Specyfikacja komputera:
Phenom II X4 3,2 Ghz
M4A87TD/USB3
8GB Goodram Value 1333 mhz
6850 Windforce
Zasilacz OCZ 600W
Windows 7 Home Premium 64 Bit.
Używam Norton Antyvirus oraz Windowsowego Firewalla
(Memtest był zapuszczany przez 9 godzin i nic niestety nie znalazł)
Wrzucam oczywiscie zapis mini dump jaki został zrobiony.
Kod: Zaznacz cały
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - Operacja uko czona pomy lnie.
FAULTING_IP:
+0
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 0
EXCEPTION_RECORD: fffff88002ffdab8 -- (.exr 0xfffff88002ffdab8)
ExceptionAddress: fffff80002e92fc3 (nt!PoIdle+0x0000000000000433)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002ffdb60 -- (.trap 0xfffff88002ffdb60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000a29b9dc2 rbx=0000000000000000 rcx=0000000000000001
rdx=0000028a00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002e92fc3 rsp=fffff88002ffdcf8 rbp=0000000000000000
r8=0000000000000000 r9=00000000002fd827 r10=000000000000fa79
r11=fffff8800b9899b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!PoIdle+0x433:
fffff800`02e92fc3 c3 ret
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e7d2ee to fffff80002e85590
STACK_TEXT:
fffff880`02ffcba8 fffff800`02e7d2ee : 00000000`00000000 00000000`00000000 fffff880`02ffd320 fffff800`02eb2524 : nt!KeBugCheck
fffff880`02ffcbb0 fffff800`02eab2dd : fffff800`03093744 fffff800`02fd4a40 fffff800`02e15000 fffff880`02ffdab8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffcbe0 fffff800`02eb2950 : fffff800`02fd4b0c fffff880`02ffcc58 fffff880`02ffdab8 fffff800`02e15000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffcc10 fffff800`02ebf8cf : fffff880`02ffdab8 fffff880`02ffd320 fffff880`00000000 fffffa80`0adeb560 : nt!RtlDispatchException+0x410
fffff880`02ffd2f0 fffff800`02e84c02 : fffff880`02ffdab8 fffff880`02fd5180 fffff880`02ffdb60 fffffa80`091d5d40 : nt!KiDispatchException+0x16f
fffff880`02ffd980 fffff800`02e8350a : 00000000`00000000 fffffa80`090a2040 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02ffdb60 fffff800`02e92fc3 : 400000c2`400000c1 0000001e`400000c3 00000000`8b32689f 00000000`00000010 : nt!KiGeneralProtectionFault+0x10a
fffff880`02ffdcf8 400000c2`400000c1 : 0000001e`400000c3 00000000`8b32689f 00000000`00000010 00000000`00000212 : nt!PoIdle+0x433
fffff880`02ffdd00 0000001e`400000c3 : 00000000`8b32689f 00000000`00000010 00000000`00000212 fffff880`02ffdd38 : 0x400000c2`400000c1
fffff880`02ffdd08 00000000`8b32689f : 00000000`00000010 00000000`00000212 fffff880`02ffdd38 00000000`00000018 : 0x1e`400000c3
fffff880`02ffdd10 00000000`00000010 : 00000000`00000212 fffff880`02ffdd38 00000000`00000018 fffff880`02ffdd40 : 0x8b32689f
fffff880`02ffdd18 00000000`00000212 : fffff880`02ffdd38 00000000`00000018 fffff880`02ffdd40 fffff800`02e8b842 : 0x10
fffff880`02ffdd20 fffff880`02ffdd38 : 00000000`00000018 fffff880`02ffdd40 fffff800`02e8b842 fffff880`02fd9f40 : 0x212
fffff880`02ffdd28 00000000`00000018 : fffff880`02ffdd40 fffff800`02e8b842 fffff880`02fd9f40 fffffa80`06bae5f0 : 0xfffff880`02ffdd38
fffff880`02ffdd30 fffff880`02ffdd40 : fffff800`02e8b842 fffff880`02fd9f40 fffffa80`06bae5f0 00000000`00000001 : 0x18
fffff880`02ffdd38 fffff800`02e8b842 : fffff880`02fd9f40 fffffa80`06bae5f0 00000000`00000001 00000000`00000000 : 0xfffff880`02ffdd40
fffff880`02ffdd40 fffff800`02e8dd5c : fffff880`02fd5180 fffff880`00000000 00000000`00000000 fffff880`052af588 : nt!SwapContext_PatchXSave+0x9f
fffff880`02ffdd80 00000000`00000000 : fffff880`02ffe000 fffff880`02ff8000 fffff880`02ffdd40 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiKernelCalloutExceptionHandler+e
fffff800`02e7d2ee 90 nop
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KiKernelCalloutExceptionHandler+e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aa44
FAILURE_BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
BUCKET_ID: X64_0x1E_nt!KiKernelCalloutExceptionHandler+e
Followup: MachineOwner