tomjar
Nowy
Liczba postów: 5
|
BSOD: spowodowany prawdopodobnie anteną WiFi
Witam. Wczoraj formatowałem komputer i od tego momentu co chwile wyskakuje mi bluescreen. Podejrzewam że to przez sterowniki od anteny WIFi Sparklan AD-600z (sterowniki które mam to Atheros AR5007UG Wifi). Wstawię kody błędu. Jeżeli to faktycznie przez te sterowniki/antenę pomógłby mi ktoś z znalezieniem odpowiednich do tej anteny?
Z góry dziękuję za pomoc.
(Ten post był ostatnio modyfikowany: 11.09.2013 21:14 przez tomjar.)
11.09.2013 20:04
|
thermalfake
Ostatni Mohikanin
Liczba postów: 13.580
|
RE: Bluescreen spowodowany prawdopodobnie anteną WiFi- Win 7
Pousuwaj ten śmietnik w poście, w folderze c:\windows\minidump są pliki dmp zrzutów pamięci. Podrzuć spakowane archiwum to sobie przelecę debugerem i powyciągam co potrzebuję.
W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
|
thermalfake
Ostatni Mohikanin
Liczba postów: 13.580
|
RE: Bluescreen spowodowany prawdopodobnie anteną WiFi- Win 7
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
Do sprawdzenia ndis.sys - nie musi być bezpośrednią przyczyną.
Już na pierwszy rzut oka widać brak Service Pack 1. Być może sterownik dla wlan zachowuje się niepoprawnie dla systemu x64 gdyż sterownik na stronie jest opisany dla x86.
Sterownik dla karty sieciowej z odkręcaną anteną - pierwszy link
http://www.sparklan.com/download.php?prod_id=37
Można tez sprawdzić identyfikator urządzenia w managerze urządzeń i poszukać na stronie atheros.cz. PPM na Atheros w managerze, właściwości, zakładka szczegóły.
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\66\090913-16203-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a62000 PsLoadedModuleList = 0xfffff800`02c9fe50
Debug session time: Mon Sep 9 22: 58: 09.360 2013 (UTC + 2: 00)
System Uptime: 0 days 0: 05: 03.000
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff880017031e0, fffff88003185678, fffff88003184ed0}
Probably caused by : ndis.sys ( ndis!memcpy+250 )
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880017031e0, The address that the exception occurred at
Arg3: fffff88003185678, Exception Record Address
Arg4: fffff88003184ed0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
FAULTING_IP:
ndis!memcpy+250
fffff880`017031e0 488b440af8 mov rax,qword ptr [rdx+rcx-8]
EXCEPTION_RECORD: fffff88003185678 -- (.exr 0xfffff88003185678)
ExceptionAddress: fffff880017031e0 (ndis!memcpy+0x0000000000000250)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88003184ed0 -- (.cxr 0xfffff88003184ed0)
rax=000000000000b19d rbx=fffffa8006aa5c90 rcx=fffff88003185c38
rdx=a989d2500f2f09cb rsi=0000000000000208 rdi=0000000000000006
rip=fffff880017031e0 rsp=fffff880031858b8 rbp=fffffa8006aa1a20
r8=0000000000000208 r9=0000000000000010 r10=0000000000000000
r11=fffff88003185a30 r12=0000000000000014 r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
ndis!memcpy+0x250:
fffff880`017031e0 488b440af8 mov rax,qword ptr [rdx+rcx-8] ds: 002b: a989cad0`124765fb=?
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - Instrukcja spod 0x%08lx odwo
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0a0e0
ffffffffffffffff
FOLLOWUP_IP:
ndis!memcpy+250
fffff880`017031e0 488b440af8 mov rax,qword ptr [rdx+rcx-8]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff8800171085e to fffff880017031e0
STACK_TEXT:
fffff880`031858b8 fffff880`0171085e : fffffa80`00001812 fffff880`00000003 fffffa80`06737810 00000000`0000000b : ndis!memcpy+0x250
fffff880`031858c0 fffff880`01710efc : fffffa80`06aa5c90 00000000`00000001 00000000`00000000 00000000`00000000 : ndis!ndisSqmLogDriverVersion+0xae
fffff880`03185c70 fffff800`02ae1161 : fffff880`01710e40 fffff800`02c775f8 fffffa80`04f36040 00000000`00000000 : ndis!ndisSqmTimerWorkerRoutine+0xbc
fffff880`03185cb0 fffff800`02d77166 : 89894c00`0000c881 fffffa80`04f36040 00000000`00000080 fffffa80`04f225f0 : nt!ExpWorkerThread+0x111
fffff880`03185d40 fffff800`02ab2486 : fffff880`02f63180 fffffa80`04f36040 fffff880`02f6df80 00000130`89894c00 : nt!PspSystemThreadStartup+0x5a
fffff880`03185d80 00000000`00000000 : fffff880`03186000 fffff880`03180000 fffff880`03185930 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: ndis!memcpy+250
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ndis
IMAGE_NAME: ndis.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc184
STACK_COMMAND: .cxr 0xfffff88003184ed0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_ndis!memcpy+250
BUCKET_ID: X64_0x7E_ndis!memcpy+250
Followup: MachineOwner
---------
rax=000000000000b19d rbx=fffffa8006aa5c90 rcx=fffff88003185c38
rdx=a989d2500f2f09cb rsi=0000000000000208 rdi=0000000000000006
rip=fffff880017031e0 rsp=fffff880031858b8 rbp=fffffa8006aa1a20
r8=0000000000000208 r9=0000000000000010 r10=0000000000000000
r11=fffff88003185a30 r12=0000000000000014 r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010283
ndis!memcpy+0x250:
fffff880`017031e0 488b440af8 mov rax,qword ptr [rdx+rcx-8] ds: 002b: a989cad0`124765fb=?
Child-SP RetAddr : Args to Child : Call Site
fffff880`031858b8 fffff880`0171085e : fffffa80`00001812 fffff880`00000003 fffffa80`06737810 00000000`0000000b : ndis!memcpy+0x250
fffff880`031858c0 fffff880`01710efc : fffffa80`06aa5c90 00000000`00000001 00000000`00000000 00000000`00000000 : ndis!ndisSqmLogDriverVersion+0xae
fffff880`03185c70 fffff800`02ae1161 : fffff880`01710e40 fffff800`02c775f8 fffffa80`04f36040 00000000`00000000 : ndis!ndisSqmTimerWorkerRoutine+0xbc
fffff880`03185cb0 fffff800`02d77166 : 89894c00`0000c881 fffffa80`04f36040 00000000`00000080 fffffa80`04f225f0 : nt!ExpWorkerThread+0x111
fffff880`03185d40 fffff800`02ab2486 : fffff880`02f63180 fffffa80`04f36040 fffff880`02f6df80 00000130`89894c00 : nt!PspSystemThreadStartup+0x5a
fffff880`03185d80 00000000`00000000 : fffff880`03186000 fffff880`03180000 fffff880`03185930 00000000`00000000 : nt!KxStartSystemThread+0x16
start end module name
fffff800`00bc0000 fffff800`00bca000 kdcom kdcom.dll Tue Jul 14 03: 31: 07 2009 (4A5BDFDB)
fffff800`02a19000 fffff800`02a62000 hal hal.dll Tue Jul 14 03: 27: 36 2009 (4A5BDF08)
fffff800`02a62000 fffff800`0303f000 nt ntkrnlmp.exe Tue Jul 14 01: 40: 48 2009 (4A5BC600)
fffff880`00c00000 fffff880`00ca4000 Wdf01000 Wdf01000.sys Tue Jul 14 01: 22: 07 2009 (4A5BC19F)
fffff880`00ca4000 fffff880`00cb3000 WDFLDR WDFLDR.SYS Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00cbf000 fffff880`00ccc000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Tue Jul 14 03: 29: 09 2009 (4A5BDF65)
fffff880`00ccc000 fffff880`00ce0000 PSHED PSHED.dll Tue Jul 14 03: 32: 23 2009 (4A5BE027)
fffff880`00ce0000 fffff880`00d3e000 CLFS CLFS.SYS Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00d3e000 fffff880`00dfe000 CI CI.dll Tue Jul 14 03: 32: 13 2009 (4A5BE01D)
fffff880`00e31000 fffff880`00e88000 ACPI ACPI.sys Tue Jul 14 01: 19: 34 2009 (4A5BC106)
fffff880`00e88000 fffff880`00e91000 WMILIB WMILIB.SYS Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00e91000 fffff880`00e9b000 msisadrv msisadrv.sys Tue Jul 14 01: 19: 26 2009 (4A5BC0FE)
fffff880`00e9b000 fffff880`00ece000 pci pci.sys Tue Jul 14 01: 19: 51 2009 (4A5BC117)
fffff880`00ece000 fffff880`00edb000 vdrvroot vdrvroot.sys Tue Jul 14 02: 01: 31 2009 (4A5BCADB)
fffff880`00edb000 fffff880`00ef0000 partmgr partmgr.sys Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`00ef0000 fffff880`00f05000 volmgr volmgr.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`00f05000 fffff880`00f61000 volmgrx volmgrx.sys Tue Jul 14 01: 20: 33 2009 (4A5BC141)
fffff880`00f61000 fffff880`00f68000 pciide pciide.sys Tue Jul 14 01: 19: 49 2009 (4A5BC115)
fffff880`00f68000 fffff880`00f78000 PCIIDEX PCIIDEX.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`00f78000 fffff880`00f92000 mountmgr mountmgr.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`00f92000 fffff880`00f9b000 atapi atapi.sys Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`00f9b000 fffff880`00fc5000 ataport ataport.SYS Tue Jul 14 01: 19: 52 2009 (4A5BC118)
fffff880`00fc5000 fffff880`00ff0000 nvstor nvstor.sys Wed May 20 08: 45: 37 2009 (4A13A711)
fffff880`01000000 fffff880`0105e000 msrpc msrpc.sys Tue Jul 14 01: 21: 32 2009 (4A5BC17C)
fffff880`010b9000 fffff880`0111b000 storport storport.sys Tue Jul 14 02: 01: 18 2009 (4A5BCACE)
fffff880`0111b000 fffff880`0115a000 nvstor64 nvstor64.sys Fri Apr 09 11: 22: 41 2010 (4BBEF1E1)
fffff880`0115a000 fffff880`01165000 amdxata amdxata.sys Tue May 19 19: 56: 59 2009 (4A12F2EB)
fffff880`01165000 fffff880`011b1000 fltmgr fltmgr.sys Tue Jul 14 01: 19: 59 2009 (4A5BC11F)
fffff880`011b1000 fffff880`011c5000 fileinfo fileinfo.sys Tue Jul 14 01: 34: 25 2009 (4A5BC481)
fffff880`0122f000 fffff880`013d2000 Ntfs Ntfs.sys Tue Jul 14 01: 20: 47 2009 (4A5BC14F)
fffff880`013d2000 fffff880`013ec000 ksecdd ksecdd.sys Tue Jul 14 01: 20: 54 2009 (4A5BC156)
fffff880`01400000 fffff880`0143a000 fvevol fvevol.sys Tue Jul 14 01: 22: 15 2009 (4A5BC1A7)
fffff880`0143a000 fffff880`01450000 disk disk.sys Tue Jul 14 01: 19: 57 2009 (4A5BC11D)
fffff880`01450000 fffff880`01480000 CLASSPNP CLASSPNP.SYS Tue Jul 14 01: 19: 58 2009 (4A5BC11E)
fffff880`014ab000 fffff880`0151e000 cng cng.sys Tue Jul 14 01: 49: 40 2009 (4A5BC814)
fffff880`0151e000 fffff880`0152f000 pcw pcw.sys Tue Jul 14 01: 19: 27 2009 (4A5BC0FF)
fffff880`0152f000 fffff880`01539000 Fs_Rec Fs_Rec.sys Tue Jul 14 01: 19: 45 2009 (4A5BC111)
fffff880`01539000 fffff880`01585000 volsnap volsnap.sys Tue Jul 14 01: 20: 08 2009 (4A5BC128)
fffff880`01585000 fffff880`015bf000 rdyboost rdyboost.sys Tue Jul 14 01: 34: 34 2009 (4A5BC48A)
fffff880`015bf000 fffff880`015d1000 mup mup.sys Tue Jul 14 01: 23: 45 2009 (4A5BC201)
fffff880`015d1000 fffff880`015da000 hwpolicy hwpolicy.sys Tue Jul 14 01: 19: 22 2009 (4A5BC0FA)
fffff880`01600000 fffff880`01660000 NETIO NETIO.SYS Tue Jul 14 01: 21: 46 2009 (4A5BC18A)
fffff880`01660000 fffff880`0168b000 ksecpkg ksecpkg.sys Tue Jul 14 01: 50: 34 2009 (4A5BC84A)
fffff880`0168b000 fffff880`016d5000 fwpkclnt fwpkclnt.sys Tue Jul 14 01: 21: 08 2009 (4A5BC164)
fffff880`016d5000 fffff880`016ea000 epfwwfp epfwwfp.sys Tue Jun 28 09: 30: 08 2011 (4E098300)
fffff880`016ea000 fffff880`016fa000 vmstorfl vmstorfl.sys Tue Jul 14 01: 42: 54 2009 (4A5BC67E)
fffff880`016ff000 fffff880`017f1000 ndis ndis.sys Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`017f1000 fffff880`017f9000 spldr spldr.sys Mon May 11 18: 56: 27 2009 (4A0858BB)
fffff880`01801000 fffff880`019fe000 tcpip tcpip.sys Tue Jul 14 01: 25: 34 2009 (4A5BC26E)
fffff880`03800000 fffff880`03815000 lltdio lltdio.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`03815000 fffff880`03868000 nwifi nwifi.sys Tue Jul 14 02: 07: 23 2009 (4A5BCC3B)
fffff880`03868000 fffff880`0387b000 ndisuio ndisuio.sys Tue Jul 14 02: 09: 25 2009 (4A5BCCB5)
fffff880`0387b000 fffff880`03893000 rspndr rspndr.sys Tue Jul 14 02: 08: 50 2009 (4A5BCC92)
fffff880`038ea000 fffff880`039cc000 eamonm eamonm.sys Tue Aug 02 11: 33: 29 2011 (4E37C469)
fffff880`039cc000 fffff880`039fd000 epfw epfw.sys Tue Jun 28 09: 30: 10 2011 (4E098302)
fffff880`03e00000 fffff880`03e11000 Npfs Npfs.SYS Tue Jul 14 01: 19: 48 2009 (4A5BC114)
fffff880`03e11000 fffff880`03e2f000 tdx tdx.sys Tue Jul 14 01: 21: 15 2009 (4A5BC16B)
fffff880`03e2f000 fffff880`03e3c000 TDI TDI.SYS Tue Jul 14 01: 21: 18 2009 (4A5BC16E)
fffff880`03e3c000 fffff880`03ec6000 afd afd.sys Tue Jul 14 01: 21: 40 2009 (4A5BC184)
fffff880`03eda000 fffff880`03f20000 dtsoftbus01 dtsoftbus01.sys Mon Mar 14 14: 15: 36 2011 (4D7E14F8)
fffff880`03f20000 fffff880`03f4a000 cdrom cdrom.sys Tue Jul 14 01: 19: 54 2009 (4A5BC11A)
fffff880`03f4a000 fffff880`03f53000 Null Null.SYS Tue Jul 14 01: 19: 37 2009 (4A5BC109)
fffff880`03f53000 fffff880`03f5a000 Beep Beep.SYS Tue Jul 14 02: 00: 13 2009 (4A5BCA8D)
fffff880`03f5a000 fffff880`03f81000 ehdrv ehdrv.sys Tue Jun 28 09: 34: 38 2011 (4E09840E)
fffff880`03f81000 fffff880`03f90000 avgtpx64 avgtpx64.sys Tue May 28 16: 57: 10 2013 (51A4C5C6)
fffff880`03f90000 fffff880`03f9e000 vga vga.sys Tue Jul 14 01: 38: 47 2009 (4A5BC587)
fffff880`03f9e000 fffff880`03fc3000 VIDEOPRT VIDEOPRT.SYS Tue Jul 14 01: 38: 51 2009 (4A5BC58B)
fffff880`03fc3000 fffff880`03fd3000 watchdog watchdog.sys Tue Jul 14 01: 37: 35 2009 (4A5BC53F)
fffff880`03fd3000 fffff880`03fdc000 RDPCDD RDPCDD.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`03fdc000 fffff880`03fe5000 rdpencdd rdpencdd.sys Tue Jul 14 02: 16: 34 2009 (4A5BCE62)
fffff880`03fe5000 fffff880`03fee000 rdprefmp rdprefmp.sys Tue Jul 14 02: 16: 35 2009 (4A5BCE63)
fffff880`03fee000 fffff880`03ff9000 Msfs Msfs.SYS Tue Jul 14 01: 19: 47 2009 (4A5BC113)
fffff880`05400000 fffff880`0544d000 mrxsmb10 mrxsmb10.sys Tue Jul 14 01: 24: 08 2009 (4A5BC218)
fffff880`0544d000 fffff880`05470000 mrxsmb20 mrxsmb20.sys Tue Jul 14 01: 24: 05 2009 (4A5BC215)
fffff880`05470000 fffff880`054a1000 AODDriver2 AODDriver2.sys Wed Jun 15 10: 38: 35 2011 (4DF86F8B)
fffff880`054c5000 fffff880`0558d000 HTTP HTTP.sys Tue Jul 14 01: 22: 16 2009 (4A5BC1A8)
fffff880`0558d000 fffff880`055ab000 bowser bowser.sys Tue Jul 14 01: 23: 50 2009 (4A5BC206)
fffff880`055ab000 fffff880`055c3000 mpsdrv mpsdrv.sys Tue Jul 14 02: 08: 25 2009 (4A5BCC79)
fffff880`055c3000 fffff880`055ef000 mrxsmb mrxsmb.sys Tue Jul 14 01: 23: 59 2009 (4A5BC20F)
fffff880`06a00000 fffff880`06a51000 rdbss rdbss.sys Tue Jul 14 01: 24: 09 2009 (4A5BC219)
fffff880`06a51000 fffff880`06a5d000 nsiproxy nsiproxy.sys Tue Jul 14 01: 21: 02 2009 (4A5BC15E)
fffff880`06a5d000 fffff880`06a68000 mssmbios mssmbios.sys Tue Jul 14 01: 31: 10 2009 (4A5BC3BE)
fffff880`06a68000 fffff880`06a77000 discache discache.sys Tue Jul 14 01: 37: 18 2009 (4A5BC52E)
fffff880`06a77000 fffff880`06acc000 atikmpag atikmpag.sys Tue Dec 06 03: 12: 14 2011 (4EDD79FE)
fffff880`06af4000 fffff880`06b39000 netbt netbt.sys Tue Jul 14 01: 21: 28 2009 (4A5BC178)
fffff880`06b39000 fffff880`06b42000 wfplwf wfplwf.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`06b42000 fffff880`06b68000 pacer pacer.sys Tue Jul 14 02: 09: 41 2009 (4A5BCCC5)
fffff880`06b68000 fffff880`06b75000 EpfwLWF EpfwLWF.sys Mon Jul 11 18: 19: 38 2011 (4E1B229A)
fffff880`06b75000 fffff880`06b84000 netbios netbios.sys Tue Jul 14 02: 09: 26 2009 (4A5BCCB6)
fffff880`06b84000 fffff880`06ba1000 serial serial.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`06ba1000 fffff880`06bbc000 wanarp wanarp.sys Tue Jul 14 02: 10: 21 2009 (4A5BCCED)
fffff880`06bbc000 fffff880`06bd0000 termdd termdd.sys Tue Jul 14 02: 16: 36 2009 (4A5BCE64)
fffff880`06c00000 fffff880`06c0e000 kbdhid kbdhid.sys Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`06c2a000 fffff880`06cad000 csc csc.sys Tue Jul 14 01: 24: 26 2009 (4A5BC22A)
fffff880`06cad000 fffff880`06ccb000 dfsc dfsc.sys Tue Jul 14 01: 23: 44 2009 (4A5BC200)
fffff880`06ccb000 fffff880`06cdc000 blbdrive blbdrive.sys Tue Jul 14 01: 35: 59 2009 (4A5BC4DF)
fffff880`06cdc000 fffff880`06d02000 tunnel tunnel.sys Tue Jul 14 02: 09: 37 2009 (4A5BCCC1)
fffff880`06d02000 fffff880`06d17000 amdppm amdppm.sys Tue Jul 14 01: 19: 25 2009 (4A5BC0FD)
fffff880`06d17000 fffff880`06d34000 parport parport.sys Tue Jul 14 02: 00: 40 2009 (4A5BCAA8)
fffff880`06d34000 fffff880`06d40000 serenum serenum.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`06d40000 fffff880`06d4b000 usbohci usbohci.sys Tue Jul 14 02: 06: 30 2009 (4A5BCC06)
fffff880`06d4b000 fffff880`06da1000 USBPORT USBPORT.SYS Tue Jul 14 02: 06: 31 2009 (4A5BCC07)
fffff880`06da1000 fffff880`06db2000 usbehci usbehci.sys Tue Jul 14 02: 06: 30 2009 (4A5BCC06)
fffff880`06db2000 fffff880`06dd6000 HDAudBus HDAudBus.sys Tue Jul 14 02: 06: 13 2009 (4A5BCBF5)
fffff880`06dd6000 fffff880`06de4000 hidusb hidusb.sys Tue Jul 14 02: 06: 22 2009 (4A5BCBFE)
fffff880`06de4000 fffff880`06dfd000 HIDCLASS HIDCLASS.SYS Tue Jul 14 02: 06: 21 2009 (4A5BCBFD)
fffff880`06e00000 fffff880`06e24000 rasl2tp rasl2tp.sys Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`06e24000 fffff880`06e30000 ndistapi ndistapi.sys Tue Jul 14 02: 10: 00 2009 (4A5BCCD8)
fffff880`06e30000 fffff880`06e5f000 ndiswan ndiswan.sys Tue Jul 14 02: 10: 11 2009 (4A5BCCE3)
fffff880`06e5f000 fffff880`06e7a000 raspppoe raspppoe.sys Tue Jul 14 02: 10: 17 2009 (4A5BCCE9)
fffff880`06e7a000 fffff880`06e9b000 raspptp raspptp.sys Tue Jul 14 02: 10: 18 2009 (4A5BCCEA)
fffff880`06e9c000 fffff880`06f90000 dxgkrnl dxgkrnl.sys Tue Jul 14 01: 38: 56 2009 (4A5BC590)
fffff880`06f90000 fffff880`06fd6000 dxgmms1 dxgmms1.sys Tue Jul 14 01: 38: 32 2009 (4A5BC578)
fffff880`06fd6000 fffff880`06fe6000 CompositeBus CompositeBus.sys Tue Jul 14 02: 00: 33 2009 (4A5BCAA1)
fffff880`06fe6000 fffff880`06ffc000 AgileVpn AgileVpn.sys Tue Jul 14 02: 10: 24 2009 (4A5BCCF0)
fffff880`06ffc000 fffff880`06ffd480 swenum swenum.sys Tue Jul 14 02: 00: 18 2009 (4A5BCA92)
fffff880`07200000 fffff880`0725a000 usbhub usbhub.sys Tue Jul 14 02: 07: 09 2009 (4A5BCC2D)
fffff880`0725a000 fffff880`0726f000 NDProxy NDProxy.SYS Tue Jul 14 02: 10: 05 2009 (4A5BCCDD)
fffff880`0726f000 fffff880`07291000 drmk drmk.sys Tue Jul 14 03: 01: 25 2009 (4A5BD8E5)
fffff880`07292000 fffff880`07d1d000 atikmdag atikmdag.sys Tue Dec 06 03: 52: 23 2011 (4EDD8367)
fffff880`07d1d000 fffff880`07d37000 rassstp rassstp.sys Tue Jul 14 02: 10: 25 2009 (4A5BCCF1)
fffff880`07d37000 fffff880`07d42000 rdpbus rdpbus.sys Tue Jul 14 02: 17: 46 2009 (4A5BCEAA)
fffff880`07d42000 fffff880`07d51000 kbdclass kbdclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`07d51000 fffff880`07d60000 mouclass mouclass.sys Tue Jul 14 01: 19: 50 2009 (4A5BC116)
fffff880`07d60000 fffff880`07da3000 ks ks.sys Tue Jul 14 02: 00: 31 2009 (4A5BCA9F)
fffff880`07da3000 fffff880`07db7000 amdiox64 amdiox64.sys Thu Feb 18 16: 17: 53 2010 (4B7D5A21)
fffff880`07db7000 fffff880`07dc9000 umbus umbus.sys Tue Jul 14 02: 06: 56 2009 (4A5BCC20)
fffff880`07dc9000 fffff880`07de3000 AtihdW76 AtihdW76.sys Tue Oct 18 09: 09: 49 2011 (4E9D263D)
fffff880`07de3000 fffff880`07e00000 usbccgp usbccgp.sys Tue Jul 14 02: 06: 45 2009 (4A5BCC15)
fffff880`08200000 fffff880`0823d000 portcls portcls.sys Tue Jul 14 02: 06: 27 2009 (4A5BCC03)
fffff880`08241000 fffff880`083eb000 viahduaa viahduaa.sys Wed Nov 25 14: 06: 00 2009 (4B0D2BB8)
fffff880`083eb000 fffff880`083f0200 ksthunk ksthunk.sys Tue Jul 14 02: 00: 19 2009 (4A5BCA93)
fffff880`083f1000 fffff880`083f2f00 USBD USBD.SYS Tue Jul 14 02: 06: 23 2009 (4A5BCBFF)
fffff880`083f3000 fffff880`083fb080 HIDPARSE HIDPARSE.SYS Tue Jul 14 02: 06: 17 2009 (4A5BCBF9)
fffff880`08465000 fffff880`084f6000 athrxusb athrxusb.sys Fri Dec 22 13: 05: 49 2006 (458BCA1D)
fffff880`084f6000 fffff880`08503000 mouhid mouhid.sys Tue Jul 14 02: 00: 20 2009 (4A5BCA94)
fffff880`08503000 fffff880`0850f000 Dxapi Dxapi.sys Tue Jul 14 01: 38: 28 2009 (4A5BC574)
fffff880`0850f000 fffff880`0852c000 cdfs cdfs.sys Tue Jul 14 01: 19: 46 2009 (4A5BC112)
fffff880`0852c000 fffff880`0853a000 crashdmp crashdmp.sys Tue Jul 14 02: 01: 01 2009 (4A5BCABD)
fffff880`0853a000 fffff880`08544000 dump_diskdump dump_diskdump.sys Tue Jul 14 02: 01: 00 2009 (4A5BCABC)
fffff880`08544000 fffff880`08583000 dump_nvstor64 dump_nvstor64.sys Fri Apr 09 11: 22: 41 2010 (4BBEF1E1)
fffff880`08583000 fffff880`08596000 dump_dumpfve dump_dumpfve.sys Tue Jul 14 01: 21: 51 2009 (4A5BC18F)
fffff880`08596000 fffff880`085a4000 monitor monitor.sys Tue Jul 14 01: 38: 52 2009 (4A5BC58C)
fffff880`085a4000 fffff880`085c7000 luafv luafv.sys Tue Jul 14 01: 26: 13 2009 (4A5BC295)
fffff880`09600000 fffff880`09669000 srv2 srv2.sys Tue Jul 14 01: 25: 02 2009 (4A5BC24E)
fffff880`096e4000 fffff880`0978a000 peauth peauth.sys Tue Jul 14 03: 01: 19 2009 (4A5BD8DF)
fffff880`0978a000 fffff880`09795000 secdrv secdrv.SYS Wed Sep 13 15: 18: 38 2006 (4508052E)
fffff880`09795000 fffff880`097c2000 srvnet srvnet.sys Tue Jul 14 01: 24: 58 2009 (4A5BC24A)
fffff880`097c2000 fffff880`097d4000 tcpipreg tcpipreg.sys Tue Jul 14 02: 09: 49 2009 (4A5BCCCD)
fffff880`09894000 fffff880`0992c000 srv srv.sys Tue Jul 14 01: 25: 11 2009 (4A5BC257)
fffff880`0992c000 fffff880`0999d000 spsys spsys.sys Mon May 11 19: 20: 58 2009 (4A085E7A)
fffff960`000f0000 fffff960`003ff000 win32k win32k.sys unavailable (00000000)
fffff960`00570000 fffff960`0057a000 TSDDD TSDDD.dll unavailable (00000000)
fffff960`00770000 fffff960`00797000 cdd cdd.dll unavailable (00000000)
Unloaded modules:
fffff880`01480000 fffff880`0148e000 crashdmp.sys
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000E000
fffff880`0148e000 fffff880`01498000 dump_storpor
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0000A000
fffff880`0105e000 fffff880`0109d000 dump_nvstor6
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 0003F000
fffff880`01498000 fffff880`014ab000 dump_dumpfve
Timestamp: unavailable (00000000)
Checksum: 00000000
ImageSize: 00013000
Bugcheck code 1000007E
Arguments ffffffff`c0000005 fffff880`017031e0 fffff880`03185678 fffff880`03184ed0
[CPU Information]
~MHz = REG_DWORD 3114
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 16 Model 5 Stepping 3
ProcessorNameString = REG_SZ AMD Athlon(tm) II X3 445 Processor
VendorIdentifier = REG_SZ AuthenticAMD
Machine ID Information [From Smbios 2.4, DMIVersion 0, Size=1127]
BiosMajorRelease = 8
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = P1.10
BiosReleaseDate = 04/12/2010
SystemManufacturer = To Be Filled By O.E.M.
SystemProductName = To Be Filled By O.E.M.
SystemFamily = To Be Filled By O.E.M.
SystemVersion = To Be Filled By O.E.M.
SystemSKU = To Be Filled By O.E.M.
BaseBoardManufacturer = ASRock
BaseBoardProduct = N68C-S UCC
BaseBoardVersion =
sysinfo: unknown error 80004005
[SMBIOS Data Tables v2.4]
[DMI Version - 0]
[2.0 Calling Convention - No]
[Table Size - 1127 bytes]
[BIOS Information (Type 0) - Length 24 - Handle 0000h]
Vendor American Megatrends Inc.
BIOS Version P1.10
BIOS Starting Address Segment f000
BIOS Release Date 04/12/2010
BIOS ROM Size 100000
BIOS Characteristics
07: - PCI Supported
11: - Upgradeable FLASH BIOS
12: - BIOS Shadowing Supported
15: - CD-Boot Supported
16: - Selectable Boot Supported
17: - BIOS ROM Socketed
19: - EDD Supported
23: - 1.2MB Floppy Supported
24: - 720KB Floppy Supported
25: - 2.88MB Floppy Supported
26: - Print Screen Device Supported
27: - Keyboard Services Supported
28: - Serial Services Supported
29: - Printer Services Supported
30: - CGA/Mono Services Supported
32: - BIOS Vendor Reserved
BIOS Characteristic Extensions
00: - ACPI Supported
01: - USB Legacy Supported
04: - LS120-Boot Supported
05: - ATAPI ZIP-Boot Supported
08: - BIOS Boot Specification Supported
09: - Fn-Key NET-Boot Supported
10: - Specification Reserved
BIOS Major Revision 8
BIOS Minor Revision 14
EC Firmware Major Revision 255
EC Firmware Minor Revision 255
[System Information (Type 1) - Length 27 - Handle 0001h]
Manufacturer To Be Filled By O.E.M.
Product Name To Be Filled By O.E.M.
Version To Be Filled By O.E.M.
Serial Number
UUID 00000000-0000-0000-0000-000000000000
Wakeup Type Power Switch
SKUNumber To Be Filled By O.E.M.
Family To Be Filled By O.E.M.
[BaseBoard Information (Type 2) - Length 15 - Handle 0002h]
Manufacturer ASRock
Product N68C-S UCC
Version
Serial Number
Asset Tag
Feature Flags 09h
1423261044: - Ã)
1423261004: - Ã)
Location
Chassis Handle 0003h
Board Type 0ah - Processor/Memory Module
Number of Child Handles 0
[System Enclosure (Type 3) - Length 21 - Handle 0003h]
Manufacturer To Be Filled By O.E.M.
Chassis Type Desktop
Version To Be Filled By O.E.M.
Serial Number
Asset Tag Number
Bootup State Safe
Power Supply State Safe
Thermal State Safe
Security Status None
OEM Defined 0
Height 0U
Number of Power Cords 1
Number of Contained Elements 0
Contained Element Size 0
[Processor Information (Type 4) - Length 35 - Handle 0004h]
Socket Designation CPUSocket
Processor Type Central Processor
Processor Family edh - Specification Reserved
Processor Manufacturer AMD
Processor ID 530f1000fffb8b17
Processor Version AMD Athlon(tm) II X3 445 Processor
Processor Voltage 8fh - 1.5V
External Clock 200MHz
Max Speed 3100MHz
Current Speed 3100MHz
Status Enabled Populated
Processor Upgrade Socket 940
L1 Cache Handle 0005h
L2 Cache Handle 0006h
L3 Cache Handle [Not Present]
Serial Number
Asset Tag Number
Part Number To Be Filled By O.E.M.
[Cache Information (Type 7) - Length 19 - Handle 0005h]
Socket Designation L1-Cache
Cache Configuration 0280h - Varies Enabled Int NonSocketed L1
Maximum Cache Size 0180h - 384K
Installed Size 0180h - 384K
Supported SRAM Type 0010h - Pipeline-Burst
Current SRAM Type 0010h - Pipeline-Burst
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Data
Associativity 4-way Set-Associative
[Cache Information (Type 7) - Length 19 - Handle 0006h]
Socket Designation L2-Cache
Cache Configuration 0281h - Varies Enabled Int NonSocketed L2
Maximum Cache Size 0600h - 1536K
Installed Size 0600h - 1536K
Supported SRAM Type 0010h - Pipeline-Burst
Current SRAM Type 0010h - Pipeline-Burst
Cache Speed 0ns
Error Correction Type Multi-Bit ECC
System Cache Type Unified
Associativity 4-way Set-Associative
[Memory Controller Information (Type 5) - Length 20 - Handle 0007h]
Error Detecting Method 06h - 64-bit ECC
Error Correcting Capability 04h - None
Supported Interleave 03h - One Way Interleave
Current Interleave 03h - One Way Interleave
Maximum Memory Module Size 0bh - 2048MB
Supported Speeds 000ch - 70ns 60ns
Supported Memory Types 0500h - DIMM SDRAM
Memory Module Voltage 3.3V
Number of Memory Slots 2
Memory Slot Handle 0008h
Memory Slot Handle 0009h
Enabled Err Correcting Caps 04h - None
[Memory Module Information (Type 6) - Length 12 - Handle 0008h]
Socket Designation DIMM0
Bank Connections 07h - 7 0
Current Speed 7ns
Current Memory Type 0140h - ECC DIMM
Installed Size 8ch - 4096 [double bank]
Enabled Size 8ch - 4096 [double bank]
Error Status 00h - [No Errors]
[Memory Module Information (Type 6) - Length 12 - Handle 0009h]
Socket Designation DIMM1
Bank Connections 07h - 7 0
Current Speed 7ns
Current Memory Type 0140h - ECC DIMM
Installed Size 0bh - 2048 [single bank]
Enabled Size 0bh - 2048 [single bank]
Error Status 00h - [No Errors]
[Physical Memory Array (Type 16) - Length 15 - Handle 000eh]
Location 03h - SystemBoard/Motherboard
Use 03h - System Memory
Memory Error Correction 03h - None
Maximum Capacity 8388608KB
Memory Error Inf Handle [Not Provided]
Number of Memory Devices 2
[Memory Array Mapped Address (Type 19) - Length 15 - Handle 000fh]
Starting Address 00000000h
Ending Address 0067ffffh
Memory Array Handle 000eh
Partition Width 01
[Memory Device (Type 17) - Length 27 - Handle 0010h]
Physical Memory Array Handle 000eh
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 4096MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM0
Bank Locator BANK0
Memory Type 01h - Other
Type Detail 0080h - Synchronous
Speed 400MHz
Manufacturer Manufacturer0
Serial Number
Asset Tag Number
Part Number PartNum0
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0011h]
Starting Address 00000000h
Ending Address 003fffffh
Memory Device Handle 0010h
Mem Array Mapped Adr Handle 000fh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
[Memory Device (Type 17) - Length 27 - Handle 0012h]
Physical Memory Array Handle 000eh
Memory Error Info Handle [Not Provided]
Total Width 64 bits
Data Width 64 bits
Size 2048MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM1
Bank Locator BANK1
Memory Type 01h - Other
Type Detail 0080h - Synchronous
Speed 400MHz
Manufacturer Manufacturer1
Serial Number
Asset Tag Number
Part Number PartNum1
[Memory Device Mapped Address (Type 20) - Length 19 - Handle 0013h]
Starting Address 00400000h
Ending Address 005fffffh
Memory Device Handle 0012h
Mem Array Mapped Adr Handle 000fh
Partition Row Position 01
Interleave Position [None]
Interleave Data Depth [None]
Sprzęt
AMD Athlon II X3 445 Processor
ASRock N68C-S UCC
4GB RAM
Sterowniki
Kod:
athrxusb.sys Fri Dec 22 13: 05: 49 2006 (458BCA1D)
Atheros Wireless LAN USB device driver - zbyt stary nieaktualizowany sterownik urządzenia o którym pisałeś
amdxata.sys Tue May 19 19: 56: 59 2009 (4A12F2EB)
AMD storage controller driver
nvstor.sys Wed May 20 08: 45: 37 2009 (4A13A711)
nVidia Storage Drivers
viahduaa.sys Wed Nov 25 14: 06: 00 2009 (4B0D2BB8)
VIA High Definition Audio Function Driver
amdiox64.sys Thu Feb 18 16: 17: 53 2010 (4B7D5A21)
AMD IO Driver
nvstor64.sys Fri Apr 9 11: 22: 41 2010 (4BBEF1E1)
nVidia Storage Driver (nForce chipset driver)
dtsoftbus01.sys Mon Mar 14 14: 15: 36 2011 (4D7E14F8)
Daemon Tools driver
AODDriver2.sys Wed Jun 15 10: 38: 35 2011 (4DF86F8B)
AMD Overdrive do testowania sprzetu
epfwwfp.sys Tue Jun 28 09: 30: 08 2011 (4E098300)
ESET Personal Firewall Driver
epfw.sys Tue Jun 28 09: 30: 10 2011 (4E098302)
ESET
ehdrv.sys Tue Jun 28 09: 34: 38 2011 (4E09840E)
ESET
EpfwLWF.sys Mon Jul 11 18: 19: 38 2011 (4E1B229A)
ESET ESS/NOD32 driver
eamonm.sys Tue Aug 2 11: 33: 29 2011 (4E37C469)
ESET Amon driver
AtihdW76.sys Tue Oct 18 09: 09: 49 2011 (4E9D263D)
ATI Function Driver for HD Audio Service
atikmpag.sys Tue Dec 6 03: 12: 14 2011 (4EDD79FE)
ATI Video driver - nieaktualne
atikmdag.sys Tue Dec 6 03: 52: 23 2011 (4EDD8367)
ATI Video driver - nieaktualne
avgtpx64.sys Tue May 28 16: 57: 10 2013 (51A4C5C6)
Driver for AVG Secure Search - jakieś pozostałości
Kolejne bsody będę sprawdzał w trakcie.
Tu już ewidentnie sterownik tej karty sieciowej - zd1211Bu.sys
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\66\090913-17796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c4ce50
Debug session time: Mon Sep 9 21: 54: 19.100 2013 (UTC + 2: 00)
System Uptime: 0 days 0: 07: 31.741
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {70633939, 2, 0, fffff88009f0cfa7}
Unable to load image \SystemRoot\system32\DRIVERS\zd1211Bu.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for zd1211Bu.sys
*** ERROR: Module load completed but symbols could not be loaded for zd1211Bu.sys
Probably caused by : zd1211Bu.sys ( zd1211Bu+10fa7 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000070633939, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88009f0cfa7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb70e0
0000000070633939
CURRENT_IRQL: 2
FAULTING_IP:
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000 movzx eax,byte ptr [rax+0C5C4h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f8b860 -- (.trap 0xfffff88002f8b860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000070627375 rbx=0000000000000000 rcx=0000000070627375
rdx=fffffa800725f010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88009f0cfa7 rsp=fffff88002f8b9f8 rbp=0000000000000000
r8=fffffa8007b23510 r9=0000000000000050 r10=fffff88002f63b80
r11=fffff88002f8bb18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
zd1211Bu+0x10fa7:
fffff880`09f0cfa7 0fb680c4c50000 movzx eax,byte ptr [rax+0C5C4h] ds: 00000000`70633939=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80469 to fffff80002a80f00
STACK_TEXT:
fffff880`02f8b718 fffff800`02a80469 : 00000000`0000000a 00000000`70633939 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f8b720 fffff800`02a7f0e0 : 00000000`00000001 fffffa80`0725f1bb 00000000`00000000 fffff880`02f6df80 : nt!KiBugCheckDispatch+0x69
fffff880`02f8b860 fffff880`09f0cfa7 : fffff800`02bb42dd fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 : nt!KiPageFault+0x260
fffff880`02f8b9f8 fffff800`02bb42dd : fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 fffff800`70627375 : zd1211Bu+0x10fa7
fffff880`02f8ba00 fffffa80`05441170 : fffffa80`05441102 fffff880`041985a6 00000000`54627255 00000000`000003ed : nt!ExFreePoolWithTag+0x22d
fffff880`02f8bab0 fffffa80`05441102 : fffff880`041985a6 00000000`54627255 00000000`000003ed fffffa80`70627375 : 0xfffffa80`05441170
fffff880`02f8bab8 fffff880`041985a6 : 00000000`54627255 00000000`000003ed fffffa80`70627375 00000000`00000000 : 0xfffffa80`05441102
fffff880`02f8bac0 fffff880`041835d9 : fffffa80`061bf050 fffffa80`0543a900 ffffffff`c0010000 00000000`00000000 : USBPORT!USBPORT_DereferenceDeviceHandle+0x14e
fffff880`02f8bb20 fffff880`04183ab7 : fffffa80`06f3c702 fffffa80`0725f010 00000000`ffffffff fffffa80`061bfea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f8bc00 fffff880`0418164f : fffffa80`061bfea8 fffffa80`061bf1a0 fffffa80`061c0040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f8bc60 fffff880`04172f89 : fffffa80`061bf050 00000000`00000000 fffffa80`061bfe02 fffffa80`061bfea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f8bca0 fffff800`02a8c5dc : fffff880`02f63180 fffffa80`061bfea8 fffffa80`061bfec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f8bcd0 fffff800`02a896fa : fffff880`02f63180 fffff880`02f6df80 00000000`00000000 fffff880`04172db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f8bd80 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000 movzx eax,byte ptr [rax+0C5C4h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: zd1211Bu+10fa7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: zd1211Bu
IMAGE_NAME: zd1211Bu.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 44ed3c9b
FAILURE_BUCKET_ID: X64_0xD1_zd1211Bu+10fa7
BUCKET_ID: X64_0xD1_zd1211Bu+10fa7
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000070633939, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88009f0cfa7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000070633939
CURRENT_IRQL: 2
FAULTING_IP:
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000 movzx eax,byte ptr [rax+0C5C4h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f8b860 -- (.trap 0xfffff88002f8b860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000070627375 rbx=0000000000000000 rcx=0000000070627375
rdx=fffffa800725f010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88009f0cfa7 rsp=fffff88002f8b9f8 rbp=0000000000000000
r8=fffffa8007b23510 r9=0000000000000050 r10=fffff88002f63b80
r11=fffff88002f8bb18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
zd1211Bu+0x10fa7:
fffff880`09f0cfa7 0fb680c4c50000 movzx eax,byte ptr [rax+0C5C4h] ds: 00000000`70633939=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80469 to fffff80002a80f00
STACK_TEXT:
fffff880`02f8b718 fffff800`02a80469 : 00000000`0000000a 00000000`70633939 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f8b720 fffff800`02a7f0e0 : 00000000`00000001 fffffa80`0725f1bb 00000000`00000000 fffff880`02f6df80 : nt!KiBugCheckDispatch+0x69
fffff880`02f8b860 fffff880`09f0cfa7 : fffff800`02bb42dd fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 : nt!KiPageFault+0x260
fffff880`02f8b9f8 fffff800`02bb42dd : fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 fffff800`70627375 : zd1211Bu+0x10fa7
fffff880`02f8ba00 fffffa80`05441170 : fffffa80`05441102 fffff880`041985a6 00000000`54627255 00000000`000003ed : nt!ExFreePoolWithTag+0x22d
fffff880`02f8bab0 fffffa80`05441102 : fffff880`041985a6 00000000`54627255 00000000`000003ed fffffa80`70627375 : 0xfffffa80`05441170
fffff880`02f8bab8 fffff880`041985a6 : 00000000`54627255 00000000`000003ed fffffa80`70627375 00000000`00000000 : 0xfffffa80`05441102
fffff880`02f8bac0 fffff880`041835d9 : fffffa80`061bf050 fffffa80`0543a900 ffffffff`c0010000 00000000`00000000 : USBPORT!USBPORT_DereferenceDeviceHandle+0x14e
fffff880`02f8bb20 fffff880`04183ab7 : fffffa80`06f3c702 fffffa80`0725f010 00000000`ffffffff fffffa80`061bfea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f8bc00 fffff880`0418164f : fffffa80`061bfea8 fffffa80`061bf1a0 fffffa80`061c0040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f8bc60 fffff880`04172f89 : fffffa80`061bf050 00000000`00000000 fffffa80`061bfe02 fffffa80`061bfea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f8bca0 fffff800`02a8c5dc : fffff880`02f63180 fffffa80`061bfea8 fffffa80`061bfec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f8bcd0 fffff800`02a896fa : fffff880`02f63180 fffff880`02f6df80 00000000`00000000 fffff880`04172db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f8bd80 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000 movzx eax,byte ptr [rax+0C5C4h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: zd1211Bu+10fa7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: zd1211Bu
IMAGE_NAME: zd1211Bu.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 44ed3c9b
FAILURE_BUCKET_ID: X64_0xD1_zd1211Bu+10fa7
BUCKET_ID: X64_0xD1_zd1211Bu+10fa7
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000070633939, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88009f0cfa7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000070633939
CURRENT_IRQL: 2
FAULTING_IP:
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000 movzx eax,byte ptr [rax+0C5C4h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f8b860 -- (.trap 0xfffff88002f8b860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000070627375 rbx=0000000000000000 rcx=0000000070627375
rdx=fffffa800725f010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88009f0cfa7 rsp=fffff88002f8b9f8 rbp=0000000000000000
r8=fffffa8007b23510 r9=0000000000000050 r10=fffff88002f63b80
r11=fffff88002f8bb18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
zd1211Bu+0x10fa7:
fffff880`09f0cfa7 0fb680c4c50000 movzx eax,byte ptr [rax+0C5C4h] ds: 00000000`70633939=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80469 to fffff80002a80f00
STACK_TEXT:
fffff880`02f8b718 fffff800`02a80469 : 00000000`0000000a 00000000`70633939 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f8b720 fffff800`02a7f0e0 : 00000000`00000001 fffffa80`0725f1bb 00000000`00000000 fffff880`02f6df80 : nt!KiBugCheckDispatch+0x69
fffff880`02f8b860 fffff880`09f0cfa7 : fffff800`02bb42dd fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 : nt!KiPageFault+0x260
fffff880`02f8b9f8 fffff800`02bb42dd : fffffa80`05441160 fffff800`02bb42dd fffffa80`06f3cb28 fffff800`70627375 : zd1211Bu+0x10fa7
fffff880`02f8ba00 fffffa80`05441170 : fffffa80`05441102 fffff880`041985a6 00000000`54627255 00000000`000003ed : nt!ExFreePoolWithTag+0x22d
fffff880`02f8bab0 fffffa80`05441102 : fffff880`041985a6 00000000`54627255 00000000`000003ed fffffa80`70627375 : 0xfffffa80`05441170
fffff880`02f8bab8 fffff880`041985a6 : 00000000`54627255 00000000`000003ed fffffa80`70627375 00000000`00000000 : 0xfffffa80`05441102
fffff880`02f8bac0 fffff880`041835d9 : fffffa80`061bf050 fffffa80`0543a900 ffffffff`c0010000 00000000`00000000 : USBPORT!USBPORT_DereferenceDeviceHandle+0x14e
fffff880`02f8bb20 fffff880`04183ab7 : fffffa80`06f3c702 fffffa80`0725f010 00000000`ffffffff fffffa80`061bfea8 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`02f8bc00 fffff880`0418164f : fffffa80`061bfea8 fffffa80`061bf1a0 fffffa80`061c0040 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`02f8bc60 fffff880`04172f89 : fffffa80`061bf050 00000000`00000000 fffffa80`061bfe02 fffffa80`061bfea8 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`02f8bca0 fffff800`02a8c5dc : fffff880`02f63180 fffffa80`061bfea8 fffffa80`061bfec0 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`02f8bcd0 fffff800`02a896fa : fffff880`02f63180 fffff880`02f6df80 00000000`00000000 fffff880`04172db0 : nt!KiRetireDpcList+0x1bc
fffff880`02f8bd80 00000000`00000000 : fffff880`02f8c000 fffff880`02f86000 fffff880`02f8bd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
zd1211Bu+10fa7
fffff880`09f0cfa7 0fb680c4c50000 movzx eax,byte ptr [rax+0C5C4h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: zd1211Bu+10fa7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: zd1211Bu
IMAGE_NAME: zd1211Bu.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 44ed3c9b
FAILURE_BUCKET_ID: X64_0xD1_zd1211Bu+10fa7
BUCKET_ID: X64_0xD1_zd1211Bu+10fa7
Followup: MachineOwner
---------
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\66\091013-15250-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a1e000 PsLoadedModuleList = 0xfffff800`02c5be50
Debug session time: Tue Sep 10 08: 45: 53.912 2013 (UTC + 2: 00)
System Uptime: 0 days 0: 01: 39.505
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\athrxusb.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrxusb.sys
*** ERROR: Module load completed but symbols could not be loaded for athrxusb.sys
Probably caused by : nwifi.sys ( nwifi!Pt6RepackRecvNBL+fa )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - Operacja uko czona pomy lnie.
FAULTING_IP:
+50502faf0375d854
00000000`00000000 ? ?
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f8b4b8 -- (.exr 0xfffff88002f8b4b8)
ExceptionAddress: fffff88003b3775e (nwifi!Pt6RepackRecvNBL+0x00000000000000fa)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002f8b560 -- (.trap 0xfffff88002f8b560)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800690f9d0 rbx=0000000000000000 rcx=fffff88003b6f6e0
rdx=cddff0c95f1916b2 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003b3775e rsp=fffff88002f8b6f0 rbp=0000000000000000
r8=0000000000000000 r9=000000001cf2122a r10=fffff88003b6d110
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nwifi!Pt6RepackRecvNBL+0xfa:
fffff880`03b3775e 4c034a18 add r9,qword ptr [rdx+18h] ds: 21a0: cddff0c9`5f1916ca=?
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a87c2e to fffff80002a8fed0
STACK_TEXT:
fffff880`02f8a598 fffff800`02a87c2e : fffff880`03b6f280 00000000`00000002 fffff880`02f8ad10 fffff800`02abce28 : nt!KeBugCheck
fffff880`02f8a5a0 fffff800`02ab5bed : fffff800`02c9cc24 fffff800`02bd5a3c fffff800`02a1e000 fffff880`02f8b4b8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f8a5d0 fffff800`02abd250 : fffff800`02bddb5c fffff880`02f8a648 fffff880`02f8b4b8 fffff800`02a1e000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f8a600 fffff800`02aca1b5 : fffff880`02f8b4b8 fffff880`02f8ad10 fffff880`00000000 fffffa80`0691ae50 : nt!RtlDispatchException+0x410
fffff880`02f8ace0 fffff800`02a8f542 : fffff880`02f8b4b8 00000000`00000000 fffff880`02f8b560 fffffa80`06f56010 : nt!KiDispatchException+0x135
fffff880`02f8b380 fffff800`02a8de4a : fffffa80`06ee3ef0 fffffa80`075a3510 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0xc2
fffff880`02f8b560 fffff880`03b3775e : 00000000`00000000 00000000`00000000 fffffa80`06f56010 fffff880`084a5772 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f8b6f0 fffff880`03b386c8 : fffffa80`06eacb1b fffff880`084c9fd8 fffffa80`068a9030 fffffa80`06f56010 : nwifi!Pt6RepackRecvNBL+0xfa
fffff880`02f8b7f0 fffff880`014a52b7 : fffffa80`0615d1a0 fffffa80`0691ae50 00000000`00000001 0000000f`06caa54a : nwifi!Pt6Receive+0x170
fffff880`02f8b850 fffff880`08486c40 : fffffa80`06eacb1b 00000000`00000000 00000000`00000000 fffffa80`060eb700 : ndis! ? : FNODOBFM: `string'+0xccef
fffff880`02f8b8a0 fffffa80`06eacb1b : 00000000`00000000 00000000`00000000 fffffa80`060eb700 fffffa80`00000001 : athrxusb+0xec40
fffff880`02f8b8a8 00000000`00000000 : 00000000`00000000 fffffa80`060eb700 fffffa80`00000001 00000000`00000000 : 0xfffffa80`06eacb1b
STACK_COMMAND: kb
FOLLOWUP_IP:
nwifi!Pt6RepackRecvNBL+fa
fffff880`03b3775e 4c034a18 add r9,qword ptr [rdx+18h]
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nwifi!Pt6RepackRecvNBL+fa
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nwifi
IMAGE_NAME: nwifi.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc3b
FAILURE_BUCKET_ID: X64_0x1E_0_nwifi!Pt6RepackRecvNBL+fa
BUCKET_ID: X64_0x1E_0_nwifi!Pt6RepackRecvNBL+fa
Followup: MachineOwner
---------
Kod:
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C: \Users\user\Desktop\bsody\66\091013-16796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: symsrv*symsrv.dll*c: \symb*http: //msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (3 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a0d000 PsLoadedModuleList = 0xfffff800`02c4ae50
Debug session time: Tue Sep 10 12: 52: 26.410 2013 (UTC + 2: 00)
System Uptime: 0 days 0: 01: 14.035
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C2, {99, fffffa8006906960, 0, 0}
Probably caused by : rdyboost.sys ( rdyboost!ST_STORE<SMD_TRAITS>: StReleaseRegion+59 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000099, Attempt to free pool with invalid address (or corruption in pool header)
Arg2: fffffa8006906960, Address being freed
Arg3: 0000000000000000, 0
Arg4: 0000000000000000, 0
Debugging Details:
------------------
FAULTING_IP:
rdyboost!ST_STORE<SMD_TRAITS>: StReleaseRegion+59
fffff880`015a6f4d 4c892cf7 mov qword ptr [rdi+rsi*8],r13
BUGCHECK_STR: 0xc2_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002f083dc to fffff80002a7ef00
STACK_TEXT:
fffff880`0aa0d6e8 fffff800`02f083dc : 00000000`000000c2 00000000`00000099 fffffa80`06906960 00000000`00000000 : nt!KeBugCheckEx
fffff880`0aa0d6f0 fffff800`02b34161 : 00000000`00000000 00000000`00000000 00000000`00189aa6 fffff800`02aa4a96 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`0aa0d730 fffff800`02bb0698 : fffffa80`06906950 00000000`00000420 00000000`0000004e fffff800`02b45830 : nt!VerifierFreeTrackedPool+0x41
fffff880`0aa0d770 fffff880`015a6f4d : 00000000`00000200 fffffa80`059fa078 00000000`00000200 fffff880`015a799a : nt!ExFreePool+0xd69
fffff880`0aa0d820 fffff880`015a686f : fffffa80`059fa078 00000000`00000000 fffffa80`05e73ff4 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>: StReleaseRegion+0x59
fffff880`0aa0d880 fffff880`015a555e : fffffa80`059fa010 00000000`00000001 fffffa80`059fa010 00000000`00000001 : rdyboost!ST_STORE<SMD_TRAITS>: StDmCleanup+0x183
fffff880`0aa0d8c0 fffff880`015a4a23 : fffffa80`059fa010 00000000`00000001 fffffa80`059fa010 fffff880`0aa0dca0 : rdyboost!SMKM_STORE<SMD_TRAITS>: SmStCleanup+0x7a
fffff880`0aa0d900 fffff880`015a4986 : fffff880`015c78f0 00000000`00000008 fffffa80`059fa010 fffff880`015c7870 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>: SmStoreMgrCallback+0x4b
fffff880`0aa0d940 fffff880`015cb4b8 : fffff880`015c7870 fffff880`0aa0dca0 00000000`00000000 fffffa80`07d69480 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>: SmCleanup+0x9a
fffff880`0aa0d970 fffff880`015acb9e : fffffa80`07d69480 fffffa80`07d69480 fffffa80`07d29bf0 00000000`00000000 : rdyboost!SmdRBContextShutdown+0x94
fffff880`0aa0d9b0 fffff800`02d973a7 : 00000000`00000000 fffffa80`07b2d7e0 fffffa80`07b2d8f8 fffffa80`07d69480 : rdyboost!SmdDispatchDeviceControl+0x3ce
fffff880`0aa0da10 fffff800`02d97c06 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`0aa0db40 fffff800`02a7e153 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`000006d8 : nt!NtDeviceIoControlFile+0x56
fffff880`0aa0dbb0 00000000`76d3ff2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0216ed08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d3ff2a
STACK_COMMAND: kb
FOLLOWUP_IP:
rdyboost!ST_STORE<SMD_TRAITS>: StReleaseRegion+59
fffff880`015a6f4d 4c892cf7 mov qword ptr [rdi+rsi*8],r13
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: rdyboost!ST_STORE<SMD_TRAITS>: StReleaseRegion+59
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc48a
FAILURE_BUCKET_ID: X64_0xc2_99_rdyboost!ST_STORE_SMD_TRAITS_: StReleaseRegion+59
BUCKET_ID: X64_0xc2_99_rdyboost!ST_STORE_SMD_TRAITS_: StReleaseRegion+59
Followup: MachineOwner
---------
W zamian za pomoc oczekuję poprawnej pisowni. Stop niechlujstwu.
Jak mądrze zadawać pytania? - przejrzyj poradnik na forum.
Nie udzielam porad via PW.
(Ten post był ostatnio modyfikowany: 14.09.2013 17:21 przez thermalfake.)
14.09.2013 17:08
|
tomjar
Nowy
Liczba postów: 5
|
RE: Bluescreen spowodowany prawdopodobnie anteną WiFi- Win 7
Dzięki za informacje. dzisiaj porobię to o czym wspomniałeś i powiem jak się sprawuje. Jeszcze raz dzięki
|
tomjar
Nowy
Liczba postów: 5
|
RE: BSOD: spowodowany prawdopodobnie anteną WiFi
Zainstalowałem service packa, reinstalowałem eseta, odinstalowałem sterki od wifi( i o dziwo windows sam później zainstalował) i na razie brak bsodów
|
peciaq
VIP
Liczba postów: 5.100
|
RE: BSOD: spowodowany prawdopodobnie anteną WiFi
To póki co zamykam, jak powrócą to napisz do mnie PW i wątek otworzymy.
Wątek rozwiązany.
(Ten post był ostatnio modyfikowany: 19.09.2013 16:56 przez peciaq.)
19.09.2013 16:56
|