Odpowiedz

BSOD: błąd powodowany przez ntoskrnl.exe

 
Kordas
Nowy
Liczba postów: 2
Post: #1

BSOD: błąd powodowany przez ntoskrnl.exe


Witam
Od kilku dni otrzymuję co jakiś czas blue screena, łącznie miałem około 5-6 blue screenów ale tylko raz został wygenerowany minidump i jego załączam. Minidump mówi, że winny jest ntoskrnl.exe.
Miałem problemy z bluescreenami już z miesiąc temu ale po formacie miałem miesiąc spokoju ale niedawno znowu to wróciło. Przedwczoraj znowu zrobiłem formata, ale problem nie ustał. Przetestowałem RAM Memtestem i nie wykrył żadnych błędów. Proszę o pomoc.

Mój sprzęt:
Procesor: AMD Phenom II x4 955
Karta graficzna: MSI GeForce GTX460 Hawk 1GB
RAM: Patriot 2x2GB
Płyta główna: Asus M4A88TD-M
System: Windows 7 Home Premium 64-bit


.zip  minidump.zip (Rozmiar: 26.31 KB / Pobrań: 2)
(Ten post był ostatnio modyfikowany: 09.11.2012 16:25 przez Kordas.)

06.11.2012 20:34

Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
thermalfake
Ostatni Mohikanin

Liczba postów: 13.580
Post: #2

RE: BSOD 0x0000003b ntoskrnl.exe


Proszę na razie tylko wrzutka z debuggera.
Albo masz uwaloną płytę albo jednak pamięci czego memtest86 wcale nie musi wykryć niestety.

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\24\110612-32651-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`0300d000 PsLoadedModuleList = 0xfffff800`03251670
Debug session time:  Tue Nov  6 17: 57: 01.798 2012 (UTC + 1: 00)
System Uptime:  0 days 2: 12: 38.421
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80003083ec5, fffff8800984cf30, 0}

Probably caused by :  ntkrnlmp.exe ( nt!ExpInterlockedPopEntrySListFault16+0 )

Followup:  MachineOwner
---------

1:  kd> !analyze -v;r;kv;lmtn;.bugcheck;!sysinfo cpuinfo;!sysinfo machineid; !sysinfo cpuspeed; !sysinfo smbios
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1:  00000000c0000005, Exception code that caused the bugcheck
Arg2:  fffff80003083ec5, Address of the instruction which caused the bugcheck
Arg3:  fffff8800984cf30, Address of the context record for the exception that caused the bugcheck
Arg4:  0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE:  (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo

FAULTING_IP:  
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`03083ec5 498b08          mov     rcx,qword ptr [r8]

CONTEXT:   fffff8800984cf30 -- (.cxr 0xfffff8800984cf30)
rax=000000034b2b00a4 rbx=ffffffffffffffff rcx=fffff880009e9b80
rdx=7ffffa8003ef9601 rsi=0000000000000005 rdi=0000000000000000
rip=fffff80003083ec5 rsp=fffff8800984d910 rbp=fffff880009e9b80
r8=7ffffa8003ef9600  r9=fffff8000300d000 r10=fffff880009e9b80
r11=fffffa8004e2f060 r12=fffff80003213580 r13=0000000000000000
r14=0000000000000002 r15=0000000053646156
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!ExpInterlockedPopEntrySListFault16:
fffff800`03083ec5 498b08          mov     rcx,qword ptr [r8] ds: 002b: 7ffffa80`03ef9600=???
Resetting default scope

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VISTA_DRIVER_FAULT

BUGCHECK_STR:   0x3B

PROCESS_NAME:   bf3.exe

CURRENT_IRQL:   0

LAST_CONTROL_TRANSFER:   from 0000000000000000 to fffff80003083ec5

STACK_TEXT:  
fffff880`0984d910 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!ExpInterlockedPopEntrySListFault16


FOLLOWUP_IP:  
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`03083ec5 498b08          mov     rcx,qword ptr [r8]

SYMBOL_STACK_INDEX:   0

SYMBOL_NAME:   nt!ExpInterlockedPopEntrySListFault16+0

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  nt

IMAGE_NAME:   ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:   503f82be

STACK_COMMAND:   .cxr 0xfffff8800984cf30 ; kb

FAILURE_BUCKET_ID:   X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0

BUCKET_ID:   X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0

Followup:  MachineOwner
---------

rax=fffff8800984c770 rbx=fffff800031d3638 rcx=000000000000003b
rdx=00000000c0000005 rsi=fffff8000300d000 rdi=0000000000000000
rip=fffff8000308bfc0 rsp=fffff8800984c668 rbp=0000000000000000
r8=fffff80003083ec5  r9=fffff8800984cf30 r10=0000000000000000
r11=fffff8800984c868 r12=fffff8000308b253 r13=fffff80003291e94
r14=fffff8000308ae40 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000282
nt!KeBugCheckEx:
fffff800`0308bfc0 48894c2408      mov     qword ptr [rsp+8],rcx ss: 0018: fffff880`0984c670=000000000000003b
Child-SP          RetAddr           :  Args to Child                                                           :  Call Site
fffff880`0984c668 fffff800`0308b569 :  00000000`0000003b 00000000`c0000005 fffff800`03083ec5 fffff880`0984cf30 :  nt!KeBugCheckEx
fffff880`0984c670 fffff800`0308aebc :  fffff880`0984d6d8 fffff880`0984cf30 00000000`00000000 fffff800`030b6fe0 :  nt!KiBugCheckDispatch+0x69
fffff880`0984c7b0 fffff800`030b6aed :  fffff800`032a6840 00000000`00000000 fffff800`0300d000 fffff880`0984d6d8 :  nt!KiSystemServiceHandler+0x7c
fffff880`0984c7f0 fffff800`030b58c5 :  fffff800`031d3638 fffff880`0984c868 fffff880`0984d6d8 fffff800`0300d000 :  nt!RtlpExecuteHandlerForException+0xd
fffff880`0984c820 fffff800`030c6851 :  fffff880`0984d6d8 fffff880`0984cf30 fffff880`00000000 00000000`00000000 :  nt!RtlDispatchException+0x415
fffff880`0984cf00 fffff800`0308b642 :  fffff880`0984d6d8 ffffffff`ffffffff fffff880`0984d780 00000000`00000005 :  nt!KiDispatchException+0x135
fffff880`0984d5a0 00000000`00000000 :  00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 :  nt!KiExceptionDispatch+0xc2
start             end                 module name
fffff800`00b98000 fffff800`00ba2000   kdcom    kdcom.dll    Sat Feb 05 17: 52: 49 2011 (4D4D8061)
fffff800`0300d000 fffff800`035f5000   nt       ntkrnlmp.exe Thu Aug 30 17: 11: 58 2012 (503F82BE)
fffff800`035f5000 fffff800`0363e000   hal      hal.dll      Sat Nov 20 14: 00: 25 2010 (4CE7C669)
fffff880`00c00000 fffff880`00ca4000   Wdf01000 Wdf01000.sys Tue Jul 14 01: 22: 07 2009 (4A5BC19F)
fffff880`00ca4000 fffff880`00cb3000   WDFLDR   WDFLDR.SYS   Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00cb5000 fffff880`00cc2000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 03: 29: 09 2009 (4A5BDF65)
fffff880`00cc2000 fffff880`00cd6000   PSHED    PSHED.dll    Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00cd6000 fffff880`00d34000   CLFS     CLFS.SYS     Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00d34000 fffff880`00df4000   CI       CI.dll       Sat Nov 20 14: 12: 36 2010 (4CE7C944)
fffff880`00e00000 fffff880`00e2a000   ataport  ataport.SYS  Sat Nov 20 10: 19: 15 2010 (4CE79293)
fffff880`00e2a000 fffff880`00e35000   amdxata  amdxata.sys  Fri Mar 19 17: 18: 18 2010 (4BA3A3CA)
fffff880`00e35000 fffff880`00e69000   avgtdia  avgtdia.sys  Fri Sep 21 03: 25: 33 2012 (505BC20D)
fffff880`00e6d000 fffff880`00ec4000   ACPI     ACPI.sys     Sat Nov 20 10: 19: 16 2010 (4CE79294)
fffff880`00ec4000 fffff880`00ecd000   WMILIB   WMILIB.SYS   Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00ecd000 fffff880`00ed7000   msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`00ed7000 fffff880`00f0a000   pci      pci.sys      Sat Nov 20 10: 19: 11 2010 (4CE7928F)
fffff880`00f0a000 fffff880`00f17000   vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00f17000 fffff880`00f2c000   partmgr  partmgr.sys  Sat Mar 17 06: 06: 09 2012 (4F641BC1)
fffff880`00f2c000 fffff880`00f41000   volmgr   volmgr.sys   Sat Nov 20 10: 19: 28 2010 (4CE792A0)
fffff880`00f41000 fffff880`00f9d000   volmgrx  volmgrx.sys  Sat Nov 20 10: 20: 43 2010 (4CE792EB)
fffff880`00f9d000 fffff880`00fa4000   pciide   pciide.sys   Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`00fa4000 fffff880`00fb4000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`00fb4000 fffff880`00fce000   mountmgr mountmgr.sys Sat Nov 20 10: 19: 21 2010 (4CE79299)
fffff880`00fce000 fffff880`00fd7000   atapi    atapi.sys    Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`01000000 fffff880`01072000   cng      cng.sys      Fri Aug 24 17: 47: 16 2012 (5037A204)
fffff880`01072000 fffff880`010bc000   fwpkclnt fwpkclnt.sys Wed Aug 22 17: 10: 49 2012 (5034F679)
fffff880`010bc000 fffff880`010de000   tdx      tdx.sys      Sat Nov 20 10: 21: 54 2010 (4CE79332)
fffff880`010f1000 fffff880`0113d000   fltmgr   fltmgr.sys   Sat Nov 20 10: 19: 24 2010 (4CE7929C)
fffff880`0113d000 fffff880`01151000   fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`01151000 fffff880`011af000   msrpc    msrpc.sys    Sat Nov 20 10: 21: 56 2010 (4CE79334)
fffff880`011af000 fffff880`011fb000   volsnap  volsnap.sys  Sat Nov 20 10: 20: 08 2010 (4CE792C8)
fffff880`0120a000 fffff880`013ad000   Ntfs     Ntfs.sys     Fri Aug 31 17: 14: 14 2012 (5040D4C6)
fffff880`013ad000 fffff880`013c8000   ksecdd   ksecdd.sys   Sat Jun 02 04: 50: 23 2012 (4FC97F6F)
fffff880`013c8000 fffff880`013d9000   pcw      pcw.sys      Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`013d9000 fffff880`013e3000   Fs_Rec   Fs_Rec.sys   Thu Mar 01 04: 41: 06 2012 (4F4EEFD2)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Wed Aug 22 17: 11: 28 2012 (5034F6A0)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Aug 24 17: 48: 29 2012 (5037A24D)
fffff880`0148b000 fffff880`01493000   spldr    spldr.sys    Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`01493000 fffff880`014a5000   mup      mup.sys      Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`014a5000 fffff880`014ae000   hwpolicy hwpolicy.sys Sat Nov 20 10: 18: 54 2010 (4CE7927E)
fffff880`014ae000 fffff880`014bf000   blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`014c8000 fffff880`015ba000   ndis     ndis.sys     Wed Aug 22 17: 11: 46 2012 (5034F6B2)
fffff880`015ba000 fffff880`015f4000   rdyboost rdyboost.sys Sat Nov 20 10: 43: 10 2010 (4CE7982E)
fffff880`01600000 fffff880`01800000   tcpip    tcpip.sys    Wed Aug 22 17: 13: 43 2012 (5034F727)
fffff880`01800000 fffff880`01807000   Beep     Beep.SYS     Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`01807000 fffff880`01815000   vga      vga.sys      Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`01815000 fffff880`0183a000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`0183a000 fffff880`0184a000   watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`0184a000 fffff880`01853000   RDPCDD   RDPCDD.sys   Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`01853000 fffff880`0185c000   rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`0185c000 fffff880`01865000   rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`01865000 fffff880`01870000   Msfs     Msfs.SYS     Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`01870000 fffff880`01881000   Npfs     Npfs.SYS     Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`01881000 fffff880`0188e000   TDI      TDI.SYS      Sat Nov 20 10: 22: 06 2010 (4CE7933E)
fffff880`0189e000 fffff880`018d8000   fvevol   fvevol.sys   Sat Nov 20 10: 24: 06 2010 (4CE793B6)
fffff880`018d8000 fffff880`018ee000   disk     disk.sys     Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`018ee000 fffff880`0191e000   CLASSPNP CLASSPNP.SYS Sat Nov 20 10: 19: 23 2010 (4CE7929B)
fffff880`0191e000 fffff880`0192a000   avgrkx64 avgrkx64.sys Fri Sep 14 02: 41: 40 2012 (50527D44)
fffff880`0192a000 fffff880`01962000   avgloga  avgloga.sys  Fri Sep 21 03: 23: 51 2012 (505BC1A7)
fffff880`01962000 fffff880`01981000   avgmfx64 avgmfx64.sys Fri Oct 05 03: 00: 13 2012 (506E311D)
fffff880`01981000 fffff880`01993000   avgidsha avgidsha.sys Fri Sep 21 03: 21: 40 2012 (505BC124)
fffff880`019c9000 fffff880`019f3000   cdrom    cdrom.sys    Sat Nov 20 10: 19: 20 2010 (4CE79298)
fffff880`019f3000 fffff880`019fc000   Null     Null.SYS     Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`02c00000 fffff880`02c0f000   discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`02c0f000 fffff880`02c2d000   dfsc     dfsc.sys     Sat Nov 20 10: 26: 31 2010 (4CE79447)
fffff880`02c38000 fffff880`02c7d000   netbt    netbt.sys    Sat Nov 20 10: 23: 18 2010 (4CE79386)
fffff880`02c7d000 fffff880`02d06000   afd      afd.sys      Wed Dec 28 04: 59: 20 2011 (4EFA9418)
fffff880`02d06000 fffff880`02d0f000   wfplwf   wfplwf.sys   Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`02d0f000 fffff880`02d35000   pacer    pacer.sys    Sat Nov 20 11: 52: 18 2010 (4CE7A862)
fffff880`02d35000 fffff880`02d44000   netbios  netbios.sys  Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`02d44000 fffff880`02d61000   serial   serial.sys   Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`02d61000 fffff880`02d7c000   wanarp   wanarp.sys   Sat Nov 20 11: 52: 36 2010 (4CE7A874)
fffff880`02d7c000 fffff880`02d90000   termdd   termdd.sys   Sat Nov 20 12: 03: 40 2010 (4CE7AB0C)
fffff880`02d90000 fffff880`02de1000   rdbss    rdbss.sys    Sat Nov 20 10: 27: 51 2010 (4CE79497)
fffff880`02de1000 fffff880`02ded000   nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`02ded000 fffff880`02df8000   mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`03e00000 fffff880`03e24000   HDAudBus HDAudBus.sys Sat Nov 20 11: 43: 42 2010 (4CE7A65E)
fffff880`03e24000 fffff880`03e54000   nusb3xhc nusb3xhc.sys Fri Jan 22 04: 22: 21 2010 (4B5919ED)
fffff880`03e54000 fffff880`03e55f00   USBD     USBD.SYS     Fri Mar 25 04: 28: 59 2011 (4D8C0BFB)
fffff880`03e56000 fffff880`03e94000   1394ohci 1394ohci.sys Sat Nov 20 11: 44: 56 2010 (4CE7A6A8)
fffff880`03e94000 fffff880`03e9f000   usbohci  usbohci.sys  Fri Mar 25 04: 29: 03 2011 (4D8C0BFF)
fffff880`03e9f000 fffff880`03ea8000   wmiacpi  wmiacpi.sys  Tue Jul 14 01: 31: 02 2009 (4A5BC3B6)
fffff880`03ea8000 fffff880`03f9c000   dxgkrnl  dxgkrnl.sys  Sat Nov 20 10: 50: 50 2010 (4CE799FA)
fffff880`03f9c000 fffff880`03fe2000   dxgmms1  dxgmms1.sys  Sat Nov 20 10: 49: 53 2010 (4CE799C1)
fffff880`03fe2000 fffff880`03ff3000   usbehci  usbehci.sys  Fri Mar 25 04: 29: 04 2011 (4D8C0C00)
fffff880`03ff3000 fffff880`03ffb000   ASACPI   ASACPI.sys   Thu Jul 16 05: 31: 29 2009 (4A5E9F11)
fffff880`03ffb000 fffff880`03ffc480   swenum   swenum.sys   Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`04000000 fffff880`0402f000   ndiswan  ndiswan.sys  Sat Nov 20 11: 52: 32 2010 (4CE7A870)
fffff880`0402f000 fffff880`0404a000   raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`0404a000 fffff880`0406b000   raspptp  raspptp.sys  Sat Nov 20 11: 52: 31 2010 (4CE7A86F)
fffff880`0406b000 fffff880`04085000   rassstp  rassstp.sys  Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`04085000 fffff880`04092000   taphss   taphss.sys   Tue Sep 15 21: 58: 23 2009 (4AAFF1DF)
fffff880`04092000 fffff880`040a1000   kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`040a1000 fffff880`040b0000   mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`040d7000 fffff880`04108000   avgldx64 avgldx64.sys Tue Oct 02 03: 05: 50 2012 (506A3DEE)
fffff880`04108000 fffff880`0413b000   avgidsdrivera avgidsdrivera.sys Thu Sep 13 02: 44: 55 2012 (50512C87)
fffff880`0413b000 fffff880`04141000   AsIO     AsIO.sys     Mon Aug 03 09: 03: 16 2009 (4A768BB4)
fffff880`04141000 fffff880`04167000   tunnel   tunnel.sys   Sat Nov 20 11: 51: 50 2010 (4CE7A846)
fffff880`04167000 fffff880`0417c000   amdppm   amdppm.sys   Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`0417c000 fffff880`0418c000   CompositeBus CompositeBus.sys Sat Nov 20 11: 33: 17 2010 (4CE7A3ED)
fffff880`0418c000 fffff880`041a2000   AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`041a2000 fffff880`041bb000   HssDrv   HssDrv.sys   Thu Sep 02 19: 47: 07 2010 (4C7FE31B)
fffff880`041bb000 fffff880`041df000   rasl2tp  rasl2tp.sys  Sat Nov 20 11: 52: 34 2010 (4CE7A872)
fffff880`041df000 fffff880`041eb000   ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`04802000 fffff880`04845000   ks       ks.sys       Sat Nov 20 11: 33: 23 2010 (4CE7A3F3)
fffff880`04845000 fffff880`04857000   umbus    umbus.sys    Sat Nov 20 11: 44: 37 2010 (4CE7A695)
fffff880`04857000 fffff880`0486f000   nusb3hub nusb3hub.sys Fri Jan 22 04: 22: 18 2010 (4B5919EA)
fffff880`0486f000 fffff880`048c9000   usbhub   usbhub.sys   Fri Mar 25 04: 29: 25 2011 (4D8C0C15)
fffff880`048c9000 fffff880`048de000   NDProxy  NDProxy.SYS  Sat Nov 20 11: 52: 20 2010 (4CE7A864)
fffff880`048de000 fffff880`04910000   nvhda64v nvhda64v.sys Tue Jul 03 17: 25: 04 2012 (4FF30ED0)
fffff880`04910000 fffff880`0494d000   portcls  portcls.sys  Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`0494d000 fffff880`0496f000   drmk     drmk.sys     Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`0496f000 fffff880`04974200   ksthunk  ksthunk.sys  Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`05c80000 fffff880`05eaf800   RTKVHD64 RTKVHD64.sys Wed Mar 17 09: 49: 15 2010 (4BA0978B)
fffff880`05eb0000 fffff880`05ecd000   usbccgp  usbccgp.sys  Fri Mar 25 04: 29: 14 2011 (4D8C0C0A)
fffff880`05ecd000 fffff880`05edb000   hidusb   hidusb.sys   Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`05edb000 fffff880`05ef4000   HIDCLASS HIDCLASS.SYS Sat Nov 20 11: 43: 49 2010 (4CE7A665)
fffff880`05ef4000 fffff880`05efc080   HIDPARSE HIDPARSE.SYS Tue Jul 14 02: 06: 17 2009 (4A5BCBF9)
fffff880`05efd000 fffff880`05f09000   KMWDFILTER KMWDFILTER.sys Wed Apr 29 08: 20: 48 2009 (49F7F1C0)
fffff880`05f09000 fffff880`05f17000   kbdhid   kbdhid.sys   Sat Nov 20 11: 33: 25 2010 (4CE7A3F5)
fffff880`05f17000 fffff880`05f24000   mouhid   mouhid.sys   Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`05f24000 fffff880`05f36100   xusb21   xusb21.sys   Fri Aug 14 00: 10: 17 2009 (4A848F49)
fffff880`05f37000 fffff880`05f45000   crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`05f45000 fffff880`05f51000   dump_dumpata dump_dumpata.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`05f51000 fffff880`05f5a000   dump_atapi dump_atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`05f5a000 fffff880`05f6d000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`05f6d000 fffff880`05f79000   Dxapi    Dxapi.sys    Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`05f79000 fffff880`05f87000   monitor  monitor.sys  Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`05f87000 fffff880`05faa000   luafv    luafv.sys    Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`05faa000 fffff880`05fcb000   WudfPf   WudfPf.sys   Sat Nov 20 11: 42: 44 2010 (4CE7A624)
fffff880`05fcb000 fffff880`05fe0000   lltdio   lltdio.sys   Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`05fe0000 fffff880`05ff8000   rspndr   rspndr.sys   Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`06c00000 fffff880`06c24000   mrxsmb20 mrxsmb20.sys Wed Apr 27 04: 39: 37 2011 (4DB781E9)
fffff880`06c7f000 fffff880`06d48000   HTTP     HTTP.sys     Sat Nov 20 10: 24: 30 2010 (4CE793CE)
fffff880`06d48000 fffff880`06d66000   bowser   bowser.sys   Wed Feb 23 05: 55: 04 2011 (4D649328)
fffff880`06d66000 fffff880`06d7e000   mpsdrv   mpsdrv.sys   Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`06d7e000 fffff880`06dab000   mrxsmb   mrxsmb.sys   Wed Apr 27 04: 40: 38 2011 (4DB78226)
fffff880`06dab000 fffff880`06df9000   mrxsmb10 mrxsmb10.sys Sat Jul 09 04: 46: 28 2011 (4E17C104)
fffff880`07600000 fffff880`07669000   srv2     srv2.sys     Fri Apr 29 05: 05: 46 2011 (4DBA2B0A)
fffff880`076be000 fffff880`07764000   peauth   peauth.sys   Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`07764000 fffff880`0776f000   secdrv   secdrv.SYS   Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`0776f000 fffff880`077a0000   srvnet   srvnet.sys   Fri Apr 29 05: 05: 35 2011 (4DBA2AFF)
fffff880`077a0000 fffff880`077b2000   tcpipreg tcpipreg.sys Sat Nov 20 11: 51: 48 2010 (4CE7A844)
fffff880`078b6000 fffff880`0794e000   srv      srv.sys      Fri Apr 29 05: 06: 06 2011 (4DBA2B1E)
fffff880`079bf000 fffff880`079ca000   asyncmac asyncmac.sys Tue Jul 14 02: 10: 13 2009 (4A5BCCE5)
fffff880`079ca000 fffff880`079e7000   cdfs     cdfs.sys     Tue Jul 14 01: 19: 46 2009 (4A5BC112)
fffff880`13000000 fffff880`13056000   USBPORT  USBPORT.SYS  Fri Mar 25 04: 29: 12 2011 (4D8C0C08)
fffff880`13056000 fffff880`13073000   parport  parport.sys  Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`13073000 fffff880`1307f000   serenum  serenum.sys  Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`13087000 fffff880`13d7b000   nvlddmkm nvlddmkm.sys Tue Oct 02 20: 21: 13 2012 (506B3099)
fffff880`13d7b000 fffff880`13e00000   Rt64win7 Rt64win7.sys Fri Jun 10 08: 33: 15 2011 (4DF1BAAB)
fffff960`000c0000 fffff960`003d5000   win32k   win32k.sys   Wed Jul 18 20: 14: 37 2012 (5006FD0D)
fffff960`004e0000 fffff960`004ea000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff960`00710000 fffff960`00737000   cdd      cdd.dll      Sat Nov 20 13: 55: 34 2010 (4CE7C546)
fffff960`008a0000 fffff960`00901000   ATMFD    ATMFD.DLL    Sat Feb 19 10: 00: 32 2011 (4D5F86B0)

Unloaded modules:
fffff880`0794e000 fffff880`079bf000   spsys.sys
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   00071000
fffff880`01993000 fffff880`019a1000   crashdmp.sys
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0000E000
fffff880`019a1000 fffff880`019ad000   dump_ataport
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   0000C000
fffff880`019ad000 fffff880`019b6000   dump_atapi.s
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   00009000
fffff880`019b6000 fffff880`019c9000   dump_dumpfve
    Timestamp:  unavailable (00000000)
    Checksum:   00000000
    ImageSize:   00013000
Bugcheck code 0000003B
Arguments 00000000`c0000005 fffff800`03083ec5 fffff880`0984cf30 00000000`00000000
[CPU Information]
~MHz = REG_DWORD 3214
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 16 Model 4 Stepping 3
ProcessorNameString = REG_SZ AMD Phenom(tm) II X4 955 Processor
VendorIdentifier = REG_SZ AuthenticAMD
Machine ID Information [From Smbios 2.5, DMIVersion 0, Size=2498]
BiosMajorRelease = 8
BiosMinorRelease = 15
BiosVendor = American Megatrends Inc.
BiosVersion = 1704  
BiosReleaseDate = 05/27/2011
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To Be Filled By O.E.M.
SystemVersion = System Version
SystemSKU = To Be Filled By O.E.M.
BaseBoardManufacturer = ASUSTeK Computer INC.
BaseBoardProduct = M4A88TD-M EVO
BaseBoardVersion = Rev X.0x
sysinfo:  unknown error 80004005
[SMBIOS Data Tables v2.5]
[DMI Version - 0]
[2.0 Calling Convention - No]
[Table Size - 2498 bytes]

[BIOS Information (Type 0) - Length 24 - Handle 0000h]
  Vendor                        American Megatrends Inc.
  BIOS Version                  1704  
  BIOS Starting Address Segment f000
  BIOS Release Date             05/27/2011
  BIOS ROM Size                 200000
  BIOS Characteristics
       04:  - ISA Supported
       07:  - PCI Supported
       09:  - Plug and Play Supported
       10:  - APM Supported
       11:  - Upgradeable FLASH BIOS
       12:  - BIOS Shadowing Supported
       14:  - ESCD Supported
       15:  - CD-Boot Supported
       16:  - Selectable Boot Supported
       17:  - BIOS ROM Socketed
       19:  - EDD Supported
       23:  - 1.2MB Floppy Supported
       24:  - 720KB Floppy Supported
       25:  - 2.88MB Floppy Supported
       26:  - Print Screen Device Supported
       27:  - Keyboard Services Supported
       28:  - Serial Services Supported
       29:  - Printer Services Supported
       30:  - CGA/Mono Services Supported
       32:  - BIOS Vendor Reserved
  BIOS Characteristic Extensions
       00:  - ACPI Supported
       01:  - USB Legacy Supported
       04:  - LS120-Boot Supported
       05:  - ATAPI ZIP-Boot Supported
       08:  - BIOS Boot Specification Supported
       10:  - Specification Reserved
  BIOS Major Revision           8
  BIOS Minor Revision           15
  EC Firmware Major Revision    255
  EC Firmware Minor Revision    255
[System Information (Type 1) - Length 27 - Handle 0001h]
  Manufacturer                  System manufacturer
  Product Name                  System Product Name
  Version                       System Version
  Serial Number                                    
  UUID                          00000000-0000-0000-0000-000000000000
  Wakeup Type                   Power Switch
  SKUNumber                     To Be Filled By O.E.M.
  Family                        To Be Filled By O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
  Manufacturer                  ASUSTeK Computer INC.
  Product                       M4A88TD-M EVO
  Version                       Rev X.0x
  Serial Number                                
  Asset Tag                                          
  Feature Flags                 09h
       1766604148:  - °c'
       1766604108:  - °c'
  Location                      To Be Filled By O.E.M.
  Chassis Handle                0003h
  Board Type                    0ah - Processor/Memory Module
  Number of Child Handles       0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
  Manufacturer                  Chassis Manufacture
  Chassis Type                  Desktop
  Version                       Chassis Version
  Serial Number                                      
  Asset Tag Number                              
  Bootup State                  Safe
  Power Supply State            Safe
  Thermal State                 Safe
  Security Status               None
  OEM Defined                   1
  Height                        0U
  Number of Power Cords         1
  Number of Contained Elements  0
  Contained Element Size        0
[Processor Information (Type 4) - Length 40 - Handle 0004h]
  Socket Designation            AM3
  Processor Type                Central Processor
  Processor Family              ech - Specification Reserved
  Processor Manufacturer        AMD              
  Processor ID                  430f1000fffb8b17
  Processor Version             AMD Phenom(tm) II X4 955 Processor                  
  Processor Voltage             8fh - 1.5V
  External Clock                200MHz
  Max Speed                     3200MHz
  Current Speed                 3200MHz
  Status                        Enabled Populated
  Processor Upgrade             Other
  L1 Cache Handle               0005h
  L2 Cache Handle               0006h
  L3 Cache Handle               0007h
  Serial Number                                      
  Asset Tag Number                                    
  Part Number                   To Be Filled By O.E.M.
[Cache Information (Type 7) - Length 19 - Handle 0005h]
  Socket Designation            L1-Cache
  Cache Configuration           0280h - Varies Enabled Int NonSocketed L1
  Maximum Cache Size            0200h - 512K
  Installed Size                0200h - 512K
  Supported SRAM Type           0010h - Pipeline-Burst
  Current SRAM Type             0010h - Pipeline-Burst
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Specification Reserved
  Associativity                 4-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
  Socket Designation            L2-Cache
  Cache Configuration           0281h - Varies Enabled Int NonSocketed L2
  Maximum Cache Size            0800h - 2048K
  Installed Size                0800h - 2048K
  Supported SRAM Type           0010h - Pipeline-Burst
  Current SRAM Type             0010h - Pipeline-Burst
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Specification Reserved
  Associativity                 4-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0007h]
  Socket Designation            L3-Cache
  Cache Configuration           0282h - Varies Enabled Int NonSocketed L3
  Maximum Cache Size            1800h - 6144K
  Installed Size                1800h - 6144K
  Supported SRAM Type           0010h - Pipeline-Burst
  Current SRAM Type             0010h - Pipeline-Burst
  Cache Speed                   0ns
  Error Correction Type         Multi-Bit ECC
  System Cache Type             Specification Reserved
  Associativity                 4-way Set-Associative
[Onboard Devices Information (Type 10) - Length 6 - Handle 0031h]
  Number of Devices             1
  01:  Type                      Video [enabled]
  01:  Description                 ATI
[Onboard Devices Information (Type 10) - Length 6 - Handle 0032h]
  Number of Devices             1
  01:  Type                      Ethernet [enabled]
  01:  Description               To Be Filled By O.E.M.
[Onboard Devices Information (Type 10) - Length 6 - Handle 0033h]
  Number of Devices             1
  01:  Type                      Sound [enabled]
  01:  Description               To Be Filled By O.E.M.
[Onboard Devices Information (Type 10) - Length 6 - Handle 0034h]
  Number of Devices             1
  01:  Type                      Other [enabled]
  01:  Description               To Be Filled By O.E.M.
[OEM Strings (Type 11) - Length 5 - Handle 0035h]
  Number of Strings             4
   1                            20CF300F4322
   2                            To Be Filled By O.E.M.
   3                            To Be Filled By O.E.M.
   4                            To Be Filled By O.E.M.
[Physical Memory Array (Type 16) - Length 15 - Handle 0038h]
  Location                      03h - SystemBoard/Motherboard
  Use                           03h - System Memory
  Memory Error Correction       03h - None
  Maximum Capacity              16777216KB
  Memory Error Inf Handle       [Not Provided]
  Number of Memory Devices      4
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 0039h]
  Starting Address              00000000h
  Ending Address                004bffffh
  Memory Array Handle           0038h
  Partition Width               01
[Memory Device (Type 17) - Length 27 - Handle 003ah]
  Physical Memory Array Handle  0038h
  Memory Error Info Handle      [Not Provided]
  Total Width                   [Unknown]
  Data Width                    [Unknown]
  Size                          [Not Populated]
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM0
  Bank Locator                  BANK0
  Memory Type                   02h - Unknown
  Type Detail                   0000h -
  Speed                         0MHz
  Manufacturer                  Manufacturer0
  Serial Number                        
  Asset Tag Number                          
  Part Number                   PartNum0
[Memory Device (Type 17) - Length 27 - Handle 003ch]
  Physical Memory Array Handle  0038h
  Memory Error Info Handle      [Not Provided]
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          2048MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM1
  Bank Locator                  BANK1
  Memory Type                   01h - Other
  Type Detail                   0080h - Synchronous
  Speed                         1333MHz
  Manufacturer                  Manufacturer1
  Serial Number                        
  Asset Tag Number                          
  Part Number                   PartNum1
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 003dh]
  Starting Address              00000000h
  Ending Address                001fffffh
  Memory Device Handle          003ch
  Mem Array Mapped Adr Handle   0039h
  Partition Row Position        01
  Interleave Position           [None]
  Interleave Data Depth         [None]
[Memory Device (Type 17) - Length 27 - Handle 003eh]
  Physical Memory Array Handle  0038h
  Memory Error Info Handle      [Not Provided]
  Total Width                   [Unknown]
  Data Width                    [Unknown]
  Size                          [Not Populated]
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM2
  Bank Locator                  BANK2
  Memory Type                   02h - Unknown
  Type Detail                   0000h -
  Speed                         0MHz
  Manufacturer                  Manufacturer2
  Serial Number                        
  Asset Tag Number                          
  Part Number                   PartNum2
[Memory Device (Type 17) - Length 27 - Handle 0040h]
  Physical Memory Array Handle  0038h
  Memory Error Info Handle      [Not Provided]
  Total Width                   64 bits
  Data Width                    64 bits
  Size                          2048MB
  Form Factor                   09h - DIMM
  Device Set                    [None]
  Device Locator                DIMM3
  Bank Locator                  BANK3
  Memory Type                   01h - Other
  Type Detail                   0080h - Synchronous
  Speed                         1333MHz
  Manufacturer                  Manufacturer3
  Serial Number                        
  Asset Tag Number                          
  Part Number                   PartNum3
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0041h]
  Starting Address              00200000h
  Ending Address                003fffffh
  Memory Device Handle          0040h
  Mem Array Mapped Adr Handle   0039h
  Partition Row Position        01
  Interleave Position           [None]
  Interleave Data Depth         [None]
1:  kd> ln fffff80003083ec5
(fffff800`03083ec5)   nt!ExpInterlockedPopEntrySListFault16   |  (fffff800`03083ed0)   nt!ExpInterlockedPopEntrySListEnd16
Exact matches:
    nt!ExpInterlockedPopEntrySListFault16 = <no type information>

[Obrazek: 2089620800_1406976151.png]

W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.

06.11.2012 21:31

Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
Kordas
Nowy
Liczba postów: 2
Post: #3

RE: BSOD ntoskrnl.exe


RAM był wymieniany podczas poprzedniej plagi blue screenów, więc wątpie, ale może faktycznie to płyta głowna... Bluescreeny czasem potrafią się pojawiać jeden za drugim, ale wczoraj grałem przez 3 godziny i nic się nie działo... Windows wygenerował 2 minidumpy z innymi błędami, które załączam, może to pomoże w doprecyzowaniu?


.zip  Minidump2.zip (Rozmiar: 26.99 KB / Pobrań: 1)

11.11.2012 14:32

Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
thermalfake
Ostatni Mohikanin

Liczba postów: 13.580
Post: #4

RE: BSOD ntoskrnl.exe


Jeden zrzut jest uszkodzony, drugi wskazuje na problemy z pamięcią a błąd został zgłoszony przez plik systemowy.

Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C: \Users\user\Desktop\bsody\26\110912-32807-01.dmp]
Mini Kernel Dump File:  Only registers and stack trace are available

Symbol search path is:  symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:  
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product:  WinNt, suite:  TerminalServer SingleUserTS Personal
Built by:  7601.17944.amd64fre.win7sp1_gdr.120830-0333
Machine Name:
Kernel base = 0xfffff800`03049000 PsLoadedModuleList = 0xfffff800`0328d670
Debug session time:  Thu Nov  8 23: 20: 44.255 2012 (UTC + 1: 00)
System Uptime:  0 days 2: 46: 02.894
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C1, {fffff9806b66af00, fffff9806b66a247, b3c100, 23}

Unable to load image avgmfx64.sys, Win32 error 0n2
*** WARNING:  Unable to verify timestamp for avgmfx64.sys
*** ERROR:  Module load completed but symbols could not be loaded for avgmfx64.sys
Probably caused by :  luafv.sys ( luafv!LuafvNormalizeNameComponentEx+162 )

Followup:  MachineOwner
---------

1:  kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption.  Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1:  fffff9806b66af00, address trying to free
Arg2:  fffff9806b66a247, address where bits are corrupted
Arg3:  0000000000b3c100, (reserved)
Arg4:  0000000000000023, caller is freeing an address where nearby bytes within the same page have been corrupted

Debugging Details:
------------------


BUGCHECK_STR:   0xC1_23

SPECIAL_POOL_CORRUPTION_TYPE:   23

CUSTOMER_CRASH_COUNT:   1

DEFAULT_BUCKET_ID:   VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:   mscorsvw.exe

CURRENT_IRQL:   0

LAST_CONTROL_TRANSFER:   from fffff8000314e36a to fffff800030c7fc0

STACK_TEXT:  
fffff880`092d9918 fffff800`0314e36a :  00000000`000000c1 fffff980`6b66af00 fffff980`6b66a247 00000000`00b3c100 :  nt!KeBugCheckEx
fffff880`092d9920 fffff800`031c6fb3 :  00000000`00000006 fffff800`03182c8b fffff980`03e94af0 fffffa80`07d94ee0 :  nt!MiCheckSpecialPoolSlop+0x9a
fffff880`092d9960 fffff800`031f2975 :  fffff800`03049000 00000000`6d4e6f49 00000000`000f6078 fffffa80`05a80030 :  nt!MmFreeSpecialPool+0x1d3
fffff880`092d9aa0 fffff800`033bff78 :  fffff980`4ae0af20 00000000`00000001 fffffa80`05a80030 fffff980`051d8fa0 :  nt!ExDeferredFreePool+0xf6d
fffff880`092d9b50 fffff800`030d11d4 :  fffff980`000c4b30 fffff980`25480b30 fffff980`005ccf30 fffff980`00272f90 :  nt!IopDeleteFile+0x168
fffff880`092d9be0 fffff800`033baae4 :  fffff980`25480b30 00000000`00000000 fffff980`4dfd0b50 00000000`00000000 :  nt!ObfDereferenceObject+0xd4
fffff880`092d9c40 fffff800`033bb094 :  00000000`00002144 fffff980`25480b30 fffff980`00272f90 00000000`00002144 :  nt!ObpCloseHandleTableEntry+0xc4
fffff880`092d9cd0 fffff800`030c7253 :  fffff980`4dfd0b50 fffff880`092d9da0 00000000`00000020 00000000`00000000 :  nt!ObpCloseHandle+0x94
fffff880`092d9d20 fffff800`030c3810 :  fffff880`05f56d8e 00000000`00000000 00000000`00000000 00000000`00000020 :  nt!KiSystemServiceCopyEnd+0x13
fffff880`092d9eb8 fffff880`05f56d8e :  00000000`00000000 00000000`00000000 00000000`00000020 fffff800`030a81ba :  nt!KiServiceLinkage
fffff880`092d9ec0 fffff880`00c588c2 :  00000000`0000005b fffffa80`0560bf10 fffff980`4ae0af20 fffff800`0355ff0d :  luafv!LuafvNormalizeNameComponentEx+0x162
fffff880`092d9fc0 fffff880`00c58afe :  00000000`0000fffe fffffa80`0560bf10 00000000`00000000 00000000`00000000 :  fltmgr!FltpCallNormalizeNameComponentHandler+0x82
fffff880`092da020 fffff880`00c59f81 :  00000000`0000006f 00000000`0000006f 00000000`0000005c 00000000`00000000 :  fltmgr!FltpExpandShortNames+0x14e
fffff880`092da080 fffff880`00c59e1e :  fffffa80`0560bf10 00000000`00000000 00000000`00000000 fffffa80`0565f668 :  fltmgr!FltpGetNormalizedFileNameWorker+0xc1
fffff880`092da0c0 fffff880`00c45b9d :  c00000bb`04d1e800 00000000`00000000 fffffa80`07218d90 fffff880`092db000 :  fltmgr!FltpCreateFileNameInformation+0xee
fffff880`092da120 fffff880`00c3fbf6 :  fffffa80`0538f000 fffffa80`072182a0 fffffa80`0565f108 fffff800`030f8696 :  fltmgr!HandleStreamListNotSupported+0x15d
fffff880`092da160 fffff880`00c46b44 :  00000000`00000000 00000000`00000000 fffffa80`072182a0 00000000`00000401 :  fltmgr! ? : FNODOBFM: `string'+0x30f3
fffff880`092da1e0 fffff880`0190e960 :  fffffa80`0560bf10 00000000`00000000 00000000`00000001 00000000`80000000 :  fltmgr!FltGetFileNameInformation+0x184
fffff880`092da270 fffffa80`0560bf10 :  00000000`00000000 00000000`00000001 00000000`80000000 00000000`00000000 :  avgmfx64+0x4960
fffff880`092da278 00000000`00000000 :  00000000`00000001 00000000`80000000 00000000`00000000 fffff800`030f2bcb :  0xfffffa80`0560bf10


STACK_COMMAND:   kb

FOLLOWUP_IP:  
luafv!LuafvNormalizeNameComponentEx+162
fffff880`05f56d8e 4c8d9c24f0000000 lea     r11,[rsp+0F0h]

SYMBOL_STACK_INDEX:   a

SYMBOL_NAME:   luafv!LuafvNormalizeNameComponentEx+162

FOLLOWUP_NAME:   MachineOwner

MODULE_NAME:  luafv

IMAGE_NAME:   luafv.sys

DEBUG_FLR_IMAGE_TIMESTAMP:   4a5bc295

FAILURE_BUCKET_ID:   X64_0xC1_23_VRFK_luafv!LuafvNormalizeNameComponentEx+162

BUCKET_ID:   X64_0xC1_23_VRFK_luafv!LuafvNormalizeNameComponentEx+162

Followup:  MachineOwner
---------

[Obrazek: 2089620800_1406976151.png]

W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.

11.11.2012 17:55

Znajdź wszystkie posty użytkownika
Odpowiedz cytując ten post
Odpowiedz

Podobne wątki
Wątek: Autor Odpowiedzi: Wyświetleń: Ostatni post
BSOD Moloch4 0 808 05.07.2019 11:29
Ostatni post: Moloch4
BSOD Windows 7 luzbluzoner 0 1.310 17.12.2016 20:25
Ostatni post: luzbluzoner
Częsty ekrad BSOD kubajed 0 1.236 03.10.2016 17:46
Ostatni post: kubajed
problem z ntoskrnl.exe Arek101 0 1.560 26.05.2016 20:03
Ostatni post: Arek101
Nowa instalacja, 3 BSOD avocado 0 1.328 20.11.2015 09:46
Ostatni post: avocado
Problem windows, blue screen, ntoskrnl.exe ramzilla 0 1.553 18.10.2015 21:26
Ostatni post: ramzilla
« Starszy wątek | Nowszy wątek »

Temat został oceniony na 0 w skali 1-5 gwiazdek.
Zebrano 1 głosów.