Dokładniej wygląda to tak, komputer zazwyczaj (choć zdarzają się sporadyczne wyjątki w formie niebieskiego ekraniku raz na dłuższy czas) pracuje dobrze, ale z racji swego bytu, często gdy nastawię mu dłuższa prace wchodzą na TS, nieraz na TS+ gra przez sieć, on sobie pracuje na kilku rdzeniach, a ja na jednym lub dwóch pozostałych i tutaj zaczyna się pojawiać problem, mianowicie nieraz w grze, nieraz do max 10 min po jej wyłączeniu, a nieraz tylko bytując na Team Speaku, lub przy zakończeniu jakiejś dłuższej i bardziej wysilającej operacji pojawia się BSOD.
Wątpię, żeby był to problem związany z ową grą, ale kto wie, lecz sama w sobie nie powinna chyba wywoływać błędy, tylko np sterownik urządzenia, którego używa.
Na dodatek, żeby mu było mało, jak raz padnie, potrafi wyskoczyć następne kilka razy raz zaraz przy początku uruchamiania systemu, a nawet ze 3 razy zresetował mi ustawienia biosu, zerując wszystko, łącznie z datą.
Nieraz nawet zrzutu pamięci nie da rady dokończyć...
W ostatnim czasie nie instalowałem żadnego nowego softu, nie licząc tej gry, próbowałem ją przeinstalować i nic, sama w sobie raczej nie jest szkodliwa.
Łącznie po zainstalowaniu gry mam 10 zrzutów pamięci, pierwszy dzień po zainstalowaniu, czytaj 9, ostatni kilka godzin temu dzisiaj, poprzedni przed zainstalowaniem gry miał miejsce 4 stycznia, więc też nie taki wielki odstęp.
Przykładowe zrzuty pamięci przedstawię na końcu.
Tak więc na start, mam zainstalowane najnowsze sterowniki, oraz aktualizacje do windows 7, jak tylko coś wychodzi, d razu się aktualizuje. Sterowniki do karty graficznej posiadają certyfikat microsoftu i są aktualne, kartę dźwiękową wymontowałem i odinstalowałem sterowniki(na nią padło moje podejrzenie na starcie, jednak jak widać, to nie ona), więc teraz lecę na wbudowanej, sterowniki ściągnięte przez system.
Odnośnie konfiguracji sprzętu(nic nie jest podkręcane etc):
Procek: AMD Phenom II x6, 3.2 GHz
Płyta Asus M4A785T-M
Pamięć: Patriot Viper DDR3 133MHZ, 4 kości po 2GB
Zasilacz: ATX Gambid 600W
Dysk Samsunga SATA 1TB
Robiłem już jeden test pamięci (ponad 6 h, nie wiem ile przebiegów zrobiło, ale na jeden zabierał coś ponad kwadrans), na 2 kościach(od czasu BSODÓW na 2 pracuje, żeby testować właśnie, dzisiaj zapuszczę jeszcze test na 4 na kilka godzin, ten na 2 nie wykazał żadnych błędów.
Zamierzam też zapuścić combofixa, wątpię żeby coś znalazł ale zawsze warto, avast niczego nie wykrył, ale to avast...
Nie wiem czy jest sens, ale mogę przeskanować jeszcze HDD jakimś programem.
Temperatury normalnej pracy są w porządku, nie wiem jak karta graficzna podczas gry, ale mogę sprawdzić jeżeli będzie to pomocne, jednak wytrzymywała o wiele większe obciążenia niż to teraz w przeszłości przy renderowaniu, czy też przy innych grach, w te jednak gram sporadycznie, więc ciężko cokolwiek określić.
A oto zrzuty pamięci, na początek ten z 4 stycznia, dalej losowe po instalacji, wyróżniam, dlatego, ze ten pierwszy jest znacząco inny niż pozostałe:
Kod: Zaznacz cały
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 18, {0, fffffa8007347050, 2, ffffffffffffffff}
*** ERROR: Module load completed but symbols could not be loaded for afd.sys
Probably caused by : afd.sys ( afd+53250 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
REFERENCE_BY_POINTER (18)
Arguments:
Arg1: 0000000000000000, Object type of the object whose reference count is being lowered
Arg2: fffffa8007347050, Object whose reference count is being lowered
Arg3: 0000000000000002, Reserved
Arg4: ffffffffffffffff, Reserved
The reference count of an object is illegal for the current state of the object.
Each time a driver uses a pointer to an object the driver calls a kernel routine
to increment the reference count of the object. When the driver is done with the
pointer the driver calls another kernel routine to decrement the reference count.
Drivers must match calls to the increment and decrement routines. This bugcheck
can occur because an object's reference count goes to zero while there are still
open handles to the object, in which case the fourth parameter indicates the number
of opened handles. It may also occur when the objects reference count drops below zero
whether or not there are open handles to the object, and in that case the fourth parameter
contains the actual value of the pointer references count.
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x18
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 1
LAST_CONTROL_TRANSFER: from fffff80002c21944 to fffff80002c80c40
STACK_TEXT:
fffff880`0880c7c8 fffff800`02c21944 : 00000000`00000018 00000000`00000000 fffffa80`07347050 00000000`00000002 : nt!KeBugCheckEx
fffff880`0880c7d0 fffff880`02ca9250 : ffffffff`ffffffff fffffa80`054e4c28 fffffa80`03d032d0 fffffa80`03d03478 : nt! ?? ::FNODOBFM::`string'+0x49d71
fffff880`0880c830 fffff880`02c97448 : 00000000`00000000 00000000`00000000 fffffa80`054e4cb8 fffff880`0880c940 : afd+0x53250
fffff880`0880c890 fffff880`02c9b524 : fffffa80`054e4cb8 00000000`00000000 fffffa80`03b29350 fffffa80`043754f0 : afd+0x41448
fffff880`0880c8e0 fffff880`02c82ead : fffffa80`0686f790 00000000`00000000 fffffa80`043754f0 00000000`00000000 : afd+0x45524
fffff880`0880c9d0 fffff800`02c742f7 : fffffa80`043754f0 fffffa80`073f3b60 fffffa80`073f3bb0 fffffa80`0686f790 : afd+0x2cead
fffff880`0880ca00 fffff800`02c8613d : fffff880`009b4640 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1c7
fffff880`0880ca80 fffff800`02c8874f : 00000000`0000028c 00000000`fff9b000 fffff880`00000006 00000000`05e7e978 : nt!KiCommitThreadWait+0x3dd
fffff880`0880cb10 fffff800`02f7744e : fffff880`0880cc00 fffffa80`00000006 00000000`00000001 00000000`02196601 : nt!KeWaitForSingleObject+0x19f
fffff880`0880cbb0 fffff800`02c7fed3 : fffffa80`073f3b60 00000000`00000000 fffff880`0880cbf8 fffffa80`06d24830 : nt!NtWaitForSingleObject+0xde
fffff880`0880cc20 00000000`753b2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`05e7e958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x753b2e09
STACK_COMMAND: kb
FOLLOWUP_IP:
afd+53250
fffff880`02ca9250 4c892b mov qword ptr [rbx],r13
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: afd+53250
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4db4dd96
FAILURE_BUCKET_ID: X64_0x18_afd+53250
BUCKET_ID: X64_0x18_afd+53250
Followup: MachineOwner
Późniejsze zrzuty:
Kod: Zaznacz cały
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000096, fffff80002c9b875, fffff8800dd055e0, 0}
Probably caused by : ntkrnlmp.exe ( nt!SwapContext_PatchXSave+74 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000096, Exception code that caused the bugcheck
Arg2: fffff80002c9b875, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800dd055e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {WYJ
FAULTING_IP:
nt!SwapContext_PatchXSave+74
fffff800`02c9b875 0f00d1 lldt cx
CONTEXT: fffff8800dd055e0 -- (.cxr 0xfffff8800dd055e0)
rax=0000000000000000 rbx=fffff80002e0ee80 rcx=0000000000000070
rdx=00000007db95ca3e rsi=fffffa8006be8b60 rdi=fffff80002e1ccc0
rip=fffff80002c9b875 rsp=fffff8800dd05fc0 rbp=0000000000000002
r8=0000000000000000 r9=0000000000000f44 r10=fffff80002c1c000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=fffffa8006faa9c0 r15=fffff80000b96080
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!SwapContext_PatchXSave+0x74:
fffff800`02c9b875 0f00d1 lldt cx
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: plugin-contain
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002c9b4da to fffff80002c9b875
STACK_TEXT:
fffff880`0dd05fc0 fffff800`02c9b4da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext_PatchXSave+0x74
fffff880`0dd06000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapContext+0x7a
FOLLOWUP_IP:
nt!SwapContext_PatchXSave+74
fffff800`02c9b875 0f00d1 lldt cx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!SwapContext_PatchXSave+74
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff8800dd055e0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!SwapContext_PatchXSave+74
BUCKET_ID: X64_0x3B_nt!SwapContext_PatchXSave+74
Followup: MachineOwner
Kod: Zaznacz cały
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000096, Exception code that caused the bugcheck
Arg2: fffff80002cdb875, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff88008af35e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {WYJ
FAULTING_IP:
nt!SwapContext_PatchXSave+74
fffff800`02cdb875 0f00d1 lldt cx
CONTEXT: fffff88008af35e0 -- (.cxr 0xfffff88008af35e0)
rax=0000000000000001 rbx=fffff880009e9180 rcx=0000000000000070
rdx=00000001e48169c8 rsi=fffffa8006d62b60 rdi=fffffa8005c82420
rip=fffff80002cdb875 rsp=fffff88008af3fc0 rbp=fffff88008aaddb0
r8=fffffa8006d62c00 r9=0000000000000009 r10=0000000000000000
r11=fffffa8005c82501 r12=0000000000000000 r13=0000000000000000
r14=fffffa8006ace980 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!SwapContext_PatchXSave+0x74:
fffff800`02cdb875 0f00d1 lldt cx
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: AvastSvc.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002cdb4da to fffff80002cdb875
STACK_TEXT:
fffff880`08af3fc0 fffff800`02cdb4da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext_PatchXSave+0x74
fffff880`08af4000 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapContext+0x7a
FOLLOWUP_IP:
nt!SwapContext_PatchXSave+74
fffff800`02cdb875 0f00d1 lldt cx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!SwapContext_PatchXSave+74
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
STACK_COMMAND: .cxr 0xfffff88008af35e0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!SwapContext_PatchXSave+74
BUCKET_ID: X64_0x3B_nt!SwapContext_PatchXSave+74
Followup: MachineOwner
---------
Kod: Zaznacz cały
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_PORTION_MUST_BE_NONPAGED (d3)
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers marking code or data as pageable when it should be
marked nonpaged.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff9600031ea00, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80002cc1919, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec9100
fffff9600031ea00
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlLookupFunctionEntry+1ce
fffff800`02cc1919 8b048f mov eax,dword ptr [rdi+rcx*4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD3
PROCESS_NAME: dwm.exe
TRAP_FRAME: fffff88008811590 -- (.trap 0xfffff88008811590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000b80 rbx=0000000000000000 rcx=0000000000002280
rdx=0000000000001700 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002cc1919 rsp=fffff88008811720 rbp=000000000001140c
r8=0000000000000b80 r9=0000000000000000 r10=fffff80002c1a000
r11=fffff880088117d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!RtlLookupFunctionEntry+0x1ce:
fffff800`02cc1919 8b048f mov eax,dword ptr [rdi+rcx*4] ds:b000:00000000`00008a00=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c961e9 to fffff80002c96c40
STACK_TEXT:
fffff880`08811448 fffff800`02c961e9 : 00000000`0000000a fffff960`0031ea00 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08811450 fffff800`02c94e60 : fffffa80`061ba098 fffff880`11232e07 fffffa80`04b07010 00000000`0018fcfe : nt!KiBugCheckDispatch+0x69
fffff880`08811590 fffff800`02cc1919 : fffff880`08812648 fffff880`08811ea0 00000000`00000000 fffff880`11ccedec : nt!KiPageFault+0x260
fffff880`08811720 fffff800`02cc0f90 : fffff960`001bfcfe fffff880`088117d8 fffff880`08812648 fffff880`11cba000 : nt!RtlLookupFunctionEntry+0x1ce
fffff880`08811790 fffff800`02cd2361 : fffff880`08812648 fffff880`08811ea0 fffff880`00000000 fffff880`00000004 : nt!RtlDispatchException+0xd0
fffff880`08811e70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x135
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!RtlLookupFunctionEntry+1ce
fffff800`02cc1919 8b048f mov eax,dword ptr [rdi+rcx*4]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!RtlLookupFunctionEntry+1ce
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0xD3_nt!RtlLookupFunctionEntry+1ce
BUCKET_ID: X64_0xD3_nt!RtlLookupFunctionEntry+1ce
Followup: MachineOwner
---------
Kod: Zaznacz cały
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff880010aa717, 0, ffffffffffffffff}
*** ERROR: Symbol file could not be found. Defaulted to export symbols for fltmgr.sys -
Probably caused by : fltmgr.sys ( fltmgr!FltReleasePushLock+7 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880010aa717, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
fltmgr!FltReleasePushLock+7
fffff880`010aa717 488b01 mov rax,qword ptr [rcx]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec2100
ffffffffffffffff
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: AvastSvc.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002cdb588 to fffff80002c8fc40
STACK_TEXT:
fffff880`0631eef8 fffff800`02cdb588 : 00000000`0000001e ffffffff`c0000005 fffff880`010aa717 00000000`00000000 : nt!KeBugCheckEx
fffff880`0631ef00 fffff800`02c8f2c2 : fffff880`0631f6d8 fffffa80`049009e0 fffff880`0631f780 fffffa80`06b40b01 : nt! ?? ::FNODOBFM::`string'+0x4977d
fffff880`0631f5a0 fffff800`02c8dbca : fffff880`0631f780 fffff880`0631f780 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0631f780 fffff880`010aa717 : fffffa80`049009e0 fffffa80`06b40b60 fffffa80`06b40f48 fffffa80`04caed20 : nt!KiGeneralProtectionFault+0x10a
fffff880`0631f918 fffffa80`049009e0 : fffffa80`06b40b01 fffffa80`04900900 fffffa80`06fba010 fffffa80`04a37010 : fltmgr!FltReleasePushLock+0x7
fffff880`0631f948 fffffa80`06b40b01 : fffffa80`04900900 fffffa80`06fba010 fffffa80`04a37010 fffffa80`06fba010 : 0xfffffa80`049009e0
fffff880`0631f950 fffffa80`04900900 : fffffa80`06fba010 fffffa80`04a37010 fffffa80`06fba010 fffffa80`06f3bc30 : 0xfffffa80`06b40b01
fffff880`0631f958 fffffa80`06fba010 : fffffa80`04a37010 fffffa80`06fba010 fffffa80`06f3bc30 ffffffff`ffffffff : 0xfffffa80`04900900
fffff880`0631f960 fffffa80`04a37010 : fffffa80`06fba010 fffffa80`06f3bc30 ffffffff`ffffffff 00000000`00000000 : 0xfffffa80`06fba010
fffff880`0631f968 fffffa80`06fba010 : fffffa80`06f3bc30 ffffffff`ffffffff 00000000`00000000 fffffa80`00000204 : 0xfffffa80`04a37010
fffff880`0631f970 fffffa80`06f3bc30 : ffffffff`ffffffff 00000000`00000000 fffffa80`00000204 fffffa80`06fba010 : 0xfffffa80`06fba010
fffff880`0631f978 ffffffff`ffffffff : 00000000`00000000 fffffa80`00000204 fffffa80`06fba010 fffff800`02cb7bc5 : 0xfffffa80`06f3bc30
fffff880`0631f980 00000000`00000000 : fffffa80`00000204 fffffa80`06fba010 fffff800`02cb7bc5 fffffa80`06fba030 : 0xffffffff`ffffffff
STACK_COMMAND: kb
FOLLOWUP_IP:
fltmgr!FltReleasePushLock+7
fffff880`010aa717 488b01 mov rax,qword ptr [rcx]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: fltmgr!FltReleasePushLock+7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fltmgr
IMAGE_NAME: fltmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7929c
FAILURE_BUCKET_ID: X64_0x1E_fltmgr!FltReleasePushLock+7
BUCKET_ID: X64_0x1E_fltmgr!FltReleasePushLock+7
Followup: MachineOwner
---------
Kod: Zaznacz cały
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {60000002c, 2, 0, fffff80002c72e10}
Probably caused by : ntkrnlmp.exe ( nt!KiInsertQueue+1d0 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000060000002c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002c72e10, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eaf100
000000060000002c
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueue+1d0
fffff800`02c72e10 0fb6472b movzx eax,byte ptr [rdi+2Bh]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff88006348960 -- (.trap 0xfffff88006348960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000006 rbx=0000000000000000 rcx=fffffa8007187100
rdx=fffffa80065445b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c72e10 rsp=fffff88006348af0 rbp=fffffa8007187168
r8=0000000000000000 r9=0000000000000000 r10=fffffa8003a377b0
r11=00000000000f00ff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!KiInsertQueue+0x1d0:
fffff800`02c72e10 0fb6472b movzx eax,byte ptr [rdi+2Bh] ds:018c:00000000`0000002b=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c7c1e9 to fffff80002c7cc40
STACK_TEXT:
fffff880`06348818 fffff800`02c7c1e9 : 00000000`0000000a 00000006`0000002c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06348820 fffff800`02c7ae60 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`06348960 fffff800`02c72e10 : fffff880`00000000 00000000`00000000 00000000`000000a4 fffffa80`07187060 : nt!KiPageFault+0x260
fffff880`06348af0 fffff800`02f65914 : 00000000`00000000 fffffa80`065445b0 00000000`0046ab00 fffff880`00000000 : nt!KiInsertQueue+0x1d0
fffff880`06348b70 fffff800`02c69252 : 00000000`00000000 00000000`00000001 fffffa80`06565060 fffffa80`06565060 : nt!IoSetIoCompletionEx+0x58
fffff880`06348ba0 fffff800`02c7bed3 : fffffa80`06579b60 fffffa80`06565060 fffff880`06348ca0 00000000`0046abf0 : nt!NtReleaseWorkerFactoryWorker+0x196
fffff880`06348c20 00000000`77bf26ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00dff698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bf26ca
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiInsertQueue+1d0
fffff800`02c72e10 0fb6472b movzx eax,byte ptr [rdi+2Bh]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiInsertQueue+1d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0xA_nt!KiInsertQueue+1d0
BUCKET_ID: X64_0xA_nt!KiInsertQueue+1d0
Followup: MachineOwner
---------
Czy ktoś ma jakiekolwiek rady? co z tym ralej robić? lub co może być przyczyną, gdyż sam nei jestem nawet w stanie stwierdzić czy to sterowniki, czy jakaś część.