thermalfake
Ostatni Mohikanin
Liczba postów: 13.580
|
RE: Prośba o zanalizowanie BSOD-ów - prawdopodobnie powodujących problemy z dyskiem
Więc po kolei
Minidump zgłasza (z zapisanego kontekstu) iż sterownik nvidia nvlddmkm.sys dokonał zakleszczenia (lock) w systemie. Czy jest to winą tylko samego sterownika czy karta nie wiadomo.
8e5274d8 96a970d9 87052000 8700f350 00000000 nvlddmkm+0xa950ae
8e527658 82da37c2 8700f350 87052000 c000035f nvlddmkm+0xa960d9
Radzę usunąć całość pakietu sterowników nvidii przy pomocy Driver Sweeper, restart i zainstalować świeże. Potem wyjąć grafikę, poczyścić ją, przesmarować i pooglądać elementy. W końcowej fazie puszczamy do testów Furmark -> http://windows7forum.pl/testowanie-kart-...da-13438-t
Zrzut błędu jest częściowo uszkodzony
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
Z listy załadowanych modułów do zaktualizowania
Cytat:95394000 953a3000 Rtnicxp Rtnicxp.sys Fri May 30 17:12:11 2008 (4840194B) -> karta sieciowa
953a3000 953c2000 HDAudBus HDAudBus.sys Tue Jul 14 01:50:55 2009 (4A5BC85F) -> audio
92419000 92459000 dtsoftbus01 dtsoftbus01.sys Fri Jan 13 14:45:57 2012 (4F103595) -> tutaj wiele osób analizujacych bsody każe wywalić Daemon Tools'a razem z stpd.sys
83964000 83989000 nvstor32 nvstor32.sys Tue Aug 19 03:53:17 2008 (48AA278D) -> chipset nvidia nforce
Jak już chcesz robić kompleksową diagnostykę w tym uczepiony hdd, przetestuj pamięć RAM programem memtest86.
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [G: \Downloads\080612-35334-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16988.x86fre.win7_gdr.120401-1505
Machine Name:
Kernel base = 0x82c00000 PsLoadedModuleList = 0x82d48810
Debug session time: Mon Aug 6 15: 04: 35.454 2012 (UTC + 2: 00)
System Uptime: 0 days 0: 00: 19.921
Loading Kernel Symbols
...............................................................
................................
Loading User Symbols
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 0, 8e5272c0, 8e526ea0}
Probably caused by : nvlddmkm.sys ( nvlddmkm+a950ae )
Followup: MachineOwner
---------
0: kd> !analyze -v;r;kv;lmtn;.bugcheck;!sysinfo cpuinfo;!sysinfo machineid; !sysinfo cpuspeed; !sysinfo smbios
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 00000000, The address that the exception occurred at
Arg3: 8e5272c0, Exception Record Address
Arg4: 8e526ea0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
+19
00000000 ? ?
EXCEPTION_RECORD: 8e5272c0 -- (.exr 0xffffffff8e5272c0)
ExceptionAddress: 00000000
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000008
Parameter[1]: 00000000
Attempt to execute non-executable address 00000000
CONTEXT: 8e526ea0 -- (.cxr 0xffffffff8e526ea0)
eax=8d38d748 ebx=96a47148 ecx=8e5273d4 edx=746c6644 esi=00000100 edi=8704c0d8
eip=00000000 esp=8e527388 ebp=8e5274d8 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
00000000 ? ?
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
EXCEPTION_PARAMETER1: 00000008
EXCEPTION_PARAMETER2: 00000000
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82d68718
Unable to read MiSystemVaType memory at 82d48160
00000000
FOLLOWUP_IP:
nvlddmkm+a950ae
96a960ae ? ?
FAILED_INSTRUCTION_ADDRESS:
+5da62faf01e6d844
00000000 ? ?
BUGCHECK_STR: 0x7E
LOCK_ADDRESS: 82d65f60 -- (!locks 82d65f60)
Resource @ nt!PiEngineLock (0x82d65f60) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0x82d65f60
Thread Count : 0
Thread address: 0x00000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from 96a960ae to 00000000
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
8e527384 96a960ae 00000000 00000000 8e5273d4 0x0
8e5274d8 96a970d9 87052000 8700f350 00000000 nvlddmkm+0xa950ae
8e527658 82da37c2 8700f350 87052000 c000035f nvlddmkm+0xa960d9
8e52783c 82dab081 00000000 00000000 8e527864 nt!IopLoadDriver+0x7ed
8e5278e8 82deff57 954cd4c0 00000001 954cd4ac nt!PipCallDriverAddDeviceQueryRoutine+0x34b
8e527924 82df82a2 8e527a1c 8e527978 954d3000 nt!RtlpCallQueryRegistryRoutine+0x292
8e5279bc 82da81a2 40000000 8000011c 8e527a38 nt!RtlQueryRegistryValues+0x414
8e527a98 82da7910 85abd478 8e527cc8 00000000 nt!PipCallDriverAddDevice+0x383
8e527c94 82d8bac0 85b67518 86f3ae38 8e527cc8 nt!PipProcessDevNodeTree+0x15d
8e527cd4 82c13f9c 86f3ae38 82d63e80 85b6bd48 nt!PiProcessStartSystemDevices+0x6d
8e527d00 82c6e07b 00000000 00000000 85b6bd48 nt!PnpDeviceActionWorker+0x241
8e527d50 82e0ead1 00000001 a2c59411 00000000 nt!ExpWorkerThread+0x10d
8e527d90 82cc0239 82c6df6e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nvlddmkm+a950ae
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4fb2071b
STACK_COMMAND: .cxr 0xffffffff8e526ea0 ; kb
FAILURE_BUCKET_ID: 0x7E_NULL_IP_nvlddmkm+a950ae
BUCKET_ID: 0x7E_NULL_IP_nvlddmkm+a950ae
Followup: MachineOwner
---------
eax=8d38d748 ebx=96a47148 ecx=8e5273d4 edx=746c6644 esi=00000100 edi=8704c0d8
eip=00000000 esp=8e527388 ebp=8e5274d8 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
00000000 ? ?
ChildEBP RetAddr Args to Child
WARNING: Frame IP not in any known module. Following frames may be wrong.
8e527384 96a960ae 00000000 00000000 8e5273d4 0x0
8e5274d8 96a970d9 87052000 8700f350 00000000 nvlddmkm+0xa950ae
8e527658 82da37c2 8700f350 87052000 c000035f nvlddmkm+0xa960d9
8e52783c 82dab081 00000000 00000000 8e527864 nt!IopLoadDriver+0x7ed
8e5278e8 82deff57 954cd4c0 00000001 954cd4ac nt!PipCallDriverAddDeviceQueryRoutine+0x34b
8e527924 82df82a2 8e527a1c 8e527978 954d3000 nt!RtlpCallQueryRegistryRoutine+0x292
8e5279bc 82da81a2 40000000 8000011c 8e527a38 nt!RtlQueryRegistryValues+0x414
8e527a98 82da7910 85abd478 8e527cc8 00000000 nt!PipCallDriverAddDevice+0x383
8e527c94 82d8bac0 85b67518 86f3ae38 8e527cc8 nt!PipProcessDevNodeTree+0x15d
8e527cd4 82c13f9c 86f3ae38 82d63e80 85b6bd48 nt!PiProcessStartSystemDevices+0x6d
8e527d00 82c6e07b 00000000 00000000 85b6bd48 nt!PnpDeviceActionWorker+0x241
8e527d50 82e0ead1 00000001 a2c59411 00000000 nt!ExpWorkerThread+0x10d
8e527d90 82cc0239 82c6df6e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
start end module name
80ba9000 80bb1000 kdcom kdcom.dll Tue Jul 14 03: 08: 58 2009 (4A5BDAAA)
82c00000 83010000 nt ntkrpamp.exe Mon Apr 02 04: 31: 54 2012 (4F790F9A)
83010000 83047000 hal halmacpi.dll Tue Jul 14 01: 11: 03 2009 (4A5BBF07)
83217000 83222000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 01: 13: 13 2009 (4A5BBF89)
83222000 83233000 PSHED PSHED.dll Tue Jul 14 03: 09: 36 2009 (4A5BDAD0)
83233000 8323b000 BOOTVID BOOTVID.dll Tue Jul 14 03: 04: 34 2009 (4A5BD9A2)
8323b000 8327d000 CLFS CLFS.SYS Tue Jul 14 01: 11: 10 2009 (4A5BBF0E)
8327d000 83328000 CI CI.dll Tue Jul 14 03: 09: 28 2009 (4A5BDAC8)
83328000 83399000 Wdf01000 Wdf01000.sys Tue Jul 14 01: 11: 36 2009 (4A5BBF28)
83399000 833a7000 WDFLDR WDFLDR.SYS Tue Jul 14 01: 11: 25 2009 (4A5BBF1D)
833a7000 833ef000 ACPI ACPI.sys Tue Jul 14 01: 11: 11 2009 (4A5BBF0F)
833ef000 833f8000 WMILIB WMILIB.SYS Tue Jul 14 01: 11: 22 2009 (4A5BBF1A)
833f8000 83400000 msisadrv msisadrv.sys Tue Jul 14 01: 11: 09 2009 (4A5BBF0D)
83800000 8382a000 pci pci.sys Tue Jul 14 01: 11: 16 2009 (4A5BBF14)
8382a000 83835000 vdrvroot vdrvroot.sys Tue Jul 14 01: 46: 19 2009 (4A5BC74B)
83835000 83846000 partmgr partmgr.sys Sat Mar 17 06: 01: 13 2012 (4F641A99)
83846000 83856000 volmgr volmgr.sys Tue Jul 14 01: 11: 25 2009 (4A5BBF1D)
83856000 838a1000 volmgrx volmgrx.sys Tue Jul 14 01: 11: 41 2009 (4A5BBF2D)
838a1000 838a8000 pciide pciide.sys Tue Jul 14 01: 11: 19 2009 (4A5BBF17)
838a8000 838b6000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 11: 15 2009 (4A5BBF13)
838b6000 838cc000 mountmgr mountmgr.sys Tue Jul 14 01: 11: 27 2009 (4A5BBF1F)
838cc000 838d5000 atapi atapi.sys Tue Jul 14 01: 11: 15 2009 (4A5BBF13)
838d5000 838f8000 ataport ataport.SYS Tue Jul 14 01: 11: 18 2009 (4A5BBF16)
838f8000 8391d000 nvstor nvstor.sys Fri Mar 19 21: 51: 52 2010 (4BA3E3E8)
8391d000 83964000 storport storport.sys Fri Mar 11 05: 02: 49 2011 (4D799EE9)
83964000 83989000 nvstor32 nvstor32.sys Tue Aug 19 03: 53: 17 2008 (48AA278D)
83989000 83992000 amdxata amdxata.sys Fri Mar 19 17: 19: 01 2010 (4BA3A3F5)
83992000 8399e7c0 AFS AFS.sys Tue Feb 26 00: 04: 47 2002 (3C7AC30F)
8399f000 839d3000 fltmgr fltmgr.sys Tue Jul 14 01: 11: 13 2009 (4A5BBF11)
839d3000 839e4000 fileinfo fileinfo.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
83a00000 83a0e000 pcw pcw.sys Tue Jul 14 01: 11: 10 2009 (4A5BBF0E)
83a0e000 83a17000 Fs_Rec Fs_Rec.sys Thu Mar 01 04: 29: 01 2012 (4F4EECFD)
83a36000 83b65000 Ntfs Ntfs.sys Fri Mar 11 04: 29: 11 2011 (4D799707)
83b65000 83b90000 msrpc msrpc.sys Tue Jul 14 01: 11: 59 2009 (4A5BBF3F)
83b90000 83ba3000 ksecdd ksecdd.sys Sat Jun 02 04: 34: 22 2012 (4FC97BAE)
83ba3000 83c00000 cng cng.sys Sat Jun 02 04: 56: 24 2012 (4FC980D8)
8c600000 8c611000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 12: 47 2009 (4A5BBF6F)
8c611000 8c621000 termdd termdd.sys Tue Jul 14 02: 01: 35 2009 (4A5BCADF)
8c632000 8c6e9000 ndis ndis.sys Tue Jul 14 01: 12: 24 2009 (4A5BBF58)
8c6e9000 8c727000 NETIO NETIO.SYS Tue Jul 14 01: 12: 35 2009 (4A5BBF63)
8c727000 8c74c000 ksecpkg ksecpkg.sys Sat Jun 02 04: 57: 18 2012 (4FC9810E)
8c74c000 8c779000 rdyboost rdyboost.sys Tue Jul 14 01: 22: 02 2009 (4A5BC19A)
8c779000 8c7ab000 fvevol fvevol.sys Sat Sep 26 04: 24: 21 2009 (4ABD7B55)
8c7ab000 8c7d0000 CLASSPNP CLASSPNP.SYS Tue Jul 14 01: 11: 20 2009 (4A5BBF18)
8c7d0000 8c7da000 dump_diskdump dump_diskdump.sys Fri Apr 22 19: 51: 00 2011 (4DB1C004)
8c7da000 8c7ff000 dump_nvstor32 dump_nvstor32.sys Tue Aug 19 03: 53: 17 2008 (48AA278D)
8c800000 8c811000 disk disk.sys Tue Jul 14 01: 11: 28 2009 (4A5BBF20)
8c817000 8c961000 tcpip tcpip.sys Fri Mar 30 10: 12: 47 2012 (4F756AFF)
8c961000 8c992000 fwpkclnt fwpkclnt.sys Tue Jul 14 01: 12: 03 2009 (4A5BBF43)
8c992000 8c9d1000 volsnap volsnap.sys Tue Jul 14 01: 11: 34 2009 (4A5BBF26)
8c9d1000 8c9d9000 spldr spldr.sys Mon May 11 18: 13: 47 2009 (4A084EBB)
8c9d9000 8c9e9000 mup mup.sys Tue Jul 14 01: 14: 14 2009 (4A5BBFC6)
8c9e9000 8c9f1000 hwpolicy hwpolicy.sys Tue Jul 14 01: 11: 01 2009 (4A5BBF05)
8c9f1000 8c9fe000 crashdmp crashdmp.sys Tue Jul 14 01: 45: 50 2009 (4A5BC72E)
92400000 92413000 wanarp wanarp.sys Tue Jul 14 01: 55: 02 2009 (4A5BC956)
92419000 92459000 dtsoftbus01 dtsoftbus01.sys Fri Jan 13 14: 45: 57 2012 (4F103595)
92459000 92478000 cdrom cdrom.sys Tue Jul 14 01: 11: 24 2009 (4A5BBF1C)
92478000 9247f000 Null Null.SYS Tue Jul 14 01: 11: 12 2009 (4A5BBF10)
9247f000 92486000 Beep Beep.SYS Tue Jul 14 01: 45: 00 2009 (4A5BC6FC)
92486000 92492000 vga vga.sys Tue Jul 14 01: 25: 50 2009 (4A5BC27E)
92492000 924b3000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 25: 49 2009 (4A5BC27D)
924b3000 924c0000 watchdog watchdog.sys Tue Jul 14 01: 24: 10 2009 (4A5BC21A)
924c0000 924c8000 RDPCDD RDPCDD.sys Tue Jul 14 02: 01: 40 2009 (4A5BCAE4)
924c8000 924d0000 rdpencdd rdpencdd.sys Tue Jul 14 02: 01: 39 2009 (4A5BCAE3)
924d0000 924d8000 rdprefmp rdprefmp.sys Tue Jul 14 02: 01: 41 2009 (4A5BCAE5)
924d8000 924e3000 Msfs Msfs.SYS Tue Jul 14 01: 11: 26 2009 (4A5BBF1E)
924e3000 924f1000 Npfs Npfs.SYS Tue Jul 14 01: 11: 31 2009 (4A5BBF23)
924f1000 92508000 tdx tdx.sys Tue Jul 14 01: 12: 10 2009 (4A5BBF4A)
92508000 92513000 TDI TDI.SYS Tue Jul 14 01: 12: 12 2009 (4A5BBF4C)
92513000 92525000 epfwtdi epfwtdi.sys Mon Aug 18 13: 02: 06 2008 (48A956AE)
92525000 9257f000 afd afd.sys Mon Apr 25 04: 35: 37 2011 (4DB4DDF9)
9257f000 925b1000 netbt netbt.sys Tue Jul 14 01: 12: 18 2009 (4A5BBF52)
925b1000 925b8000 wfplwf wfplwf.sys Tue Jul 14 01: 53: 51 2009 (4A5BC90F)
925b8000 925d7000 pacer pacer.sys Tue Jul 14 01: 53: 58 2009 (4A5BC916)
925d7000 925e5000 netbios netbios.sys Tue Jul 14 01: 53: 54 2009 (4A5BC912)
925e5000 925ff000 serial serial.sys Tue Jul 14 01: 45: 33 2009 (4A5BC71D)
95216000 95257000 rdbss rdbss.sys Tue Jul 14 01: 14: 26 2009 (4A5BBFD2)
95257000 95261000 nsiproxy nsiproxy.sys Tue Jul 14 01: 12: 08 2009 (4A5BBF48)
95261000 9526b000 mssmbios mssmbios.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
9526b000 9527a000 easdrv easdrv.sys Mon Aug 18 13: 14: 08 2008 (48A95980)
9527a000 95286000 discache discache.sys Tue Jul 14 01: 24: 04 2009 (4A5BC214)
95286000 9529e000 dfsc dfsc.sys Wed Apr 27 04: 33: 45 2011 (4DB78089)
9529e000 952ac000 blbdrive blbdrive.sys Tue Jul 14 01: 23: 04 2009 (4A5BC1D8)
952ac000 952cd000 tunnel tunnel.sys Tue Jul 14 01: 54: 03 2009 (4A5BC91B)
952cd000 952de000 amdppm amdppm.sys Tue Jul 14 01: 11: 03 2009 (4A5BBF07)
952de000 952e9000 fdc fdc.sys Tue Jul 14 01: 45: 45 2009 (4A5BC729)
952e9000 952f3000 serenum serenum.sys Tue Jul 14 01: 45: 27 2009 (4A5BC717)
952f3000 9530b000 parport parport.sys Tue Jul 14 01: 45: 34 2009 (4A5BC71E)
9530b000 95323000 i8042prt i8042prt.sys Tue Jul 14 01: 11: 23 2009 (4A5BBF1B)
95323000 95330000 kbdclass kbdclass.sys Tue Jul 14 01: 11: 15 2009 (4A5BBF13)
95330000 9533a000 usbohci usbohci.sys Fri Mar 25 04: 06: 11 2011 (4D8C06A3)
9533a000 95385000 USBPORT USBPORT.SYS Fri Mar 25 04: 06: 22 2011 (4D8C06AE)
95385000 95394000 usbehci usbehci.sys Fri Mar 25 04: 06: 12 2011 (4D8C06A4)
95394000 953a3000 Rtnicxp Rtnicxp.sys Fri May 30 17: 12: 11 2008 (4840194B)
953a3000 953c2000 HDAudBus HDAudBus.sys Tue Jul 14 01: 50: 55 2009 (4A5BC85F)
96001000 96af4000 nvlddmkm nvlddmkm.sys Tue May 15 09: 34: 51 2012 (4FB2071B)
Bugcheck code 1000007E
Arguments c0000005 00000000 8e5272c0 8e526ea0
[CPU Information]
~MHz = REG_DWORD 3013
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ x86 Family 16 Model 6 Stepping 2
ProcessorNameString = REG_SZ AMD Athlon(tm) X2 250 Processor
VendorIdentifier = REG_SZ AuthenticAMD
sysinfo: could not find necessary interfaces.
sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
sysinfo: unknown error 80004005
sysinfo: could not find necessary interfaces.
sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
(Ten post był ostatnio modyfikowany: 07.08.2012 15:26 przez thermalfake.)
07.08.2012 14:50
|