Skan memtestem (2 pass, 0 błędów):
Minidump z 21 października:
Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\Administrator\Desktop\Mini102111-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.101209-1647
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b240
Debug session time: Fri Oct 21 09:26:12.350 2011 (GMT+2)
System Uptime: 0 days 0:00:27.930
Loading Kernel Symbols
...............................................................
.....................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1902fe, f7d22580, f7d2227c, f76d8f04}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 001902fe
Arg2: f7d22580
Arg3: f7d2227c
Arg4: f76d8f04
Debugging Details:
------------------
EXCEPTION_RECORD: f7d22580 -- (.exr 0xfffffffff7d22580)
ExceptionAddress: f76d8f04 (Ntfs!NtfsSetRenameInfo+0x00000b1f)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: f7d2227c -- (.cxr 0xfffffffff7d2227c)
eax=f7d22684 ebx=00000000 ecx=f76d9469 edx=861a8190 esi=861a5d58 edi=e1e5a008
eip=f76d8f04 esp=f7d22648 ebp=f7d22821 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
Ntfs!NtfsSetRenameInfo+0xb1f:
f76d8f04 ff ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x24
PROCESS_NAME: winlogon.exe
ERROR_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
LAST_CONTROL_TRANSFER: from 58f76d86 to f76d8f04
STACK_TEXT:
f7d22821 58f76d86 70861a5d b88615ae 508618d4 Ntfs!NtfsSetRenameInfo+0xb1f
WARNING: Frame IP not in any known module. Following frames may be wrong.
f7d22841 b0000000 b8f7d228 408618d4 0ae1000d 0x58f76d86
f7d22845 b8f7d228 408618d4 0ae1000d 02000000 0xb0000000
f7d22849 408618d4 0ae1000d 02000000 d0000000 0xb8f7d228
f7d2284d 0ae1000d 02000000 d0000000 70e1e5a0 0x408618d4
f7d22851 02000000 d0000000 70e1e5a0 288615ae 0xae1000d
f7d22855 d0000000 70e1e5a0 288615ae 08e1e5a2 0x2000000
f7d22859 70e1e5a0 288615ae 08e1e5a2 01e1e5a0 0xd0000000
f7d2285d 288615ae 08e1e5a2 01e1e5a0 50f7d228 0x70e1e5a0
f7d22861 08e1e5a2 01e1e5a0 50f7d228 00863738 0x288615ae
f7d22865 01e1e5a0 50f7d228 00863738 44000000 0x8e1e5a2
f7d22869 50f7d228 00863738 44000000 44000000 0x1e1e5a0
f7d2286d 00863738 44000000 44000000 ccf7d228 0x50f7d228
f7d22871 44000000 44000000 ccf7d228 ecf7d220 0x863738
f7d22875 44000000 ccf7d228 ecf7d220 5bf7d228 0x44000000
f7d22879 ccf7d228 ecf7d220 5bf7d228 10f76a07 0x44000000
f7d2287d ecf7d220 5bf7d228 10f76a07 00f76b3c 0xccf7d228
f7d22881 5bf7d228 10f76a07 00f76b3c fc000000 0xecf7d220
f7d22885 10f76a07 00f76b3c fc000000 3bf7d228 0x5bf7d228
f7d22889 00f76b3c fc000000 3bf7d228 58f769eb 0x10f76a07
f7d2288d fc000000 3bf7d228 58f769eb b8861a5d 0xf76b3c
f7d22891 3bf7d228 58f769eb b8861a5d 708618d4 0xfc000000
f7d22895 58f769eb b8861a5d 708618d4 088615ae 0x3bf7d228
f7d22899 b8861a5d 708618d4 088615ae b8863916 0x58f769eb
f7d2289d 708618d4 088615ae b8863916 018618d4 0xb8861a5d
f7d228a1 088615ae b8863916 018618d4 4ee60000 0x708618d4
f7d228a5 b8863916 018618d4 4ee60000 00534654 0x88615ae
f7d228a9 018618d4 4ee60000 00534654 00000000 0xb8863916
f7d228ad 4ee60000 00534654 00000000 00000000 0x18618d4
f7d228b1 00534654 00000000 00000000 00000000 0x4ee60000
f7d228b5 00000000 00000000 00000000 58000000 0x534654
CHKIMG_EXTENSION: !chkimg -lo 50 -d !Ntfs
f76d8ef8 - Ntfs!NtfsSetRenameInfo+b13
[ 50:10 ]
1 error : !Ntfs (f76d8ef8)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xfffffffff7d2227c ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Minidump z 22 października:
Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\Administrator\Desktop\Mini102211-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.101209-1647
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b240
Debug session time: Sat Oct 22 10:57:52.101 2011 (GMT+2)
System Uptime: 0 days 0:00:35.691
Loading Kernel Symbols
...............................................................
.................................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000000A, {7ffd4004, ff, 0, 804f4916}
Probably caused by : ntoskrnl.exe ( nt!ExpFindCurrentThread+68 )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 7ffd4004, memory referenced
Arg2: 000000ff, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804f4916, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 7ffd4004
CURRENT_IRQL: ff
FAULTING_IP:
nt!ExpFindCurrentThread+68
804f4916 8b4104 mov eax,dword ptr [ecx+4]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: GoogleUpdate.ex
LAST_CONTROL_TRANSFER: from 804f0c44 to 804f4916
STACK_TEXT:
f3bc9a84 804f0c44 f3bc9aab 863eb238 f3bc9c64 nt!ExpFindCurrentThread+0x68
f3bc9a9c 80564abf 86282720 00000001 f3bc9c48 nt!ExAcquireResourceSharedLite+0x30
f3bc9ab0 80565d16 f3bc9c64 863eb238 e15206b0 nt!SeLockSubjectContext+0x22
f3bc9ad8 80564edd e15206c8 f3bc9c48 00000001 nt!ObCheckObjectAccess+0x54
f3bc9ba4 80564fc4 00000001 862e0be8 e15206c8 nt!ObpIncrementHandleCount+0x305
f3bc9c0c 80570c11 00000001 e15206c8 863eb238 nt!ObpCreateHandle+0x17d
f3bc9cdc 8057127e e15206c8 00000000 00000000 nt!ObOpenObjectByPointer+0xa4
f3bc9d38 8057101e ffffffff 00000008 00000000 nt!NtOpenProcessTokenEx+0x94
f3bc9d50 804de7ec ffffffff 00000008 0012f2a8 nt!NtOpenProcessToken+0x15
f3bc9d50 7c90e514 ffffffff 00000008 0012f2a8 nt!KiFastCallEntry+0xf8
WARNING: Frame IP not in any known module. Following frames may be wrong.
0012f294 00000000 00000000 00000000 00000000 0x7c90e514
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExpFindCurrentThread+68
804f4916 8b4104 mov eax,dword ptr [ecx+4]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExpFindCurrentThread+68
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntoskrnl.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4d00dbda
FAILURE_BUCKET_ID: 0xA_nt!ExpFindCurrentThread+68
BUCKET_ID: 0xA_nt!ExpFindCurrentThread+68
Followup: MachineOwner
---------
Minidump z 23 października:
Kod: Zaznacz cały
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Documents and Settings\Administrator\Desktop\Mini102311-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.101209-1647
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055b240
Debug session time: Sun Oct 23 10:01:38.809 2011 (GMT+2)
System Uptime: 0 days 0:00:27.399
Loading Kernel Symbols
...............................................................
.....................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1902fe, f5bae580, f5bae27c, f76d8f04}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 001902fe
Arg2: f5bae580
Arg3: f5bae27c
Arg4: f76d8f04
Debugging Details:
------------------
EXCEPTION_RECORD: f5bae580 -- (.exr 0xfffffffff5bae580)
ExceptionAddress: f76d8f04 (Ntfs!NtfsSetRenameInfo+0x00000b1f)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: f5bae27c -- (.cxr 0xfffffffff5bae27c)
eax=f5bae684 ebx=00000000 ecx=f76d9469 edx=861a6d28 esi=8617d810 edi=e1ee7008
eip=f76d8f04 esp=f5bae648 ebp=f5bae821 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
Ntfs!NtfsSetRenameInfo+0xb1f:
f76d8f04 ff ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x24
PROCESS_NAME: winlogon.exe
ERROR_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
LAST_CONTROL_TRANSFER: from 10f76d86 to f76d8f04
STACK_TEXT:
f5bae821 10f76d86 b88617d8 08861ee5 508616a0 Ntfs!NtfsSetRenameInfo+0xb1f
WARNING: Frame IP not in any known module. Following frames may be wrong.
f5bae841 b0000000 08f5bae8 408616a0 0ae1000d 0x10f76d86
f5bae845 08f5bae8 408616a0 0ae1000d 02000000 0xb0000000
f5bae849 408616a0 0ae1000d 02000000 d0000000 0x8f5bae8
f5bae84d 0ae1000d 02000000 d0000000 b8e1ee70 0x408616a0
f5bae851 02000000 d0000000 b8e1ee70 28861ee5 0xae1000d
f5bae855 d0000000 b8e1ee70 28861ee5 08e1ee72 0x2000000
f5bae859 b8e1ee70 28861ee5 08e1ee72 01e1ee70 0xd0000000
f5bae85d 28861ee5 08e1ee72 01e1ee70 50f5bae8 0xb8e1ee70
f5bae861 08e1ee72 01e1ee70 50f5bae8 00863738 0x28861ee5
f5bae865 01e1ee70 50f5bae8 00863738 44000000 0x8e1ee72
f5bae869 50f5bae8 00863738 44000000 44000000 0x1e1ee70
f5bae86d 00863738 44000000 44000000 ccf5bae8 0x50f5bae8
f5bae871 44000000 44000000 ccf5bae8 ecf5bae0 0x863738
f5bae875 44000000 ccf5bae8 ecf5bae0 5bf5bae8 0x44000000
f5bae879 ccf5bae8 ecf5bae0 5bf5bae8 10f76a07 0x44000000
f5bae87d ecf5bae0 5bf5bae8 10f76a07 00f76b3c 0xccf5bae8
f5bae881 5bf5bae8 10f76a07 00f76b3c fc000000 0xecf5bae0
f5bae885 10f76a07 00f76b3c fc000000 3bf5bae8 0x5bf5bae8
f5bae889 00f76b3c fc000000 3bf5bae8 10f769eb 0x10f76a07
f5bae88d fc000000 3bf5bae8 10f769eb 088617d8 0xf76b3c
f5bae891 3bf5bae8 10f769eb 088617d8 b88616a0 0xfc000000
f5bae895 10f769eb 088617d8 b88616a0 08861ee5 0x3bf5bae8
f5bae899 088617d8 b88616a0 08861ee5 08863916 0x10f769eb
f5bae89d b88616a0 08861ee5 08863916 018616a0 0x88617d8
f5bae8a1 08861ee5 08863916 018616a0 4e950000 0xb88616a0
f5bae8a5 08863916 018616a0 4e950000 00534654 0x8861ee5
f5bae8a9 018616a0 4e950000 00534654 00000000 0x8863916
f5bae8ad 4e950000 00534654 00000000 00000000 0x18616a0
f5bae8b1 00534654 00000000 00000000 00000000 0x4e950000
f5bae8b5 00000000 00000000 00000000 10000000 0x534654
CHKIMG_EXTENSION: !chkimg -lo 50 -d !Ntfs
f76d8ef8 - Ntfs!NtfsSetRenameInfo+b13
[ 50:10 ]
1 error : !Ntfs (f76d8ef8)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xfffffffff5bae27c ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Mam rozumieć, że Memtest nie wykrywa błędu pamięci, który faktycznie jest
