6c526d4d fffffa80`07f44aa0 00000000`00000001 fffffa80`0485d010 : nt!MiPfPrepareReadList+0x5b
fffffa60`0c2e3140 fffffa60`011344b2 : 00000000`00000000 00000000`00000000 fffffa80`0485d010 fffffa80`04870c90 : nt!MmPrefetchPages+0x6d
fffffa60`0c2e3190 fffffa60`0110a9d4 : fffffa80`04870c90 fffffa60`0c2e3400 00000000`00000025 fffff880`0e9f8c00 : Ntfs!NtfsPrefetchFile+0x7a2
fffffa60`0c2e32c0 fffffa60`010ef485 : fffffa80`04870c90 00000000`00000000 fffffa80`0485d010 00000000`00000000 : Ntfs! ?? ::NNGAKEGL::`string'+0x1863a
fffffa60`0c2e3300 fffffa60`00a0fe17 : 00000000`00000000 fffffa80`0485d010 00000000`00000001 fffffa80`04870c90 : Ntfs!NtfsFsdFileSystemControl+0x145
fffffa60`0c2e33b0 fffffa60`00a2cc32 : fffffa80`045934c0 fffffa80`06b12750 fffffa80`05e62d00 00000000`00000000 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`0c2e3420 fffffa60`00a0fe17 : fffffa80`0485d3b0 fffff800`020a53c0 00000000`00000010 00000000`00000082 : fltmgr!FltpFsControl+0x102
fffffa60`0c2e3480 fffffa60`00a2cc32 : fffffa80`06b05780 00000000`00000000 fffffa80`06b12700 00000000`00000000 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`0c2e34f0 fffff800`02328a6a : fffffa80`0413d1b0 fffffa80`06b12750 fffffa80`0413d1b0 fffffa80`06063800 : fltmgr!FltpFsControl+0x102
fffffa60`0c2e3550 fffff800`023311e2 : 00000000`00100001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5da
fffffa60`0c2e36a0 fffff800`0244af75 : fffff880`0e5bf250 ffffffff`ffe91ca0 fffffa60`0c2e3828 00000000`00000000 : nt!NtFsControlFile+0x56
fffffa60`0c2e3710 fffff800`0244bcb5 : 00000000`00000004 00000000`00000660 fffff880`0ec80758 00000000`00000022 : nt!PfpPrefetchDirectoryStream+0x1e5
fffffa60`0c2e37c0 fffff800`0247eb8e : fffff880`00000004 00000000`00000000 00000000`00004021 00000000`00000000 : nt!PfpVolumePrefetchMetadata+0x3d5
fffffa60`0c2e38c0 fffff800`0247ee72 : 00000000`00000000 fffffa60`0c2e3ca0 fffffa60`0c2e3a08 fffff880`0ec80001 : nt!PfpPrefetchRequestPerform+0x2ce
fffffa60`0c2e3960 fffff800`0247f0d6 : fffffa60`0c2e3a08 00000000`00000001 fffffa80`061317d0 00000000`00000000 : nt!PfpPrefetchRequest+0x171
fffffa60`0c2e39d0 fffff800`02491808 : 00000000`00000000 00000000`00000004 00000000`00000000 00000000`0aa7f201 : nt!PfSetSuperfetchInformation+0x1a5
fffffa60`0c2e3ab0 fffff800`020a4eb3 : fffffa80`0847fbb0 00000000`00000000 00000000`00000000 fffffa80`088cfeb0 : nt!NtSetSystemInformation+0x8fb
fffffa60`0c2e3c20 00000000`77b7667a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0aa7f9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b7667a


SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  Ntfs!NtfsPrefetchFile+7a2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  479190d1

STACK_COMMAND:  .cxr 0xfffffa600c2e2820 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsPrefetchFile+7a2

BUCKET_ID:  X64_0x24_Ntfs!NtfsPrefetchFile+7a2

Followup: MachineOwner
---------



-- 11 cze 2011, 19:27 --

przedwczoraj
1

Kod: Zaznacz cały


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini060911-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18538.amd64fre.vistasp1_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02062000 PsLoadedModuleList = 0xfffff800`02227db0
Debug session time: Thu Jun  9 21:17:58.649 2011 (UTC + 2:00)
System Uptime: 0 days 3:42:09.571
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904aa, fffffa600c592178, fffffa600c591b50, fffff800020be5da}

Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireExclusiveFcb+64 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904aa
Arg2: fffffa600c592178
Arg3: fffffa600c591b50
Arg4: fffff800020be5da

Debugging Details:
------------------


EXCEPTION_RECORD:  fffffa600c592178 -- (.exr 0xfffffa600c592178)
ExceptionAddress: fffff800020be5da (nt!KeWaitForSingleObject+0x000000000000014a)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: ffffffffffffffff
   Parameter[1]: 0000000000000000
Attempt to execute non-executable address 0000000000000000

CONTEXT:  fffffa600c591b50 -- (.cxr 0xfffffa600c591b50)
rax=fffff8000228d440 rbx=0000001f0957739e rcx=fffffa60005ec7f0
rdx=0000000000000000 rsi=fffffa800439b158 rdi=fffffa800439b060
rip=fffff800020be5da rsp=fffffa600c5923b0 rbp=3bc75f449de3f3fd
 r8=fffffa800439b1e8  r9=0000000000000000 r10=0000000000000000
r11=000000000000000c r12=0000000000000000 r13=fffffa600c5924b0
r14=fffffa60005ec180 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!KeWaitForSingleObject+0x14a:
fffff800`020be5da 807d0002        cmp     byte ptr [rbp],2 ss:0018:3bc75f44`9de3f3fd=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  NULL_DEREFERENCE

PROCESS_NAME:  Upgrader.exe

CURRENT_IRQL:  c

ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

EXCEPTION_PARAMETER1:  ffffffffffffffff

EXCEPTION_PARAMETER2:  0000000000000000

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000228b080
 0000000000000000

FOLLOWUP_IP:
Ntfs!NtfsAcquireExclusiveFcb+64
fffffa60`01018834 84c0            test    al,al

FAULTING_IP:
nt!KeWaitForSingleObject+14a
fffff800`020be5da 807d0002        cmp     byte ptr [rbp],2

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff800020ced2a to fffff800020be5da

STACK_TEXT: 
fffffa60`0c5923b0 fffff800`020ced2a : 00000000`000001d6 00000000`0000001b 00000000`00040000 fffff980`09c3a400 : nt!KeWaitForSingleObject+0x14a
fffffa60`0c592440 fffffa60`01018834 : ffffffff`ffb3b4c0 fffffa80`05edb180 fffffa80`04ab58a0 fffff880`013be010 : nt!ExAcquireResourceExclusiveLite+0xca
fffffa60`0c5924b0 fffffa60`01098da0 : fffff880`013c0010 fffffa60`0c592850 fffffa80`04ab58a0 fffff880`013c0010 : Ntfs!NtfsAcquireExclusiveFcb+0x64
fffffa60`0c592500 fffffa60`01008260 : fffffa80`04ab58a0 fffffa80`05edb180 fffffa80`073e8c01 00000000`00000000 : Ntfs!NtfsFlushVolume+0x170
fffffa60`0c592620 fffffa60`0101479a : fffffa80`04ab58a0 fffffa60`0c592601 fffffa80`05e9fa30 fffffa80`060e6b00 : Ntfs!NtfsVolumeDasdIo+0x150
fffffa60`0c5926b0 fffffa60`01014b68 : fffffa80`04ab58a0 fffffa80`08670940 fffffa60`0c592801 fffffa80`00000000 : Ntfs!NtfsCommonRead+0x19ab
fffffa60`0c592820 fffffa60`00a05e17 : fffffa80`08670ce0 fffffa80`08670940 fffffa80`05e97620 fffffa80`073e8b90 : Ntfs!NtfsFsdRead+0x1b8
fffffa60`0c5928d0 fffffa60`00a050dd : fffffa80`03abcac0 fffffa80`06b93750 fffffa80`05e97600 00000000`00000000 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`0c592940 fffffa60`00a05e17 : fffffa80`08670ce0 00000000`00000000 fffffa80`06b7a7c0 00000000`00000000 : fltmgr!FltpDispatch+0xcd
fffffa60`0c5929a0 fffffa60`00a050dd : fffffa80`06b7a7c0 fffffa80`07c8d4e0 fffffa80`06b93700 00000000`00000000 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`0c592a10 fffff800`02343afc : 00000000`00000001 fffffa80`036bc580 fffff880`10889a20 00000000`75183380 : fltmgr!FltpDispatch+0xcd
fffffa60`0c592a70 fffff800`023204cf : fffffa80`07c8d4e0 fffffa80`07c8d4e0 fffffa80`07c8d4e0 fffffa60`0c592ca0 : nt!IopSynchronousServiceTail+0x13c
fffffa60`0c592ad0 fffff800`020b6eb3 : fffff880`0c3244d0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x5fd
fffffa60`0c592bb0 00000000`75183917 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75183917


SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  Ntfs!NtfsAcquireExclusiveFcb+64

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  479190d1

STACK_COMMAND:  .cxr 0xfffffa600c591b50 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireExclusiveFcb+64

BUCKET_ID:  X64_0x24_Ntfs!NtfsAcquireExclusiveFcb+64

Followup: MachineOwner
---------



2

Kod: Zaznacz cały

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini060911-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18538.amd64fre.vistasp1_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02001000 PsLoadedModuleList = 0xfffff800`021c6db0
Debug session time: Thu Jun  9 22:59:47.420 2011 (UTC + 2:00)
System Uptime: 0 days 0:04:23.233
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800020e6702, fffffa600b328f60, 0}

Probably caused by : memory_corruption ( nt!MiIdentifyPfn+6f2 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020e6702, Address of the instruction which caused the bugcheck
Arg3: fffffa600b328f60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:
nt!MiIdentifyPfn+6f2
fffff800`020e6702 498b5b40        mov     rbx,qword ptr [r11+40h]

CONTEXT:  fffffa600b328f60 -- (.cxr 0xfffffa600b328f60)
rax=0200000000000000 rbx=0000058000000000 rcx=0000000000000006
rdx=00000000003fac38 rsi=fffffa8004aee430 rdi=02000000000b077e
rip=fffff800020e6702 rsp=fffffa600b3297c0 rbp=fffffa600b329800
 r8=0200000000000000  r9=0000000000000446 r10=fffffa800713daf8
r11=03949c50730a6ae6 r12=0000000000000000 r13=fffffffffffff000
r14=000fffffffffffff r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!MiIdentifyPfn+0x6f2:
fffff800`020e6702 498b5b40        mov     rbx,qword ptr [r11+40h] ds:002b:03949c50`730a6b26=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80002100ffe to fffff800020e6702

STACK_TEXT: 
fffffa60`0b3297c0 fffff800`02100ffe : 00000000`0007f587 fffffa80`04aee430 fffffa80`0758dbb0 00000000`00000000 : nt!MiIdentifyPfn+0x6f2
fffffa60`0b329860 fffff800`023f0175 : fffffa80`04aee000 fffffa60`0b329ca0 fffffa60`0b329928 00000000`00000000 : nt!MmQueryPfnList+0x13e
fffffa60`0b3298a0 fffff800`023376ac : fffffa80`000000a8 00000000`00000000 fffffa80`04aee000 00000000`05c95f01 : nt!PfpPfnPrioRequest+0x115
fffffa60`0b3298f0 fffff800`022cbcba : 00000000`00000000 00000000`05c95ff0 00000000`033deb20 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x44f2a
fffffa60`0b329960 fffff800`02055eb3 : fffffa80`0758dbb0 00000000`05c95ff0 00000000`05383b40 00000000`00000000 : nt!NtQuerySystemInformation+0xd0a
fffffa60`0b329c20 00000000`7761536a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`033dea78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7761536a


FOLLOWUP_IP:
nt!MiIdentifyPfn+6f2
fffff800`020e6702 498b5b40        mov     rbx,qword ptr [r11+40h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiIdentifyPfn+6f2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4cb71b96

STACK_COMMAND:  .cxr 0xfffffa600b328f60 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x3B_nt!MiIdentifyPfn+6f2

BUCKET_ID:  X64_0x3B_nt!MiIdentifyPfn+6f2

Followup: MachineOwner
---------



3

Kod: Zaznacz cały

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini060911-03.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18538.amd64fre.vistasp1_gdr.101014-0432
Machine Name:
Kernel base = 0xfffff800`02050000 PsLoadedModuleList = 0xfffff800`02215db0
Debug session time: Thu Jun  9 23:25:55.239 2011 (UTC + 2:00)
System Uptime: 0 days 0:03:20.082
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8000230b1aa, fffffa600abc1e70, 0}

Probably caused by : CLFS.SYS ( CLFS!CClfsManagedLogCollection::FindOrCreateManagedLog+5a )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000230b1aa, Address of the instruction which caused the bugcheck
Arg3: fffffa600abc1e70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:
nt!CompareUnicodeStrings+16
fffff800`0230b1aa 440fb711        movzx   r10d,word ptr [rcx]

CONTEXT:  fffffa600abc1e70 -- (.cxr 0xfffffa600abc1e70)
rax=0000000000000003 rbx=fffffa8007501a78 rcx=811af926a556c58b
rdx=fffffa600abc2760 rsi=fffffa8007501a78 rdi=fffffa8007501a90
rip=fffff8000230b1aa rsp=fffffa600abc26d8 rbp=fffffa80079e2018
 r8=0000000000000000  r9=000000000000003f r10=0000000000000043
r11=0000000000000009 r12=0000000000000001 r13=fffffa600abc2760
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00210246
nt!CompareUnicodeStrings+0x16:
fffff800`0230b1aa 440fb711        movzx   r10d,word ptr [rcx] ds:002b:811af926`a556c58b=????
Resetting default scope

CUSTOMER_CRASH_COUNT:  3

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff8000230b3a7 to fffff8000230b1aa

STACK_TEXT: 
fffffa60`0abc26d8 fffff800`0230b3a7 : fffffa80`040220b0 fffffa80`07501a78 fffffa80`079e2018 fffffa80`07501a78 : nt!CompareUnicodeStrings+0x16
fffffa60`0abc2700 fffffa60`00668742 : fffffa60`0abc2828 fffffa60`0abc2ca0 fffffa80`045b04a0 fffffa60`0abc2828 : nt!RtlFindUnicodePrefix+0x63
fffffa60`0abc2740 fffffa60`006a7744 : fffffa60`0abc2828 fffffa60`0abc2ca0 fffffa80`040d2d08 fffffa60`0abc2ca0 : CLFS!CClfsManagedLogCollection::FindOrCreateManagedLog+0x5a
fffffa60`0abc2780 fffff800`022ae9e1 : 00000000`00000000 00000000`00000000 fffffa80`040d2c60 fffffa60`0abc2b90 : CLFS!ClfsMgmtpRegisterManagedClient+0x54
fffffa60`0abc27e0 fffff800`022ad9e1 : 00000000`00000000 00000000`00000000 fffffa80`040d2c60 00000000`00000000 : nt!TmpRegisterForLogManagement+0xa1
fffffa60`0abc28a0 fffff800`022aa27f : fffffa60`0abc2ca0 fffffa80`040d2c60 00000000`00000000 fffff880`0b6bd5b0 : nt!TmpCreateLogFile+0x155
fffffa60`0abc2a30 fffff800`022aa0e1 : fffffa80`040d2c60 00000000`00000000 fffffa60`0abc2bc8 fffffa60`0abc2b90 : nt!TmpCreateOrOpenLogTransactionManager+0x2e
fffffa60`0abc2a70 fffff800`022aa7a1 : 00000000`04ddf5d0 00000000`00000000 fffffa60`0abc2ca0 fffffa60`0abc2b90 : nt!TmInitializeTransactionManager+0x221
fffffa60`0abc2b10 fffff800`020a4eb3 : fffffa80`04133bb0 00000000`04ddf5a8 00000000`00000000 ffffffff`ffffffff : nt!NtCreateTransactionManager+0x1dc
fffffa60`0abc2bb0 00000000`772a5aca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04ddf588 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772a5aca


FOLLOWUP_IP:
CLFS!CClfsManagedLogCollection::FindOrCreateManagedLog+5a
fffffa60`00668742 b9250200c0      mov     ecx,0C0000225h

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  CLFS!CClfsManagedLogCollection::FindOrCreateManagedLog+5a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: CLFS

IMAGE_NAME:  CLFS.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  47919076

STACK_COMMAND:  .cxr 0xfffffa600abc1e70 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_CLFS!CClfsManagedLogCollection::FindOrCreateManagedLog+5a

BUCKET_ID:  X64_0x3B_CLFS!CClfsManagedLogCollection::FindOrCreateManagedLog+5a

Followup: MachineOwner
---------



błędów tyle, że każdy znajdzie coś dla siebie :woot:

-- 11 cze 2011, 19:48 --

WhoCrashed daje

Kod: Zaznacz cały

Crash Dump Analysis
--------------------------------------------------------------------------------

Crash dump directory: C:\Windows\Minidump

Crash dumps are enabled on your computer.


On Sat 2011-06-11 16:16:31 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061111-02.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x10FBE0)
Bugcheck code: 0x1000007E (0xFFFFFFFFC0000005, 0xFFFFF8000236DBE0, 0xFFFFFA60019166E8, 0xFFFFFA60019160C0)
Error: SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a system thread generated an exception which the error handler did not catch.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Sat 2011-06-11 16:16:31 GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: ntkrnlmp.exe (nt!KeBugCheckEx+0x0)
Bugcheck code: 0x7E (0xFFFFFFFFC0000005, 0xFFFFF8000236DBE0, 0xFFFFFA60019166E8, 0xFFFFFA60019160C0)
Error: SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug check description: This bug check indicates that a system thread generated an exception that the error handler did not catch.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Sat 2011-06-11 11:57:25 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061111-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x5A490)
Bugcheck code: 0x50 (0xFFFFFA800B000000, 0x0, 0xFFFFF8000226F570, 0x2)
Error: PAGE_FAULT_IN_NONPAGED_AREA
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that invalid system memory has been referenced.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Fri 2011-06-10 20:40:03 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061011-06.dmp
This was probably caused by the following module: ntfs.sys (Ntfs+0x213B3)
Bugcheck code: 0x24 (0x1904AA, 0xFFFFFA600C2E2E48, 0xFFFFFA600C2E2820, 0xFFFFF800022A080B)
Error: NTFS_FILE_SYSTEM
file path: C:\Windows\system32\drivers\ntfs.sys
product: System operacyjny Microsoft? Windows?
company: Microsoft Corporation
description: Sterownik systemu plików NT
Bug check description: This indicates a problem occurred in the NTFS file system.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.


On Fri 2011-06-10 20:22:38 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061011-05.dmp
This was probably caused by the following module: nvlddmkm.sys (nvlddmkm+0x1ED880)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFFA60023F7880, 0xFFFFFA600B9232D0, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\drivers\nvlddmkm.sys
product: NVIDIA Windows Kernel Mode Driver, Version 186.18
company: NVIDIA Corporation
description: NVIDIA Windows Kernel Mode Driver, Version 186.18
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
A third party driver was identified as the probable root cause of this system error. It is suggested you look for an update for the following driver: nvlddmkm.sys (NVIDIA Windows Kernel Mode Driver, Version 186.18 , NVIDIA Corporation).
Google query: nvlddmkm.sys NVIDIA Corporation SYSTEM_SERVICE_EXCEPTION




On Fri 2011-06-10 19:20:54 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061011-04.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x55410)
Bugcheck code: 0x3D (0x0, 0x0, 0x0, 0xFFFFFA6002D223CA)
Error: INTERRUPT_EXCEPTION_NOT_HANDLED
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This bug check appears very infrequently.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Fri 2011-06-10 18:47:53 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061011-03.dmp
This was probably caused by the following module: ntfs.sys (Ntfs+0x213B3)
Bugcheck code: 0x24 (0x1904AA, 0xFFFFFA60017F5388, 0xFFFFFA60017F4D60, 0xFFFFF800020655DA)
Error: NTFS_FILE_SYSTEM
file path: C:\Windows\system32\drivers\ntfs.sys
product: System operacyjny Microsoft? Windows?
company: Microsoft Corporation
description: Sterownik systemu plików NT
Bug check description: This indicates a problem occurred in the NTFS file system.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.


On Fri 2011-06-10 17:06:54 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061011-02.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x55410)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF80002095AF6, 0xFFFFFA600C0BD4C0, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Thu 2011-06-09 22:28:33 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061011-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x55410)
Bugcheck code: 0x1E (0xFFFFFFFFC0000005, 0xFFFFF800020BD4BC, 0x0, 0xFFFFFFFFFFFFFFFF)
Error: KMODE_EXCEPTION_NOT_HANDLED
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a kernel-mode program generated an exception which the error handler did not catch.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Thu 2011-06-09 21:25:55 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini060911-03.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x55410)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF8000230B1AA, 0xFFFFFA600ABC1E70, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Thu 2011-06-09 20:59:47 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini060911-02.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x55410)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF800020E6702, 0xFFFFFA600B328F60, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Thu 2011-06-09 19:17:58 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini060911-01.dmp
This was probably caused by the following module: ntfs.sys (Ntfs+0x213B3)
Bugcheck code: 0x24 (0x1904AA, 0xFFFFFA600C592178, 0xFFFFFA600C591B50, 0xFFFFF800020BE5DA)
Error: NTFS_FILE_SYSTEM
file path: C:\Windows\system32\drivers\ntfs.sys
product: System operacyjny Microsoft? Windows?
company: Microsoft Corporation
description: Sterownik systemu plików NT
Bug check description: This indicates a problem occurred in the NTFS file system.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.


On Tue 2011-05-31 15:47:00 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini053111-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x55410)
Bugcheck code: 0x1E (0xFFFFFFFFC0000005, 0xFFFFF80002081ECA, 0x0, 0xFFFFFFFFFFFFFFFF)
Error: KMODE_EXCEPTION_NOT_HANDLED
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a kernel-mode program generated an exception which the error handler did not catch.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Mon 2011-05-30 18:21:10 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini053011-01.dmp
This was probably caused by the following module: ntfs.sys (Ntfs+0x213B3)
Bugcheck code: 0x24 (0x1904AA, 0xFFFFFA600DBB6328, 0xFFFFFA600DBB5D00, 0xFFFFFA6000A328F0)
Error: NTFS_FILE_SYSTEM
file path: C:\Windows\system32\drivers\ntfs.sys
product: System operacyjny Microsoft? Windows?
company: Microsoft Corporation
description: Sterownik systemu plików NT
Bug check description: This indicates a problem occurred in the NTFS file system.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.


On Thu 2011-05-26 22:45:59 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini052711-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x55410)
Bugcheck code: 0xC2 (0x99, 0xFFFFFA80070BD950, 0x0, 0x0)
Error: BAD_POOL_CALLER
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that the current thread is making a bad pool request.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.



--------------------------------------------------------------------------------
Conclusion
--------------------------------------------------------------------------------

43 crash dumps have been found and analyzed. Only 15 are included in this report. 4 third party drivers have been identified to be causing system crashes on your computer. It is strongly suggested that you check for updates for these drivers on their company websites. Click on the links below to search with Google for updates for these drivers:

nettdi64.sys (Panda TDI Filter, Panda Security, S.L.)

n64i1639.sys (netimflt, Panda Security, S.L.)

nvlddmkm.sys (NVIDIA Windows Kernel Mode Driver, Version 186.18 , NVIDIA Corporation)

If no updates for these drivers are available, try searching with Google on the names of these drivers in combination the errors that have been reported for these drivers and include the brand and model name of your computer as well in the query. This often yields interesting results from discussions from users who have been experiencing similar problems.


Read the topic general suggestions for troubleshooting system crashes for more information.

Note that it's not always possible to state with certainty whether a reported driver is actually responsible for crashing your system or that the root cause is in another module. Nonetheless it's suggested you look for updates for the products that these drivers belong to and regularly visit Windows update or enable automatic updates for Windows. In case a piece of malfunctioning hardware is causing trouble, a search with Google on the bug check errors together with the model name and brand of your computer may help you investigate this further.


Awatar użytkownika
djkamil09061991

Globalny Moderator
Posty: 8250
Rejestracja: 18 lut 2009, 11:54
Lokalizacja: Wrocław
Kontaktowanie:

Ciągle pojawiające się Bluescreeny

Post11 cze 2011, 19:52

Problemy są rózne, na początek radze zainstalować sterownik do chipsetu płyty głównej oraz zmienić sterownik od karty graficznej nvidia bo z nim tez jest problem

Awatar użytkownika
cosik_ktosik

Administrator
Posty: 21416
Rejestracja: 13 lis 2008, 01:17
Lokalizacja: Szczecin
Kontaktowanie:

Ciągle pojawiające się Bluescreeny

Post11 cze 2011, 23:26

Co do loga z HD Tune, dysk jest zdrowy. Zrób jak djkamil09061991 radzi.
Hotfix
Pozdrawiam, cosik_ktosik :)

gaw

Użytkownik
Posty: 4
Rejestracja: 11 cze 2011, 19:00

Ciągle pojawiające się Bluescreeny

Post12 cze 2011, 12:32

WhoCrashed krzyczy coś o Pandzie. co myslicie?

Awatar użytkownika
djkamil09061991

Globalny Moderator
Posty: 8250
Rejestracja: 18 lut 2009, 11:54
Lokalizacja: Wrocław
Kontaktowanie:

Ciągle pojawiające się Bluescreeny

Post12 cze 2011, 13:13

gaw pisze:WhoCrashed krzyczy coś o Pandzie. co myslicie?

Zrobiłeś to co pisałem??? czyli instalacja chipsetu oraz sterownika do grafiki? Jeśli krzyczy o pandzie to możesz ją odinstalowac lub przeinstalować.

gaw

Użytkownik
Posty: 4
Rejestracja: 11 cze 2011, 19:00

Ciągle pojawiające się Bluescreeny

Post12 cze 2011, 13:51

przeinstalowałem sterowniki od grafy dzisiaj.
od chipsetu też.

zainstalowałem pande 2011 zamiast 2010. poczekamy co się będzie działo

-- 12 cze 2011, 13:51 --

BSOD mam nadal. wywaliłem Pande, mam avast.

moze trzeba system przeinstalować?
btw. wiecie skąd można ściągnąć instalke viste business 64 bity? sama instalka nie żadne crackowane z torrentów, mam licencje oryginalną, ale płyta z windowsem znajduje sie 340km ode mnie :/

WhoCrashed raportuje tak:

Kod: Zaznacz cały


On Sun 2011-06-12 11:41:49 GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: aswsp.sys (aswSP+0xFB6D)
Bugcheck code: 0x3B (0xC0000005, 0xFFFFF800024CC768, 0xFFFFFA600C967D80, 0x0)
Error: SYSTEM_SERVICE_EXCEPTION
file path: C:\Windows\system32\drivers\aswsp.sys
product: avast! Antivirus System
company: AVAST Software
description: avast! self protection module
Bug check description: This indicates that an exception happened while executing a routine that transitions from non-privileged code to privileged code.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
A third party driver was identified as the probable root cause of this system error. It is suggested you look for an update for the following driver: aswsp.sys (avast! self protection module, AVAST Software).
Google query: aswsp.sys AVAST Software SYSTEM_SERVICE_EXCEPTION




On Sun 2011-06-12 11:16:03 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061211-06.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x5A490)
Bugcheck code: 0x3D (0x0, 0x0, 0x0, 0xFFFFF8000229AB96)
Error: INTERRUPT_EXCEPTION_NOT_HANDLED
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This bug check appears very infrequently.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Sun 2011-06-12 10:35:04 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061211-05.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x5A490)
Bugcheck code: 0x1E (0xFFFFFFFFC0000005, 0xFFFFF800022A5B96, 0x0, 0xFFFFFFFFFFFFFFFF)
Error: KMODE_EXCEPTION_NOT_HANDLED
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a kernel-mode program generated an exception which the error handler did not catch.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Sun 2011-06-12 10:12:07 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061211-04.dmp
This was probably caused by the following module: ntfs.sys (Ntfs+0x2010E)
Bugcheck code: 0x24 (0x1904AA, 0xFFFFFA600D62A028, 0xFFFFFA600D629A00, 0xFFFFF800022E71BE)
Error: NTFS_FILE_SYSTEM
file path: C:\Windows\system32\drivers\ntfs.sys
product: System operacyjny Microsoft? Windows?
company: Microsoft Corporation
description: Sterownik systemu plików NT
Bug check description: This indicates a problem occurred in the NTFS file system.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.


On Sun 2011-06-12 09:52:49 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061211-03.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x5A490)
Bugcheck code: 0x3D (0x0, 0x0, 0x0, 0xFFFFF800022A3B96)
Error: INTERRUPT_EXCEPTION_NOT_HANDLED
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This bug check appears very infrequently.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.


On Sun 2011-06-12 08:59:54 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061211-02.dmp
This was probably caused by the following module: ntfs.sys (Ntfs+0x2010E)
Bugcheck code: 0x24 (0x1904AA, 0xFFFFFA600D86B568, 0xFFFFFA600D86AF40, 0xFFFFF8000225F20A)
Error: NTFS_FILE_SYSTEM
file path: C:\Windows\system32\drivers\ntfs.sys
product: System operacyjny Microsoft? Windows?
company: Microsoft Corporation
description: Sterownik systemu plików NT
Bug check description: This indicates a problem occurred in the NTFS file system.
The crash took place in a standard Microsoft module. Your system configuration may be incorrect. Possibly this problem is caused by another driver on your system which cannot be identified at this time.


On Sat 2011-06-11 20:51:20 GMT your computer crashed
crash dump file: C:\Windows\Minidump\Mini061211-01.dmp
This was probably caused by the following module: ntoskrnl.exe (nt+0x3598A)
Bugcheck code: 0x1000007E (0xFFFFFFFFC0000005, 0xFFFFF8000224F98A, 0xFFFFFA60017E0218, 0xFFFFFA60017DFBF0)
Error: SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M
file path: C:\Windows\system32\ntoskrnl.exe
product: Microsoft? Windows? Operating System
company: Microsoft Corporation
description: NT Kernel & System
Bug check description: This indicates that a system thread generated an exception which the error handler did not catch.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver which cannot be identified at this time.

Awatar użytkownika
cosik_ktosik

Administrator
Posty: 21416
Rejestracja: 13 lis 2008, 01:17
Lokalizacja: Szczecin
Kontaktowanie:

Ciągle pojawiające się Bluescreeny

Post15 cze 2011, 00:56

hehe, to ciekawe bo tu avasta sugeruje

A third party driver was identified as the probable root cause of this system error. It is suggested you look for an update for the following driver: aswsp.sys (avast! self protection module, AVAST Software).
Google query: aswsp.sys AVAST Software SYSTEM_SERVICE_EXCEPTION
Hotfix
Pozdrawiam, cosik_ktosik :)

gaw

Użytkownik
Posty: 4
Rejestracja: 11 cze 2011, 19:00

Ciągle pojawiające się Bluescreeny

Post15 cze 2011, 10:33

No właśnie. Przedtem sugerował pande, teraz avast.

Jakoś BSOD spadły do 2-3 dziennie, ale już są inne?
Ciągle myślę, że to może te sterowniki od wifi wywalają

Awatar użytkownika
cosik_ktosik

Administrator
Posty: 21416
Rejestracja: 13 lis 2008, 01:17
Lokalizacja: Szczecin
Kontaktowanie:

Ciągle pojawiające się Bluescreeny

Post19 cze 2011, 23:19

Spakuj wszystkie najnowsze pliki DMP oraz dzienniki podglądu zdarzeń to się je sprawdzi.
Hotfix
Pozdrawiam, cosik_ktosik :)

Piotrek23

Użytkownik
Posty: 5
Rejestracja: 26 cze 2011, 14:21

Ciągle pojawiające się Bluescreeny

Post26 cze 2011, 14:35

Witam. Jestem tu nowy, także proszę o wyrozumiałość. Nie chcę też zakładać nowego tematu, żeby nie robic bałaganu.

Od jakiegoś czasu BSOD, tylko podczas pracy w internecie (w grach nigdy). 1-2 na dzień. Czasem zawieszenie się komputera (wszystko staje) bez BSOD.

AMD Athlon 64X2 Dual, 5400+
ASUS M4N78E
2GB RAM
GeForce 8800GT

Pierwszy
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\WINDOWS\Minidump\Mini062611-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.101209-1647
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sun Jun 26 00:48:47.031 2011 (GMT+2)
System Uptime: 0 days 9:51:15.627
Loading Kernel Symbols
...............................................................
.....................................................
Loading User Symbols
Loading unloaded module list
............................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {4, 2, 1, 80535b59}

Unable to load image aswSP.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
Probably caused by : aswSP.SYS ( aswSP+12903 )

Followup: MachineOwner



icrosoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\WINDOWS\Minidump\Mini062611-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.101209-1647
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sun Jun 26 00:48:47.031 2011 (GMT+2)
System Uptime: 0 days 9:51:15.627
Loading Kernel Symbols
...............................................................
.....................................................
Loading User Symbols
Loading unloaded module list
............................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {4, 2, 1, 80535b59}

Unable to load image aswSP.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
Probably caused by : aswSP.SYS ( aswSP+12903 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 80535b59, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: 00000004

CURRENT_IRQL: 2

FAULTING_IP:
nt!ExDeleteResourceLite+1f
80535b59 897904 mov dword ptr [ecx+4],edi

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: iexplore.exe

LAST_CONTROL_TRANSFER: from 805f8c7d to 80535b59

STACK_TEXT:
b2c7ac84 805f8c7d 87ee6cf8 e3525018 b2c7acb0 nt!ExDeleteResourceLite+0x1f
b2c7ac94 805bb4aa e3525030 00000000 e3525018 nt!SepTokenDeleteMethod+0x6b
b2c7acb0 805266fa e3525030 00000000 00001a6c nt!ObpRemoveObjectRoutine+0xe0
b2c7acc8 805bc37f 88090568 e593bbb8 882316e0 nt!ObfDereferenceObject+0x4c
b2c7ace0 805bc415 e593bbb8 e3525030 00001a6c nt!ObpCloseHandleTableEntry+0x155
b2c7ad28 805bc54d 00001a6c 00000001 00000000 nt!ObpCloseHandle+0x87
b2c7ad3c b45ad903 00001a6c b2c7ad64 02ddfdcc nt!NtClose+0x1d
WARNING: Stack unwind information not available. Following frames may be wrong.
b2c7ad58 8054167c 00001a6c 02ddfdcc 7c90e514 aswSP+0x12903
b2c7ad58 7c90e514 00001a6c 02ddfdcc 7c90e514 nt!KiFastCallEntry+0xfc
02ddfdcc 00000000 00000000 00000000 00000000 0x7c90e514


STACK_COMMAND: kb

FOLLOWUP_IP:
aswSP+12903
b45ad903 ?? ???

SYMBOL_STACK_INDEX: 7

SYMBOL_NAME: aswSP+12903

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: aswSP

IMAGE_NAME: aswSP.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4dc9299f

FAILURE_BUCKET_ID: 0xA_aswSP+12903

BUCKET_ID: 0xA_aswSP+12903

Followup: MachineOwner
---------




Drugi

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\WINDOWS\Minidump\Mini062411-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.101209-1647
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Fri Jun 24 01:38:24.109 2011 (GMT+2)
System Uptime: 0 days 2:47:21.857
Loading Kernel Symbols
...............................................................
.....................................................
Loading User Symbols
Loading unloaded module list
................
Unable to load image aswSP.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {aaabb5e2, 2, 1, b45bb1dd}

*** WARNING: Unable to verify timestamp for aswMon2.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswMon2.SYS
Probably caused by : aswSP.SYS ( aswSP+201dd )

Followup: MachineOwner



Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\WINDOWS\Minidump\Mini062411-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.101209-1647
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Fri Jun 24 01:38:24.109 2011 (GMT+2)
System Uptime: 0 days 2:47:21.857
Loading Kernel Symbols
...............................................................
.....................................................
Loading User Symbols
Loading unloaded module list
................
Unable to load image aswSP.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for aswSP.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswSP.SYS
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000D1, {aaabb5e2, 2, 1, b45bb1dd}

*** WARNING: Unable to verify timestamp for aswMon2.SYS
*** ERROR: Module load completed but symbols could not be loaded for aswMon2.SYS
Probably caused by : aswSP.SYS ( aswSP+201dd )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: aaabb5e2, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: b45bb1dd, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: aaabb5e2

CURRENT_IRQL: 2

FAULTING_IP:
aswSP+201dd
b45bb1dd f00fc111 lock xadd dword ptr [ecx],edx

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xD1

PROCESS_NAME: iexplore.exe

LAST_CONTROL_TRANSFER: from b45bb3c1 to b45bb1dd

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
b281cb04 b45bb3c1 aaabb5da 87fbca00 87ed5008 aswSP+0x201dd
b281cb18 b45ba32a b45de8f0 06dc727c 00000000 aswSP+0x203c1
b281cb58 b45ba4cd 00000012 89d5c020 88809008 aswSP+0x1f32a
b281cb74 804ef19f 89d5c020 88809008 89d14ae8 aswSP+0x1f4cd
b281cb84 b7edcbbf 00000000 886e1008 b281cbc8 nt!IopfCallDriver+0x31
b281cb94 804ef19f 89d384b0 e352ddb0 88809008 sr!SrCleanup+0xb3
b281cba4 b7eede9b 89c50220 88809008 89b80c18 nt!IopfCallDriver+0x31
b281cbc8 b7eee06b b281cbe8 89c50220 00000000 fltMgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x20b
b281cc00 804ef19f 89c50220 88809008 88809204 fltMgr!FltpDispatch+0x11f
b281cc10 b3603bcb 881ef388 89c3b860 88809018 nt!IopfCallDriver+0x31
b281cc34 b35fda34 8895bee0 88809008 b281cc84 aswMon2+0x6bcb
b281cc44 804ef19f 8895bee0 88809008 88809008 aswMon2+0xa34
b281cc54 80583979 881ef370 000000a8 89ddde70 nt!IopfCallDriver+0x31
b281cc84 805bca4e 88d3b3c8 8895bee0 00010080 nt!IopCloseFile+0x26b
b281ccb8 805bc377 88d3b3c8 00000001 89ddde70 nt!ObpDecrementHandleCount+0xd8
b281cce0 805bc415 e1621bf8 881ef388 00000c7c nt!ObpCloseHandleTableEntry+0x14d
b281cd28 805bc54d 00000c7c 00000001 00000000 nt!ObpCloseHandle+0x87
b281cd3c b45ad903 00000c7c b281cd64 0ed7b69c nt!NtClose+0x1d
b281cd58 8054167c 00000c7c 0ed7b6f4 7c90e514 aswSP+0x12903
b281cd58 7c90e514 00000c7c 0ed7b6f4 7c90e514 nt!KiFastCallEntry+0xfc
0ed7b6f4 00000000 00000000 00000000 00000000 0x7c90e514


STACK_COMMAND: kb

FOLLOWUP_IP:
aswSP+201dd
b45bb1dd f00fc111 lock xadd dword ptr [ecx],edx

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: aswSP+201dd

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: aswSP

IMAGE_NAME: aswSP.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4dc9299f

FAILURE_BUCKET_ID: 0xD1_aswSP+201dd

BUCKET_ID: 0xD1_aswSP+201dd

Followup: MachineOwner


Proszę o jakąkolwiek pomoc, albo chociaż o wskazówki. Komputer był w serwisie, świeżo po formacie. Nic nie wykryto jeśli chodzi o sprzęt.

pozdrawiam i bardzo dziękuję z aewentualną pomoc.

Awatar użytkownika
djkamil09061991

Globalny Moderator
Posty: 8250
Rejestracja: 18 lut 2009, 11:54
Lokalizacja: Wrocław
Kontaktowanie:

Ciągle pojawiające się Bluescreeny

Post26 cze 2011, 14:37

Problemem jest Avast odinstaluj go.

Piotrek23

Użytkownik
Posty: 5
Rejestracja: 26 cze 2011, 14:21

Ciągle pojawiające się Bluescreeny

Post26 cze 2011, 15:51

djkamil09061991 pisze:Problemem jest Avast odinstaluj go.

Hmm. Ale to znaczy, że nie mogę używać avasta? Komputer mam od 2006, avasta używałem zawsze i nigdy nie miałem problemów. Mniej więcej pół roku temu pojawiły się problemy z BSOD (na początku sporadycznie).

A format może pomóc? Na czym polega ten "konflikt" z avastem? Jestem bardzo przyzwyczajony do niego.

PS: Bardzo, ale to bardzo jestem wdzięczny za pomoc. I gorąco Ci dziękuje.

EDIT: Chociaż teraz przypominam sobie o aktualizacji avasta, która być może miała miejsce przed występowaniem BSOD. Ale nie jestem w stanie ustawić to w czasie. Hmm, nie rozumiem tego.

Awatar użytkownika
cosik_ktosik

Administrator
Posty: 21416
Rejestracja: 13 lis 2008, 01:17
Lokalizacja: Szczecin
Kontaktowanie:

Ciągle pojawiające się Bluescreeny

Post30 cze 2011, 08:18

Zamień go na razie na inny, np Avira + jakiś firewall i zobaczysz czy na 100 procent to AVAST Tobie bruździł.
Hotfix
Pozdrawiam, cosik_ktosik :)

Piotrek23

Użytkownik
Posty: 5
Rejestracja: 26 cze 2011, 14:21

Ciągle pojawiające się Bluescreeny

Post24 lip 2011, 17:09

Witam jeszcze raz. Po odinstalowaniu avasta przez kilka dni było ok. Dosłownie wczoraj postawiłem świeżą wersję systemu. Byłem przekonany, że problem rozwiązany. Dziś znowu BSOD:


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [E:\WINDOWS\Minidump\Mini072411-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp.080413-2111
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Sun Jul 24 16:37:25.343 2011 (GMT+2)
System Uptime: 0 days 4:05:09.954
Loading Kernel Symbols
...............................................................
.............................................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {e0000001, b8430925, b096c320, 0}

*** WARNING: Unable to verify timestamp for nv4_disp.dll
*** ERROR: Module load completed but symbols could not be loaded for nv4_disp.dll
Probably caused by : nv4_disp.dll ( nv4_disp+39fa78 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: e0000001, The exception code that was not handled
Arg2: b8430925, The address that the exception occurred at
Arg3: b096c320, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xe0000001 - <Unable to get error code text>

FAULTING_IP:
watchdog!RaiseExceptionInThread+b
b8430925 c3 ret

TRAP_FRAME: b096c320 -- (.trap 0xffffffffb096c320)
ESP EDITED! New esp=b096c6d0
ErrCode = 00000000
eax=e1e77800 ebx=00000001 ecx=00000628 edx=00000001 esi=e21803c8 edi=0000ffff
eip=b8430925 esp=b096c394 ebp=b096c6e8 iopl=0 nv up ei pl nz na pe nc
cs=0000 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000206
watchdog!RaiseExceptionInThread+0xb:
b8430925 c3 ret
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0x8E

PROCESS_NAME: iexplore.exe

LAST_CONTROL_TRANSFER: from 8053617d to b8430925

STACK_TEXT:
b096c724 8053617d e1e77800 89b99760 b096c79c watchdog!RaiseExceptionInThread+0xb
b096c740 bd3b1a78 e1ec80c0 e1640010 bd0f0458 nt!ExAcquireResourceExclusiveLite+0x67
WARNING: Stack unwind information not available. Following frames may be wrong.
b096c774 b8430671 e1619714 e178d458 00000000 nv4_disp+0x39fa78
b096c78c bd0040b5 e1e77800 e1ec80a8 e1619724 watchdog!WdEnterMonitoredSection+0x5f
b096c798 e1619724 e1ec80b8 80004005 b096c7bc dxg!DdDisableMotionCompObject+0x39
b096c7a8 bd006e55 e1ec80a8 7da00048 00000001 0xe1619724
b096c7bc bd003080 e1619008 00000000 00000550 dxg!bDdDeleteMotionCompObject+0x43
b096c7dc bf8c10ee 00000550 e104a008 00000000 dxg!DdHmgCloseProcess+0x48
b096c7f8 bf8bf7a9 e104a008 00000000 00000000 win32k!NtGdiCloseProcess+0x45
b096c810 bf8bc955 e104a008 00000000 88af0a28 win32k!GdiProcessCallout+0x102
b096c82c 805d248f 88ac3da0 00000000 88704f98 win32k!W32pProcessCallout+0x5c
b096c8d0 805d27e9 00000000 b096c92c 804ff93f nt!PspExitThread+0x409
b096c8dc 804ff93f 88704f98 b096c928 b096c91c nt!PsExitSpecialApc+0x23
b096c92c 80541687 00000001 00000000 b096c944 nt!KiDeliverApc+0x1af
b096c92c 7c90e440 00000001 00000000 b096c944 nt!KiServiceExit+0x59
05e6ff78 00000000 00000000 00000000 00000000 0x7c90e440


STACK_COMMAND: kb

FOLLOWUP_IP:
nv4_disp+39fa78
bd3b1a78 ?? ???

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nv4_disp+39fa78

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nv4_disp

IMAGE_NAME: nv4_disp.dll

DEBUG_FLR_IMAGE_TIMESTAMP: 4dd7387f

FAILURE_BUCKET_ID: 0x8E_nv4_disp+39fa78

BUCKET_ID: 0x8E_nv4_disp+39fa78

Followup: MachineOwner
---------


Prócz niezbędnych sterowników zainstalowałem następujące programy"
- daemon tools
- pakiet office 2003
- utorrent
-adobe reader
- winrar
- przeglądarkę FF

plus 2 gry:
- FM 2008
- Snajper

Wszystko jest oryginalne.

Nie mam juz siły do tego. Jestem zmęczony. Czy to może być jakaś kwestia techniczna albo sterowniki od grafiki? Może Deamon? Może jakieś niedopicie na kablach?

Ps: Jeżeli to coś może pomóc, to przed BSOD wszystko zamarło na parę sekund. Następnie "puściło", mogłem ruszać mychą, a potem znowu zamarło i wtedy nastąpił BSOD.


PS2: W dodatku, od jakiegoś czasu mam problem z myszką. Podejrzewam, ze może to być powiązane z BSOD. Myszka chodzi mniej precyzyjnie i potrafi od czasu do czasu sama skoczyć np 2-3 mm w którąś stronę co bardzo przeszkadza w grach i pracy. Myszka była wymieniania, podkładka jest droga, wszystko było sprawdzone.

Awatar użytkownika
djkamil09061991

Globalny Moderator
Posty: 8250
Rejestracja: 18 lut 2009, 11:54
Lokalizacja: Wrocław
Kontaktowanie:

Ciągle pojawiające się Bluescreeny

Post24 lip 2011, 17:41

Piotrek23 pisze:nv4_disp.dll

Przyczyną jest sterownik od grafiki, odinstaluj obecny i sprawdz inną wersję nie koniecznie najnowszą.



  • Reklama

Wróć do „Problemy”



Kto jest online

Użytkownicy przeglądający to forum: Obecnie na forum nie ma żadnego zarejestrowanego użytkownika i 12 gości